Analysis

  • max time kernel
    74s
  • max time network
    80s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2024 16:35

General

  • Target

    https://oxy.st/d/tELh

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://oxy.st/d/tELh
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb62046f8,0x7ffcb6204708,0x7ffcb6204718
      2⤵
        PID:4312
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:2
        2⤵
          PID:3764
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3352
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:8
          2⤵
            PID:1488
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
            2⤵
              PID:4820
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
              2⤵
                PID:1216
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:1
                2⤵
                  PID:440
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:1
                  2⤵
                    PID:3392
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:1
                    2⤵
                      PID:1000
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:1
                      2⤵
                        PID:1496
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:1
                        2⤵
                          PID:2484
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:1
                          2⤵
                            PID:1544
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:1
                            2⤵
                              PID:3636
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
                              2⤵
                                PID:5236
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3284 /prefetch:8
                                2⤵
                                  PID:5356
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3284 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5376
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6396 /prefetch:8
                                  2⤵
                                    PID:5628
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:1
                                    2⤵
                                      PID:5636
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6484 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5648
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:1
                                      2⤵
                                        PID:1648
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3800 /prefetch:1
                                        2⤵
                                          PID:2076
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6680 /prefetch:1
                                          2⤵
                                            PID:2312
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2441873035081041863,2362203430374688241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6656 /prefetch:1
                                            2⤵
                                              PID:5356
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:2892
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:4732
                                              • C:\Windows\System32\rundll32.exe
                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                1⤵
                                                  PID:6024
                                                • C:\Users\Admin\Desktop\NursultanCrack.exe
                                                  "C:\Users\Admin\Desktop\NursultanCrack.exe"
                                                  1⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1372
                                                  • C:\Windows\System32\Wbem\wmic.exe
                                                    "wmic.exe" csproduct get uuid
                                                    2⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5528
                                                • C:\Windows\system32\taskmgr.exe
                                                  "C:\Windows\system32\taskmgr.exe" /4
                                                  1⤵
                                                  • Checks SCSI registry key(s)
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:4572
                                                • C:\Users\Admin\Desktop\NursultanCrack.exe
                                                  "C:\Users\Admin\Desktop\NursultanCrack.exe"
                                                  1⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5816
                                                  • C:\Windows\System32\Wbem\wmic.exe
                                                    "wmic.exe" csproduct get uuid
                                                    2⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5696

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\NursultanCrack.exe.log

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  8094b248fe3231e48995c2be32aeb08c

                                                  SHA1

                                                  2fe06e000ebec919bf982d033c5d1219c1f916b6

                                                  SHA256

                                                  136c30d964f4abbb5279bdc86d0e00578333782f15f05f0d2d050730dcb7a9bc

                                                  SHA512

                                                  bf27a3822008796370e2c506c910a40992b9240606ea1bc19f683b2fee86b81897660ac0cf8e746ca093dae9e408949e2e9002ded75678a69f020d3b0452801f

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  7c6136bc98a5aedca2ea3004e9fbe67d

                                                  SHA1

                                                  74318d997f4c9c351eef86d040bc9b085ce1ad4f

                                                  SHA256

                                                  50c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2

                                                  SHA512

                                                  2d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  5c6aef82e50d05ffc0cf52a6c6d69c91

                                                  SHA1

                                                  c203efe5b45b0630fee7bd364fe7d63b769e2351

                                                  SHA256

                                                  d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32

                                                  SHA512

                                                  77ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  888B

                                                  MD5

                                                  7492c0be5e27a24eae4dbf8b4428c801

                                                  SHA1

                                                  61cb430e113e85993b784852a46ac4e6106bc927

                                                  SHA256

                                                  1591b95e1ea2ee72a79fd070cf940f92108a04a7da18b22accf61df0d92786b1

                                                  SHA512

                                                  410d6d40bfd68747fb111aa27038cc1a19bf1499357e1a5ae831061bb639d1c839c1a47a6e7638ae59ddbebf46dd4e123738aeb2b9f1997b7db70509ea62341f

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_download.oxy.st_0.indexeddb.leveldb\CURRENT

