Analysis

  • max time kernel
    134s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 01:24

General

  • Target

    1de1d42113064dace922eed0089dd22a9c83f1d03040f9b1e787145603ab02b2.exe

  • Size

    282KB

  • MD5

    6a6554a97cabd9a8c53fd82631dabc4d

  • SHA1

    0b3c17ed215157d1c5a9d93bb27d00b81c52c4f1

  • SHA256

    1de1d42113064dace922eed0089dd22a9c83f1d03040f9b1e787145603ab02b2

  • SHA512

    31198a4aa9df63777b3e9db8b2e9d78ae50f87cd0ad055c388331fc47338107a46f363ccc34e67e73cebc505b05418d285ca889f0ae91cb4a7d7b67ba86ed084

  • SSDEEP

    6144:T4uGqsk9IG4IshEvObSgEG/3EkAfG2eU5uG7EO:kC9DTvNgf/3rAfTeouIEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Extracted

Family

lumma

C2

https://grassemenwji.shop/api

https://preachstrwnwjw.shop/api

https://complainnykso.shop/api

https://basedsymsotp.shop/api

https://charistmatwio.shop/api

https://stitchmiscpaew.shop/api

https://commisionipwn.shop/api

Signatures

  • Detect Vidar Stealer 22 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1de1d42113064dace922eed0089dd22a9c83f1d03040f9b1e787145603ab02b2.exe
    "C:\Users\Admin\AppData\Local\Temp\1de1d42113064dace922eed0089dd22a9c83f1d03040f9b1e787145603ab02b2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4216
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\ProgramData\HJKKFIJKFC.exe
        "C:\ProgramData\HJKKFIJKFC.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:556
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5108
      • C:\ProgramData\KKKEBKJJDG.exe
        "C:\ProgramData\KKKEBKJJDG.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4784
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Checks computer location settings
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3200
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminIJKJJKFHIJ.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1780
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminJDBGHIIDAE.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3484
      • C:\ProgramData\AEGHJKJKKJ.exe
        "C:\ProgramData\AEGHJKJKKJ.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3536
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:1040
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\KFCFIEHCFIEC" & exit
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4956
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 10
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:2988
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3808,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:8
    1⤵
      PID:3212
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=4116,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=2332 /prefetch:3
      1⤵
        PID:4516

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\AAFIDGCF

        Filesize

        114KB

        MD5

        6e389da3969c19b6dbfb95013149bbb5

        SHA1

        f02ff8f1f1b353e36e4f609d39815c17eba8cee3

        SHA256

        4928d3109995b2faee203bc67184c892e9633fc7df6ad619f5852cf680c36ed4

        SHA512

        af965dc6aa1c26442f883e2d916509bc7766b425768e6a482223fdd1d3a5133c3b1955ad91bd578c387cc260efee4f738095d8ed7bafb7ed953edcc948313636

      • C:\ProgramData\AEGHJKJKKJ.exe

        Filesize

        282KB

        MD5

        5dd74b81e1e9f3ab155e1603a2fa793b

        SHA1

        653cdaf8617c7fdec6f39db3334e858bec9a2d66

        SHA256

        5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26

        SHA512

        9017f6797f998423e3cd88dcf1086f6e555797a9e6414ffd714dcb394cfd3f2b2fb5432c9ba38792021b5ba9e421454385f509c9363cedb7d3ac5919f66035fa

      • C:\ProgramData\FIDGHIIE

        Filesize

        232KB

        MD5

        7264aef80a2d59b90b3322cc424f6930

        SHA1

        b3af34f94dec077bf5ebdd4ddd51290b792efe29

        SHA256

        bb8b8bc5668d17dafac88afcb638a716b9c344609f7dd611b6dec46572636548

        SHA512

        b5d95671f77bf3996d4ca7f2cedbd1c6ba0b8c5c677666c6eeea6acaa35843bee43c0ac95521432ab338b06f7da8e89b0d0df9b032c1f7e60afed1e21d024b8e

      • C:\ProgramData\FIDGHIIECGHD\CBGCBK

        Filesize

        160KB

        MD5

        f310cf1ff562ae14449e0167a3e1fe46

        SHA1

        85c58afa9049467031c6c2b17f5c12ca73bb2788

        SHA256

        e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

        SHA512

        1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

      • C:\ProgramData\FIDGHIIECGHD\GDAEBK

        Filesize

        40KB

        MD5

        a182561a527f929489bf4b8f74f65cd7

        SHA1

        8cd6866594759711ea1836e86a5b7ca64ee8911f

        SHA256

        42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

        SHA512

        9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

      • C:\ProgramData\FIDGHIIECGHD\JKFIDG

        Filesize

        20KB

        MD5

        a603e09d617fea7517059b4924b1df93

        SHA1

        31d66e1496e0229c6a312f8be05da3f813b3fa9e

        SHA256

        ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

        SHA512

        eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

      • C:\ProgramData\HIIIDAKKJJJKKECAKKJE

        Filesize

        11KB

        MD5

        353dc12e94117d94929abfc893808f82

        SHA1

        c1c5004ec31b6bf5080c5c9236f61a3b201e813f

        SHA256

        5f3974dd4f81f55c02637848ca76783eff7f5fbafda53bc6f28c1853407b3fda

        SHA512

        2bc8f8a21fe3f8b83d64fff8fc82e2c59977197e6eee55b23e24e7e5e379606c160fcd47ae5ada2c82a89f62fd6d52de7641612888d194d0c257b5cbfae2a6a2

