Analysis

  • max time kernel
    1763s
  • max time network
    1713s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-05-2024 15:47

General

  • Target

    2cbb3497bfa28d9966c1feeae96d452d.dll

  • Size

    1.6MB

  • MD5

    2cbb3497bfa28d9966c1feeae96d452d

  • SHA1

    9ef94c7d3fedc71bb3ed1abf542dfc7ec692883d

  • SHA256

    85c3b718090144dadeb8035ac287d46b9d3458f9de409229217d42a475f42868

  • SHA512

    eed7b210655030b3855f7a20f3bc7aecf8b927a33dfdaefe1d769fa42cbf7c88b1e8ab625f7258a79d2625e06005d25b03691fe911330876ae9e7f916ab2fe4c

  • SSDEEP

    24576:KlQyNmMnq70NDxLOd0+UU1Thef1HrmP1D2:KlQyNmMq70NDROd0+UU1ThoHrA

Malware Config

Extracted

Path

C:\Users\Admin\3D Objects\README_TO_DECRYPT.html

Family

quantum

Ransom Note
<html> <head> <title>Quantum</title> </head> <body> <h1>Your ID:</h1> <b> <pre> f5de48b476c53833c47bc3b7c594420234d2b530d79f643ebdf3164bbef62965 </pre> </b> <hr/> This message contains an information how to fix the troubles you've got with your network.<br><br> Files on the workstations in your network were encrypted and any your attempt to change, decrypt or rename them could destroy the content.<br> The only way to get files back is a decryption with Key, provided by the Quantum Locker.<br><br> During the period your network was under our control, we downloaded a huge volume of information.<br> Now it is stored on our servers with high-secure access. This information contains a lot of sensitive, private and personal data.<br> Publishing of such data will cause serious consequences and even business disruption.<br><br> It's not a threat, on the contrary - it's a manual how to get a way out.<br> Quantum team doesn't aim to damage your company, our goals are only financial.<br><br> After a payment you'll get network decryption, full destruction of downloaded data, information about your network vulnerabilities and penetration points.<br> If you decide not to negotiate, in 48 hours the fact of the attack and all your information will be posted on our site and will be promoted among dozens of cyber forums, news agencies, websites etc.<br><br> To contact our support and start the negotiations, please visit our support chat.<br> It is simple, secure and you can set a password to avoid intervention of unauthorised persons.<br> <a href="http://lsxkornhwiuchwvtrm2ru2hr25rovmyvrurgej7kwv3vd6rvbznpdwid.onion/?cid=f5de48b476c53833c47bc3b7c594420234d2b530d79f643ebdf3164bbef62965">http://lsxkornhwiuchwvtrm2ru2hr25rovmyvrurgej7kwv3vd6rvbznpdwid.onion/?cid=f5de48b476c53833c47bc3b7c594420234d2b530d79f643ebdf3164bbef62965</a> <ul> <li>Password field should be blank for the first login. <li>Note that this server is available via Tor browser only. </ul> P.S. How to get TOR browser - see at https://www.torproject.org </body> </html>

Signatures

  • Quantum Ransomware

    A rebrand of the MountLocker ransomware first seen in August 2021.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 25 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2cbb3497bfa28d9966c1feeae96d452d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2cbb3497bfa28d9966c1feeae96d452d.dll,#1
      2⤵
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\0E5777FF.bat" "C:\Users\Admin\AppData\Local\Temp\2cbb3497bfa28d9966c1feeae96d452d.dll""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\2cbb3497bfa28d9966c1feeae96d452d.dll"
          4⤵
          • Views/modifies file attributes
          PID:1380
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\README_TO_DECRYPT.html
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5080
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca8a546f8,0x7ffca8a54708,0x7ffca8a54718
      2⤵
        PID:1980
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:2
        2⤵
          PID:2164
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2956
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:8
          2⤵
            PID:1728
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
            2⤵
              PID:1748
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
              2⤵
                PID:3600
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:1
                2⤵
                  PID:4664
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:1
                  2⤵
                    PID:640
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4388 /prefetch:1
                    2⤵
                      PID:1532
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4520 /prefetch:1
                      2⤵
                        PID:1604
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:1
                        2⤵
                          PID:4428
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:1
                          2⤵
                            PID:3664
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6276 /prefetch:8
                            2⤵
                              PID:5664
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6276 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5780
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6392 /prefetch:1
                              2⤵
                                PID:5964
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:1
                                2⤵
                                  PID:5972
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6704 /prefetch:1
                                  2⤵
                                    PID:6140
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6508 /prefetch:1
                                    2⤵
                                      PID:3976
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,3671708948759736298,17983375978358147011,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4012 /prefetch:2
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2284
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3456
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:5264

