Analysis

  • max time kernel
    14s
  • max time network
    15s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 23:08

General

  • Target

    venom_cleaner.exe

  • Size

    3.0MB

  • MD5

    b5171ffa77f44270c3979165ec797df1

  • SHA1

    625625196353920ef6cad543ad83d6038cb9c442

  • SHA256

    0a30913f417c499108b490cd121f895b9e1f3d7b387a8eacb238a8032a7045f8

  • SHA512

    1181a844603eb8917c29f29034452d6f6ed7876da5ded558d79358a798de5ba408ee9f68b59fe5b6a4622fbe39792a550aa6a288da88b9080181d5b55c60a0c7

  • SSDEEP

    49152:XwutH7zfAqCUtFXqFLknKGrqqcmig4qSvFkfQg35/e0e/JTzUbc:XltbTUUQL4HrqqHigj4k4gk0iJTzUQ

Malware Config

Signatures

  • Deletes NTFS Change Journal 2 TTPs 1 IoCs

    The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 59 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 21 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 27 IoCs
  • Gathers network information 2 TTPs 8 IoCs

    Uses commandline utility to view network configuration.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\venom_cleaner.exe
    "C:\Users\Admin\AppData\Local\Temp\venom_cleaner.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Drops startup file
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3236
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://venomcheats.net/
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa81146f8,0x7ffaa8114708,0x7ffaa8114718
        3⤵
          PID:4140
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7656354024531234187,293474083663918419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:2
          3⤵
            PID:2732
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,7656354024531234187,293474083663918419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2784
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,7656354024531234187,293474083663918419,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:8
            3⤵
              PID:772
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7656354024531234187,293474083663918419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
              3⤵
                PID:4936
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7656354024531234187,293474083663918419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
                3⤵
                  PID:620
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7656354024531234187,293474083663918419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:1
                  3⤵
                    PID:2720
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7656354024531234187,293474083663918419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3648 /prefetch:1
                    3⤵
                      PID:3664
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,7656354024531234187,293474083663918419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 /prefetch:8
                      3⤵
                        PID:1184
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,7656354024531234187,293474083663918419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 /prefetch:8
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4280
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7656354024531234187,293474083663918419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:1
                        3⤵
                          PID:4336
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7656354024531234187,293474083663918419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:1
                          3⤵
                            PID:4892
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7656354024531234187,293474083663918419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:1
                            3⤵
                              PID:656
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7656354024531234187,293474083663918419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:1
                              3⤵
                                PID:3064
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c fsutil usn deletejournal /d C:
                              2⤵
                                PID:4876
                                • C:\Windows\system32\fsutil.exe
                                  fsutil usn deletejournal /d C:
                                  3⤵
                                  • Deletes NTFS Change Journal
                                  PID:5100
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c vssadmin delete shadows /All /Quiet
                                2⤵
                                  PID:548
                                  • C:\Windows\system32\vssadmin.exe
                                    vssadmin delete shadows /All /Quiet
                                    3⤵
                                    • Interacts with shadow copies
                                    PID:3116
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c net stop winmgmt /Y
                                  2⤵
                                    PID:3664
                                    • C:\Windows\system32\net.exe
                                      net stop winmgmt /Y
                                      3⤵
                                        PID:672
                                        • C:\Windows\system32\net1.exe
                                          C:\Windows\system32\net1 stop winmgmt /Y
                                          4⤵
                                            PID:288
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c netsh winsock reset
                                        2⤵
                                          PID:2368
                                          • C:\Windows\system32\netsh.exe
                                            netsh winsock reset
                                            3⤵
                                            • Event Triggered Execution: Netsh Helper DLL
                                            PID:2372
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c ipconfig /release
                                          2⤵
                                            PID:5080
                                            • C:\Windows\system32\ipconfig.exe
                                              ipconfig /release
                                              3⤵
                                              • Gathers network information
                                              PID:292
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ipconfig /renew
                                            2⤵
                                              PID:4444
                                              • C:\Windows\system32\ipconfig.exe
                                                ipconfig /renew
                                                3⤵
                                                • Gathers network information
                                                PID:2776
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ipconfig /flushdns
                                              2⤵
                                                PID:3960
                                                • C:\Windows\system32\ipconfig.exe
                                                  ipconfig /flushdns
                                                  3⤵
                                                  • Gathers network information
                                                  PID:304
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ipconfig /renew
                                                2⤵
                                                  PID:5100
                                                  • C:\Windows\system32\ipconfig.exe
                                                    ipconfig /renew
                                                    3⤵
                                                    • Gathers network information
