Resubmissions

27-03-2024 16:01

240327-tgmczaah2s 8

27-03-2024 15:52

240327-tbdhwafd87 8

Analysis

  • max time kernel
    627s
  • max time network
    675s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2024 16:01

General

  • Target

    UnlockTool-2024-03-22-0.exe

  • Size

    184.6MB

  • MD5

    49297f37905a3d9497115cb2cfea4d8a

  • SHA1

    f52fdd473233453bf037e0d15089035d3d481ac2

  • SHA256

    11bf0c36322d987b12c4a944672f9ab5b095db9e66181b641f8fa1bbe0b9e193

  • SHA512

    d23b30c6645ac8fbaf5b33526702720cc4f1a6db6c8b5b35036c7d4207898d10adbcce5f9ca8615ec68729f300910b04a5e452877dfab8543a36caf176b8023c

  • SSDEEP

    3145728:H7fHpOE8Q/K6jVx913QrdPoBRGLj6+4jn5G1U72k32SriPd3:HbFXLjVx9tQqBRG36+475p77N4

Score
8/10

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 2 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\UnlockTool-2024-03-22-0.exe
    "C:\Users\Admin\AppData\Local\Temp\UnlockTool-2024-03-22-0.exe"
    1⤵
    • Manipulates Digital Signatures
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3740
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://unlocktool.net/pricing/
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4380
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xdc,0x104,0x7ff995a546f8,0x7ff995a54708,0x7ff995a54718
        3⤵
          PID:3968
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:2
          3⤵
            PID:4804
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4568
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:8
            3⤵
              PID:3708
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
              3⤵
                PID:3472
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
                3⤵
                  PID:2756
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:1
                  3⤵
                    PID:1248
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:1
                    3⤵
                      PID:400
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:1
                      3⤵
                        PID:2340
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:8
                        3⤵
                          PID:116
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:8
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2320
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:1
                          3⤵
                            PID:3924
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:1
                            3⤵
                              PID:2388
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:1
                              3⤵
                                PID:4624
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2340 /prefetch:1
                                3⤵
                                  PID:4620
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:1
                                  3⤵
                                    PID:1588
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:1
                                    3⤵
                                      PID:2756
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:1
                                      3⤵
                                        PID:2624
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:1
                                        3⤵
                                          PID:4080
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,10740581035239991490,13635629186457396581,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:2
                                          3⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:4328
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:4364
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:3096

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\UnlockTool\Drivers\pwndfu\x86\libusb0.dll

                                          Filesize

                                          45KB

                                          MD5

                                          1a534450750eca1f3d951def8d9965bf

                                          SHA1

                                          7dd82b6d52a840c4979a7515fc7a9ca3725363c4

                                          SHA256

                                          5e84d13636fbce7869cddc8b20c7d83fa0063e98c319e8e5ab751edc9ee1da76

                                          SHA512

                                          3acdfff24a4d9ebb4e9647afccf95f33b4580980fb35a91eff65a01ce470b0bbc1a3a27c476653911f1fa431757ca64c945da89da54bffa599744f29123ef715

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          0764f5481d3c05f5d391a36463484b49

                                          SHA1

                                          2c96194f04e768ac9d7134bc242808e4d8aeb149

                                          SHA256

                                          cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3

                                          SHA512

                                          a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          e494d16e4b331d7fc483b3ae3b2e0973

                                          SHA1

                                          d13ca61b6404902b716f7b02f0070dec7f36edbf

                                          SHA256

                                          a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165

                                          SHA512

                                          016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          672B

                                          MD5

                                          4c277aa70a5528b8a25fca9a57111b6f

                                          SHA1

                                          df847728a0cd81fb432825264dd7341ce0e11398

                                          SHA256

                                          9a13335a0340f830396181fff121de3a499b5be5c60adeb664d365f98ba48c33

                                          SHA512

                                          154fe4e731803a52f16efc8872c9df2f68819afc1b191a9dd0d5da4c9934a56b4f1a2ecd412657c57813832ecf9cf9df767eeccbba79b62d67f736e8f904eb55

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                          Filesize

                                          1KB

                                          MD5

                                          8a1ba06adb1eea45b029c732da15c795

                                          SHA1

                                          b9d46290e5762ff8552707370f28c48bfd8eee0f

                                          SHA256

                                          1cc625439b0fe4be3ca0baf8ff75dfe3fecdc7ce5eb7642c2d8808ca7ce9e72c

                                          SHA512

                                          5a22d6ba0307f9ffeb330991aeb0c37aece0a89e0ba8ab9f8ab72657f87011ea0273b9cfc35f24107616b1226b0911d3a0c43f90281e9866b9eeee47c1d553d8

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                          Filesize

                                          1KB

                                          MD5

                                          29ea3318ba223fc69f34cdb3adce71b8

                                          SHA1

                                          09c83a01fcd10955edca26d5053926b2c45cc75e

                                          SHA256

                                          f435ea9bd8c448030f0455495561cd368b05c476494c0f62cf34b85039ee633b

                                          SHA512

                                          d4d01bf7b9fa5aca017201fc159399e77c0f6137c833c6167743df421115c295357d130e87855881deb15be20d3e3ab228a776c331e18f668c15dadc0f603369

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          95d407c549a6de9224c4887c9cfba962

                                          SHA1

                                          6eaa71e12cc0e046fa43a2ab627d8813c453ab22

                                          SHA256

                                          2109ff3ef5d359c87cb9568a2926029fe6cda9eec850d5f12207f5625cedf0d4

                                          SHA512

                                          5296442f8b7bc88d6af6a34451e2caad14a57e9cd4758a0013e711d1fb65fe021a99cfd8b7d13c30e203ea91346a05a2520cf2d8d53d292514d75a13b78cf8bf