      • C:\ProgramData\HJKKFIJKFC.exe

        Filesize

        321KB

        MD5

        c54262d9605b19cd8d417ad7bc075c11

        SHA1

        4c99d7bf05ac22bed6007ea3db6104f2472601fd

        SHA256

        de3f08aad971888269c60afcf81dc61f2158ca08cd32c9f5dd400e07d1517b54

        SHA512

        9c3086190bcb6ac9dd1ce22e69cfaf814d4acb60140fbe9e0cb220216d068d17151cb79f8acf89567c9a7b93960479ce19ea7b86020d939f56d6fc24e4d29a3f

      • C:\ProgramData\KKKEBKJJDG.exe

        Filesize

        205KB

        MD5

        003978c8812e39ddb74bf9d5005cb028

        SHA1

        126f73c30469a1b7e9a04a670c35185b5df628bc

        SHA256

        06510b52e07e89b5781f4ee3c7b4d94ff84c03931b3d7d93224294860feaccf4

        SHA512

        7c0b7ec7dfe18f99cf850c80c3228f52537d5565b2950d4f0ef8cbbb7b19d1f5e2d128f3766dcede41711b4d3c5631c7f758dd61697b1e5978d596f98f54c31d

      • C:\ProgramData\freebl3.dll

        Filesize

        75KB

        MD5

        77d04e2964867110389ee59aecb0a2b8

        SHA1

        c5ebff3722bbad458593ed093b3630f0691b8c4d

        SHA256

        b5d2a4f72b1e7b73dcb5e2ca2e31bd58de8444512cc2699b2fa51b3581d835aa

        SHA512

        6438c0d47b9e99527269569a829f200147cc770d51616f557eef1b9603705d9912139ad77f46f03aebcee8721458c6fdc855cb8c8333a8cd23489fcd1e6655ce

      • C:\ProgramData\mozglue.dll

        Filesize

        593KB

        MD5

        c8fd9be83bc728cc04beffafc2907fe9

        SHA1

        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

        SHA256

        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

        SHA512

        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

      • C:\ProgramData\msvcp140.dll

        Filesize

        13KB

        MD5

        e416a22acaeff6cec5aa36a72becbede

        SHA1

        9fefce2eafd2e79ce0f0c60e2174b0052bfd0d2f

        SHA256

        edc0250d8dfe5b4049a64b6171d12ad701784f4650484d35315ab5286384e79e

        SHA512

        8ab549504e9c7f787e4ace97bcce5eed5bd9758b8cc223eae537e5ba3dc0f22ddd84802b1c43c2e947aa0a97742793b8cd09a5563ccd21820fa00bb5c1294421

      • C:\ProgramData\nss3.dll

        Filesize

        2.0MB

        MD5

        1cc453cdf74f31e4d913ff9c10acdde2

        SHA1

        6e85eae544d6e965f15fa5c39700fa7202f3aafe

        SHA256

        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

        SHA512

        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

      • C:\ProgramData\softokn3.dll

        Filesize

        5KB

        MD5

        d943fd798a20d796fa01aeed03b41ea0

        SHA1

        a53c656ef11eeba2931e8528c0c5f394b057cb82

        SHA256

        aefddefcb6b178882c16252df82353839ecb4a5219974c40314735dba0821768

        SHA512

        36a8567a757d5b3f286f4e5dd04a7732a413bcc469e12919c5075d04d88bab4454f5e359ed2c8d75168b4e1545191755ca2be19ee2ee427d08521593507ad425

      • C:\ProgramData\vcruntime140.dll

        Filesize

        7KB

        MD5

        067e92142839b3e7aa3f359b79425a8e

        SHA1

        21669aa81410cd5a23f136d1393a97109cd7dc1b

        SHA256

        e505a09d4323b52a2c568020387748e45d12a0b2b0d320ca9a619e8afad4469b

        SHA512

        e4c283e736d7d1682ee383d5afd1ec4740a33541e2205177c077602e0b73f8d37558d5a14c033f459130dc47319c13829c86d6339bdfa39fb2940c7c32ca6806

