Analysis

  • max time kernel
    132s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2024 13:03

General

  • Target

    e3b383702d5791f228ce52895b00856b5ef50d5cba3b952389d3e64c8064d435.exe

  • Size

    283KB

  • MD5

    95e56babf9f2cb4e5465bd164fd0e916

  • SHA1

    90bda3978469565133e4766396bb56159f3ade25

  • SHA256

    e3b383702d5791f228ce52895b00856b5ef50d5cba3b952389d3e64c8064d435

  • SHA512

    918b3f3d66c61f7f43c556aebd135ca0f2095758989dea43e5d9590ee1b01579be6705b36bae7ed0281c6ac291624c82e872a34845bb46d373402f85190df0ae

  • SSDEEP

    6144:m7pXySSZ7xMdOHynz0lkPix5xZ/XooaMgH9JndOrEJ96+g+AS3aImJ3jEO:wpXySCQwlkarjoH3dOrEJg+nqIyTEO

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Extracted

Family

lumma

C2

https://complainnykso.shop/api

https://basedsymsotp.shop/api

https://charistmatwio.shop/api

https://grassemenwji.shop/api

https://stitchmiscpaew.shop/api

https://commisionipwn.shop/api

Signatures

  • Detect Vidar Stealer 24 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3b383702d5791f228ce52895b00856b5ef50d5cba3b952389d3e64c8064d435.exe
    "C:\Users\Admin\AppData\Local\Temp\e3b383702d5791f228ce52895b00856b5ef50d5cba3b952389d3e64c8064d435.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3876
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4552
      • C:\ProgramData\FHDHCAAKEC.exe
        "C:\ProgramData\FHDHCAAKEC.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:4828
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:5080
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
                PID:3728
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                4⤵
                  PID:2516
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  4⤵
                    PID:3088
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    4⤵
                    • Checks computer location settings
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:2688
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminBGHJJDGHCB.exe"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:2448
                      • C:\Users\AdminBGHJJDGHCB.exe
                        "C:\Users\AdminBGHJJDGHCB.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:1636
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          7⤵
                          • System Location Discovery: System Language Discovery
                          PID:2304
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminBAFCGIJDAF.exe"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:1720
                      • C:\Users\AdminBAFCGIJDAF.exe
                        "C:\Users\AdminBAFCGIJDAF.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:840
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          7⤵
                          • System Location Discovery: System Language Discovery
                          • Checks processor information in registry
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4292
                • C:\ProgramData\ECBGCGCGIE.exe
                  "C:\ProgramData\ECBGCGCGIE.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:264
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    4⤵
                      PID:628
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      4⤵
                        PID:2652
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        4⤵
                        • System Location Discovery: System Language Discovery
                        • Checks processor information in registry
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1400
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\GDBAKEGIDBGI" & exit
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:64
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout /t 10
                        4⤵
                        • System Location Discovery: System Language Discovery
                        • Delays execution with timeout.exe
                        PID:4480
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=4324,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=2944 /prefetch:3
                  1⤵
                    PID:4896
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3880,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=3080 /prefetch:8
                    1⤵
                      PID:4352

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\ProgramData\DAKFIDHDGIEGCAKFIIJK

                      Filesize

                      11KB

                      MD5

                      728e2215f5526f02de192b4df3825e94

                      SHA1

                      7712fa05605b3934e1b2c13d1d0fe333175a2e14

                      SHA256

                      a545aea53d591e0b5c3d1248099ec1cad607552d2f7a40692afa80ef643a50bd

                      SHA512

                      6222c5b375768f4f84419a36f690c671220b61005ccc6dacec07904e4733c34f62995ddb288e6fe8108d294b734e4e1fe3308136f6bf274e765534af1a02ad9b

                    • C:\ProgramData\DBKKKEHD

                      Filesize

                      232KB

                      MD5

                      ac50f0e00269c18e1f356dbf9ab2021d

                      SHA1

                      0f360cd6348071cad86de68037627219d1262a6c

                      SHA256

                      d756c2830b3e1a6a5fd9f9ff93b5abfcf76ede44d97b44ad80c49f51d9091efa

                      SHA512

                      c504c26cb784fad2323fbc9e180709ee2cc94d1feb806cb8aee7b5ee4a044b97baf36b332694ddf4ca9ae034c1d43ec810492aa43f2ed1befd7868b62805935d

