Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 08:41

General

  • Target

    fbe6d8ed22a7fa2903b026b7f5d0dbb2b59b2353d1c24f6c73772b9226fa4d1a.exe

  • Size

    1.1MB

  • MD5

    4655d83f05a711daa1a0fac0f24f28e0

  • SHA1

    d54783eafe3429717adc8d64808ba3537a7beae6

  • SHA256

    fbe6d8ed22a7fa2903b026b7f5d0dbb2b59b2353d1c24f6c73772b9226fa4d1a

  • SHA512

    206a85e710d9d89750683d97fd7469e9d121d04787546fb32fabda7aac654a7b7cca546a17468994515a3989640d92721a7213d397b495f2a435f2ffa9fedfd5

  • SSDEEP

    24576:ayiclaMfdhpiMRWuHBbdQk8xGN4l1P8Fanje9xGN:hHaMfxie55dMMNs11AxG

Malware Config

Extracted

Family

redline

Botnet

magia

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 3 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbe6d8ed22a7fa2903b026b7f5d0dbb2b59b2353d1c24f6c73772b9226fa4d1a.exe
    "C:\Users\Admin\AppData\Local\Temp\fbe6d8ed22a7fa2903b026b7f5d0dbb2b59b2353d1c24f6c73772b9226fa4d1a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ns9lC69.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ns9lC69.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\WJ6Dm83.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\WJ6Dm83.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3648
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\wF5xt82.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\wF5xt82.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3624
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1RQ00bW9.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1RQ00bW9.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2328
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2qF2033.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2qF2033.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3448
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2408
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:2480
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 608
                  6⤵
                  • Program crash
                  PID:2152
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3LC57NI.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3LC57NI.exe
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4904
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                5⤵
                • Checks SCSI registry key(s)
                PID:1344
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 588
                5⤵
                • Program crash
                PID:2004
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4da828qP.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4da828qP.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1552
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              4⤵
                PID:2984
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 584
                4⤵
                • Program crash
                PID:2268
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Gv5aT1.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Gv5aT1.exe
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3088
            • C:\Windows\system32\cmd.exe
              "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6448.tmp\6449.tmp\644A.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Gv5aT1.exe"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1600
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:116
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffd84f846f8,0x7ffd84f84708,0x7ffd84f84718
                  5⤵
                    PID:4532
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,5676143782028962093,16343548340608741258,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:2
                    5⤵
                      PID:916
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,5676143782028962093,16343548340608741258,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:3
                      5⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3860
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login
                    4⤵
                    • Enumerates system info in registry
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:2636
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffd84f846f8,0x7ffd84f84708,0x7ffd84f84718
                      5⤵
                        PID:468
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,7957231080747919117,10297705919621690441,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:2
                        5⤵
                          PID:3952
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,7957231080747919117,10297705919621690441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:3
                          5⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1236
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,7957231080747919117,10297705919621690441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2984 /prefetch:8
                          5⤵
                            PID:3172
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,7957231080747919117,10297705919621690441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
                            5⤵
                              PID:1168
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,7957231080747919117,10297705919621690441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:1
                              5⤵
                                PID:4504
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,7957231080747919117,10297705919621690441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:1
                                5⤵
                                  PID:1176
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,7957231080747919117,10297705919621690441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:8
                                  5⤵
                                    PID:2760
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,7957231080747919117,10297705919621690441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:8
                                    5⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:860
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,7957231080747919117,10297705919621690441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:1
                                    5⤵
                                      PID:4648
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,7957231080747919117,10297705919621690441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:1
                                      5⤵
                                        PID:4952
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,7957231080747919117,10297705919621690441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:1
                                        5⤵
                                          PID:2324
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,7957231080747919117,10297705919621690441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:1
                                          5⤵
                                            PID:3928
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,7957231080747919117,10297705919621690441,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5068 /prefetch:2
                                            5⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4596
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3448 -ip 3448
                                    1⤵
                                      PID:3300
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4904 -ip 4904
                                      1⤵
                                        PID:708
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1552 -ip 1552
                                        1⤵
                                          PID:4048
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:4568
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:1136

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              2daa93382bba07cbc40af372d30ec576

                                              SHA1

                                              c5e709dc3e2e4df2ff841fbde3e30170e7428a94

                                              SHA256

                                              1826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30

                                              SHA512

                                              65635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              ecdc2754d7d2ae862272153aa9b9ca6e