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          4beb5efcb0bddd42c3e28e1659bd211e

                                          SHA1

                                          b4d71b5c50a443e36f89b6fe5b6425a2fad9b9b2

                                          SHA256

                                          830cfbbc5a212abcd883ebdbfaa3ab162fe2c379c86bdadcc4ba331cb0123f2c

                                          SHA512

                                          9b8a3deca7e7c5f017733067c21ba861d8f4680111a4244e12da38793ff1cd4b1393af2c0d2a1fb615e38b17059f1f01273548b5c4f8fce371f44812dac42696

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          a7302b2471c152ab8268d988620ac827

                                          SHA1

                                          a175d9b517ae444c5c60d240f3cd323c6af055af

                                          SHA256

                                          acb01b85fb9330d89d4e521672877809498ed44bb16d32732ff12e65ecdffb7e

                                          SHA512

                                          4964127714852e78dc1a83d2160b2a4c23086c9aa5a2f51e97b052668e681e04dea463ea1c233f4fcbf496a7344040ebf5b517b961db996d7692778e9113923c

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          7KB

                                          MD5

                                          5a7a39e8032c7e1c4fa2ea0a6d0e7ebe

                                          SHA1

                                          bc4faf0e31feff1897a6b7313278a3673cc0ce96

                                          SHA256

                                          9b7c29a1cf0ca3ee03019a77a8e4c9e3546d47640faca1e2876e94f24b7beabe

                                          SHA512

                                          60efe8a8f02706c5f37cf24235ef8299a69d920f02560776112ff040ecd4858fda9cdec1264840635815696da3649601944aab87e465953f3a560be2e7a11f7e

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          5963c80dabf0fd8dded74d32e0d96230

                                          SHA1

                                          8aa41c8003ec5fa48ca8fb66e358c613b7299f5f

                                          SHA256

                                          419ed780d3b3fe6827920dec0496f3bf1152df277815632ba765627aa84f5dab

                                          SHA512

                                          63523c3c821cb4f5076a47b287bd3e2e66386d00a5cd51096f12545db4e8d97ce525eab1fcbf123da2c96282929badc1e4664473ec72b7a9ca87600a5d0b6a52

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          6752a1d65b201c13b62ea44016eb221f

                                          SHA1

                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                          SHA256

                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                          SHA512

                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          12KB

                                          MD5

                                          ee057a198f2896fa5d614686545b8093

                                          SHA1

                                          fb3bbceaaa5cf6e8e57bcd57460b890ad8a7abc7

                                          SHA256

                                          989b4ae46c62d561cda346607942ff57edf8a6d7d0b428dd2f46257141b800f9

                                          SHA512

                                          b2fb9c6a7b2f7e5538f8928d610e9da8ce01373fc1a46f9d4345cfbfcfecd80f16661e5ad606a2f2423bc76f8591277a46c3887cd81d10518c2f8b88db27eab3

                                        • memory/3740-12-0x000000001B010000-0x000000001B011000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-37-0x000000001CAC0000-0x000000001CBB4000-memory.dmp

                                          Filesize

                                          976KB

                                        • memory/3740-16-0x000000001B050000-0x000000001B051000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-17-0x000000001B060000-0x000000001B061000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-18-0x000000001B070000-0x000000001B071000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-19-0x000000001B080000-0x000000001B081000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-20-0x000000001B090000-0x000000001B091000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-21-0x000000001B0B0000-0x000000001B0B1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-22-0x000000001C970000-0x000000001C971000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-23-0x000000001C980000-0x000000001C981000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-24-0x000000001C990000-0x000000001C991000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-25-0x000000001C9A0000-0x000000001C9A1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-26-0x000000001C9B0000-0x000000001C9B1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-27-0x000000001C9C0000-0x000000001C9DB000-memory.dmp

                                          Filesize

                                          108KB

                                        • memory/3740-31-0x000000001C9C0000-0x000000001C9DB000-memory.dmp

                                          Filesize

                                          108KB

                                        • memory/3740-32-0x000000001C9E0000-0x000000001C9F2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/3740-36-0x000000001C9E0000-0x000000001C9F2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/3740-15-0x000000001B040000-0x000000001B041000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-51-0x000000001CAC0000-0x000000001CBB4000-memory.dmp

                                          Filesize

                                          976KB

                                        • memory/3740-52-0x000000001CA10000-0x000000001CA4E000-memory.dmp

                                          Filesize

                                          248KB

                                        • memory/3740-78-0x000000001D160000-0x000000001D161000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-14-0x000000001B030000-0x000000001B031000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-386-0x000000001D160000-0x000000001D161000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-13-0x000000001B020000-0x000000001B021000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-0-0x000000001AB10000-0x000000001AB11000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-11-0x000000001B000000-0x000000001B001000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-10-0x000000001AFF0000-0x000000001AFF1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-9-0x000000001AFE0000-0x000000001AFE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-8-0x000000001AFD0000-0x000000001AFD1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-7-0x000000001ACC0000-0x000000001ACC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-6-0x000000001ACB0000-0x000000001ACB1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-5-0x000000001ACA0000-0x000000001ACA1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-4-0x000000001AC90000-0x000000001AC91000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-3-0x000000001AC80000-0x000000001AC81000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-2-0x000000001AC70000-0x000000001AC71000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3740-1-0x000000001AC60000-0x000000001AC61000-memory.dmp

                                          Filesize

                                          4KB