Resubmissions

11/07/2024, 20:18

240711-y3emgavcrd 10

11/07/2024, 20:09

240711-yw6sdavare 10

11/07/2024, 20:08

240711-ywq2xssaqp 3

11/07/2024, 20:05

240711-yt46rssakr 3

11/07/2024, 20:04

240711-ytdntathpf 3

11/07/2024, 20:03

240711-ys5e5s1hpn 1

Analysis

  • max time kernel
    75s
  • max time network
    76s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 20:09

Errors

Reason
Machine shutdown

General

  • Target

    RobloxScreenShot20231231_160103318.png

  • Size

    979KB

  • MD5

    ab50ef9b41f1046bad8a91aef89e76e4

  • SHA1

    511f01a41f8470fb3ee2b45b4dac2edbe2af54f9

  • SHA256

    91d3faef143362ad384934ce71905437c78db2a9e0e6307245771034e0abd59c

  • SHA512

    e7a2a075b7a0c5e268424fd309d2f6613444ce95e76334adde82615096343541a60bac82f25858edd2ddb2aa568efcd2fbed608484c11c56dbad0707ae00b803

  • SSDEEP

    24576:bOINuEEQDf2l3cL7F/AE5A0sxnuONOmsLW4dgNSk5J:HDfJfF/rAZuOr0zdKSkP

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\RobloxScreenShot20231231_160103318.png
    1⤵
      PID:3196
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
      1⤵
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3140
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffe0d4b46f8,0x7ffe0d4b4708,0x7ffe0d4b4718
        2⤵
          PID:2852
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:2
          2⤵
            PID:620
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3988
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:8
            2⤵
              PID:4896
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:1
              2⤵
                PID:3220
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:1
                2⤵
                  PID:1096
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:1
                  2⤵
                    PID:4084
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:1
                    2⤵
                      PID:3744
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:8
                      2⤵
                        PID:4388
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3848
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:1
                        2⤵
                          PID:3868
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:1
                          2⤵
                            PID:2456
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5500 /prefetch:8
                            2⤵
                              PID:4312
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5664 /prefetch:8
                              2⤵
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4336
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:1
                              2⤵
                                PID:1496
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:1
                                2⤵
                                  PID:4432
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:1
                                  2⤵
                                    PID:1732
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5668 /prefetch:8
                                    2⤵
                                      PID:4832
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:1
                                      2⤵
                                        PID:4724
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6188 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3372
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:1
                                        2⤵
                                          PID:2388
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1768 /prefetch:1
                                          2⤵
                                            PID:4384
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:1
                                            2⤵
                                              PID:1924
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10850506229014865953,17983280556958629485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:1
                                              2⤵
                                                PID:864
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:3724
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:916
                                                • C:\Windows\System32\rundll32.exe
                                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                  1⤵
                                                    PID:4776
                                                  • C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe
                                                    "C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"
                                                    1⤵
                                                    • Modifies WinLogon for persistence
                                                    • UAC bypass
                                                    • Disables RegEdit via registry modification
                                                    • Drops desktop.ini file(s)
                                                    • Sets desktop wallpaper using registry
                                                    • Drops file in Windows directory
                                                    PID:5020
                                                  • C:\Windows\system32\LogonUI.exe
                                                    "LogonUI.exe" /flags:0x4 /state0:0xa3908055 /state1:0x41c64e6d
                                                    1⤵
                                                    • Modifies data under HKEY_USERS
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1732
                                                  • C:\Windows\System32\rundll32.exe
                                                    C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                                                    1⤵
                                                      PID:6000

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      7f37f119665df6beaa925337bbff0e84

                                                      SHA1

                                                      c2601d11f8aa77e12ab3508479cbf20c27cbd865

                                                      SHA256

                                                      1073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027

                                                      SHA512

                                                      8e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      44009c992aa7356e7c86119f37899f2c

                                                      SHA1

                                                      f1e4331bed483d819558184f9a68f0060fb35782

                                                      SHA256

                                                      91b0a39b90d04d3ee5e27d0f2d402328f0bf3bef7d4b8c798fc4e68a46f85b23

                                                      SHA512

                                                      547e192ffce7b85a98919e4b893bf6912bc51b291499b9c08aa99e75c1ecc7c64f7fa5a347fb457395934ece4b91cf69d5c6d9beeea3b2544cfc65b896277ee9

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      7fd5bf42f839e92c7a057b669108e77a

                                                      SHA1

                                                      0aa611be35ba6b0b9c09c3d3099764bb2c7d9da3

                                                      SHA256

                                                      c6b9e463689f1036808e0ac2f8e54d21cc8f0d3319d08f9bd7dda5fe322a3730

                                                      SHA512

                                                      4b9c8e760662f4ab36a9d50e45955b34aa457a55001da7e09bf15fab925894b1b8fcbe42ff8ec2e340d12d7c259e3abcc45375892274ec20f67f8b7ecd5d7078

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      db2e6cbf257b4475e51a00c0a2c76a90

                                                      SHA1

                                                      4013e9710e3d75ef93f334fd2a5532fab857b836

                                                      SHA256

                                                      70c3a7896f1efa6aad9923241bd0367dc73e726cf02171c0a980f7f3f3a239a0

                                                      SHA512

                                                      201cf3d535f6f87587e969d8d8c801c6fc575ef9c79e3b94fb7f009acb41aaa38bc510024e1f5b8c9e6c56928241af05dbd7a808f0053b210b1ef07169808162

