Resubmissions

23-11-2024 00:44

241123-a3xw2stkhy 7

23-11-2024 00:40

241123-a1nwcstkd1 10

23-11-2024 00:39

241123-azsg6ayrhq 3

Analysis

  • max time kernel
    95s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 00:40

Errors

Reason
Machine shutdown

General

  • Target

    download.jpg

  • Size

    8KB

  • MD5

    fd59c3cd5e5088281635eced5c20ccaa

  • SHA1

    9ef4149257a4d39e6624cddc320f59f5eee3798d

  • SHA256

    178ad69c097b6020ffde876881fe38499ca82be6781e7d47988d3422872a1440

  • SHA512

    7ed57054b81b5749fded7622510978c82d2bc50602ca845f20234292130a48bed31afcc4da1da6265d7435d1f46826330a22f33b71e242ab59d77046e6761628

  • SSDEEP

    192:N+wAO7JR1SJBL+n+tiNWVxpzS7CYwPW7NDaMMQOOtk3/aHOSqQcC692pXu:N+wR7JR4JBL++xdQCd+JMSohrCHp+

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\download.jpg
    1⤵
      PID:3508
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
      1⤵
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4852
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffae7746f8,0x7fffae774708,0x7fffae774718
        2⤵
          PID:3296
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
          2⤵
            PID:4036
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:232
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:8
            2⤵
              PID:4312
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:1
              2⤵
                PID:1520
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:1
                2⤵
                  PID:4384
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:1
                  2⤵
                    PID:2564
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:1
                    2⤵
                      PID:1624
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3544 /prefetch:8
                      2⤵
                        PID:468
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3544 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3864
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:1
                        2⤵
                          PID:3160
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:1
                          2⤵
                            PID:2472
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:1
                            2⤵
                              PID:2168
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:1
                              2⤵
                                PID:4072
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:1
                                2⤵
                                  PID:2940
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5844 /prefetch:8
                                  2⤵
                                    PID:2852
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:1
                                    2⤵
                                      PID:4496
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:640
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:1
                                      2⤵
                                        PID:5088
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:1
                                        2⤵
                                          PID:4360
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2136,7562641287433635111,883302774459601100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:8
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1604
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:1744
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:2852
                                          • C:\Windows\System32\rundll32.exe
                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                            1⤵
                                              PID:2124
                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe
                                              "C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe"
                                              1⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:968
                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe" -burn.unelevated BurnPipe.{9E6EED85-02F3-4BA2-9F4F-6A3DF20E41E6} {93353C60-4639-4FC1-A2FB-1B656975FF46} 968
                                                2⤵
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                PID:3772
                                            • C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe
                                              "C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"
                                              1⤵
                                              • Modifies WinLogon for persistence
                                              • UAC bypass
                                              • Disables RegEdit via registry modification
                                              • Drops desktop.ini file(s)
                                              • Sets desktop wallpaper using registry
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:464
                                            • C:\Windows\system32\LogonUI.exe
                                              "LogonUI.exe" /flags:0x4 /state0:0xa38da855 /state1:0x41c64e6d
                                              1⤵
                                              • Modifies data under HKEY_USERS
                                              • Suspicious use of SetWindowsHookEx
                                              PID:776
                                            • C:\Windows\System32\rundll32.exe
                                              C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                                              1⤵
                                                PID:388

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                e55832d7cd7e868a2c087c4c73678018

                                                SHA1

                                                ed7a2f6d6437e907218ffba9128802eaf414a0eb

                                                SHA256

                                                a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574

                                                SHA512

                                                897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                c2d9eeb3fdd75834f0ac3f9767de8d6f

                                                SHA1

                                                4d16a7e82190f8490a00008bd53d85fb92e379b0

                                                SHA256

                                                1e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66

                                                SHA512

                                                d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                2KB

                                                MD5

                                                a33491f86b3ad83d267ca06f1fc99b9b

                                                SHA1

                                                f7f6fe191c76272d3be74f18acf1abc41968e4a4

                                                SHA256

                                                e29307a7cef1267a627f0f7afc09c5c3d2556b1d751595bd899a5bab55f1b517

                                                SHA512

                                                4eb9fd5e351ebcd46cdc8b2370bb23b54bf47e817d5709f88523eb356026776b5cfd48a7f90a35e3fde05ed9ecfbb43d06584531a899f496a0e139e37fbb188a

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                Filesize

                                                788B

                                                MD5

                                                4bcabb90b8a304cde1dd7fea0348ed1a

                                                SHA1

                                                2e14be04146d6dd70d42c052f9cb610f260847c1

                                                SHA256

                                                dc585692b97b9660820039ca821657eb2fcde4254b76caf8fb790f9b7ee75603

                                                SHA512

                                                20c27856f3e9766285dd2ec1f7e1b1918802c5d53600de4a64761a5692716172c897e25b276b3f60a4830923ae7eda75025613439df312e974e0c4b6047b86d5

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                a332e0144184968fa089116a931cca7f

                                                SHA1

                                                93a94fe8c7f9a0f1d5f1cca76cf9922c0fb268f7

                                                SHA256

                                                4875394b7bf33c666e1ad8b1a5ad334fa3b76e9c0a31d8211c959e2698cf89ff

                                                SHA512

                                                6de8179a37272f32974a0f539ef0d655426470995b4853d7ca9b9f2523d35d91a007ae67968fb25425662be325ba69fe0d6283d2b9d954b03158239829481190