      • C:\Users\AdminIJKJJKFHIJ.exe

        Filesize

        1KB

        MD5

        c6a5abb575f4c14729b299058539998f

        SHA1

        90a8e0cfc7695944c9d28f3cf908ecbeb3367d0c

        SHA256

        7271dd5c11fb9a1052a5e91a09afbe7d148fd3388dc51c338df62a0a16f06739

        SHA512

        80fa0b7d01774d4a68e42ffd4b874c60a129684d86af168699905342e95af7ff7bc84559ea5a2619a600d75346b41664522b621b7bbe3fc7b5d14448568865af

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4

        Filesize

        471B

        MD5

        a3a730aee52549b673746d0dbbc59531

        SHA1

        deb5b7d626272c1bc7b88f3476caaf1d64534972

        SHA256

        94ed1105931e5f86b887032ceb8b4f61e6f275487b7fa36220fd9ec520b82493

        SHA512

        354b4558b2a187117635e91d8d360c752c11844757be413349e5e701b1fa10294f55ea70053d49f46401bc4e7218991bde096d6c7179070963e636e3fccd3cd2

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

        Filesize

        2KB

        MD5

        499fb781218e91f17ceb95c95b2540af

        SHA1

        7eaa6a1efec6586520b78e140efdb3e223ac9a5f

        SHA256

        490b98a7d88b0805c5e90caf89aece53f21997ad060734cea5ec7d38ff02bff5

        SHA512

        65dcbd4af9aafd6fc88f5e941e60802a2adb03db22164cbbefbd3cec83f066c3ff5381b323eed658af75e097b542b51d95f66ab9b36a597e19ad19cba2d807ed

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

        Filesize

        2KB

        MD5

        8647fa3218bfe81a6208ddf38d3f62b2

        SHA1

        0f4b0ec7df5f949ce3363e73587e632c223ef09c

        SHA256

        17d9aff1230b821ca5a4899b410c7a395fdbdd4efeb4eef7637aa94eda100cd1

        SHA512

        085963090453894146c66499f13079db408af57ae615f1c3237da4d3af6bd56542c95a54aa9e3df13c2c53c2a5e8eb9c460cc54b3ecc7107fbc810f09fc2aab8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

        Filesize

        2KB

        MD5

        ffec8069cabce0949aaee67665624e67

        SHA1

        d449a98b34103a9e80740ed9d7593c8115c3dc75

        SHA256

        340d048d7f46e25d83d97affa98d53d773e83e070b28ed67ea3472362a0a2993

        SHA512

        770d7b72772940699b4fb66ededa53a02fe580c5fcc5e050e2798e8e065c7a3505886d91d3ce05172e1d5c942069297934dd3c8c52f9e3d2be8f5d0c1ab851d3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

        Filesize

        1KB

        MD5

        67db8c5d484fe0b60abd574b0480e4c9

        SHA1

        bafea8ad167114a72854bfe78095155bb7c44f89

        SHA256

        5d2c8933104167dece16b77357813d01c861d0c00176057ab8fe93222b51141d

        SHA512

        5d71a6271cfdcbef50f51c083f1665baaa59e7d927051ec96086bc68ceb2334227d620ee777237fccb3954ae1a1691f79d7f73335e7c95179591a1cdd0e9c844

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

        Filesize

        1KB

        MD5

        409753e064ef8537c278c361a2b1ebbc

        SHA1

        a28aa7a82427968cb8b2c0d91675e8374b087fe4

        SHA256

        c69ca82fa2695413ca28bc6e087ba57e9754e60d26dff82f5cc04fd1467c7ede

        SHA512

        b57b32aaf8a431ad5d9bb66ab23fbd37df5cf7ab6079e82f384cd8a367a9d92ad3b94c57c1f1310c15d321964f8757f1391d73e034e34efe113dbb674dd277a8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4

        Filesize

        490B

        MD5

        68a3bf1ae2b5651b6dcc2222f588e3f4

        SHA1

        01a53954c6ba1cf82b15457a98e47b5b8a892803

        SHA256

        77a6e834a8fb9a93ccf15aa870c6554ec37d19d0c57d45f131e61ab11f2a6825

        SHA512

        f78fc3ba97014fbf7abc46228d532252635b9a20cab1ff4d818b3ffc44d3e3993e1490333f6925e725f33c8bc6deff2deafdd0bc4cfc1644998e6b33e3d67b4b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

        Filesize

        458B

        MD5

        63e8b2c9bc23594f3014562bfef4b68e

        SHA1

        7f4b1e7b968f4b10099abb1290174bdfd259b809

        SHA256

        1552fd61ea760508aae6cbba9f23cd8e250fea42c90968c371ea27c002dfc2f6

        SHA512

        a42c5258c2576ab0f70629cfec799c47712a06efc0e7e01fd824e99b6fb2035c2b990258f622cd89e585810b54623f4358bf8e270be83405ca6081a4a5d6baa8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

