Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/06/2024, 10:41

General

  • Target

    VirusShare_1449cdc2acb385e8326dfd0364e67d25.exe

  • Size

    339KB

  • MD5

    1449cdc2acb385e8326dfd0364e67d25

  • SHA1

    27ec595e01e4c89fb17a895bced8b84871355df4

  • SHA256

    7007b16d76f879588fbbaef6ed77de0be778d38b09ace3740d50068937334dab

  • SHA512

    d660379a13c169ca0690a64cf5427d75ca71030e61bcc2795d6ddbd41d21028b453487c170db74303aa6c2c76d188272c8f6ad049ac4e579c6aaf738590d8c0b

  • SSDEEP

    6144:Y9Jy1mYCrFLXOppiFWDKvZBjtgnbEufzKB/xL4lkY:YvyUYsXWpiVztebEWz+Z4eY

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\restore_files_ijkso.txt

Ransom Note
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! What happened to your files ? All of your files were protected by a strong encryption with RSA-2048. More information about the encryption keys using RSA-2048 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) What does this mean ? This means that the structure and data within your files have been irrevocably changed, you will not be able to work with them, read them or see them, it is the same thing as losing them forever, but with our help, you can restore them. How did this happen ? Especially for you, on our server was generated the secret key pair RSA-2048 - public and private. All your files were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our secret server. What do I do ? Alas, if you do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed. If you really value your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://lk2gaflsgh.jgy658snfyfnvh.com/CD1A4ACA94CFB26B 2. http://dg62wor94m.sdsfg834mfuuw.com/CD1A4ACA94CFB26B 3. https://djdkduep62kz4nzx.onion.to/CD1A4ACA94CFB26B If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization. 3. Type in the address bar: djdkduep62kz4nzx.onion/CD1A4ACA94CFB26B 4. Follow the instructions on the site. IMPORTANT INFORMATION: Your personal pages: http://lk2gaflsgh.jgy658snfyfnvh.com/CD1A4ACA94CFB26B http://dg62wor94m.sdsfg834mfuuw.com/CD1A4ACA94CFB26B https://djdkduep62kz4nzx.onion.to/CD1A4ACA94CFB26B Your personal page (using TOR): djdkduep62kz4nzx.onion/CD1A4ACA94CFB26B Your personal identification number (if you open the site (or TOR 's) directly): CD1A4ACA94CFB26B
URLs

