Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/06/2024, 21:55

General

  • Target

    VirusShare_c9ef69554082be3467df433a15e7ab45.exe

  • Size

    321KB

  • MD5

    c9ef69554082be3467df433a15e7ab45

  • SHA1

    79c01bf85a712ddf6a4d54e9db281a8310a12c15

  • SHA256

    0db818ad2b03a8003c1b923985b3cd74ed82272205b3372796b192d2661824ac

  • SHA512

    13d818b734a9ee2d1cd2bda66ae6213f7fb7e9a74f0175ae37b85906816341e6224cdf1d5f57487e21b80d9782cee75db8acbd3752a303569fc8c6fa2598a4f9

  • SSDEEP

    6144:cL42La41ctAaWLBbYcTDASiBdRIGt4MCZnsdbTo07BTT9OyIO:I42LasctABLBz/Udu04MEnsdbTo01VO8

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\restore_files_felny.txt

Ransom Note
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! What happened to your files ? All of your files were protected by a strong encryption with RSA-2048. More information about the encryption keys using RSA-2048 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) What does this mean ? This means that the structure and data within your files have been irrevocably changed, you will not be able to work with them, read them or see them, it is the same thing as losing them forever, but with our help, you can restore them. How did this happen ? Especially for you, on our server was generated the secret key pair RSA-2048 - public and private. All your files were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our secret server. What do I do ? Alas, if you do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed. If you really value your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://qw2234duoiyu.h2fyr6785jhdhfg.com/63EC4070FC173D71 2. http://awoeinf832as.wo49i277rnw.com/63EC4070FC173D71 3. https://kb63vhjuk3wh4ex7.onion.to/63EC4070FC173D71 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization. 3. Type in the address bar: kb63vhjuk3wh4ex7.onion/63EC4070FC173D71 4. Follow the instructions on the site. IMPORTANT INFORMATION: Your personal pages: http://qw2234duoiyu.h2fyr6785jhdhfg.com/63EC4070FC173D71 http://awoeinf832as.wo49i277rnw.com/63EC4070FC173D71 https://kb63vhjuk3wh4ex7.onion.to/63EC4070FC173D71 Your personal page (using TOR): kb63vhjuk3wh4ex7.onion/63EC4070FC173D71 Your personal identification number (if you open the site (or TOR 's) directly): 63EC4070FC173D71
URLs

