Analysis

  • max time kernel
    98s
  • max time network
    99s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    15-12-2024 12:32

General

  • Target

    https://www.goflle.io/d/8MLl89

Malware Config

Signatures

  • Detect Xworm Payload 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Looks for VMWare Tools registry key 2 TTPs 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 2 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 30 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.goflle.io/d/8MLl89
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffc167a46f8,0x7ffc167a4708,0x7ffc167a4718
      2⤵
        PID:1716
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
        2⤵
          PID:3684
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1128
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:8
          2⤵
            PID:2484
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:1
            2⤵
              PID:3272
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:1
              2⤵
                PID:464
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:1
                2⤵
                  PID:4664
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:8
                  2⤵
                    PID:4576
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                    2⤵
                    • Drops file in Program Files directory
                    PID:1204
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x7ff600595460,0x7ff600595470,0x7ff600595480
                      3⤵
                        PID:4424
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4216
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:1
                      2⤵
                        PID:4020
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:1
                        2⤵
                          PID:2972
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:1
                          2⤵
                            PID:4692
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:1
                            2⤵
                              PID:4436
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:1
                              2⤵
                                PID:3828
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:1
                                2⤵
                                  PID:2928
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:1
                                  2⤵
                                    PID:5068
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6184 /prefetch:8
                                    2⤵
                                      PID:3272
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6336 /prefetch:1
                                      2⤵
                                        PID:3836
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6680 /prefetch:8
                                        2⤵
                                          PID:1108
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,1314822187945336721,4224289585002222600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6904 /prefetch:8
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:4692
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:1120
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:2980
                                          • C:\Windows\System32\rundll32.exe
                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                            1⤵
                                              PID:116
                                            • C:\Users\Admin\Downloads\perm.exe
                                              "C:\Users\Admin\Downloads\perm.exe"
                                              1⤵
                                              • Looks for VirtualBox Guest Additions in registry
                                              • Looks for VMWare Tools registry key
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Maps connected drives based on registry
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4716
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:780
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /f /im HTTPDebuggerUI.exe
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  PID:4812
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:5032
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /f /im HTTPDebuggerSvc.exe
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  PID:820
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&1
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:3776
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /f /im Ida64.exe
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  PID:2596
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&1
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1512
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /f /im OllyDbg.exe
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  PID:4100
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&1
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2124
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /f /im Dbg64.exe
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  PID:4664
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&1
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:3852
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /f /im Dbg32.exe
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  PID:1068
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&1
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2456
                                                • C:\Windows\SysWOW64\sc.exe
                                                  sc stop HTTPDebuggerPro
                                                  3⤵
                                                  • Launches sc.exe
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1388
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1968
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  PID:4668
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:240
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  PID:2452
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:3456
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  PID:2720
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:3140
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /f /im HTTPDebuggerUI.exe
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  PID:3524
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:3828
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /f /im HTTPDebuggerSvc.exe
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  PID:2448
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&1
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:3192
                                                • C:\Windows\SysWOW64\sc.exe
                                                  sc stop HTTPDebuggerPro
                                                  3⤵
                                                  • Launches sc.exe
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2072
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4712
                                                • C:\Windows\System32\Conhost.exe
                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  3⤵
                                                    PID:4812
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    PID:3080
                                              • C:\Users\Admin\Desktop\perm.exe
                                                "C:\Users\Admin\Desktop\perm.exe"
                                                1⤵
                                                • Looks for VirtualBox Guest Additions in registry
                                                • Looks for VMWare Tools registry key
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Maps connected drives based on registry
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4924
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1440
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /f /im HTTPDebuggerUI.exe
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    PID:4048
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3780
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /f /im HTTPDebuggerSvc.exe
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    PID:240
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&1
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2744
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /f /im Ida64.exe
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    PID:4728
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&1
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4744
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /f /im OllyDbg.exe
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    PID:3140
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&1
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3388
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /f /im Dbg64.exe
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    PID:1104
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&1
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2648
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /f /im Dbg32.exe
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    PID:4124
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&1
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2172
                                                  • C:\Windows\SysWOW64\sc.exe
                                                    sc stop HTTPDebuggerPro
                                                    3⤵
                                                    • Launches sc.exe
                                                    PID:5060
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4608
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    PID:1872
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2924
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:1712
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                                                  2⤵
                                                    PID:3784
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Kills process with taskkill
                                                      PID:4172
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
                                                    2⤵
                                                      PID:2416
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /f /im HTTPDebuggerUI.exe
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        PID:4084
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                                                      2⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3408
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /f /im HTTPDebuggerSvc.exe
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        PID:3204
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&1
                                                      2⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5020
                                                      • C:\Windows\SysWOW64\sc.exe
                                                        sc stop HTTPDebuggerPro
                                                        3⤵
                                                        • Launches sc.exe
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3016
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                                      2⤵
                                                        PID:3772
                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                          taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Kills process with taskkill
                                                          PID:3996
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                        2⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3820
                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                          taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Kills process with taskkill
                                                          PID:4764
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                                                        2⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4360
                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                          taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Kills process with taskkill
                                                          PID:2220
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&1
                                                        2⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3372
                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                          taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Kills process with taskkill
                                                          PID:4164
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&1
                                                        2⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1896
                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                          taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T
                                                          3⤵
                                                          • Kills process with taskkill
                                                          PID:3424
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&1
                                                        2⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3216
                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                          taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Kills process with taskkill
                                                          PID:2468
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                                        2⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2452
                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                          taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Kills process with taskkill
                                                          PID:1608