http://lk2gaflsgh.jgy658snfyfnvh.com/CD1A4ACA94CFB26B

http://dg62wor94m.sdsfg834mfuuw.com/CD1A4ACA94CFB26B

https://djdkduep62kz4nzx.onion.to/CD1A4ACA94CFB26B

http://djdkduep62kz4nzx.onion/CD1A4ACA94CFB26B

Extracted

Path

C:\Program Files\7-Zip\Lang\restore_files_ijkso.html

Ransom Note
<html> <style>a { color:green; }.tb { background:white; border-style:solid; border-width:1px; padding:3px; border-color:lime; } .ttl { font-size:13px; color:880000; }</style><body style="background:#33CCFF;"> <center> <div style="text-align:left; font-family:Arial; font-size:13px; line-height:20px; margin-top:10px; width:800px; background:#F4F4F4; padding:20px; border-style:solid; border-width:5px; border-color:#BABABA;"> <b><font class="ttl">What happened <!------sfg2gdfstw5ey3345 --> to your files?</b></font><br> <font style="font-size:13px;">All of your files were<!------sfg2gdfstw5ey3345 --> protected by a strong<!------sfg2gdfstw5ey3345 --> encryption with<!------sfg2gdfstw5ey3345 --> RSA-2048 <br> More information about the <!------sfg2gdfstw5ey3345 -->encryption RSA-2048 can be<!------sfg2gdfstw5ey3345 --> found here: <a href="http://en.wikipedia.org/wiki/RSA_(cryptosystem)" target="_blank">http://en.wikipedia.org/wiki/RSA_(cryptosystem)</a><br></font> <br><b><font class="ttl">What <!------sfg2gdfstw5ey3345 --> does this mean?</b></font><br><font style="font-size:13px;"> This<!------sfg2gdfstw5ey3345 --> means that the <!------sfg2gdfstw5ey3345 --> structure and data within your files have been irrevocably <!------sfg2gdfstw5ey3345 -->changed, you will not be able to work<br> with them, read<!------sfg2gdfstw5ey3345 --> them or see them, it is the same thing <!------sfg2gdfstw5ey3345 -->as losing them forever, but with our help, you can restore them.</font><br><br><b><font class="ttl">How did this happen?</b></font> <br> <font style="font-size:13px;"> Especially for you, on our server was generated the secret key pair RSA-2048 - public and private. <br>All your <!------sdkfg3265436456hdfskjghfdg --> files were encrypted with the public key, <!------sdkfghd456334565436fskjghfdg --> which has been <!------sdkfghd45363456fskjghfdg --> transferred to <!------sdkfghdfskjghfdg -->your computer via <!------sdkfghd4356345643564356fskjghfdg -->the Internet.<br> <!------sdkfghd34563456fskjghfdg --> Decrypting of <!------sdkf45363456ghdfskjghfdg -->YOUR FILES is <!------sdkfghdfs4563456kjghfdg -->only possible <!------sdkfgh45364356dfskjghfdg -->with the help of the <!------sdkfghd4563456fskjghfdg -->private key and <!------sdkfghd43563456fskjghfdg -->decrypt program, <!------sdkfghdf43564356tyretyskjghfdg -->which is on our <!------sdkfgh34565346dfskjghfdg -->SECRET SERVER!!! </font><br><br><b><font class="ttl">What do I do?</b></font> <br><font style="font-size:13px;">Alas, if you do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed.<br> If you really need your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist.</font><br><br> <!------23452345dgtwertwre --><div class="tb" style="color:#880000; font-size:13px; border-width:3px;">For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: <hr> <!------sadfs32452345gfdsgsdfgdfsafasdfasdfsadf --><b>1.<a href="http://lk2gaflsgh.jgy658snfyfnvh.com/CD1A4ACA94CFB26B" target="_blank">http://lk2gaflsgh.jgy658snfyfnvh.com/CD1A4ACA94CFB26B</a></b><br> <!------ds234523452345fgwert --><b>2.<a href="http://dg62wor94m.sdsfg834mfuuw.com/CD1A4ACA94CFB26B" target="_blank">http://dg62wor94m.sdsfg834mfuuw.com/CD1A4ACA94CFB26B</a></b><br> <!------wer234524353245terwtewrt --><b>3.<a href="https://djdkduep62kz4nzx.onion.to/CD1A4ACA94CFB26B" target="_blank">https://djdkduep62kz4nzx.onion.to/CD1A4ACA94CFB26B</a></b><br> <!------sfg2gdfstw5ey3345 --></div><br><div class="tb" style="font-size:13px; border-color:#880000;">If for some reasons the addresses are not available, follow these steps: <hr> 1. Download and install tor-browser: <a href="http://www.torproject.org/projects/torbrowser.html.en" target="_blank">http://www.torproject.org/projects/torbrowser.html.en</a><br> 2. After a successful installation, run the browser and wait for initialization.<br> 3. Type in the address bar: <font style="font-weight:bold; color:#009977;">djdkduep62kz4nzx.onion/CD1A4ACA94CFB26B</font><br> 4. Follow the instructions on the site.</div><br><br><b>IMPORTANT INFORMATION:</b><br> <div class="tb" style="width:790px;"> Your Personal PAGES: <b><br> <a href="http://lk2gaflsgh.jgy658snfyfnvh.com/CD1A4ACA94CFB26B" target="_blank">http://lk2gaflsgh.jgy658snfyfnvh.com/CD1A4ACA94CFB26B</a> <br> <a href="http://dg62wor94m.sdsfg834mfuuw.com/CD1A4ACA94CFB26B" target="_blank">http://dg62wor94m.sdsfg834mfuuw.com/CD1A4ACA94CFB26B</a> <br> <a href="https://djdkduep62kz4nzx.onion.to/CD1A4ACA94CFB26B" target="_blank"> https://djdkduep62kz4nzx.onion.to/CD1A4ACA94CFB26B</a> </b> <br> Your Personal PAGE (using TOR): <font style="font-weight:bold; color:#009977;">djdkduep62kz4nzx.onion/CD1A4ACA94CFB26B</font><br> Your personal code (if you open the site (or TOR 's) directly): <font style="font-weight:bold; color:#770000;">CD1A4ACA94CFB26B</font><br> </div></div></center></body></html>
URLs

