Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 09:31

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Virus/MadMan.exe

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 45 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Virus/MadMan.exe
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3216
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe41846f8,0x7fffe4184708,0x7fffe4184718
      2⤵
        PID:4828
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1956 /prefetch:2
        2⤵
          PID:4580
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1592
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:8
          2⤵
            PID:1580
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
            2⤵
              PID:2236
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
              2⤵
                PID:3488
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:8
                2⤵
                  PID:432
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:684
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:1
                  2⤵
                    PID:3140
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:1
                    2⤵
                      PID:4704
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
                      2⤵
                        PID:2452
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:1
                        2⤵
                          PID:4756
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5992 /prefetch:8
                          2⤵
                            PID:4480
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:1
                            2⤵
                              PID:2796
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6316 /prefetch:8
                              2⤵
                                PID:3020
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1484
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6528 /prefetch:1
                                2⤵
                                  PID:1176
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6792 /prefetch:8
                                  2⤵
                                    PID:3504
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6692 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2300
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,14487210551640471429,8772654845629398569,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5108 /prefetch:2
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1372
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:1112
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:4296
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:2168
                                      • C:\Users\Admin\Downloads\BadRabbit.exe
                                        "C:\Users\Admin\Downloads\BadRabbit.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • Drops file in Windows directory
                                        PID:4088
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                          2⤵
                                          • Loads dropped DLL
                                          • Drops file in Windows directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4704
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /c schtasks /Delete /F /TN rhaegal
                                            3⤵
                                              PID:4940
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /Delete /F /TN rhaegal
                                                4⤵
                                                  PID:3396
                                              • C:\Windows\SysWOW64\cmd.exe
                                                /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1826755043 && exit"
                                                3⤵
                                                  PID:2328
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1826755043 && exit"
                                                    4⤵
                                                    • Creates scheduled task(s)
                                                    PID:3596
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 09:50:00
                                                  3⤵
                                                    PID:872
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 09:50:00
                                                      4⤵
                                                      • Creates scheduled task(s)
                                                      PID:1520
                                                  • C:\Windows\F23F.tmp
                                                    "C:\Windows\F23F.tmp" \\.\pipe\{102C8B4F-C896-42EF-9B50-E099B184BB4A}
                                                    3⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1536
                                              • C:\Users\Admin\Downloads\BadRabbit.exe
                                                "C:\Users\Admin\Downloads\BadRabbit.exe"
                                                1⤵
                                                • Executes dropped EXE
                                                • Drops file in Windows directory
                                                PID:4224
                                                • C:\Windows\SysWOW64\rundll32.exe
                                                  C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                  2⤵
                                                  • Loads dropped DLL
                                                  • Drops file in Windows directory
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5092
                                              • C:\Users\Admin\Downloads\BadRabbit.exe
                                                "C:\Users\Admin\Downloads\BadRabbit.exe"
                                                1⤵
                                                • Executes dropped EXE
                                                • Drops file in Windows directory
                                                PID:2880
                                                • C:\Windows\SysWOW64\rundll32.exe
                                                  C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                  2⤵
                                                  • Loads dropped DLL
                                                  • Drops file in Windows directory
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:4444
                                              • C:\Users\Admin\Downloads\Birele.exe
                                                "C:\Users\Admin\Downloads\Birele.exe"
                                                1⤵
                                                • Modifies WinLogon for persistence
                                                • Executes dropped EXE
                                                • Adds Run key to start application
                                                PID:2356
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM explorer.exe
                                                  2⤵
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2056

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                4f7152bc5a1a715ef481e37d1c791959

                                                SHA1

                                                c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7

                                                SHA256

                                                704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc

                                                SHA512

                                                2e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                ea98e583ad99df195d29aa066204ab56

                                                SHA1

                                                f89398664af0179641aa0138b337097b617cb2db

                                                SHA256

                                                a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6

                                                SHA512

                                                e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\82e26b9b-136d-43d6-9ff5-6d46b20edd74.tmp

                                                Filesize

                                                5KB

                                                MD5

                                                07d2a3943dd0b5897f156f0355919842

                                                SHA1

                                                db53d406037b921acbe007b5866188eb91d224ab

                                                SHA256

                                                154acbb035abb614fa652ce3f5537ce7167e601ac6b092dc67f619aadb38fe63

                                                SHA512

                                                31e99c6925ef6e166222752159699a3ba1730552cabf26216b81fab36fbf9636e6e4005bc59155f0432065b2a76e9feabc3bcf0eed7633f5cfe31b9ec1f159cd

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                1KB

                                                MD5

                                                add57f71825c0c9eeb670a4fed67ae8b

                                                SHA1

                                                e4d335f87af91e20aaf0c81f460e9ea19332325f

                                                SHA256

                                                184a6bcecd20688f47bfe256f947d3d39a9fbff3e7b73ed53cfa56adaded9033

                                                SHA512

                                                31df1314529b523d55fc55f4d1e985677d42d4377c484dc71f6f04dda8c3697514c5e60eac2fa03a91e49be7de44cf2a56d68a1db986acc0c6ad5aa5d87f9ef8