                                                  Filesize

                                                  16B

                                                  MD5

                                                  46295cac801e5d4857d09837238a6394

                                                  SHA1

                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                  SHA256

                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                  SHA512

                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_download.oxy.st_0.indexeddb.leveldb\MANIFEST-000001

                                                  Filesize

                                                  23B

                                                  MD5

                                                  3fd11ff447c1ee23538dc4d9724427a3

                                                  SHA1

                                                  1335e6f71cc4e3cf7025233523b4760f8893e9c9

                                                  SHA256

                                                  720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed

                                                  SHA512

                                                  10a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  21c8a866b75f51974dfb6a8c768eded8

                                                  SHA1

                                                  b027ae6f0a193e33dc7eec663553136171d30d4b

                                                  SHA256

                                                  ca9d0e2019b7059f2464ca5ae72a30066e437513e1f36bbc9807621d6829b31d

                                                  SHA512

                                                  e3ff19bfe00c01c448be58c9bc32312283fd67f953138d0717255453f3f21ee0af7635c580db47ceb8b053e32c3f34d8225779d5c1da147062da29698f664db6

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  cebb61a94f98489da785e6d759fb1f09

                                                  SHA1

                                                  d135b7d75899f66c7e5dc203d19725027bc448ba

                                                  SHA256

                                                  75dee47c6a0b663f3bf7c20208d6ea6a78b32e9eb4cb063088d0d2a3e5665c99

                                                  SHA512

                                                  8da55a8b4199abab92b8e13cce2f528f4bc24100e2dfdc7880de58a9157d19497609c010f7b47ac9087b5db92af87f373f5825908e469e75cbfe26ba07566c7f

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  557dd5ea688a5a798725067fe3a950c5

                                                  SHA1

                                                  74f6b7f9987980b799fc819c01b1d1e6689b0596

                                                  SHA256

                                                  c32406073394299606cac46c7187777851acc5093e263a44097533b09eb95db5

                                                  SHA512

                                                  3a8efe8352190982bec92d7b2872d7027fe1bdc0f0141cc2b0ca3267e2e45a987b6af878bbd973607ff3fd8fd2f0d6b266f65b03608d3a3ad57abee660d2ee58

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  af44c7799f21cca9cf997f5c80c70c1a

                                                  SHA1

                                                  6dcd7385b065c2308f0f14e06abd473e5a03b076

                                                  SHA256

                                                  8c2887fff1662b4577f4ce0ceaf8743765d8b584170d2b2d347b629f611f93fc

                                                  SHA512

                                                  84ad70459f3be6cd35c9cfc2e3af2434ee3516e7a73019739f83eab14f87ad64dba75612fbe88b879e3e72173e349f30c9fec356ddde9cd3a420278b4d9fcad8

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  407512ac88d297f4d39a509da620f175

                                                  SHA1

                                                  9e305f3bd4b1d3d2edf7449a5c45203b4f858748

                                                  SHA256

                                                  3726cefbe11e7296b63792553db29bf7c9906bca1e1ac4965313abb59445cccb

                                                  SHA512

                                                  58dd32d799c01942523e5e45c5c47dd3d424e61732dc641d47ee31db0a9cf1fe0e8cbd1086fbdd972b780303f59c5200802f4f04025453f4921e22c4624cd70d

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  d686deea6552a99c3dea5169c8674cd9

                                                  SHA1

                                                  819bce9f4dec2fe3d962b3b2d674c6a097bceb28

                                                  SHA256

                                                  e18a94f4917d7c66c534d5fa7895dda86b8278777943d25fc37936eb9bedb8e9

                                                  SHA512

                                                  0e2bdca11c77348bc59c4140caab9298022d1890a54a664ab7973659512da5aa8f6a6515171ffac691c6600233fa9bb32280049d00c0a1529cd3cbd03c0e23a4

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  016d2ed9fe9b886f2bbcf86f2b76ca3e