                                              SHA1

                                              c19bed1c6e1c998b9fa93298639ad7961339147d

                                              SHA256

                                              a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7

                                              SHA512

                                              cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              1KB

                                              MD5

                                              778bffc1617ac2f4df241ef6c100b591

                                              SHA1

                                              5f8dc46993ec64b32f630303b8c1f84e06afacee

                                              SHA256

                                              43070c1ce1883a45e8b2f36bf23fd4169c85359a1115ba33df51b7b47dc62a07

                                              SHA512

                                              976e6cb5eefc34d18cd9eacb63aa2aa83052e2077f08f2122e278d28762f732400919bd08179af3f330de225c1493210833e64e06a67624644d943ca8c68f380

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              1KB

                                              MD5

                                              f6153f78ce759e58f1b1813f5d971f6b

                                              SHA1

                                              4cbeb151dd7d59bdfdc1f271d22a0cabefd72437

                                              SHA256

                                              e7b7480545a65f4359d91cf968f16866520a76882ccb2d9ec56e264231dd0fbd

                                              SHA512

                                              9d22520e0ebe6e245660792c7efbe00329bd1d509cc4fd64dd181da80f96ff4470ef8f47701e08b4ebb3eddc607f6922cd0b60e7a1d0df5d694b5678d4ff1473

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              1KB

                                              MD5

                                              d0d9fffd60d60b508c0875247fe4c614

                                              SHA1

                                              38306f9705425ec3d3178f5ed8ca140f4ba195c3

                                              SHA256

                                              a94795ed48b5b1270d396b1bd34408d50ab73132725c6356dfc4e7f32b0991b5

                                              SHA512

                                              cbfea18c1adadca4af868b25ace78625a496b9422f1a49e3b19d3dacc6e392815cee590ea3123484ad69170fbd2d9462d42921728edfb7dbbef4d5f21a2d86b1

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              520c28ae3e5369a6f2e37d0931b962eb

                                              SHA1

                                              edabf1198887d33379da7a3c839a6bb4f897ac14

                                              SHA256

                                              56e376b28e4b921ef84b27dba7ff2d3b70810593ce6c842167af658d8586e739

                                              SHA512

                                              25e41f4c58964c8b64b98a9fbd3648367116a170738d82ab1c8b99f6c7a1c98a63a7bf827ece4afb0c576ce3b1c5b6c4b16597d11ecb04de7e321f387872116f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              7KB

                                              MD5

                                              d6b1727dceca4f5211dffda114581d31

                                              SHA1

                                              48778b74db92b6e5a97c7c1a22eba23a6ec9d392

                                              SHA256

                                              057b0faf2763e673923870c0134f0b25e76445d7455013cea32c2c2b82764823

                                              SHA512

                                              85b7062731f5b03ac92c1a63a871b5262ecad0c98d3d2d9dfab373a123ee2097627c48441182d1ad702a437636aa5d4cc64e04a9a3ba74b7c7c6a0df139d2944

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              872B

                                              MD5

                                              6de441673baa574bc1fbf0b515481717

                                              SHA1

                                              3c03654d0387330c0d66915f47d416f6782ab178

                                              SHA256

                                              9ffdceed4031a3eed6819e931535eeb3481824db5e9f7a1a6dfccdc8bf825816

                                              SHA512

                                              4598d2712b9980b3a2dd28af84af6cd274ffe079a3d52ee1f7911d98439509658f2951f1ffaf3266002839c217276a55421cca7a02d0a328b3b24f1becea985d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              872B

                                              MD5

                                              d17d21d3249f99502059a5ab6d4191f2

                                              SHA1

                                              a97c273c09becf8411d71a8ef914811dd5ca45c6

                                              SHA256

                                              f8185ba33d5bcf5528216f6ebad0f86e193caf2423694471f3f24bcaafcfe807

                                              SHA512

                                              d00d6d57bda250a6f204a2265d3ba3a33385765449ab3f819ad77fd32ef2f57ce434e55ab2709175bee4c1cf3d7e5629575cd4e6abc701832b4bad8b1224c43f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              872B

                                              MD5

                                              f7ab38d64860b879e3b76ab7f480bed4

                                              SHA1

                                              191decca78e16984f90864ef47ceb0d4db71f4d3

                                              SHA256

                                              47e2dab86c1df70a7d43f6637948a323bb459c66f8e11b0cb20ea4dd91875c37

                                              SHA512

                                              fa8d83c2b83c757f2e32a0b103f1e01a2dd17b6d1210eb8cc514b8e558b6393f43cb8743d1ae4e563e84e837b275b43728f8d5f3db367425c7fd8567ee1146e9