http://qw2234duoiyu.h2fyr6785jhdhfg.com/63EC4070FC173D71

http://awoeinf832as.wo49i277rnw.com/63EC4070FC173D71

https://kb63vhjuk3wh4ex7.onion.to/63EC4070FC173D71

http://kb63vhjuk3wh4ex7.onion/63EC4070FC173D71

Extracted

Path

C:\Program Files\7-Zip\Lang\restore_files_felny.html

Ransom Note
<html> <style>a { color:green; }.tb { background:white; border-style:solid; border-width:1px; padding:3px; border-color:lime; } .ttl { font-size:13px; color:880000; }</style><body style="background:#33CCFF;"> <center> <div style="text-align:left; font-family:Arial; font-size:13px; line-height:20px; margin-top:10px; width:800px; background:#F4F4F4; padding:20px; border-style:solid; border-width:5px; border-color:#BABABA;"> <b><font class="ttl">What happened <!------sfg2gdfstw5ey3345 --> to your files?</b></font><br> <font style="font-size:13px;">All of your files were<!------sfg2gdfstw5ey3345 --> protected by a strong<!------sfg2gdfstw5ey3345 --> encryption with<!------sfg2gdfstw5ey3345 --> RSA-2048 <br> More information about the <!------sfg2gdfstw5ey3345 -->encryption RSA-2048 can be<!------sfg2gdfstw5ey3345 --> found here: <a href="http://en.wikipedia.org/wiki/RSA_(cryptosystem)" target="_blank">http://en.wikipedia.org/wiki/RSA_(cryptosystem)</a><br></font> <br><b><font class="ttl">What <!------sfg2gdfstw5ey3345 --> does this mean?</b></font><br><font style="font-size:13px;"> This<!------sfg2gdfstw5ey3345 --> means that the <!------sfg2gdfstw5ey3345 --> structure and data within your files have been irrevocably <!------sfg2gdfstw5ey3345 -->changed, you will not be able to work<br> with them, read<!------sfg2gdfstw5ey3345 --> them or see them, it is the same thing <!------sfg2gdfstw5ey3345 -->as losing them forever, but with our help, you can restore them.</font><br><br><b><font class="ttl">How did this happen?</b></font> <br> <font style="font-size:13px;"> Especially for you, on our server was generated the secret key pair RSA-2048 - public and private. <br>All your <!------sdkfg3265436456hdfskjghfdg --> files were encrypted with the public key, <!------sdkfghd456334565436fskjghfdg --> which has been <!------sdkfghd45363456fskjghfdg --> transferred to <!------sdkfghdfskjghfdg -->your computer via <!------sdkfghd4356345643564356fskjghfdg -->the Internet.<br> <!------sdkfghd34563456fskjghfdg --> Decrypting of <!------sdkf45363456ghdfskjghfdg -->YOUR FILES is <!------sdkfghdfs4563456kjghfdg -->only possible <!------sdkfgh45364356dfskjghfdg -->with the help of the <!------sdkfghd4563456fskjghfdg -->private key and <!------sdkfghd43563456fskjghfdg -->decrypt program, <!------sdkfghdf43564356tyretyskjghfdg -->which is on our <!------sdkfgh34565346dfskjghfdg -->SECRET SERVER!!!. </font><br><br><b><font class="ttl">What do I do?</b></font> <br><font style="font-size:13px;">Alas, if you do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed.<br> If you really need your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist.</font><br><br> <!------23452345dgtwertwre --><div class="tb" style="color:#880000; font-size:13px; border-width:3px;">For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: <hr> <!------sadfs32452345gfdsgsdfgdfsafasdfasdfsadf --><b>1.<a href="http://qw2234duoiyu.h2fyr6785jhdhfg.com/63EC4070FC173D71" target="_blank">http://qw2234duoiyu.h2fyr6785jhdhfg.com/63EC4070FC173D71</a></b><br> <!------ds234523452345fgwert --><b>2.<a href="http://awoeinf832as.wo49i277rnw.com/63EC4070FC173D71" target="_blank">http://awoeinf832as.wo49i277rnw.com/63EC4070FC173D71</a></b><br> <!------wer234524353245terwtewrt --><b>3.<a href="https://kb63vhjuk3wh4ex7.onion.to/63EC4070FC173D71" target="_blank">https://kb63vhjuk3wh4ex7.onion.to/63EC4070FC173D71</a></b><br> <!------sfg2gdfstw5ey3345 --></div><br><div class="tb" style="font-size:13px; border-color:#880000;">If for some reasons the addresses are not available, follow these steps: <hr>1. Download and install tor-browser: <a href="http://www.torproject.org/projects/torbrowser.html.en" target="_blank">http://www.torproject.org/projects/torbrowser.html.en</a><br>2. After a successful installation, run the browser and wait for initialization.<br>3. Type in the address bar: <font style="font-weight:bold; color:#009977;">kb63vhjuk3wh4ex7.onion/63EC4070FC173D71</font><br>4. Follow the instructions on the site.</div><br><br><b>IMPORTANT INFORMATION:</b><br><div class="tb" style="width:790px;"> Your Personal PAGES: <b><br> <a href="http://qw2234duoiyu.h2fyr6785jhdhfg.com/63EC4070FC173D71" target="_blank">http://qw2234duoiyu.h2fyr6785jhdhfg.com/63EC4070FC173D71</a> <br> <a href="http://awoeinf832as.wo49i277rnw.com/63EC4070FC173D71" target="_blank">http://awoeinf832as.wo49i277rnw.com/63EC4070FC173D71</a> <br> <a href="https://kb63vhjuk3wh4ex7.onion.to/63EC4070FC173D71" target="_blank"> https://kb63vhjuk3wh4ex7.onion.to/63EC4070FC173D71</a> </b> <br> Your Personal PAGE (using TOR): <font style="font-weight:bold; color:#009977;">kb63vhjuk3wh4ex7.onion/63EC4070FC173D71</font><br> Your personal code (if you open the site (or TOR 's) directly): <font style="font-weight:bold; color:#770000;">63EC4070FC173D71</font><br> </div></div></center></body></html>
URLs

