Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 08:34

General

  • Target

    d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe

  • Size

    1.1MB

  • MD5

    49d567d32dd0c1e1e61bf5e848c46345

  • SHA1

    84a6f4f0b064e024c714d235de7ad29e60831730

  • SHA256

    d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f

  • SHA512

    d6e6e2ad69dc513fdf17b0502fa97f9fd269cb6269743050e4b3768a2b34cd52fbc7c852c6a6a3a00f912d5c2c6b17ed40f7f63583f3f370b74e9257bc2b74df

  • SSDEEP

    24576:Gy+DubI6MnVbrroOWonnRie4FLFyHm9M6Scvr:VUQI6M93oOWEnRie2LFom9Mb

Malware Config

Extracted

Family

redline

Botnet

magia

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe
    "C:\Users\Admin\AppData\Local\Temp\d0c1074be1d3cb22682be7bb947cb39668cb342942917997126020b102ea101f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Iw4gF55.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Iw4gF55.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nq2tO87.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nq2tO87.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1052
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vp5nv55.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vp5nv55.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3504
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xf12sO2.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xf12sO2.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2892
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2VQ3223.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2VQ3223.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3932
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2620
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 576
                6⤵
                • Program crash
                PID:1932
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Ub46bc.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Ub46bc.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4600
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
              • Checks SCSI registry key(s)
              PID:3692
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 540
              5⤵
              • Program crash
              PID:4772
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ks824nY.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ks824nY.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:5036
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:3720
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              4⤵
                PID:3172
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 592
                4⤵
                • Program crash
                PID:676
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5cc3Lj3.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5cc3Lj3.exe
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1940
            • C:\Windows\system32\cmd.exe
              "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\79F3.tmp\79F4.tmp\79F5.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5cc3Lj3.exe"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4268
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login
                4⤵
                • Enumerates system info in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:3884
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7fff4b6546f8,0x7fff4b654708,0x7fff4b654718
                  5⤵
                    PID:536
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:2
                    5⤵
                      PID:5056
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
                      5⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4520
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:8
                      5⤵
                        PID:2360
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                        5⤵
                          PID:3136
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                          5⤵
                            PID:2164
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:1
                            5⤵
                              PID:4572
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:8
                              5⤵
                                PID:3220
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:8
                                5⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4556
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:1
                                5⤵
                                  PID:3360
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:1
                                  5⤵
                                    PID:996
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:1
                                    5⤵
                                      PID:5036
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:1
                                      5⤵
                                        PID:2528
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,206905363661657729,8934845358169839358,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 /prefetch:2
                                        5⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3224
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                                      4⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:1056
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7fff4b6546f8,0x7fff4b654708,0x7fff4b654718
                                        5⤵
                                          PID:4792
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10388855297788859711,3346942226376907017,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
                                          5⤵
                                            PID:3360
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,10388855297788859711,3346942226376907017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3
                                            5⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1688
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3932 -ip 3932
                                    1⤵
                                      PID:4192
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4600 -ip 4600
                                      1⤵
                                        PID:2024
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5036 -ip 5036
                                        1⤵
                                          PID:848
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:3216
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:3516

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\69192351-33d5-49cd-bfa0-c25cf12d1bba.tmp

                                              Filesize

                                              8KB

                                              MD5

                                              36703835f0f84d4146f8371910b807af

                                              SHA1

                                              183615abdc63dd6dd0768c9bbe07976a671b7ee7

                                              SHA256

                                              fcb04bf2cc79fcce7d8fc265d0095fa64725178518dabcd9af5ac6acb3a28246

                                              SHA512

                                              fd5d1e5377c396e2ee60e83674bca3874723f861286aa37752b74014edcac95eed2d63673749768eef71678d3c9baf75a162922206883ba50a29069151da7b7c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              4b4f91fa1b362ba5341ecb2836438dea

                                              SHA1

                                              9561f5aabed742404d455da735259a2c6781fa07

                                              SHA256

                                              d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c

                                              SHA512

                                              fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              eaa3db555ab5bc0cb364826204aad3f0