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                5KB

                                                MD5

                                                cdda11f8e6b46ee26cdf9c7139910003

                                                SHA1

                                                7d79c359d3a65aec00561a5bbf02fbfe2805ba52

                                                SHA256

                                                16b24d7673271decb1d35c9bfe8b46fe5dcf12da658b8c2607ffc39ddce65000

                                                SHA512

                                                1ce4608832bbd458f4ff7946354d3174c180b55d40316f40e6f708d1a550ff92a1fabf233e47ef2d659f1e6caae2a2833d5a8569f9e38c0ebe18adae663e69ef

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                8674dfdf54ac60d1e53e784534439434

                                                SHA1

                                                dc39fa69df6a61f195d6784203346373f8ba32a1

                                                SHA256

                                                91654fa120ec0dc6148c305578f19135049ab9cc26c04fa44d47ccbecd5ff39f

                                                SHA512

                                                553da973935ca670e9c7f62935f16ccc5e6c06ddb74f36655c0e44839f0a7bfb8683d217980afeee34721c766dc684848e2dbc6b0b1565435667f1ed9cde4c83

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                Filesize

                                                1KB

                                                MD5

                                                3efdd99cf6e7b303f2582c703385303d

                                                SHA1

                                                c93caea7dadea5b769212b51f411545336ed6643

                                                SHA256

                                                f2ac86e1f67c5bcc7d70b57103276c386c60d57bfd552872c60492ca520dd41f

                                                SHA512

                                                0ff0111c49a681eac0c732b3636cd45bc9c3e5a990315eae73fc521a84ebb819000fe550087afdbc98756af00672dedcfbb578b4d4c7a7b66a14becfced15c85

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58465b.TMP

                                                Filesize

                                                1KB

                                                MD5

                                                af69359e33d14577a9378eafb9b06fd8

                                                SHA1

                                                eb8261a32cc3e6f36c8d512378ba5d8b60f9d8a3

                                                SHA256

                                                6d9965292093a66cb6a47234b70d72fe3c393004a7299866cc7d0227b6628e10

                                                SHA512

                                                5e098bc5d1a45b15293eb3a1e35b5b279aa049c48f691a9d6c3efde6599ae049bcc08d23bd6dd179b4ece2ce6cada84d2cd03c4410adb6ff93432eea033b873c

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                6752a1d65b201c13b62ea44016eb221f

                                                SHA1

                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                SHA256

                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                SHA512

                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                10KB

                                                MD5

                                                e4834ce4042ceae470d860a904fdb633

                                                SHA1

                                                38e4cdeb81a07eb35c20d67617883f9769c7f708

                                                SHA256

                                                4412849eeccd2ddf4b9afbde8a570fa0a8d1f54b2952843966ecd3986881e476

                                                SHA512

                                                62295cd73cbc4df6ac6164e41f873e232a631576c0ad2c7aafca2c65b8109ce7091c69d74ba061a1fe63dbf12e43a9cd4539bc6e71cbdb223cf3ad2668738018

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                10KB

                                                MD5

                                                1c02010f45f54047cbe2d7d24088b9c4

                                                SHA1

                                                3ca3aad03f8d1a1b903cf8a177b8d7327c4bf79b

                                                SHA256

                                                f960eadc4767959ea68b1b60b062c114f5ce5ccbbf39d5da78b56e5d4dbd84f4

                                                SHA512

                                                6cf6b8c683e2643d2390156fda686b4d1d76cc76e3217328f7abf60df25ef2b968383e8bc3719f5eee39e471dca6a903c04dc8071973145685ad090b6926596d

                                              • C:\Users\Admin\AppData\Local\Temp\{74d0e5db-b326-4dae-a6b2-445b9de1836e}\.ba1\logo.png

                                                Filesize

                                                1KB

                                                MD5

                                                d6bd210f227442b3362493d046cea233

                                                SHA1

                                                ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

                                                SHA256

                                                335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

                                                SHA512

                                                464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

                                              • C:\Users\Admin\AppData\Local\Temp\{74d0e5db-b326-4dae-a6b2-445b9de1836e}\.ba1\wixstdba.dll

                                                Filesize

                                                118KB

                                                MD5

                                                4d20a950a3571d11236482754b4a8e76

                                                SHA1

                                                e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c

                                                SHA256

                                                a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b

                                                SHA512

                                                8b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2

                                              • C:\Users\Admin\Downloads\NoEscape.exe.zip

                                                Filesize

                                                13.5MB

                                                MD5

                                                660708319a500f1865fa9d2fadfa712d

                                                SHA1

                                                b2ae3aef17095ab26410e0f1792a379a4a2966f8

                                                SHA256

                                                542c2e1064be8cd8393602f63b793e9d34eb81b1090a3c80623777f17fa25c6c

                                                SHA512

                                                18f10a71dc0af70494554b400bdf09d43e1cb7e93f9c1e7470ee4c76cd46cb4fbf990354bbbd3b89c9b9bda38ad44868e1087fd75a7692ad889b14e7e1a20517

                                              • C:\Users\Public\Desktop\⪈෈⣔ૻ☽⨢ឣᬜ✢⚀☀ڮਘ⼀ᇁ⌹

                                                Filesize

                                                666B

                                                MD5

                                                e49f0a8effa6380b4518a8064f6d240b

                                                SHA1

                                                ba62ffe370e186b7f980922067ac68613521bd51

                                                SHA256

                                                8dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13

                                                SHA512

                                                de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4

                                              • memory/464-410-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                Filesize

                                                1.8MB

                                              • memory/464-610-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                Filesize

                                                1.8MB