Analysis

  • max time kernel
    296s
  • max time network
    261s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2024 20:04

General

  • Target

    https://drive.google.com/drive/folders/1_3S4LK-BbMbqLhq3vbcn8V2PsctO_cqP

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 11 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/drive/folders/1_3S4LK-BbMbqLhq3vbcn8V2PsctO_cqP
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3352
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb03046f8,0x7ffbb0304708,0x7ffbb0304718
      2⤵
        PID:4636
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:2
        2⤵
          PID:2944
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1868
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:8
          2⤵
            PID:2100
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
            2⤵
              PID:1460
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
              2⤵
                PID:1804
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2672 /prefetch:1
                2⤵
                  PID:1164
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 /prefetch:8
                  2⤵
                    PID:4532
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1212
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5348 /prefetch:8
                    2⤵
                      PID:4528
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:1
                      2⤵
                        PID:2624
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:1
                        2⤵
                          PID:1788
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:1
                          2⤵
                            PID:452
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:1
                            2⤵
                              PID:428
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:1
                              2⤵
                                PID:1956
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3452
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,12124629949320647872,266404108519486518,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=904 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1616
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2488
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1040
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:1280
                                  • C:\Windows\system32\mspaint.exe
                                    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\DPDD\DPDD\1P0A1002.png" /ForceBootstrapPaint3D
                                    1⤵
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of SetWindowsHookEx
                                    PID:4204
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
                                    1⤵
                                    • Drops file in System32 directory
                                    PID:3824
                                  • C:\Windows\system32\OpenWith.exe
                                    C:\Windows\system32\OpenWith.exe -Embedding
                                    1⤵
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1072
                                  • C:\Windows\system32\cmd.exe
                                    "C:\Windows\system32\cmd.exe"
                                    1⤵
                                      PID:4652
                                      • C:\Windows\system32\netsh.exe
                                        netsh wlan show profile
                                        2⤵
                                        • Event Triggered Execution: Netsh Helper DLL
                                        • System Network Configuration Discovery: Wi-Fi Discovery
                                        PID:1044

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      bffcefacce25cd03f3d5c9446ddb903d

                                      SHA1

                                      8923f84aa86db316d2f5c122fe3874bbe26f3bab

                                      SHA256

                                      23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405

                                      SHA512

                                      761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      d22073dea53e79d9b824f27ac5e9813e

                                      SHA1

                                      6d8a7281241248431a1571e6ddc55798b01fa961

                                      SHA256

                                      86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6

                                      SHA512

                                      97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000018

                                      Filesize

                                      25KB

                                      MD5

                                      9222217ea98c35e71acd00dfe056b030

                                      SHA1

                                      42fc786d7b865bdba84117ff15357fada69d3b35

                                      SHA256

                                      1bbd4cf227b3645dccb3d9e3e03736d4e7612326ef09126cf18fccf00b1aac4f

                                      SHA512

                                      7aaaa2031579bdbc89a31201613e26f4a1b67998cafc0d2372438beb22f11ba0bcc13d41c6d6e074b3e5a8d87a15dee42747b796c92d619549e83bb117362780

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\temp-index

                                      Filesize

                                      1KB

                                      MD5

                                      901b1134bd53f4332900affad06d8ffc

                                      SHA1

                                      27dd5d493b220bee10aef01e4539c18122f481a3

                                      SHA256

                                      981cecd93bc3d687ee5481b304c83160f6ecb879ec2a83605d4dc3ceb8ec15da

                                      SHA512

                                      5ef61ff08a718e9345f12db20864aac6689a332d8c20ddabcb9e992c3546bbef4f9838563b00dd69ac3f7f31d79691bf7a7347dac2729750e7f258a30642163e

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      1KB

                                      MD5

                                      22408285fda53f8d5b62fd256adaa0a6

                                      SHA1

                                      7a4f93e8a6c0c34aab768e270ee3d502e1b61f7a

                                      SHA256

                                      d69ba6ac9865ca41722873bf385e659cabba6abc84d267046f432922ef5eeb2a

                                      SHA512

                                      3c17578f4bf09e7432d210f6b4c94e24e47a8f498575727295cb978a2b593f2f89502dc715cd7b502a6c60a03ce975c4161165f0029d8d3690b032ba5a8822cd

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      4KB

                                      MD5

                                      561040ceb4d18074e91bf4b20f8bb987

                                      SHA1

                                      f714393fc1888af2ead0c203c2f8e04a1ed21049

                                      SHA256

                                      40c585d2ecdaa177c8ebddc9bc04998b021ba272b170c475c45df297c06c39ce

                                      SHA512

                                      4cf7eb307362e9b404393cb70749b748107ac93f5b1a1b7e861a26a371cf26cef9d0f4f8a02da656de622d6998a2c26366ab2848bac0f1952ae0551acf2dace1

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      4KB

                                      MD5

                                      b0ebf8340bab611f63126ca2521f40d6

                                      SHA1

                                      b7e33288838a3bb8add3dba860b02cf21bb0cc04

                                      SHA256

                                      1f10d948c159d26680e22cd90e1150ec0fa52172359ba70aa8d323d71e8cdc29

                                      SHA512

                                      718127f93b6a5a8f7052cf5c256200fc3ecc9555daeb8d87a763ad9e76f5ebf72d1a4092cc56d8f4439dc6c47264f6d03913b30e32dfde2ac88550ca40db0486