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe581325.TMP

                                              Filesize

                                              872B

                                              MD5

                                              b8d0f2c828de634a029dbcf9f7ca5fea

                                              SHA1

                                              26d39858bd92953051927c53e5a6ed40960a9040

                                              SHA256

                                              24583fa8898bbf69981d93115a1988cf3a562a16356787ba85a89ca441841141

                                              SHA512

                                              14b24d39aaffd70b10fd45fd96fce1ebf949eecda8014190ec37039327d57dcf57d356f8e52e5cbf9a0029276008c39a608ca0e4de643f703025f34594ae13c5

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              6752a1d65b201c13b62ea44016eb221f

                                              SHA1

                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                              SHA256

                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                              SHA512

                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              c32e99c38950f7f862d7a3ae71c2e0e6

                                              SHA1

                                              e9b6b51ebe75fa94aad3ff44d038eed017f48900

                                              SHA256

                                              ed48ad26e3eff9b083ea40e80161deab4a9edffc2b293e984a23ce456b156ad5

                                              SHA512

                                              3b98cb730be7dadb4aa8f22532d3665603540dbb930ce37720c35c286a665f9beb2736948cd2fb592d0ce95bc58d6750f26cf129d11f5440b3824da8829a43e7

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              8KB

                                              MD5

                                              84be381b8d6ab485a3a2cdeec2066f4a

                                              SHA1

                                              7da400e51cf510570ca62771d40bafda6e39c05f

                                              SHA256

                                              01c51783d7e203bcd0717546d9f7fa3245a92bdcc9959f686e9f71309425bfcf

                                              SHA512

                                              445c2952b743d20480d7348deae2a9c6a7d7c63ab80a6e318213d2393017669501b64de16dec31d5bfdbc24748b1b00300e75b20d6d62ccc04881aedd7ee0c98

                                            • C:\Users\Admin\AppData\Local\Temp\6448.tmp\6449.tmp\644A.bat

                                              Filesize

                                              88B

                                              MD5

                                              0ec04fde104330459c151848382806e8

                                              SHA1

                                              3b0b78d467f2db035a03e378f7b3a3823fa3d156

                                              SHA256

                                              1ee0a6f7c4006a36891e2fd72a0257e89fd79ad811987c0e17f847fe99ea695f

                                              SHA512

                                              8b928989f17f09282e008da27e8b7fd373c99d5cafb85b5f623e02dbb6273f0ed76a9fbbfef0b080dbba53b6de8ee491ea379a38e5b6ca0763b11dd4de544b40

                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5Gv5aT1.exe

                                              Filesize

                                              97KB

                                              MD5

                                              09a0c9c67a668f95005d80047b1151c2

                                              SHA1

                                              d77e6e74b61b379b2c23421bf07dddc3a54e902a

                                              SHA256

                                              8737837e29992a01c68afc6ce6f2ba8a0f301d8cbe084b8e3a72a1a7820ec57c

                                              SHA512

                                              46c315c219b76b8b9aa4f5faad552eecf2b6f998b0c3c787029736f3ff66ac75127c0752ecc9f12bef97125f29e12406c0cecdaf28386813dbe4cc37e38137e1

                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ns9lC69.exe

                                              Filesize

                                              1018KB

                                              MD5

                                              a48b17b17b8b142389821a4d89a81c0e

                                              SHA1

                                              7a62f981db1e5cf5026b4c5246cee8f1ca909ca0

                                              SHA256

                                              d4af6baef965233908a885b44ec0324547e65a6ff4b7e04ae1843f7ddfe125cf

                                              SHA512

                                              e9d697d9b441cfdb8e678f35ce0d8ca8c746a851c6060bb8555dbfe9f086c61053cf425cbf4ff3c9cefd6205195c90cbc2b00d00e9eee18e4484d6101bb259dc

                                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4da828qP.exe

                                              Filesize

                                              461KB

                                              MD5

                                              6366a4a94269f236c63d493a8170f514

                                              SHA1

                                              c4bae7384272d8e44095d3e0fa048af33ae29cc0

                                              SHA256

                                              574821f816a18131e2dc6ea4f1ade27000ead27129c542dabf638bd7ed0cf741

                                              SHA512

                                              5e1a43daec489d34d42d4efac1d75616e100f8f6faaac1171e46365361f29a996f0b3bf11105c4eb60340f4e031de47804d5c76fb43c2caab571a6a5103b824e