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\3D Objects\README_TO_DECRYPT.html

                                        Filesize

                                        2KB

                                        MD5

                                        867698a2f6e51b54a2c826e3c9600f07

                                        SHA1

                                        94cb5ed8f01225b02db259fb1d1908e687f53577

                                        SHA256

                                        fb66e9dfa750c9043b58bbd4a38a83a48e58d1ae13ba989e164795f999e3a7dc

                                        SHA512

                                        045cecd3e62078d2668ccac248f1842f9f2ba575efc859df1b982c6d1706551f1e8e5e425629aec9f1a8ae92ad5e9e402e2d832087aa3a66727c20cd344a3867

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\48ef9f70-9c3d-40e5-8e1e-0003fc653abb.tmp

                                        Filesize

                                        10KB

                                        MD5

                                        8a33fd0f73fd8c65dadbb7792cb5b6dc

                                        SHA1

                                        33aa53a3ff6629bd87f8a8a8cbd776ccc3570345

                                        SHA256

                                        eb66ca9fc5dc43c6fdfb36cce92c3a76eca28ce2837c4e071caad510345b47c2

                                        SHA512

                                        04b9a3489acc25a8e4fc8058a0ba765a7125052bbd3f4f907210e18acda06ca20c5995572fc19ffd42e542591ff45c3291d2fbe9ac40aec40455da51fd9098e9

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-663B6585-1244.pma.quantum

                                        Filesize

                                        4.0MB

                                        MD5

                                        db6a396499efe8bf347c95b50b035a42

                                        SHA1

                                        069f3d44aca9ff625bc1d87b5b4d6efeadb2fca2

                                        SHA256

                                        063b4def4dcb37d2dde2c6a806dcc3b2baf75214a7e92687ef14847171a1aa09

                                        SHA512

                                        e90b079363db524e0a9a3accf1913c7a162c9e13631b0a3c3d3a810a9b97a2dae0fcfacb73e3ac7752c2552a69926259921fef4f4a0a1d23ec2a880f14a54d0d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        c7e37d16241d68c979f5e27c88a19801

                                        SHA1

                                        934aa98dc16d8ca007f7119bf6087201b6c98c41

                                        SHA256

                                        f10883b5faabc9e709ec3d6df5b4d4a3ae87931e36d30cf8de14552d2ad2341c

                                        SHA512

                                        e64bf0bdef3db28946b81951a8e72cd4240019d419a2dea40dd23a1aa5976ddd8dbae8bcdae18bbf06feb84c32c8fc9ed2a10c306a40433bf1ec8012684947d3

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        0f438a3c22a3a53fbeda21a482b95b7a

                                        SHA1

                                        954deffa5eb6785ef191a67c832e3b7ff39e9375

                                        SHA256

                                        8f1d9bb7e050c512ad9ed77ce31dac8c7555e4bc5cb59764098507670aba987b

                                        SHA512

                                        1aea30026d310c68d0892970d81add32b593c539ed2fc58244cb1a329837cd5aafca6b62f3f3f5a116b99ca894f8c7abf26bf6e3d138371a4cc122e540380c1c

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        a6dffc5e76b21697a246243f175feaef