        Filesize

        450B

        MD5

        0a770347271f7d5e911e9331737a5ed1

        SHA1

        fdbeb17f8f48dd2ec06a64852483561a1b00a968

        SHA256

        4b5de6bf95a76d9d2f258c6509dbb8d24a296f87e9879028180313dd9ee64870

        SHA512

        1b33882a13f93f9979a5c345af61565172c0140de92a97d6e8bfe6a86b1970a2c485fd6dcc57b1abc870194c47c06004ac946065d39c1bdeab1feb4345b7634d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA

        Filesize

        482B

        MD5

        8098a2c7b17eaa36e7759146e043fbbd

        SHA1

        6c211e4367dda7f524a963939fa508bef8034d14

        SHA256

        7bbb0a44620cd47ff1d0bc2fdb7aa45464915dadb7ae1ec30fee91c9975506f1

        SHA512

        4dba5f8e8ec3bb71682903e2b362a0e0a5f1fa8e4f112ddc4060c75b4f85434facc908d0e171054df6e2ca0107e46da9d2001435b26e0917a2b70b94dc528e97

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691

        Filesize

        486B

        MD5

        90b29aa7dd501c632765754b9128f66e

        SHA1

        36a09fb4032b5713e6c409cff8bf2bc41eea1c58

        SHA256

        e52861edef64aba796bc2de71f7f0ba2dcb07156f36859e48b1e3b01281f1a77

        SHA512

        9e3d2ac452a6120f58886f59eade464fc5cde8a91330dba4b813ff4f548ca33aaef9ff6bbadc1cffe3de48e1911f2e3d18e7b8b5feb13900f352fae62bb1fa9a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

        Filesize

        458B

        MD5

        7017fae4a5e2f1e5b400f5468c740280

        SHA1

        0cc10b422b7f33bb010aa9063e21aeb1b54ab684

        SHA256

        4faad99a4861b88d4df1d78eaa36532258104e8f68350c8a03f527e3ba3b5c0a

        SHA512

        d1cd0412f9034d8dca7c2e86b9416021ddacc8999b5c0ed716138e10a791d275a56c26e940ccaea62eb3f300865fd01c296ec6abd854dc26582997c2ed8559f3

      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

        Filesize

        2B

        MD5

        d751713988987e9331980363e24189ce

        SHA1

        97d170e1550eee4afc0af065b78cda302a97674c

        SHA256

        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

        SHA512

        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

        Filesize

        40B

        MD5

        20d4b8fa017a12a108c87f540836e250

        SHA1

        1ac617fac131262b6d3ce1f52f5907e31d5f6f00

        SHA256

        6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

        SHA512

        507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

      • memory/556-132-0x000000007145E000-0x000000007145F000-memory.dmp

        Filesize

        4KB

      • memory/556-133-0x0000000000F90000-0x0000000000FE4000-memory.dmp

        Filesize

        336KB

      • memory/556-240-0x0000000071450000-0x0000000071C00000-memory.dmp

        Filesize

        7.7MB

      • memory/556-142-0x0000000071450000-0x0000000071C00000-memory.dmp

        Filesize

        7.7MB

      • memory/1040-274-0x0000000022610000-0x000000002286F000-memory.dmp

        Filesize

        2.4MB

      • memory/1040-269-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/1040-180-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/1040-184-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/1040-273-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/1040-182-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/1040-288-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/1040-289-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-108-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-7-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-95-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-70-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-4-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-46-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-55-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-62-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-30-0x00000000225E0000-0x000000002283F000-memory.dmp

        Filesize

        2.4MB

      • memory/2360-10-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-29-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-28-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-45-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-77-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-96-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/2360-109-0x0000000000400000-0x0000000000657000-memory.dmp

        Filesize

        2.3MB

      • memory/3200-162-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/3200-188-0x0000000061E00000-0x0000000061EF3000-memory.dmp

        Filesize

        972KB

      • memory/3200-160-0x0000000000400000-0x0000000000643000-memory.dmp

        Filesize

        2.3MB

      • memory/3536-177-0x0000000000850000-0x000000000089A000-memory.dmp

        Filesize

        296KB

      • memory/4216-13-0x0000000074500000-0x0000000074CB0000-memory.dmp

        Filesize

        7.7MB

      • memory/4216-27-0x0000000074500000-0x0000000074CB0000-memory.dmp

        Filesize

        7.7MB

      • memory/4216-0-0x000000007450E000-0x000000007450F000-memory.dmp

        Filesize

        4KB

      • memory/4216-1-0x00000000005F0000-0x000000000063A000-memory.dmp

        Filesize

        296KB

      • memory/4784-157-0x0000000000CA0000-0x0000000000CD8000-memory.dmp

        Filesize

        224KB

      • memory/5108-140-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/5108-136-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/5108-143-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB