Analysis

  • max time kernel
    111s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-09-2024 21:42

General

  • Target

    67042f0de57638c97d125bf1c9897fdfa295566761fe17c80bfe05e19461a98e.exe

  • Size

    282KB

  • MD5

    80d8b1bfdaf8085595c83d95e1b50a4a

  • SHA1

    c4a9c9765d296159c0b882ee952418f4208a8f6b

  • SHA256

    67042f0de57638c97d125bf1c9897fdfa295566761fe17c80bfe05e19461a98e

  • SHA512

    e124f0303de3e4bc9519ec6d9c0fbb19bacafd4bc52aeb7ae04e0c2cf3db845a9e3d8504223da7f910453b58041913b8165aa5ebdd87e73499cbcf27e897ecbe

  • SSDEEP

    6144:KCjGhD5daDWqd+wQG5u1x5miq6gXGG07ejs0uK0HuEO:1IDH7wQkuD5GRGG0KA0uKUuEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Detect Vidar Stealer 23 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67042f0de57638c97d125bf1c9897fdfa295566761fe17c80bfe05e19461a98e.exe
    "C:\Users\Admin\AppData\Local\Temp\67042f0de57638c97d125bf1c9897fdfa295566761fe17c80bfe05e19461a98e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\ProgramData\BGCFBGDHJK.exe
        "C:\ProgramData\BGCFBGDHJK.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1304
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:840
      • C:\ProgramData\IECFBKFHCA.exe
        "C:\ProgramData\IECFBKFHCA.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3044
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminAEHIJKKFHI.exe"
            5⤵
              PID:1276
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminEGHJKFHJJJ.exe"
              5⤵
                PID:2180
          • C:\ProgramData\IJEBKKEGDB.exe
            "C:\ProgramData\IJEBKKEGDB.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2136
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:4596
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\DAEBFHJKJEBF" & exit
            3⤵
              PID:3656
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                4⤵
                • Delays execution with timeout.exe
                PID:1496
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3808,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:8
          1⤵
            PID:4340
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=4180,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=2332 /prefetch:3
            1⤵
              PID:4008

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\BGCFBGDHJK.exe

              Filesize

              321KB

              MD5

              c54262d9605b19cd8d417ad7bc075c11

              SHA1

              4c99d7bf05ac22bed6007ea3db6104f2472601fd

              SHA256

              de3f08aad971888269c60afcf81dc61f2158ca08cd32c9f5dd400e07d1517b54

              SHA512

              9c3086190bcb6ac9dd1ce22e69cfaf814d4acb60140fbe9e0cb220216d068d17151cb79f8acf89567c9a7b93960479ce19ea7b86020d939f56d6fc24e4d29a3f

            • C:\ProgramData\DAEBFHJKJEBF\AKFHDB

              Filesize

              20KB

              MD5

              a603e09d617fea7517059b4924b1df93

              SHA1

              31d66e1496e0229c6a312f8be05da3f813b3fa9e

              SHA256

              ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

              SHA512

              eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

            • C:\ProgramData\DAEBFHJKJEBF\DHDBGH

              Filesize

              20KB

              MD5

              a294094ee520a9e0aac560a71004e6c4

              SHA1

              db9590548e72c92703610abf3fb7bfa8735f1f12

              SHA256

              bccf4ccef1c8208ca50696dc68160c12e951b209f3c85982f713e565dba55c31

              SHA512

              a5691cbd3079d4ff25531bb83411343225cb9468312b518be68f36cc237afb7011df0f1cf82e98962c0885d947f1d2470666f702ed646793748da182af838606

            • C:\ProgramData\DAEBFHJKJEBF\IEHDBG

              Filesize

              160KB

              MD5

              f310cf1ff562ae14449e0167a3e1fe46

              SHA1

              85c58afa9049467031c6c2b17f5c12ca73bb2788

              SHA256

              e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

              SHA512

              1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

            • C:\ProgramData\DAEBFHJKJEBF\IEHDBG

              Filesize

              40KB

              MD5

              a182561a527f929489bf4b8f74f65cd7

              SHA1

              8cd6866594759711ea1836e86a5b7ca64ee8911f

              SHA256

              42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

              SHA512

              9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

            • C:\ProgramData\GDHCGDGI

              Filesize

              232KB

              MD5

              7264aef80a2d59b90b3322cc424f6930

              SHA1

              b3af34f94dec077bf5ebdd4ddd51290b792efe29

              SHA256

              bb8b8bc5668d17dafac88afcb638a716b9c344609f7dd611b6dec46572636548

              SHA512

              b5d95671f77bf3996d4ca7f2cedbd1c6ba0b8c5c677666c6eeea6acaa35843bee43c0ac95521432ab338b06f7da8e89b0d0df9b032c1f7e60afed1e21d024b8e