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      4KB

                                      MD5

                                      d5841a625c5308356896c48ab4730b5c

                                      SHA1

                                      c63f86d6acd049705f0b6d2309773f69fc5190eb

                                      SHA256

                                      5cf820a29392bec573253c579009ce1b224e40bff434cffd0c8a72700616712e

                                      SHA512

                                      88a6ad7e07780ea42a8c7b77f61a562e6bdb14811ec05a0c214a89380e08de95ee98fb646c07060075a7a100f37471a3d0753e85489b2ee812c1431133266e39

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      e9a598bee70f0ad4100557b9e26ce4ad

                                      SHA1

                                      aaad6187a16638504f3acef76691a63af2f53152

                                      SHA256

                                      f7d52fc499c4112287b495b1eb8c8d4831d5db4a22113c1c733b75fc91e00dc6

                                      SHA512

                                      68abb15bfa2bde362cfc84e85f5464ac6adf1beab79e408778c711aac5c2cafd664e88311a3391ae374fa0867f22ab4f46684e2524b21a302b8c375eb07bd786

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      054f6487d498b36428a963af734175a1

                                      SHA1

                                      e44df42758afc963929b9bba47e8a15c2b23e754

                                      SHA256

                                      c503d356dca0e7975c43b3d687069db5782f9a3ba238559b2995cf2858bf202e

                                      SHA512

                                      382cc88bbb5e4dcebcd8c3c052de7bf2e4a5daded583072f6f2ca60a18a6c7b6c92b1ebf9860f6d5700eb25eb9c31d1dd25c6432e765f8975045a68fc587a610

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      caa1e4ab6db11bdb6e1300798c755740

                                      SHA1

                                      846e6e82f7b7a9423ffc99a63d21d6e02ae5a80e

                                      SHA256

                                      87110394aa74696e23bd9a7394d0159037318133de84ba5734e8b2c65ba312f6

                                      SHA512

                                      82992827f082be584af4f5480462d670a35123d61e0c110fa4c48f69e91c55e004101807bd96446e3dac52607a14c15b6aa0d06de38a59e20e92e279fa50a932

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                      Filesize

                                      1KB

                                      MD5

                                      6923b7ef6cec693ddd118b7982da6b65

                                      SHA1

                                      972cf26573ba1a235f5683f8e709ccc1eef13d1d

                                      SHA256

                                      358b0aaabf9d76510893ea947a2da85eb347dd747c4b17b667933a0fdf22f6aa

                                      SHA512

                                      c614df2e25233fb4c2524a2c95c54943f1be4c0ac2b9bd17c7da42961d6d61da8fcbecc01244699c851267c45d16ae93f8066aca221f3ac6c659e6f073f9de3e

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                      Filesize

                                      1KB

                                      MD5

                                      4645176754bf773fcebb7c511e0fc3a3

                                      SHA1

                                      4b3f391bfb7fe6c39a3fed8b49c372a9c34aca31

                                      SHA256

                                      ac6a1c295dea068e5239c8c95a6d7c741cbfac235e53a44846cf95bec30d10e8

                                      SHA512

                                      6d90edaced6b69901064697d910deed0a86ca5328106734f43f985a743d35a7b6b1b2a1bbf40a8c01247e6696f6eaf526a41d57667468751b404250024364f34

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58dba5.TMP

                                      Filesize

                                      1KB

                                      MD5

                                      f9b0de57a9794759b7f2a0ce4bb27539

                                      SHA1

                                      3a6e95d5319eaf7ce51c05f8978f43be16032886

                                      SHA256

                                      96fbc84064321f6229944a0703a4efb426a228f672e6bad1b3c41b3053d011b4

                                      SHA512

                                      7e5ead6463ef49ce43fa04f2589197b49fd69116664a09118e669d15595930270d14b090e91f09f7847a92df50e9ba506bc578a59420064cae1bbcff29337f90

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      71d5a786a9c84e00b73e25277ad1ba38

                                      SHA1

                                      4c6fb9d51a795ea35c3b2f554cfa4d206f3c2bc0

                                      SHA256

                                      f7aa0baaa9936f4c7ec3c2926b26cfaf4db5492031c1c17505b12268eae82297

                                      SHA512

                                      4c2e8a297879feb17591a026e3930811efd21af68ee57a8e7aaf7d7f344719dd9581b8acefce5d596a2643e99074398900d5c40f5124ebbc2ad0466b04eb9d36

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      5306bac9f413f0c5b5c072bf5813df57

                                      SHA1

                                      33c02d42eaeecc2e4e49e4d9fe06371c62bb6547

                                      SHA256

                                      3393b49e691fd5d3d7821815b486387eca5f4bae33f34ce642c4d4c00c5f710b

                                      SHA512

                                      e89d99bb210aa7683853cea741ccc710ee2d72c32a937300e9d0fff5cbcf07143883ef2c9be3f492f70e3ce69706553601a2881afade446f4577a9c1189f4ddc

                                    • memory/3824-270-0x000001D2E80D0000-0x000001D2E80D1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3824-272-0x000001D2E8150000-0x000001D2E8151000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3824-274-0x000001D2E8150000-0x000001D2E8151000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3824-275-0x000001D2E81E0000-0x000001D2E81E1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3824-276-0x000001D2E81E0000-0x000001D2E81E1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3824-278-0x000001D2E81F0000-0x000001D2E81F1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3824-277-0x000001D2E81F0000-0x000001D2E81F1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3824-263-0x000001D2DF5A0000-0x000001D2DF5B0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3824-259-0x000001D2DF560000-0x000001D2DF570000-memory.dmp

                                      Filesize

                                      64KB