Resubmissions

16-12-2024 20:02

241216-yskezaznap 10

16-12-2024 20:00

241216-yrb27szmhl 9

16-12-2024 19:57

241216-yparcszmek 8

16-12-2024 19:52

241216-ylqneaypds 8

16-12-2024 19:49

241216-yjtbhsynhx 10

Analysis

  • max time kernel
    88s
  • max time network
    99s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    16-12-2024 20:00

Errors

Reason
Machine shutdown

General

  • Target

    sample

  • Size

    258KB

  • MD5

    37698ffffe211da5c8b3f97ec1f36bae

  • SHA1

    83f5b50f58b8c0a1451e8ba9f119b526abae76df

  • SHA256

    a9614c6564109168c11a853f00a2073803c8a26af2effa33b861d80f78121e54

  • SHA512

    368e0ee6d90d1f1746c23a520520a658964a7d289f846f2ed94772f28bb7331af763dc99fc7a8395c4a19314b35fbe9c5aa9e765cf7092e59cbd8f48f8ee3134

  • SSDEEP

    6144:giaRHpOL/saqkPV9FemLtcIDSsmwj9OvZJT3CqbMrhryf65NRPaCieMjAkvCJv1/:laRHpOL/saqkPV9FemLtcIDSsmwj9OvY

Malware Config

Signatures

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Enables test signing to bypass driver trust controls 1 TTPs 1 IoCs

    Allows any signed driver to load without validation against a trusted certificate authority.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\sample
    1⤵
      PID:3400
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
      1⤵
      • Enumerates system info in registry
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff986963cb8,0x7ff986963cc8,0x7ff986963cd8
        2⤵
          PID:5104
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:2
          2⤵
            PID:4400
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1460
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2556 /prefetch:8
            2⤵
              PID:3748
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
              2⤵
                PID:4824
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
                2⤵
                  PID:1248
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:1
                  2⤵
                    PID:4020
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4572 /prefetch:1
                    2⤵
                      PID:4864
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3480 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3068
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
                      2⤵
                        PID:2516
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:1
                        2⤵
                          PID:1944
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:1
                          2⤵
                            PID:1104
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1
                            2⤵
                              PID:2372
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:1
                              2⤵
                                PID:2676
                              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3304
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:1
                                2⤵
                                  PID:1140
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:1
                                  2⤵
                                    PID:3524
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:1
                                    2⤵
                                      PID:2752
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:1
                                      2⤵
                                        PID:2700
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6548 /prefetch:8
                                        2⤵
                                          PID:2208
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1884,13216040041790587733,3226293486714199447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2632 /prefetch:8
                                          2⤵
                                          • Subvert Trust Controls: Mark-of-the-Web Bypass
                                          • NTFS ADS
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:3496
                                        • C:\Users\Admin\Downloads\Spark.exe
                                          "C:\Users\Admin\Downloads\Spark.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          • NTFS ADS
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2940
                                          • C:\Windows\System32\bcdedit.exe
                                            "C:\Windows\System32\bcdedit.exe" -set nointegritychecks on
                                            3⤵
                                            • Modifies boot configuration data using bcdedit
                                            PID:2812
                                          • C:\Windows\System32\bcdedit.exe
                                            "C:\Windows\System32\bcdedit.exe" -set testsigning on
                                            3⤵
                                            • Modifies boot configuration data using bcdedit
                                            • Enables test signing to bypass driver trust controls
                                            PID:4892
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:1652
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:4664

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            e9a2c784e6d797d91d4b8612e14d51bd

                                            SHA1

                                            25e2b07c396ee82e4404af09424f747fc05f04c2

                                            SHA256

                                            18ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6

                                            SHA512

                                            fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            1fc959921446fa3ab5813f75ca4d0235

                                            SHA1

                                            0aeef3ba7ba2aa1f725fca09432d384b06995e2a

                                            SHA256

                                            1b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c

                                            SHA512

                                            899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            2KB

                                            MD5

                                            461318162a86906a8e5bbd5cd936928c

                                            SHA1

                                            fa20950b2f7ef6b415a689a146f0bdaa47a23851

                                            SHA256

                                            6877428fb0c3782b9be95ec1962a6140725d2e6c963537d4e0a6ed7be6e608a3

                                            SHA512

                                            0264c307de6eb2612cd79482025b73d3a4e81027bd29ab93c399a3859a6c76ea9ba803a40713c60181ef72365358144f11a4ea79fc65ebfc17c6804b07e3942d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                            Filesize