                                                    PID:288
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c netsh int ip reset
                                                  2⤵
                                                    PID:4288
                                                    • C:\Windows\system32\netsh.exe
                                                      netsh int ip reset
                                                      3⤵
                                                      • Event Triggered Execution: Netsh Helper DLL
                                                      PID:4976
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c netsh winsock reset
                                                    2⤵
                                                      PID:292
                                                      • C:\Windows\system32\netsh.exe
                                                        netsh winsock reset
                                                        3⤵
                                                        • Event Triggered Execution: Netsh Helper DLL
                                                        PID:4232
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c netsh interface ipv4 reset
                                                      2⤵
                                                        PID:300
                                                        • C:\Windows\system32\netsh.exe
                                                          netsh interface ipv4 reset
                                                          3⤵
                                                          • Event Triggered Execution: Netsh Helper DLL
                                                          PID:304
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c netsh interface ipv6 reset
                                                        2⤵
                                                          PID:4716
                                                          • C:\Windows\system32\netsh.exe
                                                            netsh interface ipv6 reset
                                                            3⤵
                                                            • Event Triggered Execution: Netsh Helper DLL
                                                            PID:288
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c netsh interface tcp reset
                                                          2⤵
                                                            PID:1888
                                                            • C:\Windows\system32\netsh.exe
                                                              netsh interface tcp reset
                                                              3⤵
                                                              • Event Triggered Execution: Netsh Helper DLL
                                                              PID:4568
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c netsh int reset all
                                                            2⤵
                                                              PID:3960
                                                              • C:\Windows\system32\netsh.exe
                                                                netsh int reset all
                                                                3⤵
                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                PID:300
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c ipconfig /release
                                                              2⤵
                                                                PID:2928
                                                                • C:\Windows\system32\ipconfig.exe
                                                                  ipconfig /release
                                                                  3⤵
                                                                  • Gathers network information
                                                                  PID:4716
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c ipconfig /renew
                                                                2⤵
                                                                  PID:2228
                                                                  • C:\Windows\system32\ipconfig.exe
                                                                    ipconfig /renew
                                                                    3⤵
                                                                    • Gathers network information
                                                                    PID:2640
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c ipconfig /flushdns
                                                                  2⤵
                                                                    PID:1848
                                                                    • C:\Windows\system32\ipconfig.exe
                                                                      ipconfig /flushdns
                                                                      3⤵
                                                                      • Gathers network information
                                                                      PID:276
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ipconfig /renew
                                                                    2⤵
                                                                      PID:4844
                                                                      • C:\Windows\system32\ipconfig.exe
                                                                        ipconfig /renew
                                                                        3⤵
                                                                        • Gathers network information
                                                                        PID:2736
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c WMIC PATH WIN32_NETWORKADAPTER WHERE PHYSICALADAPTER=TRUE CALL DISABLE >nul 2>&1
                                                                      2⤵
                                                                        PID:284
                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                          WMIC PATH WIN32_NETWORKADAPTER WHERE PHYSICALADAPTER=TRUE CALL DISABLE
                                                                          3⤵
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1888
                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                      1⤵
                                                                        PID:2536
                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                        1⤵
                                                                          PID:1952
                                                                        • C:\Windows\system32\vssvc.exe
                                                                          C:\Windows\system32\vssvc.exe
                                                                          1⤵
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2184
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                          1⤵
                                                                            PID:3020

                                                                          Network

                                                                                MITRE ATT&CK Enterprise v15

                                                                                Replay Monitor

                                                                                Loading Replay Monitor...

