Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    85s
  • max time network
    86s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2024, 02:49

Errors

Reason
Machine shutdown

General

  • Target

    Iris-Installer-3.2.0.jar

  • Size

    1.6MB

  • MD5

    97cfa283f188d846c86e8c0e58d00db8

  • SHA1

    b9c83d9d0068a89434aaf05c2a1b594d4a1d0ee8

  • SHA256

    8649d34616022150e1a099737bce5c07351fd3dfce7ca0978a82b4a435e0931f

  • SHA512

    358d6ff9f6a7c594e482a64e1085bd56366dbf094bd81907a9709bb54e2e588d4b8d76da2c8dad5edd2de2ec9a7607758174d16cd919add950ad0cddeb619f13

  • SSDEEP

    49152:43VZ7NK4Y745jZOTTGANUjKUlqGFLiELag7p9UD5DBE9:43VZ5w74LkKbqwt4a

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\Iris-Installer-3.2.0.jar
    1⤵
      PID:5084
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3340
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffa74e046f8,0x7ffa74e04708,0x7ffa74e04718
        2⤵
          PID:4992
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2
          2⤵
            PID:3996
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:216
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:8
            2⤵
              PID:4000
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
              2⤵
                PID:2176
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                2⤵
                  PID:5020
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:1
                  2⤵
                    PID:836
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                    2⤵
                      PID:4920
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:8
                      2⤵
                        PID:3052
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2292
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:1
                        2⤵
                          PID:4008
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:1
                          2⤵
                            PID:760
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5192 /prefetch:8
                            2⤵
                              PID:4872
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4952 /prefetch:8
                              2⤵
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1312
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:1
                              2⤵
                                PID:2152
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:1
                                2⤵
                                  PID:2968
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:1
                                  2⤵
                                    PID:3920
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5720 /prefetch:8
                                    2⤵
                                      PID:1288
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                                      2⤵
                                        PID:1956
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2096,11374761592508616352,1435950450680683576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4188 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1588
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:1288
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:1732
                                        • C:\Windows\System32\rundll32.exe
                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                          1⤵
                                            PID:5004
                                          • C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe
                                            "C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"
                                            1⤵
                                              PID:2724
                                            • C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe
                                              "C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"
                                              1⤵
                                                PID:1840
                                              • C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe
                                                "C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"
                                                1⤵
                                                • Modifies WinLogon for persistence
                                                • UAC bypass
                                                • Disables RegEdit via registry modification
                                                • Drops desktop.ini file(s)
                                                • Sets desktop wallpaper using registry
                                                • Drops file in Windows directory
                                                PID:2180
                                              • C:\Windows\system32\LogonUI.exe
                                                "LogonUI.exe" /flags:0x4 /state0:0xa3961855 /state1:0x41c64e6d
                                                1⤵
                                                • Modifies data under HKEY_USERS
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2696
                                              • C:\Windows\System32\rundll32.exe
                                                C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                                                1⤵
                                                  PID:2180

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  47b2c6613360b818825d076d14c051f7

                                                  SHA1

                                                  7df7304568313a06540f490bf3305cb89bc03e5c

                                                  SHA256

                                                  47a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac

                                                  SHA512

                                                  08d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  e0811105475d528ab174dfdb69f935f3

                                                  SHA1

                                                  dd9689f0f70a07b4e6fb29607e42d2d5faf1f516

                                                  SHA256

                                                  c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c

                                                  SHA512

                                                  8374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  3KB

                                                  MD5

                                                  d0e666673f2f4e3c9324f505612ac31a

                                                  SHA1

                                                  09fac2fd5f58f51770088b73a30dde09c75214d1

                                                  SHA256

                                                  c3e30041077bbc73baebe22da33f1f70f009e1bb3710a58bb64203f444166ccd

                                                  SHA512

                                                  c19cc7961cc85e4452b19ea58d25b01f9275859fc6487d49777b7d693f040b02f5245720010c3074a50d5bb939a8fbfa18885538a490b6ba47e2d1fc9f305efe

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  c9d47463a1da8312bfb81113ee683bdb

                                                  SHA1

                                                  9c462dc4a5c859be931cdf3207f6f100ae78e94c

                                                  SHA256

                                                  ba2319622284ad6e1f830194328536461f50efaa5699adfc5c6058470a31061d

                                                  SHA512

                                                  974efc303e52e5627e82103f9315b2a572099a6311ed8d5469378b5aaafff3f2ccbe756f11ca21a53ee4e173bc2255c7f7080f8ad7c45cd93a2f8b632040fa8e

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  2203cc3f948bc7cc9370d5bec48b1582

                                                  SHA1

                                                  2d19745000cc768a338bdad15bf9adda8bc7e8e8

                                                  SHA256

                                                  4a730d037922cf321d7dd55cffe4cede55635fce8f6f6a80e433d3230b4fa26f

                                                  SHA512

                                                  7d2e0aaf93eb5c1bbbec5a26ca3342540e3103fd748cc6a115f705b112d086c5ac4ec203ec94b9aafcbd0ce62f1dfe5575d4df2d3514df9f92301334d36f83e1

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  ceb767875ffba3e11960cec09b4cf2a1