                                                  SHA1

                                                  3cb097e8fe56f86b792daffd8d98a1b710a0582c

                                                  SHA256

                                                  02a1b0203b4921c3f707ee3c4d3a7bd72cbf99b0d666ad46354eb65165c3e237

                                                  SHA512

                                                  57f0c0caca2be364e6d66acd69da559e42996732e5859e8c62e413e216c2cd792309ca97789b7cb83552ff2e69cd5dd3d3b46a405dee96491f40d903b98438f4

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57b798.TMP

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  5e66a35102774b9db00beac69d1ef0b5

                                                  SHA1

                                                  abd1e4fb197210e11999c8830e8de5d965d91fc1

                                                  SHA256

                                                  7dbe346033c149d02d1d1aa1ee9e6ccb7a61685a973625a956c30e4ef72d501d

                                                  SHA512

                                                  2b30452f4100f5da412957e9e6d6710aafdcafc58ea84d5a1abdc98cf00fbebeb213d5d86561d61945dd001c4c0b0e7b2328d9507a199464abcfb785a1055272

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                  Filesize

                                                  16B

                                                  MD5

                                                  6752a1d65b201c13b62ea44016eb221f

                                                  SHA1

                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                  SHA256

                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                  SHA512

                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  4a3a2504076cfbb0053f6be40d7b9d43

                                                  SHA1

                                                  5d180059efccaf21d0493683d4788c0340b967f3

                                                  SHA256

                                                  c086e21865bffa574237656ca6a3016b1526cb81c6032e776d99252882103e80

                                                  SHA512

                                                  06d3b94218c148d551535e9854ff42965eaed0aac4a0beabc5702248770aa0c5fb4c07babe5b2e6c8db2a71bc5003bafcd2e81fa328ff5ccbc8207c0cb3bdb38

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  4f00ee05f617654bcf13535a9a3b94ad

                                                  SHA1

                                                  38c1956176bc2853ea358a535417a675de43211a

                                                  SHA256

                                                  1c567254fea8b416ee435aff4b7906380556e42678b435c2db2f098ece4d8726

                                                  SHA512

                                                  1b7ddbb8dd17781be5cebbf3af14a4415c12fb7b5f3e7c58c519baaed7ad86466271bbacb7173736bcc77db5d7d8d32e3b24b3a4a359a92a287b128084d69126

                                                • C:\Users\Admin\Downloads\CrackByWinni.zip

                                                  Filesize

                                                  91KB

                                                  MD5

                                                  e54ccac35df48bc3da485079e474a8ea

                                                  SHA1

                                                  bf9eee85e24e29c055d757b50a3297867687ba51

                                                  SHA256

                                                  350b85d61aab608048c7faa7c7e5a04dfa74cb2645ea02efaba4c7c9b655bdc6

                                                  SHA512

                                                  4319bf2cb5490232fd44b91648f09f1d7f35472f3c8737cb95963941c88f8eda91bc87fab7a25288d3b6ac2c91473787b2e4aa481cf08f7eaadac5e777c188a3

                                                • memory/1372-290-0x00007FFCA31B0000-0x00007FFCA3C71000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/1372-293-0x00007FFCA31B0000-0x00007FFCA3C71000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/1372-289-0x00000224123F0000-0x0000022412430000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/1372-291-0x000002242C890000-0x000002242C8A0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4572-303-0x0000028474DD0000-0x0000028474DD1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4572-301-0x0000028474DD0000-0x0000028474DD1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4572-304-0x0000028474DD0000-0x0000028474DD1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4572-294-0x0000028474DD0000-0x0000028474DD1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4572-305-0x0000028474DD0000-0x0000028474DD1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4572-306-0x0000028474DD0000-0x0000028474DD1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4572-295-0x0000028474DD0000-0x0000028474DD1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4572-302-0x0000028474DD0000-0x0000028474DD1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4572-300-0x0000028474DD0000-0x0000028474DD1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4572-296-0x0000028474DD0000-0x0000028474DD1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5816-335-0x00007FFCA1E10000-0x00007FFCA28D1000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/5816-345-0x00007FFCA1E10000-0x00007FFCA28D1000-memory.dmp

                                                  Filesize

                                                  10.8MB