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                Filesize

                                                579B

                                                MD5

                                                65141ee7de186b38be5e1fdaddb3d501

                                                SHA1

                                                455647ecf2fe6d59ac8b378758eb06b9b7a4e69c

                                                SHA256

                                                534e5e7800ffb87965af22f5b6137df74b4cf5ab7c061b0a325bb5f62c157465

                                                SHA512

                                                d0625d5c88c342ebf59235de6d9ce14e2e9c054d6aa15cc3658a8f9fd913642374f817c41d594b77bdd17218b063047a572d1eaf4ff5c33f638550dfb9f14b37

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                691375cf1f0aa85df7f16392f57fd2ea

                                                SHA1

                                                19b906488a9163ad868f67bdb3ef0634e7c5a64f

                                                SHA256

                                                d8c99dfb2a020e1e8c3a76149a8c33125b6ab8bc9249a36a5583595b0425c975

                                                SHA512

                                                c8614730f9e1e440f1f87c131eee740d244f15e22a5464bc088a395d7e503efbfc790a177c6da57e8f49109ce1c38b79e83e72184946bed5d1b502c7b5be8df2

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                0877828442b9588dcfa09078285c2273

                                                SHA1

                                                048a71144a70e28f87c3be0686e73a2a9186597b

                                                SHA256

                                                322453614222f6bd85e45906ce11a1c482a6f418d8cfd9302617fc23a71f9c73

                                                SHA512

                                                0434e7f03190cf22e93cb38dd742a6d553e1ece475bb02064a795eef56387daab52636dacdb69f5910ddbd3dfe3d1aa9e8b3949bc13f82ebc490cd8c6e67f38a

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                Filesize

                                                1KB

                                                MD5

                                                5590c1290eb61016806670d4b8491440

                                                SHA1

                                                38f9f5cab85e8df60f4281711aca7ec5459b74d2

                                                SHA256

                                                d75c397fc43298ef06c7f98e530084a55748018735130bb1c3b2acb0bc8171d1

                                                SHA512

                                                cec3d39bd1d72c61574af64ebaeb66164abdb4d76f61216d84c34e1c8c24eaed7bc4b6aa684363f898d1eee0edcb171c84984b64099c5fd30986e2c7f067e8cb

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                Filesize

                                                1KB

                                                MD5

                                                6eb5fbd1e37cda7c1782294338c9a4a9

                                                SHA1

                                                f4a1bd176c9980bc2f2ad164fe3d2e7d0ce3b7b1

                                                SHA256

                                                5c5726aa17c44a5ccafe7d6109b7c0fa0dd283446700d33b890786cf2ffae3f9

                                                SHA512

                                                85943c13682104c15b9f5bb9432c163429f581e2faef8aa6e8a8bdd7671b93ae49e61a1bece6f973422d40232722e894cca1438bf92cd27912b92da01e0ad2e8

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                Filesize

                                                874B

                                                MD5

                                                f293af34507bf0a9afcc7d399481bf6e

                                                SHA1

                                                a11395bff209331a26f8b54b4a13e5b6a6c27360

                                                SHA256

                                                75e14793077d3941e5a468f94d51a2746b578c0af4a92d82e4d7c98b9527b17d

                                                SHA512

                                                41fbf35d8f979cb0ecb032559ed05f5d3a777ca26d8c41d3c0132cd962021afc3a6bef4a2ccbfd1f1249401ca06355d23ec54ed2f62b7b216fac8a898cbe7c0b

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                Filesize

                                                1KB

                                                MD5

                                                1fccae8b4875bae89aee857c6c47e1a4

                                                SHA1

                                                62b77ad46cf09d70f7a664a182f82d26d50b53ce

                                                SHA256

                                                72cd005be0b0800322975e498f0a695890ac00e59c63dbef68a65ae5f82df89a

                                                SHA512

                                                bdc4577b286ed58fe5d67c4128f55648b45f0023547f31305d0adb8b817ad7760246cc55c50cd09ea755de55edda1f2f98156d244228045bd73dbe6e1db9eaa9

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe578fbd.TMP

                                                Filesize

                                                874B

                                                MD5

                                                72034596c2621b7d5fbbc979dcf36acc

                                                SHA1

                                                bb3db32d96834aaebe2f603bb8a48e014d2df9b1

                                                SHA256

                                                c7e9e19695238218b8f1f299a33791a22ff0295af2a7e8bf1391c5aeda7b9134

                                                SHA512

                                                742e9e4d1b78291f1c6e93c352e1aa4e09291a97a1e1ca520a87bb30908c1fbd49e70dd9a76424d36e9a285b9eba5ac608f3e0eb4766a8b9caf58d1f8383ee3d

