Analysis

  • max time kernel
    53s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2024 13:37

Errors

Reason
Machine shutdown

General

  • Target

    https://store.steampowered.com/?l=turkish

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Detected potential entity reuse from brand STEAM.
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://store.steampowered.com/?l=turkish
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba3ef46f8,0x7ffba3ef4708,0x7ffba3ef4718
      2⤵
        PID:4676
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2
        2⤵
          PID:5012
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1188
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:8
          2⤵
            PID:628
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
            2⤵
              PID:2000
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
              2⤵
                PID:4976
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:1
                2⤵
                  PID:4796
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:1
                  2⤵
                    PID:1120
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:1
                    2⤵
                      PID:1580
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:8
                      2⤵
                        PID:3824
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3664
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:1
                        2⤵
                          PID:224
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:1
                          2⤵
                            PID:2220
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2444 /prefetch:1
                            2⤵
                              PID:1680
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:1
                              2⤵
                                PID:2268
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:1
                                2⤵
                                  PID:1688
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5360 /prefetch:8
                                  2⤵
                                    PID:5052
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:1
                                    2⤵
                                      PID:4300
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2160,3805385777274343159,11437270245679992054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4488
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3952
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:1596
                                      • C:\Windows\System32\rundll32.exe
                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                        1⤵
                                          PID:1244
                                        • C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe
                                          "C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"
                                          1⤵
                                          • Modifies WinLogon for persistence
                                          • UAC bypass
                                          • Disables RegEdit via registry modification
                                          • Drops desktop.ini file(s)
                                          • Sets desktop wallpaper using registry
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          PID:2112
                                        • C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe
                                          "C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"
                                          1⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1244
                                        • C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe
                                          "C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"
                                          1⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4440
                                        • C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe
                                          "C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"
                                          1⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:864
                                        • C:\Windows\system32\LogonUI.exe
                                          "LogonUI.exe" /flags:0x4 /state0:0xa39ba055 /state1:0x41c64e6d
                                          1⤵
                                          • Modifies data under HKEY_USERS
                                          • Suspicious use of SetWindowsHookEx
                                          PID:5188
                                        • C:\Windows\System32\rundll32.exe
                                          C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                                          1⤵
                                            PID:892

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            53bc70ecb115bdbabe67620c416fe9b3

                                            SHA1

                                            af66ec51a13a59639eaf54d62ff3b4f092bb2fc1

                                            SHA256

                                            b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771

                                            SHA512

                                            cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            e765f3d75e6b0e4a7119c8b14d47d8da

                                            SHA1

                                            cc9f7c7826c2e1a129e7d98884926076c3714fc0

                                            SHA256

                                            986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89

                                            SHA512

                                            a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            3KB

                                            MD5

                                            6a18a4a539ecdd954b2f097fca274c32

                                            SHA1

                                            a45e29b3da640df282eacae6e898f52c118f82bc

                                            SHA256

                                            745ec53e6a001c824c214748c8567305c7f68fc4781ef1837efeb62ad89fca72

                                            SHA512

                                            036aa1068a9d6180104d8eeff6748315cd0f54a4c70294616a6c24d54639bf408e548b39eeb8a58047fd227ad3a168027bc20d61cf1f82b3272293748b84b67a

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            f81f4bfb1040ef61721267f96f35d3ca

                                            SHA1

                                            cd8d44b2cac893075d0fa11b9469a1c63dee32f9

                                            SHA256

                                            6113906f36c576a0f4d89f9d06da4f9857c3ec08957f237eaa49a0cc3d3752fa

                                            SHA512

                                            21fa6536a1a7f331073e11953669950567666594bc93abc1fc10665fe4dc8a884ff13203eca191492add91e91dff2af9c4cf803adb0373cba919cb793e530b99

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            7KB

                                            MD5

                                            ae71229b2fd54e69d7be014129eb938a

                                            SHA1

                                            8d136a0be26bc14df818ee5b5bb586e1f3016f91

                                            SHA256

                                            072e277e89b6651f8f2e4d535ebb06ab26fd780179dc00e627ca8ec54b1df796

                                            SHA512

                                            c0c518f94ec1885d9deb4d93edac1ac5e0a00153a51b877d60f7609ccf9a93390be02a28711ba31d6c8ef352e0badc481644d3add6228dd0eeb609f3affa6061

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            335f247f7699f959c369729e7982523e

                                            SHA1

                                            d1c22e6782f33db86a2f77ab2dbd9458a992807a

                                            SHA256

                                            665409acb24f4bb6ae75b5e0227b25dbe78e8d6e15c30413f631eda472702c6f

                                            SHA512

                                            6a787059ced3625118861cb2b6b2197ba137a521e6c4718428d1ddbd15964fcd3652370a288f60d7bae3b74805d6b4e5ebe009d5ba0cd4d4d4e6899cdd287658

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            52d1557405899d30e3e3de1430941a11

                                            SHA1

                                            e5fb3b247fdce158fc546215ce495b5fa57b84fa

                                            SHA256

                                            e3fe9082dab7cac070d754d5f4ac6a74c1de1a0bccc392870b9b82b44166b1cd

                                            SHA512

                                            aeb5d45f12447ff7aa13c953b673e14f7906ce8930f83a9e85c0dead6ce9185b761da8a25ea87c38a87669f7252db8d6675b9c23f175fa9f043ed699bfcb1a9e