https://djdkduep62kz4nzx.onion.to/CD1A4ACA94CFB26B</a>

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (872) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_1449cdc2acb385e8326dfd0364e67d25.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_1449cdc2acb385e8326dfd0364e67d25.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Users\Admin\AppData\Roaming\vcwtee.exe
      C:\Users\Admin\AppData\Roaming\vcwtee.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4736
      • C:\Windows\System32\vssadmin.exe
        "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
        3⤵
        • Interacts with shadow copies
        PID:3704
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RESTORE_FILES.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:768
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RESTORE_FILES.HTML
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4608
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x7c,0x108,0x7ffa586446f8,0x7ffa58644708,0x7ffa58644718
          4⤵
            PID:2952
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14700932495615928190,5521331254828678193,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2
            4⤵
              PID:1472
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14700932495615928190,5521331254828678193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
              4⤵
                PID:4656
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14700932495615928190,5521331254828678193,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:8
                4⤵
                  PID:5236
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14700932495615928190,5521331254828678193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:1
                  4⤵
                    PID:4724
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14700932495615928190,5521331254828678193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1
                    4⤵
                      PID:4448
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14700932495615928190,5521331254828678193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:8
                      4⤵
                        PID:4592
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14700932495615928190,5521331254828678193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:8
                        4⤵
                          PID:5332
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14700932495615928190,5521331254828678193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:1
                          4⤵
                            PID:4372
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14700932495615928190,5521331254828678193,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:1
                            4⤵
                              PID:4332
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14700932495615928190,5521331254828678193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:1
                              4⤵
                                PID:964
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14700932495615928190,5521331254828678193,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:1
                                4⤵
                                  PID:4436
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14700932495615928190,5521331254828678193,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:2
                                  4⤵
                                    PID:1584
                                • C:\Windows\System32\vssadmin.exe
                                  "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
                                  3⤵
                                  • Interacts with shadow copies
                                  PID:5020
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Roaming\vcwtee.exe >> NUL
                                  3⤵
                                    PID:1804
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE >> NUL
                                  2⤵
                                    PID:424
                                • C:\Windows\system32\vssvc.exe
                                  C:\Windows\system32\vssvc.exe
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1160
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4996
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3580

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Program Files\7-Zip\Lang\restore_files_ijkso.html

                                      Filesize

                                      4KB

                                      MD5

                                      2c2e39bd9e15cc2ee530ebe01db078f9

                                      SHA1

                                      33ed5c8ad16698a7bfa99182625933ed999fc760

                                      SHA256

                                      dd51514ee261a24191ad82da8bbe316cd15ed1829d712f284d2a6475607012f1

                                      SHA512

                                      3a2110a7632b2bbfdce3ddc01c105980ea60e34528c913ac8808a34f47c83d4211b482cfc22648061474d3ac49eb4e7d394966aced51cc048caaffc683471579

                                    • C:\Program Files\7-Zip\Lang\restore_files_ijkso.txt

                                      Filesize

                                      2KB

                                      MD5

                                      9de9808a030ca473744b6c5a617aafc6

                                      SHA1

                                      a196275eecd69293435739411882461d3f02db87

                                      SHA256

                                      08627d6477260e0f083ac13246006d2338d666cefb8f53b62277823294460e3a

                                      SHA512

                                      93f2917bb1bd6552720ee610c4ebed3b19c210d3cc2197c6b12ee1156022c6a9d515290e936598fe646a128875898f4859c3dfe03230d436d26e3c9834239e7e