https://kb63vhjuk3wh4ex7.onion.to/63EC4070FC173D71</a>

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (879) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_c9ef69554082be3467df433a15e7ab45.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_c9ef69554082be3467df433a15e7ab45.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Users\Admin\AppData\Roaming\vcwmvr.exe
      C:\Users\Admin\AppData\Roaming\vcwmvr.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1608
      • C:\Windows\System32\vssadmin.exe
        "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
        3⤵
        • Interacts with shadow copies
        PID:2908
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RESTORE_FILES.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1844
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RESTORE_FILES.HTML
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1840
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa955e46f8,0x7ffa955e4708,0x7ffa955e4718
          4⤵
            PID:2744
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13303139454415601465,5834484600137634589,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
            4⤵
              PID:752
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,13303139454415601465,5834484600137634589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:3
              4⤵
                PID:4656
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,13303139454415601465,5834484600137634589,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8
                4⤵
                  PID:2952
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13303139454415601465,5834484600137634589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1
                  4⤵
                    PID:2028
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13303139454415601465,5834484600137634589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:1
                    4⤵
                      PID:876
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13303139454415601465,5834484600137634589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 /prefetch:8
                      4⤵
                        PID:800
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13303139454415601465,5834484600137634589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 /prefetch:8
                        4⤵
                          PID:1212
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13303139454415601465,5834484600137634589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:1
                          4⤵
                            PID:2940
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13303139454415601465,5834484600137634589,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:1
                            4⤵
                              PID:2584
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13303139454415601465,5834484600137634589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                              4⤵
                                PID:4048
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13303139454415601465,5834484600137634589,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:1
                                4⤵
                                  PID:1276
                              • C:\Windows\System32\vssadmin.exe
                                "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
                                3⤵
                                • Interacts with shadow copies
                                PID:3036
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Roaming\vcwmvr.exe >> NUL
                                3⤵
                                  PID:1004
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE >> NUL
                                2⤵
                                  PID:1944
                              • C:\Windows\system32\vssvc.exe
                                C:\Windows\system32\vssvc.exe
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2312
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:2588
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:1604

                                  Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Program Files\7-Zip\Lang\restore_files_felny.html

                                          Filesize

                                          4KB

                                          MD5

                                          8a8265a4c4afca98b6a10c62631af95b

                                          SHA1

                                          bff6652abb60e24040a76fa6d2a010b31e9c7430

                                          SHA256

                                          7570040cdfd03ba4adb88f7b678ea3c05b74eea4f360c0475daabe34e377d5ec

                                          SHA512

                                          1011cb8dc80cfee315bdd9e7a566a4ccef855c0408ebc43190f6250064f979e0a91b28afe61ac6356904128a92b381f5585f40ee53327781fc555dfe320a6cd0

                                        • C:\Program Files\7-Zip\Lang\restore_files_felny.txt

                                          Filesize

                                          2KB

                                          MD5

                                          20fe4937760a4361d59f65535c986311

                                          SHA1

                                          6da4416457e5c75cbea82b8c59d0f59f3c2e04d9

                                          SHA256

                                          8347bfbb6c763e500521248462e5418eb03c99420f52b7ffa92711586539b771

                                          SHA512

                                          0fbf6e4995b38e4341f7ed5f83f47be35e941d3a278136f229de1f86a68085efaf0fdcf597aacf78444f8a72a1f6be512eaab341edad5fd8baaab47f604f2794

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          439b5e04ca18c7fb02cf406e6eb24167

                                          SHA1

                                          e0c5bb6216903934726e3570b7d63295b9d28987

                                          SHA256

                                          247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654

                                          SHA512

                                          d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          a8e767fd33edd97d306efb6905f93252

                                          SHA1

                                          a6f80ace2b57599f64b0ae3c7381f34e9456f9d3

                                          SHA256

                                          c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb

                                          SHA512

                                          07b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          061f62b246cf4a9eb3b7e69b577aaf57