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      913cd25b0de81960e841c81a7bee8b19

                                                      SHA1

                                                      2c4bf2a4de37c06bea3e39898c9a98ee611b5455

                                                      SHA256

                                                      b01953744098bc035aee2a21976607df9352ca42abc3e01d769e2ceee1c9bd5f

                                                      SHA512

                                                      e5a879cdd1f83d6b6ee13117924522c967e2413c29722b5507b632514e28a0defbbcc942e7176f819e05df7bef37ca5133ba5efeb67a91c34b3736eec05ac8af

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      de0e1d3019517b3b005d7731bbb8a355

                                                      SHA1

                                                      ddf1f15c241f72585595cd30de12c4c3ce4e2f97

                                                      SHA256

                                                      4ceef5b8daa774c456edd70e46668746b8fa086bb9515ed5975e6737e40dc3f0

                                                      SHA512

                                                      84f7a069fd6f0713fdb9d35f17839b8755671047be477e49102f5777e8ebeeaa6421d3816727dd37f1241f4653c063fb0823ae7bab1d3001635c5075c2ba464d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      48B

                                                      MD5

                                                      8145dcb090c53967e3c9f8c7264ca2ca

                                                      SHA1

                                                      6ac46777a4a96e4df1a393ffae0c8da5ef86c58e

                                                      SHA256

                                                      c85df28ef602ee88ce8bce5cb6f749a8e6d1e5b027951a5b527275f2fd48a7f3

                                                      SHA512

                                                      68ea979b59ba0a7c88a566506d6f5f9ce3e4846742c1a83e7d259e0fe8be5b195ace883e3a12d1eac87c3280a8979a4c97a0d2ef7eec4ba801ff3965841f2f7b

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      240B

                                                      MD5

                                                      93ca842bc4c024e54d0dd7a08a0bad38

                                                      SHA1

                                                      66e3bdb45fcc5c185dfeecbdddb9a7f509207b4f

                                                      SHA256

                                                      912f54f2a82b9ce208a2f90ec9c242942ec9b2a7f48b27c33cd809211e0207db

                                                      SHA512

                                                      c1c473e1cef910e1a8d49e33059378f07e392eb85e19d3f7b067dc652fa4f80380ff7d02c5327e86ab5944e5b924f673747380bc99cc107e8bae8870d9e63a2d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                      Filesize

                                                      70KB

                                                      MD5

                                                      e5e3377341056643b0494b6842c0b544

                                                      SHA1

                                                      d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                                      SHA256

                                                      e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                                      SHA512

                                                      83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\CURRENT

                                                      Filesize

                                                      16B

                                                      MD5

                                                      46295cac801e5d4857d09837238a6394

                                                      SHA1

                                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                      SHA256

                                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                      SHA512

                                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1

                                                      Filesize

                                                      264KB

                                                      MD5

                                                      f50f89a0a91564d0b8a211f8921aa7de

                                                      SHA1

                                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                      SHA256

                                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                      SHA512

                                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_3

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      41876349cb12d6db992f1309f22df3f0

                                                      SHA1

                                                      5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                      SHA256

                                                      e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                      SHA512

                                                      e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      6d50c01ebd14f34b06a35e7dc7a45f2c