                                        SHA1

                                        0501c5a0e04a45f6d65af6a4563b2b857ba6ba90

                                        SHA256

                                        16d58f4ad4fcf2ecc154e0f6f8984b8beaac3cc3180183e18552d0e3719327b7

                                        SHA512

                                        4700890801d22c46e34587631c8b62bb6e8b359da730cba9e532fcb0ee780f53d8d5b7a97a75d30343ea4b4efe8064533527d9f9c8d271f36182e04f6893bda7

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\throttle_store.dat

                                        Filesize

                                        20B

                                        MD5

                                        9e4e94633b73f4a7680240a0ffd6cd2c

                                        SHA1

                                        e68e02453ce22736169a56fdb59043d33668368f

                                        SHA256

                                        41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                                        SHA512

                                        193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\22646e41-42ab-4f92-85a7-d059297410cf.tmp

                                        Filesize

                                        4KB

                                        MD5

                                        53b6e64d4f73f7fd481b0f1e3423e815

                                        SHA1

                                        a3eaafb3823618948c9b84ce8331f8b5833a4b80

                                        SHA256

                                        cfd20e0d411a7c06b49de8231e9034a2fb1c0ff109a0e11bdaded9ea4c34b39c

                                        SHA512

                                        038e2d3871cb83208b83afb498c40c1b711d2221d58f2b73dc846b9a33ff72c572aa99bfe9d43e255a3a5ce5b07d7a18164e5c8eca533a659fd61cced2053a54

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\44883cfa-eb98-4929-90a6-83450cf6a2b1.tmp

                                        Filesize

                                        70KB

                                        MD5

                                        e5e3377341056643b0494b6842c0b544

                                        SHA1

                                        d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                        SHA256

                                        e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                        SHA512

                                        83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_0

                                        Filesize

                                        8KB

                                        MD5

                                        cf89d16bb9107c631daabf0c0ee58efb

                                        SHA1

                                        3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                        SHA256

                                        d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                        SHA512

                                        8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_1

                                        Filesize

                                        264KB

                                        MD5

                                        d0d388f3865d0523e451d6ba0be34cc4

                                        SHA1

                                        8571c6a52aacc2747c048e3419e5657b74612995

                                        SHA256

                                        902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                        SHA512

                                        376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_2

                                        Filesize

                                        8KB

                                        MD5

                                        0962291d6d367570bee5454721c17e11

                                        SHA1

                                        59d10a893ef321a706a9255176761366115bedcb

                                        SHA256

                                        ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                        SHA512

                                        f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_3

                                        Filesize

                                        8KB

                                        MD5

                                        41876349cb12d6db992f1309f22df3f0

                                        SHA1

                                        5cf26b3420fc0302cd0a71e8d029739b8765be27

                                        SHA256

                                        e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                        SHA512

                                        e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        4KB

                                        MD5

                                        c959e4649f2f3e5272ee451b05ad9b9c

                                        SHA1

                                        c1ce14ada4d1b18d0ed9907b9da7f66a9f2bc546

                                        SHA256

                                        9913bc9fb15a0358da1e82a113d2981446e8be6ceeda2f56a98385af30b1d359

                                        SHA512

                                        25e38c4d2d6b6ac97c5912eaf6c8b21397dd46d3633e1a10f6ccf6ce0d3ffb14a47a4b414602ab997591b10ea526bd4aff09b5ccdf0e74995bc08c2c0670e176

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        15b963566f4e2d373c27ae5956e58f65

                                        SHA1

                                        aab063ed7a2084e71a4043b019acba3563c50b99

                                        SHA256

                                        0876e97f8f50c89630698ab66014ce58524566b93467eac7a4f71f0215a64093

                                        SHA512

                                        065a282a4944cf2fb7607857b5033a65a5b09482071629de67eef899daf14f50065da0d81b893cf6b4f3214446c1029fca22ac74aa6013c02e49ff7156da8084

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        513248e5bcf55b3412a1d6174fa1ae8d