                                          SHA1

                                          a568234f2a06e6fd2c5407fdd0ef3278b47c688f

                                          SHA256

                                          528bdc86deac79bd15de8ed44cef15960be9cf6161fd705966ee971e02e0a8e6

                                          SHA512

                                          e9b8b8c7a7e6882b1b8be15be53175ee7945e1a48cb5463678e7a0bf21e33389ac8ab513f5ad7c5d984c5697f98616e90c946c6a53dc17ece2d08984471c84b2

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          b73442e05f206cf06712c57c1172e3c9

                                          SHA1

                                          592f136ed6d559acebcc4f76f14d47face2c7ccb

                                          SHA256

                                          d93ed7c5a017cc24aa21fd0f1770226186bc4741259fe30b26dfaad3342d1153

                                          SHA512

                                          46c9158b6c246b54be7f20d3cf7b67f254a037f01501a6c044e04b7db6ac6d85c8eb1f13821d831911e709cf942a9b915809f64e4e57e1017291b635c4accc01

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          6752a1d65b201c13b62ea44016eb221f

                                          SHA1

                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                          SHA256

                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                          SHA512

                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          8KB

                                          MD5

                                          235139f8a8cb84221536b3e27a689d1f

                                          SHA1

                                          311974ab58aef39c65e4d521f7a3de5e4be8a95d

                                          SHA256

                                          458797ccd20b6619af4367f70c75434b6da5e981b3ada9f1091e29bad4957c86

                                          SHA512

                                          11c5454a77162f142f944f81bea6438ce9a06e357d8ab11aea1f85b2973dd21711aee75696b1c8edce5d683b22129b992d4d4bcd5d166bea8d4ec3ad23eec2fc

                                        • C:\Users\Admin\AppData\Roaming\vcwmvr.exe

                                          Filesize

                                          321KB

                                          MD5

                                          c9ef69554082be3467df433a15e7ab45

                                          SHA1

                                          79c01bf85a712ddf6a4d54e9db281a8310a12c15

                                          SHA256

                                          0db818ad2b03a8003c1b923985b3cd74ed82272205b3372796b192d2661824ac

                                          SHA512

                                          13d818b734a9ee2d1cd2bda66ae6213f7fb7e9a74f0175ae37b85906816341e6224cdf1d5f57487e21b80d9782cee75db8acbd3752a303569fc8c6fa2598a4f9

                                        • memory/652-11-0x0000000000400000-0x00000000006A3000-memory.dmp

                                          Filesize

                                          2.6MB

                                        • memory/652-0-0x0000000000C60000-0x0000000000C63000-memory.dmp

                                          Filesize

                                          12KB

                                        • memory/652-1-0x0000000000400000-0x00000000006A3000-memory.dmp

                                          Filesize

                                          2.6MB

                                        • memory/652-5-0x0000000000D20000-0x0000000000D24000-memory.dmp

                                          Filesize

                                          16KB

                                        • memory/652-6-0x0000000074DC0000-0x0000000074DF9000-memory.dmp

                                          Filesize

                                          228KB

                                        • memory/652-12-0x0000000074DC0000-0x0000000074DF9000-memory.dmp

                                          Filesize

                                          228KB

                                        • memory/1608-7622-0x0000000000400000-0x00000000006A3000-memory.dmp

                                          Filesize

                                          2.6MB

                                        • memory/1608-13-0x0000000000400000-0x00000000006A3000-memory.dmp

                                          Filesize

                                          2.6MB

                                        • memory/1608-7648-0x0000000074DC0000-0x0000000074DF9000-memory.dmp

                                          Filesize

                                          228KB

                                        • memory/1608-7647-0x0000000000400000-0x00000000006A3000-memory.dmp

                                          Filesize

                                          2.6MB

                                        • memory/1608-17-0x0000000000890000-0x0000000000894000-memory.dmp

                                          Filesize

                                          16KB

                                        • memory/1608-18-0x0000000074DC0000-0x0000000074DF9000-memory.dmp

                                          Filesize

                                          228KB

                                        • memory/1608-7589-0x0000000000400000-0x00000000006A3000-memory.dmp

                                          Filesize

                                          2.6MB

                                        • memory/1608-3041-0x0000000000400000-0x00000000006A3000-memory.dmp

                                          Filesize

                                          2.6MB