                                                      SHA1

                                                      7877df56127d3268ed7c0c9789e524ff5617a694

                                                      SHA256

                                                      f92af441e18bb20cef0a581d5c5f20191602d13c5bcff4dd6ae31803a9190f8f

                                                      SHA512

                                                      1c8bd913c4723d48a36b54f84a88c9a048178e4bcfaca64e825f01ebbd66f81e88e007f66d8d52b6b52802132e2bef78bf191731b8356b0c78366a04cb862b72

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe57ca55.TMP

                                                      Filesize

                                                      59B

                                                      MD5

                                                      2800881c775077e1c4b6e06bf4676de4

                                                      SHA1

                                                      2873631068c8b3b9495638c865915be822442c8b

                                                      SHA256

                                                      226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                                      SHA512

                                                      e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      5ea94f123918c4346b1e7dddd488e18e

                                                      SHA1

                                                      ca041752f2841b8e777d13c4ba6aae01dc752011

                                                      SHA256

                                                      aeadc1aa7e2de06463a76e1bce785bd6eb316e58148f055aa221e7448d4a7a7f

                                                      SHA512

                                                      3c6e40b90316c35fbd4ab1f06e9bedb67ffd13106e2569501a447153b4461db916fd34ab9aa045d542b8c277701e0556e55919e702887e7393271c671d099e2c

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      46bba1a0a2614bffcfa0bf5c44be5fe9

                                                      SHA1

                                                      a0ebd4ae8086f5085fd6d2fe9b0a1e86f26623a6

                                                      SHA256

                                                      888af3867916dbc1ba5e5bd2543f83824aaaba8a28b2ed7a2b1c6b880dc38421

                                                      SHA512

                                                      435a661fa569ca47c0ca847113ca3208236d7afd2b8aa73bcfeaa874755dd9a23a214329347b8b2dbb61e1f382224ccef8679905047e2dca60aad3f5e7e489a7

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      fb99bf7becbbc4224186e4366aaad427

                                                      SHA1

                                                      5940554dfcc3e9d82faa4846db2dcdb5b46bb5da

                                                      SHA256

                                                      470b8138aecde81a19d4c0e25ce03f84b1ca2da328ff7d35507682425a0e0dcf

                                                      SHA512

                                                      c16341a60c342453612082327dc222e642a02bef2eca5e1734288bd3068feedbd63c1c42b381c58d57f8cc040eae6ddea72118e18486f98565f3e402fdcb4d18

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      6577fd6114bebd042cedddc9a5640e0f

                                                      SHA1

                                                      05240dd111378573df0a59280146dee2e32f426b

                                                      SHA256

                                                      ab3d57804b07cfe2a6e0dc9b30cf76ae979082b7872b9f9ef9e36b646f4b6de8

                                                      SHA512

                                                      e8b3c01f8f06468166d1d664a2d626e6de8f76a7fe5097017b57b4b640317f825d19973abaefbede8645e33a977d55b41dc7a25831c8f75f3953b0d14d860136

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                      Filesize

                                                      24KB

                                                      MD5

                                                      832b664db8c95c83ff39b95fac93bb5b

                                                      SHA1

                                                      9d244b3081440efd5dcb15c341b2e790e5af359c

                                                      SHA256

                                                      d1d1d00928970105a43609aa8e2516b41e9473ac285cb591fecaf74b69213487

                                                      SHA512

                                                      0d46d177ca250277b341f04e3e4565b048069a14993bd1d89d38d03ac8cc4b499dcb2c181bd86f12f903054923a3bb47787d229ee975d900dfd6297db22c246b

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                      Filesize

                                                      24KB

                                                      MD5

                                                      cc420cc45f686797b102b94f6bfda2ee

                                                      SHA1

                                                      2b0b5d4848cc346c341cbd51d5fc6ce8a08910e7

                                                      SHA256

                                                      23f845e57c6718a65f93b97ac9c425d7abaad84f75e77e662c4df298305b9a19

                                                      SHA512

                                                      2410ec9ef56e8ad547219c4ffde2d02ab4fe8ea668c51f6519e224805770375427a4db95eab5e5f062ebdf36323c5bf03d1633508776fa553da2e8c408846092

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\MANIFEST-000001

                                                      Filesize

                                                      41B

                                                      MD5

                                                      5af87dfd673ba2115e2fcf5cfdb727ab

                                                      SHA1

                                                      d5b5bbf396dc291274584ef71f444f420b6056f1

                                                      SHA256

                                                      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                      SHA512

                                                      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                      Filesize