                                                  SHA1

                                                  a7dc23eeeff1d05de5542e395d2a72b06d0eb53e

                                                  SHA256

                                                  88419501f7cb5a51e02214235d49eb651fde97a0f29fc51ac64ab32e275d734c

                                                  SHA512

                                                  24d07b8fafcb8497f10b719256fb7489438bbf651cb712b63857b9d80129f819f2cdfb134d7078d014744a8605f1bd40bbe087404b071dce1c2d894f03d94c1d

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  2fd15776443a2fa216c461d851f23345

                                                  SHA1

                                                  0fcb99588c6baca3c5fb59b3ed5b9c5aa7a02b11

                                                  SHA256

                                                  8aa5a122edb0318e770b037b4d064b670c4684c74ff1dcc94b8a237a577b0b54

                                                  SHA512

                                                  15a0f5b1f60e44a232ff7a9ab800efcec8431012365245f2053cb032f0708991fee12b9395ba34bbfc4f10fc08fe5ca508d541cdf1a48ee07f9ed6d32b050c58

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  4fb67c728313d980aadbc573003c54b3

                                                  SHA1

                                                  e79ef822f47d59761fc467ca226b17e1878d0c8c

                                                  SHA256

                                                  c7c3bc8cf57a66acdec64cf500fab881b9937fad09de8d013f5de013cce31b26

                                                  SHA512

                                                  08247229364ef4394a328827b92effd572acb4befacf71227a6768daf196467653d96d91b9e2aebd87d262239e4a233de49c517daf02d1259428cc9589200565

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  02cb01a47d1806759903bf6ed371b314

                                                  SHA1

                                                  7385c715451ddea786d654dc40e3c5fd0f1a3b92

                                                  SHA256

                                                  cb7411c7728b776eeee0ba06e26a87ca71fb4f123a9afb072a4a22c955022fb6

                                                  SHA512

                                                  4b905ecf9594e9d0a7da59f569ceda3d9261a45167ab46134bd5d6487aeaf57f83d253981441223b22547f46b8ae548291017c5c387fc8960243596a1d6d948f

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57b67f.TMP

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  018bc96091be5e6fd7fcbc848bcbda39

                                                  SHA1

                                                  d0ca7ebcfaf66a6ecf605d69b9dbe204109e9379

                                                  SHA256

                                                  404d8273f31af9d6a5bd429ad7012511624901e016371eeec9ded0fc9c0a2bef

                                                  SHA512

                                                  c1e4cf1c4d848ed0ad18828961b31afac0fa7c13cc2bbc974844837a4e66e72c284d2c07f80ead048d855700b0f2cfb135201ce9d9b9e948e9f127d800601c5d

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                  Filesize

                                                  16B

                                                  MD5

                                                  6752a1d65b201c13b62ea44016eb221f

                                                  SHA1

                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                  SHA256

                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                  SHA512

                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  0740e07552210291d0d3d447f2bdd48a

                                                  SHA1

                                                  eafa983d89e6bf55c0fd03505a66723299955e21

                                                  SHA256

                                                  8758ed17dd5fc1cfc06065bbd9fa5b7d901665240557f5244f2d3da6a485391e

                                                  SHA512

                                                  8d1bb4c0cdcebc0e04a8d69ca05413a46d6853e13d4b4465e91258fdbe50aebe420732b0522021680b808caf6fa4762c98a7632ac5feae983ed241d82c2bafa9

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  de4389da5c9cd4fb2c6e55b7c84be96f

                                                  SHA1

                                                  6abbc2a89fb332b4196494fc67d4752a491a6555

                                                  SHA256

                                                  8ec21a91f4acb8e4c50956d20098cff178e93abd0ea11f04537d55b4d11ea04d

                                                  SHA512

                                                  a24fb023127a0cdd759fefb37932f9ad53e311ced1106b3395429eae20281eb601274863535277024f6d41c7123406a9a8d05b7c0d5bbc2c06df2f95b6610757

                                                • C:\Users\Admin\Downloads\NoEscape.exe.zip

                                                  Filesize

                                                  13.5MB

                                                  MD5

                                                  660708319a500f1865fa9d2fadfa712d

                                                  SHA1

                                                  b2ae3aef17095ab26410e0f1792a379a4a2966f8

                                                  SHA256

                                                  542c2e1064be8cd8393602f63b793e9d34eb81b1090a3c80623777f17fa25c6c

                                                  SHA512

                                                  18f10a71dc0af70494554b400bdf09d43e1cb7e93f9c1e7470ee4c76cd46cb4fbf990354bbbd3b89c9b9bda38ad44868e1087fd75a7692ad889b14e7e1a20517

                                                • C:\Users\Public\Desktop\ୃKכ〨᫭⫰⑄⃏྽ᘾ⒂وᘗᣞೈؗ՞১৫⅊⻇෉ᚿⶖᰥᑠ♚⊣

                                                  Filesize

                                                  666B

                                                  MD5

                                                  e49f0a8effa6380b4518a8064f6d240b

                                                  SHA1

                                                  ba62ffe370e186b7f980922067ac68613521bd51

                                                  SHA256

                                                  8dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13

                                                  SHA512

                                                  de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4

                                                • memory/1840-441-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/1840-442-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/2180-444-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/2180-445-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/2180-621-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/2724-440-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/2724-439-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/2724-443-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/5084-4-0x0000023680000000-0x0000023681000000-memory.dmp

                                                  Filesize

                                                  16.0MB