                                        SHA1

                                        4cf869375d31deecdc5dba2e07915eb983670dd5

                                        SHA256

                                        03f6b165090a709c6ac12f45711280e2e30d45b68af0b088db6f5ddc8ac68cac

                                        SHA512

                                        2bdafeafd449ef624836209dc6eed09ae57c1dec26e9c234043d9cb33d6881ad6bdfbb6d8b153f21f94311e95969b39678d0b15d415a82e8f008bf7dcba1a087

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                        Filesize

                                        24KB

                                        MD5

                                        137b3b5ad46bbd468887b0d61277a7af

                                        SHA1

                                        6ac0b55e904f40cc3c5bea2909aaa6bc4968bc6f

                                        SHA256

                                        df068702d2b3b62e6cc8c2683e7a57dd4188e7117d1d49f652517f48f76a8bed

                                        SHA512

                                        b4d3d76fcc624b7099e5c840178376b98b59aa33d28f501aed35479de69ee062cafea482806b7e5553a53931c36f959d7a12468e6133310c88d37473a1b192e3

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RFe57cc49.TMP

                                        Filesize

                                        24KB

                                        MD5

                                        51a3cfbd69983bfbde792363fc776873

                                        SHA1

                                        fbc5f6ef81b563ba87b546689194362b4901b47c

                                        SHA256

                                        802b2bf8cb0a20fd9f6b3489c44e9fa77c42ed34a8a94b080ab6d9e13660b361

                                        SHA512

                                        6bc4b68ff98ec9b71641e652188b9c7059660e6d7b825cf9be3a39090d017869d05da9cbf90693eef620c04cc238d09555df35e61156aae8d0f460df8d6e35e5

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\MANIFEST-000001

                                        Filesize

                                        41B

                                        MD5

                                        5af87dfd673ba2115e2fcf5cfdb727ab

                                        SHA1

                                        d5b5bbf396dc291274584ef71f444f420b6056f1

                                        SHA256

                                        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                        SHA512

                                        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        46295cac801e5d4857d09837238a6394

                                        SHA1

                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                        SHA256

                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                        SHA512

                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        206702161f94c5cd39fadd03f4014d98

                                        SHA1

                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                        SHA256

                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                        SHA512

                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                      • C:\Users\Admin\AppData\Local\Temp\0E5777FF.bat

                                        Filesize

                                        65B

                                        MD5

                                        348cae913e496198548854f5ff2f6d1e

                                        SHA1

                                        a07655b9020205bd47084afd62a8bb22b48c0cdc

                                        SHA256

                                        c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506

                                        SHA512

                                        799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611

                                      • \??\pipe\LOCAL\crashpad_5080_LFGMYAIPRDWJRZXY

                                        MD5

                                        d41d8cd98f00b204e9800998ecf8427e

                                        SHA1

                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                        SHA256

                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                        SHA512

                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                      • memory/4544-66-0x00000000027F0000-0x00000000028C1000-memory.dmp

                                        Filesize

                                        836KB

                                      • memory/4544-0-0x00000000027F0000-0x00000000028C1000-memory.dmp

                                        Filesize

                                        836KB

                                      • memory/4544-7-0x00000000027F0000-0x00000000028C1000-memory.dmp

                                        Filesize

                                        836KB

                                      • memory/4544-30-0x00000000027F0000-0x00000000028C1000-memory.dmp

                                        Filesize

                                        836KB

                                      • memory/4544-8-0x00000000027F0000-0x00000000028C1000-memory.dmp

                                        Filesize

                                        836KB

                                      • memory/4544-32-0x00000000027F0000-0x00000000028C1000-memory.dmp

                                        Filesize

                                        836KB

                                      • memory/4544-1141-0x00000000027F0000-0x00000000028C1000-memory.dmp

                                        Filesize

                                        836KB

                                      • memory/4544-1-0x00000000027F0000-0x00000000028C1000-memory.dmp

                                        Filesize

                                        836KB

                                      • memory/4544-1144-0x00000000027F0000-0x00000000028C1000-memory.dmp

                                        Filesize

                                        836KB

                                      • memory/4544-1150-0x00000000027F0000-0x00000000028C1000-memory.dmp

                                        Filesize

                                        836KB