                                                                                Downloads

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                  Filesize

                                                                                  152B

                                                                                  MD5

                                                                                  9e3fc58a8fb86c93d19e1500b873ef6f

                                                                                  SHA1

                                                                                  c6aae5f4e26f5570db5e14bba8d5061867a33b56

                                                                                  SHA256

                                                                                  828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4

                                                                                  SHA512

                                                                                  e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                  Filesize

                                                                                  152B

                                                                                  MD5

                                                                                  27304926d60324abe74d7a4b571c35ea

                                                                                  SHA1

                                                                                  78b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1

                                                                                  SHA256

                                                                                  7039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de

                                                                                  SHA512

                                                                                  f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                  Filesize

                                                                                  6KB

                                                                                  MD5

                                                                                  2c1e04a19e24a2b526bac72adaea4f54

                                                                                  SHA1

                                                                                  96b4cca11be2db9b5d7c10a89fa53b2e2b446d06

                                                                                  SHA256

                                                                                  f72f794acc15839a6a8aa6d7c76c7cfc5b0d23f39bdfe66470e00e5dd3e58024

                                                                                  SHA512

                                                                                  847c38999a2d5348ff9399c70042ddcc1d2e8dcede9dc4e56f8c931bf5594232feaf7c80a2757265769c13b69fac6511b821c404d724b06649f0e63b69d752f7

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                  Filesize

                                                                                  6KB

                                                                                  MD5

                                                                                  232961198bcb5886cb56d4a2a1f6dcfe

                                                                                  SHA1

                                                                                  19b116062f944c71ba903a406b145bc1606db46b

                                                                                  SHA256

                                                                                  a3e6e3c8eb7427b2125d9eff5053d2204eee2ef6603da7242610702111c1227e

                                                                                  SHA512

                                                                                  63f1829f803cc94eef80b775618c03720ca8478a2f6fcc7bb1c5172f7df1e8e7415d4e5b04301bb2fe84ce135a3c0b6e1788b4629135b629633e1ef105f29140

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                  Filesize

                                                                                  16B

                                                                                  MD5

                                                                                  6752a1d65b201c13b62ea44016eb221f

                                                                                  SHA1

                                                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                  SHA256

                                                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                  SHA512

                                                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                  Filesize

                                                                                  8KB

                                                                                  MD5

                                                                                  97b08937f57644b4bb162601a28a8efa

                                                                                  SHA1

                                                                                  814d88f88cb8ea2f6f244025aaa51b30f73d8aba

                                                                                  SHA256

                                                                                  cb12441a261edd34d3920e747450f2c6c6cafc86453305266d8c9dce0887a480

                                                                                  SHA512

                                                                                  a2a69fe2b8c96cf786aae47a450eaea2bc8c7e975bfd6c36d763aa947f67a2809a4f1395df16c4eede12efcb9789c33bec69935a60c4234e6909a5d5da8a3d03

                                                                                • memory/3236-0-0x00007FF6E9F60000-0x00007FF6EA789000-memory.dmp

                                                                                  Filesize

                                                                                  8.2MB

                                                                                • memory/3236-4-0x00007FF6E9F60000-0x00007FF6EA789000-memory.dmp

                                                                                  Filesize

                                                                                  8.2MB

                                                                                • memory/3236-2-0x00007FF6E9F60000-0x00007FF6EA789000-memory.dmp

                                                                                  Filesize

                                                                                  8.2MB

                                                                                • memory/3236-46-0x00007FF6E9F60000-0x00007FF6EA789000-memory.dmp

                                                                                  Filesize

                                                                                  8.2MB

                                                                                • memory/3236-3-0x00007FF6E9F60000-0x00007FF6EA789000-memory.dmp

                                                                                  Filesize

                                                                                  8.2MB

                                                                                • memory/3236-1-0x00007FFAC5910000-0x00007FFAC5912000-memory.dmp

                                                                                  Filesize

                                                                                  8KB