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      8b167567021ccb1a9fdf073fa9112ef0

                                      SHA1

                                      3baf293fbfaa7c1e7cdacb5f2975737f4ef69898

                                      SHA256

                                      26764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513

                                      SHA512

                                      726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      537815e7cc5c694912ac0308147852e4

                                      SHA1

                                      2ccdd9d9dc637db5462fe8119c0df261146c363c

                                      SHA256

                                      b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f

                                      SHA512

                                      63969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      2d1b135636cc390fa244e45f0ce80220

                                      SHA1

                                      8e131cbd9e0ac309df644a6479e29085b3f3acd0

                                      SHA256

                                      7a3ed6baa5418903e2355a55b6285e9546d4f89a58bb4f94b14ee0274c069479

                                      SHA512

                                      5ab3e02e1a30a916db2562596252aa1d1955da7c1cafffe6545f361f6c4654ddadb5bad0c33a62badd598de52028308b624b73182e33d86adfddf681573588f8

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      b9ec02b786f84feed40550fc9b410ab1

                                      SHA1

                                      ce5d75ac993bf5cb59e4adef1e44bb4e96005625

                                      SHA256

                                      bcd3036ab51f1c9916e185fdabb0a4b01afa5c725fb98dd7590110fb3738ed20

                                      SHA512

                                      4237b762647f4c7eebbfd695fcf29ab69e92884bb8a0c95a7ea8334e769733a3eec47e0d17eeb40cc0e56c3c6dfbcf9b809578eccef5ddd5e5dda5c9d3b5519f

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      52d67b539f9eda31e0bd9740de5f7b25

                                      SHA1

                                      f2efcb42434a2be7afc219ab7de2609f6cf9213b

                                      SHA256

                                      d1986e34c9566ec1b040709ce17b35f67998fd3c505988f67c8487acd93a5edc

                                      SHA512

                                      1425381aeb3a00d9a05f3b9012cd732af6e909136588c70718dfb18bab3a8e5035259050d9a4944f40b39f4f0f72d2301c51520b843b4e303040b6c2b356b379

                                    • C:\Users\Admin\AppData\Roaming\vcwtee.exe

                                      Filesize

                                      339KB

                                      MD5

                                      1449cdc2acb385e8326dfd0364e67d25

                                      SHA1

                                      27ec595e01e4c89fb17a895bced8b84871355df4

                                      SHA256

                                      7007b16d76f879588fbbaef6ed77de0be778d38b09ace3740d50068937334dab

                                      SHA512

                                      d660379a13c169ca0690a64cf5427d75ca71030e61bcc2795d6ddbd41d21028b453487c170db74303aa6c2c76d188272c8f6ad049ac4e579c6aaf738590d8c0b

                                    • memory/4508-17-0x0000000073F70000-0x0000000073FA9000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/4508-16-0x0000000000400000-0x00000000006E3000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/4508-4-0x0000000000780000-0x0000000000784000-memory.dmp

                                      Filesize

                                      16KB

                                    • memory/4508-6-0x0000000073F70000-0x0000000073FA9000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/4508-5-0x0000000000790000-0x0000000000793000-memory.dmp

                                      Filesize

                                      12KB

                                    • memory/4508-0-0x0000000000400000-0x00000000006E3000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/4736-15-0x00000000023D0000-0x00000000023D3000-memory.dmp

                                      Filesize

                                      12KB

                                    • memory/4736-7624-0x0000000000400000-0x00000000006E3000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/4736-5508-0x0000000000400000-0x00000000006E3000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/4736-7680-0x0000000000400000-0x00000000006E3000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/4736-18-0x0000000073F70000-0x0000000073FA9000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/4736-11-0x0000000000400000-0x00000000006E3000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/4736-7700-0x0000000000400000-0x00000000006E3000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/4736-7701-0x0000000073F70000-0x0000000073FA9000-memory.dmp

                                      Filesize

                                      228KB