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      5a20a678eea16d85c2204efdb0e41cc4

                                                      SHA1

                                                      625da318e9b0206f011a294f55857854ebe28ff4

                                                      SHA256

                                                      0b88d1cb1c9e505e6788e42c083e35dd0d62e9c5120704f3b35c1db6d5026452

                                                      SHA512

                                                      b511bb9f838f965003c1e08375a268b9e2599a895da132418c4de51d4046a8f72b0b2ef85621f97b3208f9091fa9f3b4a41431e1e7ba3ad2bcb30345c395f5aa

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      cf4cfc5b44bb37cf0a6de8446835275b

                                                      SHA1

                                                      501e88233141d7526800e27a591bf219acba30d2

                                                      SHA256

                                                      60dad3520d2bbdad8230657c35c43f6fd7fcc38e1f705a11b4f50ad5c4491962

                                                      SHA512

                                                      3385dc2acd252d4b6fb2ad46556a46da9b6199853184549d7f6f3607e6d5240078e5fff6f0528c43472529cc947f8dc9df0e62e8230060c6eada6e4540ab0e8e

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      575f4aaf730b296b83a8afd8129f849d

                                                      SHA1

                                                      d2e1c3882d080be67fd9f459787ad4c17d40d626

                                                      SHA256

                                                      827d0f88054ba0168d521e8f70e25afaa3db4f8bf649f7e0e299d0846161dd0c

                                                      SHA512

                                                      7a4312442f3f90eab5dbef8fcdfab3466407b05673c78ade41efe68f22b842d7dce763c48dc7e072577db1ca280d071bd631a8756fbae86c9c8a4a544d165637

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58605b.TMP

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      775762acdf3d3208651c98b673598f15

                                                      SHA1

                                                      6df6caaab648474fbe1b898789afab71686df730

                                                      SHA256

                                                      9dd08417631d6be87e6c302ca4a57e51e4e37e607708cb93246b86de26c7577a

                                                      SHA512

                                                      e3a8c18205106260c3c2da533e0b48b0ccf5deea7a3b3778b6bfb5c793e29cdced500798d90d014ec4e7d4c9da8c37e90093133ce83347e057a8010dd6bdd43d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                      Filesize

                                                      16B

                                                      MD5

                                                      46295cac801e5d4857d09837238a6394

                                                      SHA1

                                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                      SHA256

                                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                      SHA512

                                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                      Filesize

                                                      16B

                                                      MD5

                                                      206702161f94c5cd39fadd03f4014d98

                                                      SHA1

                                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                      SHA256

                                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                      SHA512

                                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      b0c860ab022913ad08b0894858ec6ff9

                                                      SHA1

                                                      26a2fafa29b318daf4cdb56d6ecaf4de96b259eb

                                                      SHA256

                                                      538983b612b18c6f48da28fc9bb727786f8fdfe8c9f672d03e023d359716493e

                                                      SHA512

                                                      afebd9dd0934bcb225101f85974e1f95aca66e4241a7093f44cd32c256612f068aca8107d2dbedcf9b576c8f096b8d924de697edfff28643b7751e792c3f2870

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      e47fddee6e184cfe3572cb6d9851ef0d

                                                      SHA1

                                                      faaf3e2cc908be2b6c7d6eda97ed2af4efe62166

                                                      SHA256

                                                      57e00b763e8e6ef83a12e4af9476419fdf4d55d9cf24b8335b2d0b531c28f086

                                                      SHA512

                                                      a2c1c7d6088ef39d75fdc262b8a51b5ad5c389f1b1874b78b759838dccc580a7769510b319c1a8a2a750ca43474037136a07f1ffb6ffda6a54e7ba0d25ac17de

                                                    • C:\Users\Admin\Downloads\NoEscape.exe.zip

                                                      Filesize

                                                      13.5MB

                                                      MD5

                                                      660708319a500f1865fa9d2fadfa712d

                                                      SHA1

                                                      b2ae3aef17095ab26410e0f1792a379a4a2966f8

                                                      SHA256

                                                      542c2e1064be8cd8393602f63b793e9d34eb81b1090a3c80623777f17fa25c6c

                                                      SHA512

                                                      18f10a71dc0af70494554b400bdf09d43e1cb7e93f9c1e7470ee4c76cd46cb4fbf990354bbbd3b89c9b9bda38ad44868e1087fd75a7692ad889b14e7e1a20517

                                                    • C:\Users\Public\Desktop\⟔Ꮌ⭰ⴢᇞ⁋ⶩὼᜑ≌⇽ጄⱹⵛᎲ୪֝ᔾᐘघۮ՞⡚ᕟᲈ␖⋪

                                                      Filesize

                                                      666B

                                                      MD5

                                                      e49f0a8effa6380b4518a8064f6d240b

                                                      SHA1

                                                      ba62ffe370e186b7f980922067ac68613521bd51

                                                      SHA256

                                                      8dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13

                                                      SHA512

                                                      de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4

                                                    • memory/5020-368-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                      Filesize

                                                      1.8MB

                                                    • memory/5020-556-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                      Filesize

                                                      1.8MB