Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 05:30

General

  • Target

    e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe

  • Size

    1.3MB

  • MD5

    ba596649dd39015b9ebb20e53e576673

  • SHA1

    1f6bb78f5decfae319019346d7a2c5c2d5be2cd4

  • SHA256

    e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0

  • SHA512

    4544fd2669ff8d9632241040946868026712ddc7faf1a0db708ccf8f0c7edcb92a6c6ec9167b59421014158b0f27353b6afc4026d3a2748bb7fa3252e2747f57

  • SSDEEP

    24576:gyfJAGy3eES79rsujbjYlvUJG76Sh44Q+x6/7XOHG+nnsQPGKkUw:nfJBbES79rjYbth44xsKxJPGKk

Malware Config

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 1 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe
    "C:\Users\Admin\AppData\Local\Temp\e91c8d810420c37f7d9fedc2bacbb5930e0178d958a77de6f83732cc996f85e0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EE2Ip30.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EE2Ip30.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uu9aR70.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uu9aR70.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5036
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\at1Tc45.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\at1Tc45.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4844
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Tr42EG0.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Tr42EG0.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4044
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Je6892.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Je6892.exe
            5⤵
            • Executes dropped EXE
            PID:1968
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3gW94Vu.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3gW94Vu.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2148
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Checks SCSI registry key(s)
            PID:4028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4aZ207Wr.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4aZ207Wr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1412
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:2452
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5QR4sy2.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5QR4sy2.exe
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:648
        • C:\Windows\system32\cmd.exe
          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6726.tmp\6727.tmp\6728.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5QR4sy2.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3848
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
            4⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2828
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff9738746f8,0x7ff973874708,0x7ff973874718
              5⤵
                PID:5108
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9037968371126234918,17852420875447381288,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
                5⤵
                  PID:1712
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,9037968371126234918,17852420875447381288,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4576
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,9037968371126234918,17852420875447381288,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:8
                  5⤵
                    PID:4896
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9037968371126234918,17852420875447381288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
                    5⤵
                      PID:5044
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9037968371126234918,17852420875447381288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                      5⤵
                        PID:1544
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9037968371126234918,17852420875447381288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:1
                        5⤵
                          PID:1384
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,9037968371126234918,17852420875447381288,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:8
                          5⤵
                            PID:5868
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,9037968371126234918,17852420875447381288,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:8
                            5⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:6032
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9037968371126234918,17852420875447381288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:1
                            5⤵
                              PID:6040
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9037968371126234918,17852420875447381288,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:1
                              5⤵
                                PID:6048
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9037968371126234918,17852420875447381288,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:1
                                5⤵
                                  PID:1164
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9037968371126234918,17852420875447381288,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:1
                                  5⤵
                                    PID:2028
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9037968371126234918,17852420875447381288,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5740 /prefetch:2
                                    5⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1008
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login
                                  4⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:4832
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff9738746f8,0x7ff973874708,0x7ff973874718
                                    5⤵
                                      PID:5084
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,7875575537865861890,14313067281319028688,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:2
                                      5⤵
                                        PID:3600
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,7875575537865861890,14313067281319028688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:3
                                        5⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:868
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4008
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3720
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:4628
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:5124

                                      Network

                                      MITRE ATT&CK Matrix ATT&CK v13

                                      Persistence

                                      Boot or Logon Autostart Execution

                                      1
                                      T1547

                                      Registry Run Keys / Startup Folder

                                      1
                                      T1547.001

                                      Privilege Escalation

                                      Boot or Logon Autostart Execution

                                      1
                                      T1547

                                      Registry Run Keys / Startup Folder

                                      1
                                      T1547.001

                                      Defense Evasion

                                      Modify Registry

                                      1
                                      T1112

                                      Discovery

                                      Query Registry

                                      3
                                      T1012

                                      System Information Discovery

                                      4
                                      T1082

                                      Peripheral Device Discovery

                                      1
                                      T1120

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                        Filesize

                                        152B

                                        MD5

                                        f53207a5ca2ef5c7e976cbb3cb26d870

                                        SHA1

                                        49a8cc44f53da77bb3dfb36fc7676ed54675db43

                                        SHA256

                                        19ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23

                                        SHA512

                                        be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                        Filesize

                                        152B

                                        MD5

                                        ae54e9db2e89f2c54da8cc0bfcbd26bd

                                        SHA1

                                        a88af6c673609ecbc51a1a60dfbc8577830d2b5d

                                        SHA256

                                        5009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af

                                        SHA512

                                        e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\temp-index
                                        Filesize