                                                      16B

                                                      MD5

                                                      206702161f94c5cd39fadd03f4014d98

                                                      SHA1

                                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                      SHA256

                                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                      SHA512

                                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_2

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      0962291d6d367570bee5454721c17e11

                                                      SHA1

                                                      59d10a893ef321a706a9255176761366115bedcb

                                                      SHA256

                                                      ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                      SHA512

                                                      f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      477065959c1ca9996ea2c448399448e1

                                                      SHA1

                                                      ff1b322dd14d980ec5b8a3e9b36e0520492b8ba8

                                                      SHA256

                                                      f3786401220aeb927a0bb49da6239812267d4fce9730af52284cea1f61d731d3

                                                      SHA512

                                                      34ca456260593dd52cd994033f93c86219f0fac38e4c9db9e7bdfd99ffdc11d06b9ee344dfbfa40e4a3daa9f2535c3cdd137b18ff5ceb5f1bbba37fd279f910c

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      365e40cc8723c76177703b3f0ee9a73e

                                                      SHA1

                                                      34b48563c4369a824c7c0e0c894238abba3386ac

                                                      SHA256

                                                      ec0faee5aabd5eb34319a78071b60fc7b5250610f9f7841c807ab73fecd250cf

                                                      SHA512

                                                      ff21d9363602bceb2070a9144e8e6b32d75feca87630a9316d3e2b6ff661a9add11f493de2b268d56f696d6bd5f2d55dc836e082c54a01d65476e614b5c5dc60

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      5ed358f0799b814e6182ab684c556422

                                                      SHA1

                                                      a61c770eeaab2c19b18c7e2bc9ac4822f6ee66ed

                                                      SHA256

                                                      0f71c8d030f12d59e1a4e0ccbc68d81afa57ca1af93fde4f3b76d764c5d0c074

                                                      SHA512

                                                      323e9fdb7cb35d43c92d82a32d999d3f3d0796ee77d0b4a1b8cb15381d05ebafef33454e4102beeb1054886ea6bba632e73cca379debc64197aa5d6ec6838b16

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      efe8a888aa856d71aa8ac801602299a1

                                                      SHA1

                                                      e39d0a277a69d3ef8edf61e87efcb32bc4008756

                                                      SHA256

                                                      1876b828cba5001fb9e95cf78e1d34a8b151e707a1c5994e8208514eaf715f25

                                                      SHA512

                                                      e9a84aa0c5d07387da723642f42c3e655da898bc5a4fd765c94e35958c53dd59e7cd77f54a34d5cd6c2bcd1628d476fe72e150dd9e9b9b3302e7bf3b30b17ffc

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      8403977211f6e80bd8924cb4268fcc02

                                                      SHA1

                                                      8f9ad2eb07707838cb22916fe729a1e5d72db9a0

                                                      SHA256

                                                      0e158da0a55d9b2d756ad23557a16c1e426b41023f5d1ede602ba5766226a73c

                                                      SHA512

                                                      7ad6c34066baebf45d963683e7351caa0adc18ada0f930146945da538c26b68dc077e1847957b62692d336c7c4e74d976e7fad089ec803ac9567cffab0756c47

                                                    • C:\Users\Admin\Downloads\Unconfirmed 789176.crdownload

                                                      Filesize

                                                      4.6MB

                                                      MD5

                                                      cd15473be3b87cf2f089fe3a652d0d08

                                                      SHA1

                                                      5fecdc548d7c9e134940509d4b002dd36deda1ef

                                                      SHA256

                                                      27088c28c0f31bf50d35890675acb14a9da0b2bf574a03c79040e640bd1fbe96

                                                      SHA512

                                                      cdd2f2dbc59942999082bd62bd869b66bf80b525d7b7244cb6527540bb288a50844f6d078f21c319d6888d02efca5a73ed054c16a544958ef40e215a54336477

                                                    • memory/4716-416-0x0000000000EA0000-0x000000000133E000-memory.dmp

                                                      Filesize

                                                      4.6MB

                                                    • memory/4716-417-0x0000000005C30000-0x0000000005CC4000-memory.dmp

                                                      Filesize

                                                      592KB

                                                    • memory/4716-418-0x0000000006680000-0x0000000006C26000-memory.dmp

                                                      Filesize

                                                      5.6MB

                                                    • memory/4716-419-0x0000000006150000-0x00000000061B6000-memory.dmp

                                                      Filesize

                                                      408KB