                                              SHA1

                                              a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca

                                              SHA256

                                              ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b

                                              SHA512

                                              e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              1KB

                                              MD5

                                              89c1b63d5ced2a8c19ece254e54df33f

                                              SHA1

                                              7a6f083986bfa3f24ad41f97d20e468fca6c60cf

                                              SHA256

                                              b0fa466a6725bccd51c870e77046932849c8fffcef62b37e8a8b771aca9ea1f0

                                              SHA512

                                              3f627edde0be38c7008eef44b071d7b4499aea87d4fc1bfc7dc05efeda334638bce6154eada90d9bba953476df3f9b8352ced87e47f7eea849195e3b4601d5c3

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              1KB

                                              MD5

                                              efce9460007935a1abb0f7321a5a153a

                                              SHA1

                                              aa84a60687da28fcbda34775c70753bdd4fd28ee

                                              SHA256

                                              9ade0073271fa62d517c15c80c8571fe7a83d0824e5928918c35425164da1748

                                              SHA512

                                              c6a3bd74b42b547d8879162b23dbe0f546b61e4b0de6c7f344b8b64f159504269356467a39ce63991fd7592ca90a41207f9a792ad40d85c98640142ea99f4b61

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              1KB

                                              MD5

                                              ed28601c0e0f7aa2ab8c89a00d08caa0

                                              SHA1

                                              de2c71f5cc35ae083539c1c65f0109872035c788

                                              SHA256

                                              02275eee2e1ffe7cdf129abf346475a54661a1fe9d2d6a7badc267138653dc64

                                              SHA512

                                              f253ce2c81368d244128041fd97c1efdace4116f05db140633ba1d37aef8a0b7b700279b41c3406e578e5513efa47f1a4f84738672fffb9b0abba1b690caaded

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              26775f19ed2380646e97614b4d684b7b

                                              SHA1

                                              e6381f74ee9156178e835ca625928aebb3510348

                                              SHA256

                                              2957dd93c80ea84d883a84127aecc2bec4af7e8e825ab60d82b3dfb97e9dd6e2

                                              SHA512

                                              b7984ee74f756c51cf1d4acf8e6e2a326fddc88f9a7896000e5ee23e7d2ccbe67a719a1e045f4d99b345d9f82953424ebf18bdfa3a2a8cfc04e647dde0734845

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              7KB

                                              MD5

                                              2b75e9a61089c897a1c7a87d6d230bb8

                                              SHA1

                                              99d2b214e0cf4563eb807ece0e7942fe30ee0c51

                                              SHA256

                                              5c6e16777fa40dcfdb47bb0930b6cea91b1392a8e78bd12a221c39f090a7b982

                                              SHA512

                                              f6e14643a643ef89c084e29f36fd545d8db3448c920ca06d329a2ba2c20ea8f7c14103ff303ddf265d8db5d9a85977ba838bd72a0fa91705c2e9eb2b7fca5bbe

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              872B

                                              MD5

                                              0ce2e48b6ffaaf491135aef259af1134

                                              SHA1

                                              375644c0f0a9b2d68671e98a7860870ae34567e9

                                              SHA256

                                              653a1f1d6c552343b7bc311d7351c6a68ab41aad1ed62e2ae220715a30bb0d57

                                              SHA512

                                              b62194114bf47202a234339d550988ba4b1fd0519f5fa846dcec5b1aa03f3e86a421a3f024d283172a450aee332e77939977ab038cade70dd8c329b8ed5cc276

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              872B

                                              MD5

                                              0ebb9593939c8b0c271e334b41dab1e4

                                              SHA1

                                              dba2a5509af402b5de878fcf58d68ca4d1cb7106

                                              SHA256

                                              04c1ab1ff5a27d51d679a9d66ab5f541e434ecb69e3008d052b27904ba8ea9ef

                                              SHA512

                                              295770923e0153552e9014961b710d85cf9dbf64bc68b915b638f220f5e28dff3a6a6dcd5f9ea979e176c4e5d5bd1cf28d63895f79755821beb16fb00f4d4286