                                        1KB

                                        MD5

                                        14849a936b7c44296f9cc2fc5fb517d2

                                        SHA1

                                        40208ab77713533ea75304a5db0a0c597004f034

                                        SHA256

                                        98c98194c44f65de71ab1886e4952dbedc0092af3955446891ce3f41785cab21

                                        SHA512

                                        5e491637023b05e43c4f186209b29a68582168650c321ff43ce29df02b6bd150d7c5f1e21d1f436538a06266ab955e45c44ae051d99d5aa060ece3f94ad3761a

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
                                        Filesize

                                        1KB

                                        MD5

                                        e2b417bd09148d6ae2849bd29919ebcc

                                        SHA1

                                        ecf04e5c3fd1f3819c90a999a459c00db6d9fea9

                                        SHA256

                                        3dff8872e8e110f890b4967b48fd1dbd3d817a2036b59fb01c6b235a71d412ce

                                        SHA512

                                        019a76d168984d1a636086bdd47051e457deb032fda62406d3e477d25475633e4383a0538b5cef0d234e53107ebe0d3ff395e1c2f78e8414655686132c21ff4f

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
                                        Filesize

                                        1KB

                                        MD5

                                        cf39b511bdb71343a85fec0793ad74b4

                                        SHA1

                                        77c231465b0a691d06ab71bb1d703de0ce668853

                                        SHA256

                                        3ffb0890b6b150c46096024c3bef991aae7c78441369c4cb1004e29108851d0a

                                        SHA512

                                        df56fa43a9db94bd946e123d6f29252d5b58846c7f13b50ff37632885f74bc5f67990d47434252038163d67bc498c6cc39c8b2a3c571721a0f28268fc0bd6f8a

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                        Filesize

                                        7KB

                                        MD5

                                        0488475b5d6f3611d00077c9f1676f9f

                                        SHA1

                                        9c1ba0f46a2cd9931db4f182687a0e5568575bc9

                                        SHA256

                                        b1df1d33f47327ac45b839980c7fce5c9c6d4f76b8fb37ef8e4fc789cd4110df

                                        SHA512

                                        a5ece239e60907da09efccd421c6c70bc39b58bcc4177c1910f02a89801dfb2cc7e69b3038f900f5b2635febf11442a196c63929c1e8ac957a0da1985ec4cf2a

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                        Filesize

                                        5KB

                                        MD5

                                        d7bba71adca66bed86a02b219d090f6e

                                        SHA1

                                        8095d5a9d994161d19c1ba7ac711e791a1278b6c

                                        SHA256

                                        714b0b1ae812151ddfb8055f02e8f15387e0c045b33865f910957fc52ca790f1

                                        SHA512

                                        4fe342d18b2a5a30e64b3ef6237f5dedaae934a1fc5dd7f1de821c6ad878772c0c474bf21a39b1bd7bd46316963b57ced2871c856bd53a08efbd05e89442ffff

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity
                                        Filesize

                                        870B

                                        MD5

                                        a5237ae922c8024daddd9e8a61ad8ee0

                                        SHA1

                                        5f7bcd6647c930aa59d4d17d4aa5e5fad34788a0

                                        SHA256

                                        d072108e2130003d96881563d52214f96f42576ad18f21535f07936016aa5503

                                        SHA512

                                        6241f36b3ef65a109e5b8fb5007ee8accf2dd5b6b1e1ba1cf49e1ee07012866353ef3e0238ec577d0a1cf7494f8f20809dc41157741c63b9e0dc901da1b53e7e

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity
                                        Filesize

                                        872B

                                        MD5

                                        3bde11ee5c5d009e131c873fcfb3f6f3

                                        SHA1

                                        f4c7ce7a94402c0e3395f2b0911c5373976c452e

                                        SHA256

                                        2e3b5850d5ae98e78254a99bd31f2c77976879c8ff5e8646b8b0a479dd841f2c

                                        SHA512

                                        99556f68564d7af94a93330733f2e00401770f47ebb0e798548ad8278bca3903528d9e6a1fa21a203e3fe7d0846c03440344cde04169519af25c9d49fd11e432

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity
                                        Filesize

                                        868B

                                        MD5

                                        e4b1b2710b6881b4093297f13b1b695f

                                        SHA1

                                        40e8cdf5354468e6ad343e62884f8756183f7c9d

                                        SHA256

                                        183480fa7f579ab05b85b601d0b4c65102a94e596193c22d5ca4db3db8eef3b5

                                        SHA512

                                        e720ede8b90bdee0820c08aadcdc9d6d37964f7344fb1ba761ccddf3f94e4d7355aec3c89153beef4b878298ca13b1e99e21d27e0a02675a181654e08158e726

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity
                                        Filesize