                                            940B

                                            MD5

                                            9730c49ce13a4b09dee4159570b693f4

                                            SHA1

                                            72a5ba707461a229804f192f3812c7470c514e49

                                            SHA256

                                            24ebd3e11e02bab22a3031a98ccb78377e1622cbf7860e13f6cdf0b01590dcec

                                            SHA512

                                            722c839336f7e2eeaa6646ee5217a4c91ba16db950658e71e34aa51616fe4640e15883b598af59e45c2ebbf4b4c38e4a3d9b41f4034128e45b6095c3b5a59281

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                            Filesize

                                            111B

                                            MD5

                                            285252a2f6327d41eab203dc2f402c67

                                            SHA1

                                            acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                            SHA256

                                            5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                            SHA512

                                            11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            f5d19c460879dff3583b2ef11362fc00

                                            SHA1

                                            5f07525e4fe35999be61ce4b21b4d1fc5226bc59

                                            SHA256

                                            5e8dc0941f879c30dbe51f89157277a5bf1337675c27776e72dc525669514509

                                            SHA512

                                            ef6fdb9ec0d92f9f3091bb33c0f0a98fe38d19d7b22954d8bab2222e0eac185858d5c884fdcdcdec57925b9e01aa608536e939b63cbe4e78e5657614193f5454

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            e3bfcc1637def3d6e2925f8dda39040e

                                            SHA1

                                            87a7e3b65c0456d3a92afc31e605628e53fce879

                                            SHA256

                                            7544bb9f3f0afe830ea6f216b453b990cd03baa3114f4b48ad0e5de9c92c3a20

                                            SHA512

                                            83961cddb8660feaa72afc910944dec0253700c43cd1c5c5d186791616a7a9371eb8e3210c036525c1cc6eb0ab16cedd871a46db57bbd1082bfa94147e9b008d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            483da3bff4f875783b1c4165ea5dd05e

                                            SHA1

                                            e239b6361a4b24e25dc50b550eab9ab2f4ccd379

                                            SHA256

                                            8e9ad938a438e7b8a9e9b25d89993b68a0d27b5ce148eab3272b396c3a72ca7f

                                            SHA512

                                            24bdf86bba5668122973df2f6b0647b02e745b8e4e3ef2cae2c2d542bbb215171c5300bd545e6ebd16fca2c568cdd63f694e49531e252deb0a0c942226dfc4fd

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            ac65b397e46da84cf94ac43bf0870773

                                            SHA1

                                            91b370102841178e38df502deb96fb497ada317e

                                            SHA256

                                            842a47cfe051597e19537fe249a83f2d7bd43e2ac0c8178a78f4cb08245f59a7

                                            SHA512

                                            4aca6f7ab0fcd3e38a8e20f4794f923dfb362da49fde336d1bc54de412eac4dc182cba553c38d964e2437e7eeec12c211a3b081003d99562a560cda4ea877624

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            7eb6ac4df84357aee436042131c4697f

                                            SHA1

                                            50e44446df0b0e5d18f52fb2bb1f791e0f1743f6

                                            SHA256

                                            a15267e4f508b9d62fb3a1a82b021fdfbd5c793c98684304234820da330848ec

                                            SHA512

                                            f62f74dba898ed4d855d25d1d5d089e3829e649b341890c8e63d74fcf8c6ed2437f1b5d6c675f626f9fe839d66594977c0a8770bd0b69142b2bd767dbb479f80

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            c91c1749d9a8202ca74c3df59f15a0e5

                                            SHA1

                                            abc0cfcd63fb0d8bf4124aee5b296f64e076a767

                                            SHA256

                                            4697eb6ecfe5a203ee04d8313561ade9332bafbf1f54bd1e02907753a7dc5e0a

                                            SHA512

                                            3e6c839c0551850755216643e621e398b4c2ea374e86c2cc70929b7ae25c6875867b39f0eb30bf8898bd14483195db968f16009d7e166389eef484ce213b261b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58338e.TMP

                                            Filesize

                                            538B

                                            MD5

                                            abd0586dced699d27abc920bd382d3f4

                                            SHA1

                                            81745d28358322f1a09d47674dd87f7453b50f14

                                            SHA256

                                            6307e9425c72df0ef7389fd45a5fb479982deb2e02005db3571a0f147aabcdc0

                                            SHA512

                                            15767a659abd456769391014c577cf0581668cf6ec1ba7beaa1e07004c707ecd4467fc32484d9a491a8e367f8cb8210c67ec65dc743922253e68ee28faa52307

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            6752a1d65b201c13b62ea44016eb221f

                                            SHA1

                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                            SHA256

                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                            SHA512

                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            11KB

                                            MD5

                                            d9210114d45a475c3497dd68ebdbe661

                                            SHA1

                                            d9b32eb17e6edf88c7760a5b84b69fdd990b3cf8

                                            SHA256

                                            95e1aa29c7776c9ccd45a72751338a69e2aba4ec73684d3b779b897148a59a0e

                                            SHA512

                                            50a9a4a494a2f60849c97055bd8ee6fbe25be0510a954b2cde2bcc4e501a540c45e61f5afd67d5cdafbbec9659d87840e8549ad2174ccbbe7480a7f99cbdeac9

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            7e313b2a1910af735401838879f645ed

                                            SHA1

                                            625606d49366aac3f810bdea31f2a7953035286b

                                            SHA256

                                            af3b5858f13e49ef04a4cde94d1da49dadc109277330ce634a2ec62d1c3c9ea9

                                            SHA512

                                            8c5b2ae4c3c0b5399db3b493bda6116d6589c0f4a86ac476121e78af5a00144168aef0f013ca7af9946c5d2aae491e4a2785f96b744a00cc321a425eb10247e1

                                          • C:\Users\Admin\Downloads\Spark.exe:Zone.Identifier

                                            Filesize

                                            26B

                                            MD5

                                            fbccf14d504b7b2dbcb5a5bda75bd93b

                                            SHA1

                                            d59fc84cdd5217c6cf74785703655f78da6b582b

                                            SHA256

                                            eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                            SHA512

                                            aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                          • C:\Users\Admin\Downloads\Unconfirmed 576915.crdownload

                                            Filesize

                                            495KB

                                            MD5

                                            181ee63003e5c3ec8c378030286ed7a2

                                            SHA1

                                            6707f3a0906ab6d201edc5b6389f9e66e345f174

                                            SHA256

                                            55bfcb784904477ef62ef7e4994dee42f03d69bfec3591989513cccbba3fc8fe

                                            SHA512

                                            e9820f60b496d6631e054204c6fc5b525527d40a578faac1d5cdb116abcb4a35aacf4f4354ff092a2b455c5d9c2e0f29a761d737d9c9ad3d59d70b51d0583d92

                                          • C:\Windows\File Cache\DLL.dll

                                            Filesize

                                            116KB

                                            MD5

                                            a61c26b360471c8258c7571037c4bca0

                                            SHA1

                                            5db105e0384f25b1ab165c10a9445e6b943cd0ff

                                            SHA256

                                            e77316a1fd682e1af8af3ccd03c170f886b9ec8edf7013e1be6a6207cb5a6f16

                                            SHA512

                                            3ef680d50ccfa4311d3d1bec1648c48cf8e8633353dea5e06f52339047ede36fd1655ce728541e769d9fcaa6ab8c2a66981aef708a9f4d05ae46ad26f9d6aef4

                                          • memory/2940-390-0x0000000000680000-0x0000000000700000-memory.dmp

                                            Filesize

                                            512KB

                                          • memory/2940-391-0x00000000055A0000-0x0000000005B46000-memory.dmp

                                            Filesize

                                            5.6MB

                                          • memory/2940-392-0x0000000005190000-0x0000000005222000-memory.dmp

                                            Filesize

                                            584KB

                                          • memory/2940-417-0x0000000005550000-0x00000000055A4000-memory.dmp

                                            Filesize

                                            336KB