Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

06/04/2024, 10:50

240406-mxnseahb85 1

06/04/2024, 10:50

240406-mxff2age8z 1

Analysis

  • max time kernel
    85s
  • max time network
    89s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240214-en
  • resource tags

    arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06/04/2024, 10:50

General

  • Target

    https://moonreborn.com/attachments/steal_31.03.24_v2.20.zip

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://moonreborn.com/attachments/steal_31.03.24_v2.20.zip
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffea6573cb8,0x7ffea6573cc8,0x7ffea6573cd8
      2⤵
        PID:2180
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:2
        2⤵
          PID:3128
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:484
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:8
          2⤵
            PID:1836
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1
            2⤵
              PID:4328
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
              2⤵
                PID:4000
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4480 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1304
              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:5032
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:1
                2⤵
                  PID:3784
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:8
                  2⤵
                  • NTFS ADS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1044
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4572 /prefetch:1
                  2⤵
                    PID:2340
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:1
                    2⤵
                      PID:5068
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:1
                      2⤵
                        PID:1188
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:1
                        2⤵
                          PID:716
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1352 /prefetch:1
                          2⤵
                            PID:2540
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:1
                            2⤵
                              PID:580
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:1
                              2⤵
                                PID:1624
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:1
                                2⤵
                                  PID:1144
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6832 /prefetch:8
                                  2⤵
                                    PID:3588
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6820 /prefetch:8
                                    2⤵
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3532
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6800 /prefetch:8
                                    2⤵
                                      PID:1796
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6500 /prefetch:8
                                      2⤵
                                      • Modifies registry class
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1920
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6216 /prefetch:1
                                      2⤵
                                        PID:2340
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6464 /prefetch:8
                                        2⤵
                                        • Modifies registry class
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SetWindowsHookEx
                                        PID:240
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6880 /prefetch:1
                                        2⤵
                                          PID:2052
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6972 /prefetch:1
                                          2⤵
                                            PID:4064
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1348 /prefetch:1
                                            2⤵
                                              PID:944
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:1
                                              2⤵
                                                PID:1448
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1880,14883144875933113888,7247891842765498591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6460 /prefetch:8
                                                2⤵
                                                • Modifies registry class
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of SetWindowsHookEx
                                                PID:4428
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:3456
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:4884
                                                • C:\Windows\System32\rundll32.exe
                                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                  1⤵
                                                    PID:4144
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\steal_31.03.24_v2.20\inject.bat" "
                                                    1⤵
                                                      PID:4540
                                                      • C:\Users\Admin\Downloads\steal_31.03.24_v2.20\SharpMonoInjector.Console\smi.exe
                                                        "SharpMonoInjector.Console\smi.exe" inject -p "Gorilla Tag" -a steal.dll -n Steal.Background.Security -c Base -m Init
                                                        2⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2576
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\steal_31.03.24_v2.20\inject.bat" "
                                                      1⤵
                                                        PID:1812

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        ec7568123e3bee98a389e115698dffeb

                                                        SHA1

                                                        1542627dbcbaf7d93fcadb771191f18c2248238c

                                                        SHA256

                                                        5b5e61fe004e83477411dd2b6194e90591d36f2f145cc3b4faa20cf7ae266a75

                                                        SHA512

                                                        4a53fbbd7281a1a391f0040f6ff5515cedf6e1f97f2dae4ab495b4f76eb4f929dcda6b347f9bf7f66a899330f8897e1ed117314945d1de27b035cc170fa447d3

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000014

                                                        Filesize

                                                        198KB

                                                        MD5

                                                        319e0c36436ee0bf24476acbcc83565c

                                                        SHA1

                                                        fb2658d5791fe5b37424119557ab8cee30acdc54

                                                        SHA256

                                                        f6562ea52e056b979d6f52932ae57b7afb04486b10b0ebde22c5b51f502c69d1

                                                        SHA512

                                                        ad902b9a010cf99bdedba405cad0387890a9ff90a9c91f6a3220cdceec1b08ecb97a326aef01b28d8d0aacb5f2a16f02f673e196bdb69fc68b3f636139059902

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001a

                                                        Filesize

                                                        27KB

                                                        MD5

                                                        322ec754f369b14aa8898467033c49a4

                                                        SHA1

                                                        c6d01ad92e6e8a7e4a61a656f2bc931f1a5994cb

                                                        SHA256

                                                        a20310738269ab7907af99cf6abaaf81a876fd59dd36d9ccbd8fdbd4407489df

                                                        SHA512

                                                        6b2f26ba17a1a9172acacf71d8b69743f866579da7dde85789b2984e5d618c57d872fabd41f487b217c2d4b10409853fa2a03e3b77c9cdfd4ebb2ad313631b0b

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        43d32ef21332267211fe3e9a033e596d

                                                        SHA1

                                                        13664d9d6f0ced0bb631d5afd57394a1ee1e0c6e

                                                        SHA256

                                                        caaed6810bd9f6562bbd739975acfbbfdfdac1ca46de926c07bc979a0348e7e3

                                                        SHA512

                                                        a7dcfad1388ce317155a489279ab4e6fbbc8af13d348e65067f956f5ed6d0981a093b587022bc890d2ecfdd3397046c6cd386f9b54a2ec57f040a5f9f94155d2