            • C:\ProgramData\IECFBKFHCA.exe

              Filesize

              205KB

              MD5

              003978c8812e39ddb74bf9d5005cb028

              SHA1

              126f73c30469a1b7e9a04a670c35185b5df628bc

              SHA256

              06510b52e07e89b5781f4ee3c7b4d94ff84c03931b3d7d93224294860feaccf4

              SHA512

              7c0b7ec7dfe18f99cf850c80c3228f52537d5565b2950d4f0ef8cbbb7b19d1f5e2d128f3766dcede41711b4d3c5631c7f758dd61697b1e5978d596f98f54c31d

            • C:\ProgramData\IJEBKKEGDB.exe

              Filesize

              282KB

              MD5

              5dd74b81e1e9f3ab155e1603a2fa793b

              SHA1

              653cdaf8617c7fdec6f39db3334e858bec9a2d66

              SHA256

              5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26

              SHA512

              9017f6797f998423e3cd88dcf1086f6e555797a9e6414ffd714dcb394cfd3f2b2fb5432c9ba38792021b5ba9e421454385f509c9363cedb7d3ac5919f66035fa

            • C:\ProgramData\IJEBKKEGDBFIIEBFHIEH

              Filesize

              11KB

              MD5

              353dc12e94117d94929abfc893808f82

              SHA1

              c1c5004ec31b6bf5080c5c9236f61a3b201e813f

              SHA256

              5f3974dd4f81f55c02637848ca76783eff7f5fbafda53bc6f28c1853407b3fda

              SHA512

              2bc8f8a21fe3f8b83d64fff8fc82e2c59977197e6eee55b23e24e7e5e379606c160fcd47ae5ada2c82a89f62fd6d52de7641612888d194d0c257b5cbfae2a6a2

            • C:\ProgramData\JEBKJDAF

              Filesize

              114KB

              MD5

              6e389da3969c19b6dbfb95013149bbb5

              SHA1

              f02ff8f1f1b353e36e4f609d39815c17eba8cee3

              SHA256

              4928d3109995b2faee203bc67184c892e9633fc7df6ad619f5852cf680c36ed4

              SHA512

              af965dc6aa1c26442f883e2d916509bc7766b425768e6a482223fdd1d3a5133c3b1955ad91bd578c387cc260efee4f738095d8ed7bafb7ed953edcc948313636

            • C:\ProgramData\mozglue.dll

              Filesize

              42KB

              MD5

              3fa8bb5f89ec64e3a838217037f5da97

              SHA1

              323d80880aaec9aa38ee0890e3acf7d8d3dea017

              SHA256

              d9109f7a616f3b641a53066cf2f67cab705a6cf93d1cce6523b84eb20f15ab83

              SHA512

              1098cc0fa68906ba3ee6d474361f660d0f37793bdcc5d9de4b94efd041af5c8ea4a0ff9b7da3ca9611e736001e316989777032a30c060c4e224bf9f3ce307857

            • C:\ProgramData\mozglue.dll

              Filesize

              593KB

              MD5

              c8fd9be83bc728cc04beffafc2907fe9

              SHA1

              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

              SHA256

              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

              SHA512

              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

            • C:\ProgramData\nss3.dll

              Filesize

              2.0MB

              MD5

              1cc453cdf74f31e4d913ff9c10acdde2

              SHA1

              6e85eae544d6e965f15fa5c39700fa7202f3aafe

              SHA256

              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

              SHA512

              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

            • C:\Users\AdminAEHIJKKFHI.exe

              Filesize

              1KB

              MD5

              c6a5abb575f4c14729b299058539998f

              SHA1

              90a8e0cfc7695944c9d28f3cf908ecbeb3367d0c

              SHA256

              7271dd5c11fb9a1052a5e91a09afbe7d148fd3388dc51c338df62a0a16f06739

              SHA512

              80fa0b7d01774d4a68e42ffd4b874c60a129684d86af168699905342e95af7ff7bc84559ea5a2619a600d75346b41664522b621b7bbe3fc7b5d14448568865af

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4

              Filesize

              471B

              MD5

              a3a730aee52549b673746d0dbbc59531

              SHA1

              deb5b7d626272c1bc7b88f3476caaf1d64534972

              SHA256

              94ed1105931e5f86b887032ceb8b4f61e6f275487b7fa36220fd9ec520b82493

              SHA512

              354b4558b2a187117635e91d8d360c752c11844757be413349e5e701b1fa10294f55ea70053d49f46401bc4e7218991bde096d6c7179070963e636e3fccd3cd2