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                6752a1d65b201c13b62ea44016eb221f

                                                SHA1

                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                SHA256

                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                SHA512

                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                12KB

                                                MD5

                                                7bba8a1ec4cb24bfc05a065fcecca172

                                                SHA1

                                                e861820b91311e113fcaff3cb266b0e5e2e85e7a

                                                SHA256

                                                8d53da8d6a0c33b682fa3f2aefa905e230c6e45bc993c6457304d6dd912c28e1

                                                SHA512

                                                6a5f817da0ec3ab528365f0b029e608d236084921a15ceea79afc925f1d97d0e34e4cae9ab7c8c1c029aa3713d55fefcf8a5ea2478c719989dd59e7492271675

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                d427e3b21bb406e01a3035ea44db5a50

                                                SHA1

                                                aba9ab185d5f346a00d9a6e5db9aaab37def00f0

                                                SHA256

                                                10f6df91156dbd6113c910200615a48e80bf564cfb4628080a1a2f341416d1a6

                                                SHA512

                                                e412e5e17e034cebe41064241f958de74ce7685034b2d85c1ba5fdfedbed92d3b2eddc1a88749a59b85998315783bec8db65fe80a425bf87047702ce9db7426c

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                f2d97f804dd334e3308a83bd257e21ef

                                                SHA1

                                                2eecf1bdcf271427e726854ec580c2c66fecd15f

                                                SHA256

                                                cc2c9990fcb99b0d3774f001bb67f7c5aba2418134b54848088d53f84cae9e94

                                                SHA512

                                                8a3bd22abf26fa897679d96cfac6ee0bd16a63d24fa925059dbaeadeb44fd1b392fdf4637030a406a7c9f54a99d380cb9ec88a5bfa4f441bea7ade09c22e52d3

                                              • C:\Users\Admin\Downloads\Unconfirmed 176340.crdownload

                                                Filesize

                                                116KB

                                                MD5

                                                41789c704a0eecfdd0048b4b4193e752

                                                SHA1

                                                fb1e8385691fa3293b7cbfb9b2656cf09f20e722

                                                SHA256

                                                b2dcfdf9e7b09f2aa5004668370e77982963ace820e7285b2e264a294441da23

                                                SHA512

                                                76391ac85fdc3be75441fcd6e19bed08b807d3946c7281c647f16a3be5388f7be307e6323fac8502430a4a6d800d52a88709592a49011ecc89de4f19102435ea

                                              • C:\Users\Admin\Downloads\Unconfirmed 838759.crdownload

                                                Filesize

                                                431KB

                                                MD5

                                                fbbdc39af1139aebba4da004475e8839

                                                SHA1

                                                de5c8d858e6e41da715dca1c019df0bfb92d32c0

                                                SHA256

                                                630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

                                                SHA512

                                                74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

                                              • C:\Windows\F23F.tmp

                                                Filesize

                                                60KB

                                                MD5

                                                347ac3b6b791054de3e5720a7144a977

                                                SHA1

                                                413eba3973a15c1a6429d9f170f3e8287f98c21c

                                                SHA256

                                                301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

                                                SHA512

                                                9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

                                              • C:\Windows\infpub.dat

                                                Filesize

                                                401KB

                                                MD5

                                                1d724f95c61f1055f0d02c2154bbccd3

                                                SHA1

                                                79116fe99f2b421c52ef64097f0f39b815b20907

                                                SHA256

                                                579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648

                                                SHA512

                                                f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113

                                              • memory/2356-414-0x0000000000400000-0x0000000000438000-memory.dmp

                                                Filesize

                                                224KB

                                              • memory/2356-416-0x0000000000400000-0x0000000000438000-memory.dmp

                                                Filesize

                                                224KB

                                              • memory/2356-431-0x0000000000400000-0x0000000000438000-memory.dmp

                                                Filesize

                                                224KB

                                              • memory/4444-312-0x0000000002A10000-0x0000000002A78000-memory.dmp

                                                Filesize

                                                416KB

                                              • memory/4444-319-0x0000000002A10000-0x0000000002A78000-memory.dmp

                                                Filesize

                                                416KB

                                              • memory/4704-260-0x0000000002270000-0x00000000022D8000-memory.dmp

                                                Filesize

                                                416KB

                                              • memory/4704-250-0x0000000002270000-0x00000000022D8000-memory.dmp

                                                Filesize

                                                416KB

                                              • memory/4704-257-0x0000000002270000-0x00000000022D8000-memory.dmp

                                                Filesize

                                                416KB

                                              • memory/5092-297-0x00000000021C0000-0x0000000002228000-memory.dmp

                                                Filesize

                                                416KB

                                              • memory/5092-290-0x00000000021C0000-0x0000000002228000-memory.dmp

                                                Filesize

                                                416KB