                                        868B

                                        MD5

                                        adb6fc2c96e1d906c97b74eae41e002c

                                        SHA1

                                        2915b08ba3049a6e203a5633a6541cdf4ff486f2

                                        SHA256

                                        a604c34d50682fd44cd1e74eaea1e4e6e0bc8589403158b69068afb87b97179b

                                        SHA512

                                        c9fe291a35e233915f41ab05992915c648253f3cea37a3e1b81486e5a7e044fe465331209f82a5eb6668ad3aa97d25f265399fdd02e0b4779fb4e0949a7a4f49

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57bdf1.TMP
                                        Filesize

                                        868B

                                        MD5

                                        29960bac171903877db2cf9c87188dff

                                        SHA1

                                        c195fa43786ae971bfd4fa4ca04ae1c3e47dc6fe

                                        SHA256

                                        1e141356be5c0e292a1c754aa2f91747b6ac890383a16aa4fb5d196f40363595

                                        SHA512

                                        7a0de8d7120287d377c56ad00cc71d71abe5174f7e3a75649d30adc780fed42a60ce68e29a079d280e6a97b77705a725f714893090226455f392a517059d9364

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
                                        Filesize

                                        16B

                                        MD5

                                        6752a1d65b201c13b62ea44016eb221f

                                        SHA1

                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                        SHA256

                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                        SHA512

                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                        Filesize

                                        8KB

                                        MD5

                                        bb4510ccf8692e99fc00d4518c302a78

                                        SHA1

                                        5228dc8fcd4b55c24278da90a6a76e35cb2822ce

                                        SHA256

                                        686c50b2364212b3266da8bb59e89b22fb8d3b63122d5b057e682ab4c2764dca

                                        SHA512

                                        6d037ebdc6ae54b732586fa604f33f5bf177afa2041b4a1641d4ff2f27051a674c0b8838d7b2772bb5e98c7a16e34935545702b810a29f40ec2c0a357c3475d9

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                        Filesize

                                        11KB

                                        MD5

                                        c2a8a29f0967c496521c07f98f0b977e

                                        SHA1

                                        9fd3de64d7eaa03583569d7ef15410cc35939678

                                        SHA256

                                        793e787e94037c5580aefe76d28db8007e91f472b714a68286c56eb862c9ffba

                                        SHA512

                                        9ab0637ae82bcb632b4d992a4abe1cb9efd2eab70d051f441cb6312af98936eecc7887310c5de89c1e3c73e663b344878e2aa9c06950987ece947714b87b5604

                                      • C:\Users\Admin\AppData\Local\Temp\6726.tmp\6727.tmp\6728.bat
                                        Filesize

                                        88B

                                        MD5

                                        0ec04fde104330459c151848382806e8

                                        SHA1

                                        3b0b78d467f2db035a03e378f7b3a3823fa3d156

                                        SHA256

                                        1ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f

                                        SHA512

                                        8b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40

                                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5QR4sy2.exe
                                        Filesize

                                        99KB

                                        MD5

                                        6bd6fb9952fa18f6e52f1e9ef0cfb385

                                        SHA1

                                        e1060312496d9e0bedf94df585b7863ec67ef42b

                                        SHA256

                                        89ca04731834695e5a1e35404e6c408b3cf420fcd34c9e053f9a3075b4e2e6fa

                                        SHA512

                                        04e89b9002406375764e6e8a369de9dde35c3836e6516393a84df50b1bf44b0bc0d920c30dcb781dd4679bc4b512f9d47997f193f16ad8779a0e9be06fda1483

                                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EE2Ip30.exe
                                        Filesize

                                        1.2MB

                                        MD5

                                        2d06bb1883376c02addfdae30c4674c6

                                        SHA1

                                        39256ee881bab5b8a39ed57ed4c486fe9a8dd70d

                                        SHA256

                                        1d350c9449236440b90b533da9a3681d802230b17fc646e4f39fac8b06d28564

                                        SHA512

                                        90545e90df858c97326e20de98bb86ad0ed25f50bbbe4c1563c71f9606bb697be5e63cb81e722bfaf594a3b355fb18d16d38f1a26e2ad3d12f837e60f1021926

                                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4aZ207Wr.exe
                                        Filesize

                                        1.2MB

                                        MD5

                                        267ef1a960bfb0bb33928ec219dc1cea

                                        SHA1

                                        fc28acaa6e4e4af3ad7fc8c2a851e84419a2eebf

                                        SHA256

                                        b462fedfb5904509e82387e2591bdb1ddfe6d12b6a28a189c6403a860050965e

                                        SHA512

                                        ba09e6c6b71426e09214c1c6773114d0a46edd133d711f81960390f940a81a695550971b30c1d292109873b524db94b596ecaebfaf379e6c6bcfd4089379e38f

                                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uu9aR70.exe
                                        Filesize