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

              Filesize

              2KB

              MD5

              499fb781218e91f17ceb95c95b2540af

              SHA1

              7eaa6a1efec6586520b78e140efdb3e223ac9a5f

              SHA256

              490b98a7d88b0805c5e90caf89aece53f21997ad060734cea5ec7d38ff02bff5

              SHA512

              65dcbd4af9aafd6fc88f5e941e60802a2adb03db22164cbbefbd3cec83f066c3ff5381b323eed658af75e097b542b51d95f66ab9b36a597e19ad19cba2d807ed

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

              Filesize

              2KB

              MD5

              8647fa3218bfe81a6208ddf38d3f62b2

              SHA1

              0f4b0ec7df5f949ce3363e73587e632c223ef09c

              SHA256

              17d9aff1230b821ca5a4899b410c7a395fdbdd4efeb4eef7637aa94eda100cd1

              SHA512

              085963090453894146c66499f13079db408af57ae615f1c3237da4d3af6bd56542c95a54aa9e3df13c2c53c2a5e8eb9c460cc54b3ecc7107fbc810f09fc2aab8

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

              Filesize

              2KB

              MD5

              ffec8069cabce0949aaee67665624e67

              SHA1

              d449a98b34103a9e80740ed9d7593c8115c3dc75

              SHA256

              340d048d7f46e25d83d97affa98d53d773e83e070b28ed67ea3472362a0a2993

              SHA512

              770d7b72772940699b4fb66ededa53a02fe580c5fcc5e050e2798e8e065c7a3505886d91d3ce05172e1d5c942069297934dd3c8c52f9e3d2be8f5d0c1ab851d3

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

              Filesize

              1KB

              MD5

              67db8c5d484fe0b60abd574b0480e4c9

              SHA1

              bafea8ad167114a72854bfe78095155bb7c44f89

              SHA256

              5d2c8933104167dece16b77357813d01c861d0c00176057ab8fe93222b51141d

              SHA512

              5d71a6271cfdcbef50f51c083f1665baaa59e7d927051ec96086bc68ceb2334227d620ee777237fccb3954ae1a1691f79d7f73335e7c95179591a1cdd0e9c844

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

              Filesize

              1KB

              MD5

              409753e064ef8537c278c361a2b1ebbc

              SHA1

              a28aa7a82427968cb8b2c0d91675e8374b087fe4

              SHA256

              c69ca82fa2695413ca28bc6e087ba57e9754e60d26dff82f5cc04fd1467c7ede

              SHA512

              b57b32aaf8a431ad5d9bb66ab23fbd37df5cf7ab6079e82f384cd8a367a9d92ad3b94c57c1f1310c15d321964f8757f1391d73e034e34efe113dbb674dd277a8

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4

              Filesize

              490B

              MD5

              73836acd7e269e2ad55f3955dcc29148

              SHA1

              853af53f6f70759c285941389614c6ff532821cb

              SHA256

              25e50f85d6f73cd63e1811ba8f51f8ff34677eddf4677ba96883fdb1217cf495

              SHA512

              439d7d414f3088ad22d637efaf0bcd93e8b4da237678dc2a7e23f1748d23c0c6d87ad6a9114ab9adfc55ce5887007465a65a0ac5e79150c13c9c1673365487fa

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

              Filesize

              458B

              MD5

              f7422d7a5e78ae024f809d721a053b00

              SHA1

              086c84e64c6be04c09012401dd72dc5d379c31fd

              SHA256

              47e7a8d137fbb11fb32c73a76e8e03e8e9c041462876491515bd1dc8b2495b40

              SHA512

              70fa133d14c72329ee8bd768274b745fc9e6c6b88ce03b9650ed1688ec91cf040b19e47a135a12345f0c728150c8515b529045789cf4ea895cea3c0f7ddb0ce7

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

              Filesize

              450B

              MD5

              55e9e5fc88ba8cd2257ec353c4453dec

              SHA1

              7a2ee68e589f4fa6f3ec8d8b6056e9efbb92e882

              SHA256

              bb2876fa66351dbb7b5dd47924046a2666200efffbf32cd740a3cf05fd998cb2

              SHA512

              d2924784863d69407f0ccde7e076c64dedff3fe8700330f4bdc3105018ba301c49028e1a2213541915d413adef375128daec75ab885061cbf601c2e4c65e6324