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            793a51807baa2b980b9d23033cf28670

                                            SHA1

                                            315b7af880a68446487101ad921b9b9e758d19ec

                                            SHA256

                                            5f9518014de28257ee607299ba694e70d37bf5ce7901774383e2a87b44dc7783

                                            SHA512

                                            59a85fadc4200a34af1f12f3386fc3f98b2327f11bcbd81becf4b085c7bbad575d819c643d8d96686b7513afa9ad880dfe430a9fcbcc13d1202499bd4b05fd66

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57d513.TMP

                                            Filesize

                                            372B

                                            MD5

                                            5560508a2af21d0a15b6977fa0276efe

                                            SHA1

                                            dc75a0f03377d57a1858117b96a49aefede587b5

                                            SHA256

                                            be51e3fe8272aa1c723a18badc883f2010df3e8999602855e34985af923ef350

                                            SHA512

                                            e3f97cca82a7940094ef396ab2dc060d98a95cc486c6cbb6652cef545fdd384bace00b9ea1670cc326526fee0d2131ab9e15fbb63e6839dc9495b9c9f5a35c66

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a7dffa75-1993-4575-bd86-9deac7f00a79.tmp

                                            Filesize

                                            6KB

                                            MD5

                                            ad227aad2d14b7cb378723ab66189cd1

                                            SHA1

                                            e5bb0efcdcd0c4f48b00b1d68cfc2416346704b0

                                            SHA256

                                            9960edbc01d7a5bc7e12966312c566f00dbdb9fbdb1c45fdba86f53d6e64f075

                                            SHA512

                                            bc4672940545ce41f81b0bfe112dae85b2f9f4dadba5fbe550521ae505f45a2e4dc94608e8e630f3ffbd7e75e5753962a9400757bedb7ad86bbe4aef584d2224

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            6752a1d65b201c13b62ea44016eb221f

                                            SHA1

                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                            SHA256

                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                            SHA512

                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            67fb2c41f26b2e38733b3a114ac9689a

                                            SHA1

                                            62100b8537bd82cbbd369de567c3628f6b17db2c

                                            SHA256

                                            f502fe747137a65629e0d7760bc09402ab478e48e403a6489e8e9d102b64baae

                                            SHA512

                                            90d80a3a8d4af447f70de49a292a0a3301fd708f32381d83103f7c0a2cf5c7e58456141beac8b4fdfb0683c90ae3d3e300a6f87b91fb7719858dd907f2b2d701

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            3aba65c88c5e22068b8771bfa8dac9f2

                                            SHA1

                                            dafb3781714079278865930168e24b31c3a78ce4

                                            SHA256

                                            11cf5fdc4ebe7ef294a14263ca16d62d72d7af746a742c8e9fb14da24ad2ba29

                                            SHA512

                                            2ba1d494975eff22b128a53cf459c3874ad0174de76de5fb1c9c59b2da54e6e112f5d7817ad5da066f830363766b275fbb983ad23bcb70eefb55d994f4868e76

                                          • C:\Users\Admin\Downloads\NoEscape.exe.zip

                                            Filesize

                                            13.5MB

                                            MD5

                                            660708319a500f1865fa9d2fadfa712d

                                            SHA1

                                            b2ae3aef17095ab26410e0f1792a379a4a2966f8

                                            SHA256

                                            542c2e1064be8cd8393602f63b793e9d34eb81b1090a3c80623777f17fa25c6c

                                            SHA512

                                            18f10a71dc0af70494554b400bdf09d43e1cb7e93f9c1e7470ee4c76cd46cb4fbf990354bbbd3b89c9b9bda38ad44868e1087fd75a7692ad889b14e7e1a20517

                                          • C:\Users\Public\Desktop\ՠ᥄ஐΊگ⟦Ꮀ⤯ᘊル✨ሰ⹟ጼ⊬ᖭ⃶Ծ⟢Ⓓᳳࣔಲⴖ

                                            Filesize

                                            666B

                                            MD5

                                            e49f0a8effa6380b4518a8064f6d240b

                                            SHA1

                                            ba62ffe370e186b7f980922067ac68613521bd51

                                            SHA256

                                            8dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13

                                            SHA512

                                            de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4

                                          • \??\pipe\LOCAL\crashpad_4108_LFUJHNTUHJZFQJNU

                                            MD5

                                            d41d8cd98f00b204e9800998ecf8427e

                                            SHA1

                                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                                            SHA256

                                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                            SHA512

                                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                          • memory/864-573-0x0000000000400000-0x00000000005CC000-memory.dmp

                                            Filesize

                                            1.8MB

                                          • memory/1244-569-0x0000000000400000-0x00000000005CC000-memory.dmp

                                            Filesize

                                            1.8MB

                                          • memory/2112-568-0x0000000000400000-0x00000000005CC000-memory.dmp

                                            Filesize

                                            1.8MB

                                          • memory/2112-760-0x0000000000400000-0x00000000005CC000-memory.dmp

                                            Filesize

                                            1.8MB

                                          • memory/4440-571-0x0000000000400000-0x00000000005CC000-memory.dmp

                                            Filesize

                                            1.8MB