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58267e.TMP

                                              Filesize

                                              872B

                                              MD5

                                              c255161ea989f8527641ff2abcd1234d

                                              SHA1

                                              c26a1d3c5559c9dcf8f38021f888e638db9556cc

                                              SHA256

                                              64991aa6ba58896bc6659f29ccb330457c1560ab6fc4bfd534e27de735f2403c

                                              SHA512

                                              67dae462e2dcb8e0502ae1e9509ef65d7f8dd4f3fc5abb834e098d62834d56f3824ebb8022c4d3b1a9196b83fc01e59aa40f377823cde104469237a3c766def8

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              6752a1d65b201c13b62ea44016eb221f

                                              SHA1

                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                              SHA256

                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                              SHA512

                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              0138678b4eb5dd7d2b7fe3a1ce2b8ec7

                                              SHA1

                                              94cf5600b00e2238f4d8efeb30510803a93365a0

                                              SHA256

                                              0ace6816c99ab683f51e0a5f28051207668db1f514bb92f15ef91da3a4567ddd

                                              SHA512

                                              67b5826ecbfbad7329e20b9218d6394186b430bc112190b11b0beea3c2b822ffec127a45c81312878e178b5026140da463da41af12462d697791d8341bbb006c

                                            • C:\Users\Admin\AppData\Local\Temp\79F3.tmp\79F4.tmp\79F5.bat

                                              Filesize

                                              90B

                                              MD5

                                              5a115a88ca30a9f57fdbb545490c2043

                                              SHA1

                                              67e90f37fc4c1ada2745052c612818588a5595f4

                                              SHA256

                                              52c4113e7f308faa933ae6e8ff5d1b955ba62d1edac0eb7c972caa26e1ae4e2d

                                              SHA512

                                              17c399dad7b7343d5b16156e4d83de78ff5755d12add358bd2987ed4216dd13d24cfec9ecdb92d9d6723bb1d20d8874c0bad969dbec69eed95beb7a2817eb4fe

                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5cc3Lj3.exe

                                              Filesize

                                              87KB

                                              MD5

                                              619ce79c55efb23618d79b2ab8bf61fd

                                              SHA1

                                              753b21ff5ca0c9badaa932bf3d476866f23824dc

                                              SHA256

                                              1e3ce93557984816776ae8f423c8cd1af00b68dc7ec812d9a14611447d7ee3e2

                                              SHA512

                                              46d760ea85497298f7521d03f2c9fee7fa831ea122e5e183a2ca8f64af451274c3e28aa7e8d97ce13c1925d26ad892cbc0e5c9ce65023ec6df8db9ce904322e0

                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Iw4gF55.exe

                                              Filesize

                                              1022KB

                                              MD5

                                              d68a352b054b0bc4f309c79377844027

                                              SHA1

                                              87c07537a00f0f62d59f880d46984f89514c30e4

                                              SHA256

                                              fda90584567040552aaa25b79ef86725e4e500393d703dc71839a01d89f0145d

                                              SHA512

                                              c3b638be682ca2bcc8475cb5049b109f1e76629257b4ef4154b554c8c11e91ffc43b0c82f3bf95a38ac8c3dd3d97b2785bc584b4a96d707f63aec0aec52a5a25

                                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4Ks824nY.exe

                                              Filesize

                                              461KB

                                              MD5

                                              fc9af8aad670e6faea27dd70ec4bf339

                                              SHA1

                                              b3d9e532cbe79381d0ba0a9a8e0086afc1a7c6d3

                                              SHA256

                                              bb8c74f99bd09260aa9b4942a992e9489b6e2b3a6300508d4fffae9530538af2

                                              SHA512

                                              bd84f4c1bd2b09567cef71c9ef559c3f7ac33f47b249fdfa7dbf4273a810a3f7ea3105263e4bb072ab40ca560ce9d765d06ea36cca2fcddb814cd56906cebd01

                                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Nq2tO87.exe

                                              Filesize

                                              727KB

                                              MD5

                                              e3e8b00602efbec6fffe09e809679d32

                                              SHA1

                                              6e853a7b89df446781d79cfde5e4b60f1a2bb189

                                              SHA256

                                              fcf131b7f4a4c17a4cef36f7655e3fb1383e15f4a4d75a21bcf10aa2cd5b73b6

                                              SHA512

                                              a0591b3f123d99197bdf74b1a20c2f42771db1021389274590948347b2d86523e84e9afd95113c8df8f42c4630d40898bb920b55fc5f7a5689fa12b7fb90dd8a