                                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\WJ6Dm83.exe

                                              Filesize

                                              723KB

                                              MD5

                                              27e6768a5c989466e6fb6689e69c0939

                                              SHA1

                                              593f94d9a2e6e728dcec228cdab3ee4306f5717f

                                              SHA256

                                              5b908297be7fc2d943b75148130a433b31f5e8dbbc34879075a4afb69b6db0b9

                                              SHA512

                                              fd0e9fe1dc90bd0992d3b540e402d17d8e1e45f097e82ee56abe3cdbdf0e10b9d055ac84b844eba0059169a2733e48fe4d405286090bf74d2a31aa9c7ff2c438

                                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3LC57NI.exe

                                              Filesize

                                              270KB

                                              MD5

                                              53e6b1a9696bad5ed97fcb8546959f70

                                              SHA1

                                              2841112dee699e984980578f40b3581b990f1815

                                              SHA256

                                              3324ec6bf96ae9770f22264aa4adecdeb0e4371f635c68421284296426b35023

                                              SHA512

                                              c34e30effd1784f6465aca2b011eb7bd18c148e7803a92b3a7c28676f24ff2be75b7ab23b17cdcf07c5ff3d7c4d0e5b717fe357a7f2f17a9f0191ee247a1cae3

                                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\wF5xt82.exe

                                              Filesize

                                              478KB

                                              MD5

                                              fbb1407cc135c98cd7d4482b457248bf

                                              SHA1

                                              79097da43f0b841a5ec783bcfed1ae5434741c9e

                                              SHA256

                                              73acd7a22255d7e93be4656c81e2a1b91f17875d27bf6ead5357e07e77532d32

                                              SHA512

                                              f185e41e22d6d15ee8cb0e9190fcd86e83f96e57ef2660abb5ec0919e9070bfd9a7c24302e42ffeaca6db95af39f6a5f7666b6b7f8e18eb9b52e05ff739d4bd3

                                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1RQ00bW9.exe

                                              Filesize

                                              194KB

                                              MD5

                                              6241b03d68a610324ecda52f0f84e287

                                              SHA1

                                              da80280b6e3925e455925efd6c6e59a6118269c4

                                              SHA256

                                              ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2

                                              SHA512

                                              a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9

                                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2qF2033.exe

                                              Filesize

                                              422KB

                                              MD5

                                              30f1b3c42fe6718060e068b3d68066b5

                                              SHA1

                                              79cadb4bc00e7d66adb5936b45a64bd17bc7486c

                                              SHA256

                                              320ff4338213e3e90553408ef0a19094e58defb1a4983678a00c3dabdf03a79b

                                              SHA512

                                              272ffae995c49ac4c135f9d895acb3521b7206df9b01f4aaa956a4cf00a68a671fc0f0c6479e80c5f8e8b572e7d62a0e925485721b8d34c34613dab094220fd5

                                            • memory/1344-70-0x0000000000400000-0x0000000000409000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/2328-36-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2328-41-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2328-50-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2328-44-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2328-38-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2328-28-0x0000000002410000-0x000000000242E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/2328-29-0x0000000004B50000-0x00000000050F4000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/2328-33-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2328-48-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2328-30-0x0000000004AD0000-0x0000000004AEC000-memory.dmp

                                              Filesize

                                              112KB

                                            • memory/2328-31-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2328-54-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2328-52-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2328-34-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2328-46-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2328-58-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2328-56-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2328-42-0x0000000004AD0000-0x0000000004AE6000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/2480-63-0x0000000000400000-0x0000000000433000-memory.dmp

                                              Filesize

                                              204KB

                                            • memory/2480-64-0x0000000000400000-0x0000000000433000-memory.dmp

                                              Filesize

                                              204KB

                                            • memory/2480-66-0x0000000000400000-0x0000000000433000-memory.dmp

                                              Filesize

                                              204KB

                                            • memory/2984-81-0x00000000087E0000-0x0000000008DF8000-memory.dmp

                                              Filesize

                                              6.1MB

                                            • memory/2984-84-0x0000000007960000-0x000000000799C000-memory.dmp

                                              Filesize

                                              240KB

                                            • memory/2984-74-0x0000000000400000-0x000000000043E000-memory.dmp

                                              Filesize

                                              248KB

                                            • memory/2984-85-0x00000000079A0000-0x00000000079EC000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/2984-83-0x00000000078C0000-0x00000000078D2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/2984-82-0x0000000007AA0000-0x0000000007BAA000-memory.dmp

                                              Filesize

                                              1.0MB

                                            • memory/2984-76-0x0000000004B30000-0x0000000004B3A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/2984-75-0x0000000007700000-0x0000000007792000-memory.dmp

                                              Filesize

                                              584KB