                    • C:\ProgramData\ECBGCGCG

                      Filesize

                      114KB

                      MD5

                      6e389da3969c19b6dbfb95013149bbb5

                      SHA1

                      f02ff8f1f1b353e36e4f609d39815c17eba8cee3

                      SHA256

                      4928d3109995b2faee203bc67184c892e9633fc7df6ad619f5852cf680c36ed4

                      SHA512

                      af965dc6aa1c26442f883e2d916509bc7766b425768e6a482223fdd1d3a5133c3b1955ad91bd578c387cc260efee4f738095d8ed7bafb7ed953edcc948313636

                    • C:\ProgramData\ECBGCGCGIE.exe

                      Filesize

                      283KB

                      MD5

                      c252b6cf66b0de7e3b34c180bab3b0fa

                      SHA1

                      cba15dad617651223885f6c032b65cd598dcce5c

                      SHA256

                      7fc6bc7f2cb710cf14da22c9e40b8407dbbe523ba7f8a91f8d67f5bce413d5c5

                      SHA512

                      95e7dd1377d0baebe0a7a22901dcfa77d4f562c88e88b0133c03edac36bc7b058522465c03ee792743022a20c639e306b1ecb25b3910650233ecbc6f281f3617

                    • C:\ProgramData\FBKEHJEGCFBF\FIECFB

                      Filesize

                      20KB

                      MD5

                      a603e09d617fea7517059b4924b1df93

                      SHA1

                      31d66e1496e0229c6a312f8be05da3f813b3fa9e

                      SHA256

                      ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

                      SHA512

                      eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

                    • C:\ProgramData\FBKEHJEGCFBF\GIEHID

                      Filesize

                      160KB

                      MD5

                      f310cf1ff562ae14449e0167a3e1fe46

                      SHA1

                      85c58afa9049467031c6c2b17f5c12ca73bb2788

                      SHA256

                      e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                      SHA512

                      1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                    • C:\ProgramData\FBKEHJEGCFBF\GIEHID

                      Filesize

                      40KB

                      MD5

                      a182561a527f929489bf4b8f74f65cd7

                      SHA1

                      8cd6866594759711ea1836e86a5b7ca64ee8911f

                      SHA256

                      42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                      SHA512

                      9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                    • C:\ProgramData\FHDHCAAKEC.exe

                      Filesize

                      207KB

                      MD5

                      b20dff2e59e94e48d6449fb22ec6411b

                      SHA1

                      07a0dc8735b048696d8db42ad689ba8c9bbbccc9

                      SHA256

                      5afff322d4b56afbe4429c6fd83aa2d699c51dbf4f5495b08ac104f07da8c49d

                      SHA512

                      2119e9b24c133d556d3e9e293914e720b012e5dfd492e90dcec1c4ae75f29b01a38037f4741cd5ec1d4bda3e4c24f81627f7f39d140d82aab168c44942d55a3b

                    • C:\ProgramData\HCAAEGIJKEGH\CBAFCA

                      Filesize

                      20KB

                      MD5

                      053eebd8bbc084f86b298296bddfb169

                      SHA1

                      3151411b0bf92d1e89f848f610834022bce22035

                      SHA256

                      f4558aec88bba9663e57dc577a51246ac9d600ec8ecc656820a3b97c0ab522d7

                      SHA512

                      c0b5832ddb0babff0638282a8a821219c39dea94760a95bccf95ed3c8deaa770da0971a454c6e97d6cf10d015e91395463cf59e8bedb842c4cf9b5fb7cd92aac

                    • C:\ProgramData\mozglue.dll

                      Filesize

                      593KB

                      MD5

                      c8fd9be83bc728cc04beffafc2907fe9

                      SHA1

                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                      SHA256

                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                      SHA512

                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                    • C:\ProgramData\nss3.dll