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                        Filesize

                                                        111B

                                                        MD5

                                                        285252a2f6327d41eab203dc2f402c67

                                                        SHA1

                                                        acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                        SHA256

                                                        5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                        SHA512

                                                        11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        cfb9c21ee9d34663f7614fc2a45517bc

                                                        SHA1

                                                        41b40d5ba8317016244ee9bbc278a6a49c25566c

                                                        SHA256

                                                        5faf1b1ec3234ccb9602b73affebc9f801605a8f6bc44402deeaeb26fea83d74

                                                        SHA512

                                                        16c3129a1de8e9de35ceb2e320fa8f6460fda9b1e3652b9563c71bb2b20f319db62cb654e74f4fd0374205f55c198b94432b161bde0a19ca1f0b22f585b7eb22

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        4351f5a3d892bc3b06f0bcaec746e5b3

                                                        SHA1

                                                        79d2d3a96532d7f1c799b401b9cee1b4b6b61590

                                                        SHA256

                                                        7fd1d101028caaa4147972763269eb3bba0d445f9125130fa29ba88c60c6bddd

                                                        SHA512

                                                        b9d3b6e13d23cb5e35ded6e4978a3a791c701941687a3073f88e9808e3db575c3307960dbd209bba461f9d51ea11e5a65d58046bbc9cde8e90f9c943037a5348

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        2091ba39a68db903eecbf441d04879f2

                                                        SHA1

                                                        11b534b7dd2eca1fe9c93e251e328f16fe2bbe06

                                                        SHA256

                                                        5df4179eb72d80d482da9eb37cdda05c7884dd2c1ca1e4ee9db40407f08c5ea6

                                                        SHA512

                                                        3cebf0aa4e8418b3c2ba3f96e3d0f1e6335fe1da6134aebfc348f889f1e6958e9eb55220c9e0cb70ed1a5b7b5c7ec8b7cd288c6c000abdd5134858a000cb94ad

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        9643143a0fac318b111990a0d63f3533

                                                        SHA1

                                                        a8d523dc202a723176dd6890240227e585addf2e

                                                        SHA256

                                                        6a535a0f1126c65de56c7aa5985ea156a0750b625ef3d27d2d5643eef953e0f9

                                                        SHA512

                                                        cb7bdaf3c5e8185508795cb786f9332edf600b685d07e44f7f48595989e89ad5239ed7498fa480ca42d8e0bb6c5f239d87907240a86cb7557a52d18e94aa8b93

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        00e3236408016695325f13e050d32ed8

                                                        SHA1

                                                        912206b2bbe4335ff006eca91236dad0ef9a1e94

                                                        SHA256

                                                        5731717463f4cacd1e21828eb008e87a82dda9daf98e1e1a88e0892a12d34511

                                                        SHA512

                                                        10c446f0385d5a33b596de3bf865568710e01109928a06aa0f616eb8985fccde52e2e9b798171295c2eb235b881f0ff80a4b2c322bc7ea2f3a2d4c121c971f69

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        9f04a85c36d216d93b061616deab0b38

                                                        SHA1

                                                        d26ffbb3e3b12b13530648da8f176baf5f7d7075

                                                        SHA256

                                                        d90ac735f237c603dd3ae472bacee74aa5a2dc949231342f2cf50bd894f4ff18

                                                        SHA512

                                                        bd72b94edb1fe20569a7c22f95dd3714fcc192584ed14ee732c3c57858dc3e874df35630295c1e79a924673fc8deba7f06b830123e25ef7d0b0f302a05ea193b

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        d40a97007b1fa1acaea9d0ab3e548d8e

                                                        SHA1

                                                        6f4842b87cab4687a0be45c19013c0a4cf121b45

                                                        SHA256

                                                        968511806eac360630ccc38a2c35528bccc2277b405c35e0a3b3e8d11644ee7d

                                                        SHA512

                                                        26326851d51c529f0af0184cb5e8830c2466aac99f2da53aa6fc0971cde7c4162777801a2f639556fd6b73487844cedc3ecc1407a8def9ffafa933c0c8c6124b

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        87219ad708e6c3b5d1943c033ea8bc8e

                                                        SHA1

                                                        3a2eb71a960cb01737ea40b204b1f8b7f44bafe8

                                                        SHA256

                                                        122789c73a874ebf6179f284139037dc610d725bcc2ee8cc8f86b307faff3e12

                                                        SHA512

                                                        3254ec8e46f6643a0108cb2071b025c780535b4f151698c1f605d7f234cc9ad13ea1d4c80521851382a31c0b6783526a0b6a7877a4cb860151aca009fa1c3867

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                        Filesize

                                                        25KB

                                                        MD5

                                                        0ba15f72ffb0a37243558588d3e78221

                                                        SHA1

                                                        814bdfffd723f7de9f8d6d6a0bc8d85a9f275cc0

                                                        SHA256

                                                        3d0223e1f8bb35870db41872cfbbe467f65bf9a1208dcb4d4ad874e250ccc10a

                                                        SHA512

                                                        02b168ef9cc226a08955092173c3745a55b28faa438b8152acb90d3bc1d9f433de7d8341def8b452db1986392a59cabc7c69689ad00825c58371ca78021183be

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                        Filesize

                                                        72B

                                                        MD5

                                                        0a09b44d4a42834159c4ee680598d1d7

                                                        SHA1

                                                        0e681c699107dce065e874fb8448e815ab24d097

                                                        SHA256

                                                        3225e50d95786652909efc6181e5cbae0e1b13dedd7e3c9956b11fd605736c60

                                                        SHA512

                                                        8d6d344a6c843de53fe8e98d9bac127c35c4336ccc245119cbf487a942d66a4b07b211b4a17fa185571e4f6d79e17abc0872a2eff40eadf668d20319017065a3

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe582a38.TMP

                                                        Filesize

                                                        48B

                                                        MD5

                                                        a31ec336889394ec43424256b8ecbe7e

                                                        SHA1

                                                        bdde04253122c15f4231449c425abe09cfc28010

                                                        SHA256

                                                        7b26e4c0887355e3658023d18b5f0ebce1a47849018e242b90d6921911102214

                                                        SHA512

                                                        51f0b12bd22e6b24c38e5edc4a86ed3fdb0fb85026082b7af946a53a3eae9e1300189efd7ebd8d24a9f6cefec5cb281ffb384238bc86661a0c57891918c14bb6

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                        Filesize

                                                        16B

                                                        MD5

                                                        6752a1d65b201c13b62ea44016eb221f

                                                        SHA1

                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                        SHA256

                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                        SHA512

                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        9b2dc0627abce7b47f9e39c2a20843f2

                                                        SHA1

                                                        95cdd1a525ee932cecd84c7217af20d81ab57c79

                                                        SHA256

                                                        1572caf85bb9ab966870afd791ba9ca2f2fbf64706078b172840737ccad0e869

                                                        SHA512

                                                        c7f89619a7ff7f0f6a5a821dfac441dfc1ff8037bfe33b041dda82a643e111380958b05b3c0e65e514cb964d8826a476e180542eb6df5d64e7c0ebf7e0148f71

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        46d6d38b8cb10fa1bcf74abd747d5e4e

                                                        SHA1

                                                        a97c91fcad41696d41427c494dc32e1adba17da6

                                                        SHA256

                                                        9e3fc1b2bb66d61d8d795bad3be049cf0bfd5a430ef8af26cd9c5c0b28c1d68c

                                                        SHA512

                                                        440f508f8db36cd4a21f6b0f7ee524b067c81b7fa56fc885d3402ebac5ad883faee5ddd1bab3766ed0ce2dd138c21edc471e70f2373614850174022f11d6c781

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        23c3203eed9ea126a322f0e4eb1590f1

                                                        SHA1

                                                        1939823983638589a47aaf998b0fe5cd14ae4397

                                                        SHA256

                                                        2a77fe581f9edca31bb3019ba5f9827b990c4d5c70471f83dce0fa3b929eeb09

                                                        SHA512

                                                        3e0272956f8a5a3063e52fe78a9e0fba37e0f913817db1e07b77be443d09061e926046b7ef0a0fdee15927080d708df707bfbb9977de3f3a329518ae121505aa

                                                      • C:\Users\Admin\Downloads\steal_31.03.24_v2.20.zip

                                                        Filesize

                                                        7.2MB

                                                        MD5

                                                        7ab279d65fc88039691b88f55418c01e

                                                        SHA1

                                                        832945bca7b88ed4c71fdb41aaad4d3964a4d8ec

                                                        SHA256

                                                        d12c8945721b71c972cb2f6180b768180a80419f113ab3f92fdfa640ba6d626d

                                                        SHA512

                                                        3af409ed630dd2d625a8b15c8afb72bc610a94590dc7bd57fd059ab555504faf8eb441b5d452eb7ceb73b3db72ca17ea8986c3ec9f75deafb409636b32bb70d0

                                                      • C:\Users\Admin\Downloads\steal_31.03.24_v2.20.zip:Zone.Identifier

                                                        Filesize

                                                        26B

                                                        MD5

                                                        fbccf14d504b7b2dbcb5a5bda75bd93b

                                                        SHA1

                                                        d59fc84cdd5217c6cf74785703655f78da6b582b

                                                        SHA256

                                                        eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                        SHA512

                                                        aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                      • memory/2576-76-0x00000214932F0000-0x000002149330A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/2576-74-0x0000021492E90000-0x0000021492E98000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/2576-75-0x00000214932C0000-0x00000214932CC000-memory.dmp

                                                        Filesize

                                                        48KB

                                                      • memory/2576-77-0x00007FFE91B10000-0x00007FFE925D2000-memory.dmp

                                                        Filesize

                                                        10.8MB

                                                      • memory/2576-78-0x00007FFE91B10000-0x00007FFE925D2000-memory.dmp

                                                        Filesize

                                                        10.8MB