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

              Filesize

              482B

              MD5

              ae7a198b2ad4f378c09b8f00f74cb43b

              SHA1

              0d09dcb4baed2576bdb84e8b6d3c07fec5ed37e7

              SHA256

              05be7e49559b4c728f7772470442d27a4ca5219346da32200f5d4754b9ad34e8

              SHA512

              eb07aeb7baff642a44760fc1b4fd52d2c0c4883a4eb1a2f7d65601493f1b9b026bdfa6688a94851a9f52bf9bc584018a0a84c74d5d102f7c9f39de6de410b680

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

              Filesize

              486B

              MD5

              7de1a8886aa95c0d9823897d635c4305

              SHA1

              ee9796225e155b95ee2ba282cc889ec6aab5177b

              SHA256

              bf80042185ba1b82f8f3c22b55c16514ad125f70d390ff829b0a7c3cc497979c

              SHA512

              73243a2aaa88c910c56e628a62aa937e1d9ed2e6f38267a988cf39e9e8427525bcc37e271f9b90059170d39a89c9fd0c673dedf8eb2bd3fb8485b5f5d5198316

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

              Filesize

              458B

              MD5

              181044176cc65edaacfb9e0c57c1c52e

              SHA1

              daf0567f7d895d509643e5a1cd70e1589345455f

              SHA256

              b0538e06306d34670e6e615ba43cc1187054dbbb9208b607cd6622a00cc41900

              SHA512

              0655c4377105b764aca86c84c52fb063e171bdd078f3cedb3bea92cda923d930088c8f8afee5e71d05d31b5a28e4a59854a7d79577738542bfce6282c8896219

            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

              Filesize

              2B

              MD5

              d751713988987e9331980363e24189ce

              SHA1

              97d170e1550eee4afc0af065b78cda302a97674c

              SHA256

              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

              SHA512

              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

              Filesize

              40B

              MD5

              20d4b8fa017a12a108c87f540836e250

              SHA1

              1ac617fac131262b6d3ce1f52f5907e31d5f6f00

              SHA256

              6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

              SHA512

              507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

            • memory/840-135-0x0000000000400000-0x0000000000458000-memory.dmp

              Filesize

              352KB

            • memory/840-138-0x0000000000400000-0x0000000000458000-memory.dmp

              Filesize

              352KB

            • memory/840-142-0x0000000000400000-0x0000000000458000-memory.dmp

              Filesize

              352KB

            • memory/1304-132-0x0000000000920000-0x0000000000974000-memory.dmp

              Filesize

              336KB

            • memory/1304-187-0x0000000071420000-0x0000000071BD0000-memory.dmp

              Filesize

              7.7MB

            • memory/1304-131-0x000000007142E000-0x000000007142F000-memory.dmp

              Filesize

              4KB

            • memory/1304-140-0x0000000071420000-0x0000000071BD0000-memory.dmp

              Filesize

              7.7MB

            • memory/1752-68-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1752-53-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1752-106-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1752-108-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1752-99-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1752-76-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1752-69-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1752-4-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1752-60-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1752-107-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1752-44-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1752-30-0x0000000022300000-0x000000002255F000-memory.dmp

              Filesize

              2.4MB

            • memory/1752-28-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1752-27-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1752-10-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1752-7-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/1936-13-0x0000000074500000-0x0000000074CB0000-memory.dmp

              Filesize

              7.7MB

            • memory/1936-0-0x000000007450E000-0x000000007450F000-memory.dmp

              Filesize

              4KB

            • memory/1936-1-0x0000000000410000-0x000000000045A000-memory.dmp

              Filesize

              296KB

            • memory/2136-176-0x0000000000370000-0x00000000003BA000-memory.dmp

              Filesize

              296KB

            • memory/2804-156-0x0000000000FC0000-0x0000000000FF8000-memory.dmp

              Filesize

              224KB

            • memory/3044-194-0x0000000061E00000-0x0000000061EF3000-memory.dmp

              Filesize

              972KB

            • memory/3044-159-0x0000000000400000-0x0000000000643000-memory.dmp

              Filesize

              2.3MB

            • memory/3044-161-0x0000000000400000-0x0000000000643000-memory.dmp

              Filesize

              2.3MB

            • memory/4596-265-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/4596-228-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/4596-266-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/4596-184-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/4596-182-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/4596-179-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/4596-252-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/4596-233-0x0000000000400000-0x0000000000657000-memory.dmp

              Filesize

              2.3MB

            • memory/4596-239-0x0000000022090000-0x00000000222EF000-memory.dmp

              Filesize

              2.4MB