                                        749KB

                                        MD5

                                        a4a164fa5c5e796e10b4d328ec8d73a5

                                        SHA1

                                        a102c3367d3161a4bfe6c0988bcd891f744c9036

                                        SHA256

                                        ea7601c6ee113edfc553fd5ff05c1f8ae21bd30d793c426a7b3a9dc5cce47dba

                                        SHA512

                                        ca7b82ebb4b57aac7404d6553cc05871b618175d04022819958e479c31bb8361da588224223ffac1b3e448f51d24043c4e972f01d0da622d9545652fe6038f0e

                                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3gW94Vu.exe
                                        Filesize

                                        973KB

                                        MD5

                                        5dc4be46727c1853e63ebdd240ec9bd9

                                        SHA1

                                        6265b41bbecbb96cf666d2b4cbd6f209f44d7a2d

                                        SHA256

                                        1df63e2de3adac7ff425c75b3f649078fd7a8e0008e5063bd290adb1cdba2446

                                        SHA512

                                        59828cba7af9fb26c6717eb3e655eec07f732ec92d3ec0cce7ed2df1acf6095dec2d97cdbbd3591ed96c08cb2adcff12c31534a93b48757ff8976c0a4233062b

                                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\at1Tc45.exe
                                        Filesize

                                        364KB

                                        MD5

                                        455347ba3d7b41331dfee6bf9eee794b

                                        SHA1

                                        6b4e14e85ec934c26fda86b0071cc25a1fbb1627

                                        SHA256

                                        028b2964534ec73672e940b1d39800c01228ab40cfa923a7921d7726c68878a5

                                        SHA512

                                        7126814a86b53bca08d83cd552d5dd5c7a2700d76855afb37cb0192ea1e2d2cacd4970df01c4cc53afb53169206a9b0a502e120f227d08d7580e45c555eda933

                                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Tr42EG0.exe
                                        Filesize

                                        188KB

                                        MD5

                                        425e2a994509280a8c1e2812dfaad929

                                        SHA1

                                        4d5eff2fb3835b761e2516a873b537cbaacea1fe

                                        SHA256

                                        6f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a

                                        SHA512

                                        080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0

                                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Je6892.exe
                                        Filesize

                                        186KB

                                        MD5

                                        3a24a41f3044d90555f6cdea0f2533f8

                                        SHA1

                                        25a1913e9e41dd13039d023a5f63a050256c72ca

                                        SHA256

                                        5e900b7d563b6dc3f5c5db7386ae7ea83ec512b1a72a1cac6d16d17110a90253

                                        SHA512

                                        8d12aca702a3f81329fe0dad30b28269fd9933b5493e8d978080fbee9b66a1727b76b6230d910a9cda1ca68141b55ef7b63fd3f7de077eb453da7d8b44f5b837

                                      • \??\pipe\LOCAL\crashpad_2828_TWHJVMDNIRZQRYXE
                                        MD5

                                        d41d8cd98f00b204e9800998ecf8427e

                                        SHA1

                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                        SHA256

                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                        SHA512

                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                      • memory/2452-53-0x0000000007940000-0x000000000797C000-memory.dmp
                                        Filesize

                                        240KB

                                      • memory/2452-52-0x00000000078C0000-0x00000000078D2000-memory.dmp
                                        Filesize

                                        72KB

                                      • memory/2452-51-0x0000000007A10000-0x0000000007B1A000-memory.dmp
                                        Filesize

                                        1.0MB

                                      • memory/2452-50-0x0000000008790000-0x0000000008DA8000-memory.dmp
                                        Filesize

                                        6.1MB

                                      • memory/2452-48-0x0000000004CA0000-0x0000000004CAA000-memory.dmp
                                        Filesize

                                        40KB

                                      • memory/2452-43-0x0000000000400000-0x000000000043E000-memory.dmp
                                        Filesize

                                        248KB

                                      • memory/2452-54-0x0000000007980000-0x00000000079CC000-memory.dmp
                                        Filesize

                                        304KB

                                      • memory/4028-39-0x0000000000400000-0x0000000000409000-memory.dmp
                                        Filesize

                                        36KB

                                      • memory/4044-29-0x0000000004BA0000-0x0000000005144000-memory.dmp
                                        Filesize

                                        5.6MB

                                      • memory/4044-28-0x0000000004A20000-0x0000000004A40000-memory.dmp
                                        Filesize

                                        128KB

                                      • memory/4044-30-0x0000000004AD0000-0x0000000004AEE000-memory.dmp
                                        Filesize

                                        120KB

                                      • memory/4044-31-0x0000000004AF0000-0x0000000004B82000-memory.dmp
                                        Filesize

                                        584KB