                                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3Ub46bc.exe

                                              Filesize

                                              270KB

                                              MD5

                                              71fefde72d25d474cf288af92c3d058d

                                              SHA1

                                              ada09f423d8da8e11d858c20bcd8c1360ef3bf9d

                                              SHA256

                                              e2a05d3834b6a325c150cd20fd5659daf5af95c04d9ca34b929eeb891815dc53

                                              SHA512

                                              8bc79ad8b5ec399264fa96544c5c201a44902ed43958ae62c3784c7f0cba0e8306b9636e9c40f538c09b2aa104edf64b51f492fa7383330fb004d30fd6a5495f

                                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Vp5nv55.exe

                                              Filesize

                                              482KB

                                              MD5

                                              2e344f24c04980b4e4978fbfc5995af7

                                              SHA1

                                              bfa0ca5a17ac638772edfc69b29841262f4a5e45

                                              SHA256

                                              ddbbcc9777cfbc839fa7e22db466863b419b28f7e1543ecf705012925635c989

                                              SHA512

                                              e00cf399294792440c146d3d81b88befe800d7a51628e47942d38a86a98cae744903b5c6c69f16d4f918b492d0556eb989e2dd0f12bc86c6a3a9811bdf158a35

                                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Xf12sO2.exe

                                              Filesize

                                              194KB

                                              MD5

                                              35d718538c3e1346cb4fcf54aaa0f141

                                              SHA1

                                              234c0aa0465c27c190a83936e8e3aa3c4b991224

                                              SHA256

                                              97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

                                              SHA512

                                              4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

                                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2VQ3223.exe

                                              Filesize

                                              422KB

                                              MD5

                                              9e9196e1f884777f5b681af78f4be0c3

                                              SHA1

                                              e6db0678dee3f6a3abdc586889bf1d61fca6e3d4

                                              SHA256

                                              5170aee76e1ce4d6dbc751f87c07b479663776446561379f235b77fb01e63556

                                              SHA512

                                              73653ec9c7d869d12815d677d3376c8a22a94eb5967ec0cd3c6eb88ccf7383066164ee9fe616a94f3841750e1cf642a4fcf37694a81b761c98008a2e20e3bc8f

                                            • memory/2620-64-0x0000000000400000-0x0000000000433000-memory.dmp

                                              Filesize

                                              204KB

                                            • memory/2620-66-0x0000000000400000-0x0000000000433000-memory.dmp

                                              Filesize

                                              204KB

                                            • memory/2620-63-0x0000000000400000-0x0000000000433000-memory.dmp

                                              Filesize

                                              204KB

                                            • memory/2892-52-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2892-31-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2892-40-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2892-28-0x00000000021A0000-0x00000000021BE000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/2892-29-0x0000000004AB0000-0x0000000005054000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/2892-34-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2892-44-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2892-46-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2892-58-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2892-56-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2892-54-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2892-36-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2892-32-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2892-30-0x0000000004990000-0x00000000049AC000-memory.dmp

                                              Filesize

                                              112KB

                                            • memory/2892-50-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2892-38-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2892-42-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2892-48-0x0000000004990000-0x00000000049A6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/3172-85-0x0000000007510000-0x000000000755C000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/3172-84-0x0000000007580000-0x00000000075BC000-memory.dmp

                                              Filesize

                                              240KB

                                            • memory/3172-83-0x00000000074E0000-0x00000000074F2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/3172-82-0x0000000007EC0000-0x0000000007FCA000-memory.dmp

                                              Filesize

                                              1.0MB

                                            • memory/3172-81-0x00000000084E0000-0x0000000008AF8000-memory.dmp

                                              Filesize

                                              6.1MB

                                            • memory/3172-76-0x0000000004870000-0x000000000487A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/3172-75-0x0000000007400000-0x0000000007492000-memory.dmp

                                              Filesize

                                              584KB

                                            • memory/3172-74-0x0000000000400000-0x000000000043E000-memory.dmp

                                              Filesize

                                              248KB

                                            • memory/3692-70-0x0000000000400000-0x0000000000409000-memory.dmp

                                              Filesize

                                              36KB