                      Filesize

                      2.0MB

                      MD5

                      1cc453cdf74f31e4d913ff9c10acdde2

                      SHA1

                      6e85eae544d6e965f15fa5c39700fa7202f3aafe

                      SHA256

                      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                      SHA512

                      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                    • C:\Users\AdminBGHJJDGHCB.exe

                      Filesize

                      321KB

                      MD5

                      5831ebced7b72207603126ed67601c28

                      SHA1

                      2ba46b54074675cc132b2c4eb6f310b21c7d7041

                      SHA256

                      02097348db100eb22d46dc474a1078b5ddbb56ee916cc81f24fadd0a6938ac58

                      SHA512

                      a9924ef2373851156d981bc3c5b5d533e8b510abf6c3f12e62af0c019e740f0d077efb8f7f93699d797335df33013c72fd9ead3b2253dd82f14b7b330faacb8e

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                      Filesize

                      717B

                      MD5

                      822467b728b7a66b081c91795373789a

                      SHA1

                      d8f2f02e1eef62485a9feffd59ce837511749865

                      SHA256

                      af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                      SHA512

                      bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

                      Filesize

                      2KB

                      MD5

                      be866b8cac2ee4ef9f82b89eac8e4c16

                      SHA1

                      46e0ea958226322baac1c9d83ae1dde09c9c3119

                      SHA256

                      8c2a88d2c06d851ec946fd5c6b7b7746824357edcd315938c96f59d5cd71fc39

                      SHA512

                      b8fc299d1c723ea0ddc1a91b59ef92f5d55875de02e1c7281577281a9b8ef93020cd1615321507750d550768b4d0bacc30ba4153fbc9eac1cd7026d13fd662bf

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

                      Filesize

                      2KB

                      MD5

                      d9b99d63755d3b61ef98e5ce4a2c5360

                      SHA1

                      3c6deb91e5634ead4fafe02c9094a84c728dd7d7

                      SHA256

                      18c144d485c6f38e0e79f083cf75e04615aa7066eb6ce0582b164acbdb0a0e80

                      SHA512

                      ee89dfb6b741ae6cda197f99fcfd8c99ff5b3a06b3fadcb6f128777a7bd31a76100d1234943f3365117ec27d6ae83e57357e69d5956b67cbd3dc94efcd8903fc

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

                      Filesize

                      1KB

                      MD5

                      30bbf79a5d8e291a526458c43603682c

                      SHA1

                      0d9a5f1a13a800b416cb803da570a1e82a2e40c1

                      SHA256

                      1c045ef45ff87b7422faef763da35e239c0d278f0d3d8fefa86f44d3b753da21

                      SHA512

                      2a415850423404cca839f5202a74799f17ab25f623d3b8d9e622e97488b769ced88f72ff1f2fc8101b0c7dc299d6329c10442b247b4c0a408cace5428f97e98a

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                      Filesize

                      192B

                      MD5

                      2d01b5ef6eebe651af183f35f1c3a036

                      SHA1

                      e65eb8f12a6ca14624d2c475e6fab3f01afdbb89

                      SHA256

                      3e8e230c7deee05f9afee480a4f7c90ec0267d4897670a909bf35003c44e0fbd

                      SHA512

                      53dd938a5197bfdb5f523d3ebfc942234d542eb943849d5c03c2c9affbfce3e4723b62f2362f9f8af6e0ea9389f03a6bc617228420becdf01d1aa3b4d4cae633

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE

                      Filesize

                      458B

                      MD5

                      3ba887db1572208ca0ae6a44b8039a86

                      SHA1

                      316134b0c8711f2ba9be89467e829e1e11552547

                      SHA256

                      a97bde4501d55b3523c799b4b9184fae499afde5c8bfa487f1f4fa2f881f7fa7

                      SHA512

                      af6cc4452b0733137ace5caa3aeda4d200da2dd273e221bd38732c221b00f0ac0d72a8516d33d8614eab6a35c5d4925b192dde1033a8fc3243648ce6dfa7f0a0

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

                      Filesize

                      450B

                      MD5

                      da1d72ae6a1c11961661b7834ea883a9

                      SHA1

                      99093e55228672e4007e1220a8e06e34def62c7a

                      SHA256

                      49001ffce12064479cb2a540521d9242a603330d08af3975651a8337bc210920

                      SHA512

                      3107be3b8598b59b2cb4d713d9bc26ecbdaf7b32cddc34b1076438cf84b77a8db67deea932b78459b844bea88ef97ff213373ac66be815ab2d9df70cd619c720

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

                      Filesize

                      458B

                      MD5

                      c433869b13611474023f460b994646eb

                      SHA1

                      bf0c68ad77f0b15e086857ce7224910414fbded1

                      SHA256

                      634f63b92e4d8e4e9a98a2c1e3fc4d5d614bbf11e2e6ebbec7d871a9aa3780c4

                      SHA512

                      3b0791cb56a42572582f2e38d35a3a0a615015f88f92ac8721102b483485f2f85c3e7adb25690ce1ded188a4a413edae71cb1f16799d9792996a6470dbe362a5

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                      Filesize

                      2B

                      MD5

                      d751713988987e9331980363e24189ce

                      SHA1

                      97d170e1550eee4afc0af065b78cda302a97674c

                      SHA256

                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                      SHA512

                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                      Filesize

                      40B

                      MD5

                      20d4b8fa017a12a108c87f540836e250

                      SHA1

                      1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                      SHA256

                      6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                      SHA512

                      507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                    • memory/264-145-0x00000000002C0000-0x000000000030A000-memory.dmp

                      Filesize

                      296KB

                    • memory/1400-198-0x0000000022240000-0x000000002249F000-memory.dmp

                      Filesize

                      2.4MB

                    • memory/1400-147-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/1400-217-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/1400-212-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/1400-196-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/1400-195-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/1400-151-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/1400-149-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/1636-260-0x0000000000FC0000-0x0000000001014000-memory.dmp

                      Filesize

                      336KB

                    • memory/2192-194-0x0000000071A10000-0x00000000721C0000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/2192-124-0x0000000000E60000-0x0000000000E98000-memory.dmp

                      Filesize

                      224KB

                    • memory/2192-130-0x0000000071A10000-0x00000000721C0000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/2192-123-0x0000000071A1E000-0x0000000071A1F000-memory.dmp

                      Filesize

                      4KB

                    • memory/2304-265-0x0000000000400000-0x0000000000458000-memory.dmp

                      Filesize

                      352KB

                    • memory/2304-267-0x0000000000400000-0x0000000000458000-memory.dmp

                      Filesize

                      352KB

                    • memory/2304-263-0x0000000000400000-0x0000000000458000-memory.dmp

                      Filesize

                      352KB

                    • memory/2688-160-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                      Filesize

                      972KB

                    • memory/2688-131-0x0000000000400000-0x0000000000643000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/2688-274-0x0000000000400000-0x0000000000643000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/2688-126-0x0000000000400000-0x0000000000643000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/2688-197-0x0000000000400000-0x0000000000643000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/2688-129-0x0000000000400000-0x0000000000643000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/3876-12-0x0000000074470000-0x0000000074C20000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/3876-2-0x00000000056E0000-0x0000000005C84000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/3876-1-0x0000000000800000-0x000000000084A000-memory.dmp

                      Filesize

                      296KB

                    • memory/3876-0-0x000000007447E000-0x000000007447F000-memory.dmp

                      Filesize

                      4KB

                    • memory/3876-67-0x0000000074470000-0x0000000074C20000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/4292-286-0x0000000022400000-0x000000002265F000-memory.dmp

                      Filesize

                      2.4MB

                    • memory/4292-285-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4292-284-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-7-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-93-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-66-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-101-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-9-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-4-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-24-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-58-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-68-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-92-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-100-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-51-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-25-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-42-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-41-0x0000000000400000-0x0000000000657000-memory.dmp

                      Filesize

                      2.3MB

                    • memory/4552-26-0x0000000022620000-0x000000002287F000-memory.dmp

                      Filesize

                      2.4MB