Analysis

  • max time kernel
    830s
  • max time network
    879s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2024 06:28

General

  • Target

    New Client.exe

  • Size

    141KB

  • MD5

    a5e6869cc1b826c71ef68e6ab6196606

  • SHA1

    0185672daadea373d19fa721ec644562eba3a82e

  • SHA256

    7471944a136673044e47c277341a4b31d46434a433e902cb2d2bd19b1a79b845

  • SHA512

    ba558d98bcaffc4d096d8238fdb5bd30deec836f5d650eec0bf205a3f3984ee770bff921f615aa937bc85bd0376f05076178b2cd774cf27dcedb6b133447564d

  • SSDEEP

    3072:dUJ8T2SXZyrgoBJtbN/3MCK2kevEwl/6GJHSj7ZnC3Bx0Tcnsn+Mm4:R/JdSI5ebW+z0os+X4

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

HacKed

C2

127.0.0.1:10095

Mutex

discord.exe

Attributes
  • reg_key

    discord.exe

  • splitter

    |Ghost|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • A potential corporate email address has been identified in the URL: [email protected]
  • A potential corporate email address has been identified in the URL: [email protected]
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 7 IoCs
  • Executes dropped EXE 7 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Drops file in System32 directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies registry class 10 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 58 IoCs
  • Suspicious use of SendNotifyMessage 57 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\New Client.exe
    "C:\Users\Admin\AppData\Local\Temp\New Client.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Users\Admin\AppData\Roaming\discord.exe
      "C:\Users\Admin\AppData\Roaming\discord.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4536
      • C:\Windows\SYSTEM32\taskkill.exe
        taskkill /f im discord.exe
        3⤵
        • Kills process with taskkill
        PID:4668
      • C:\Windows\SYSTEM32\schtasks.exe
        schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f
        3⤵
          PID:4924
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\discord.exe
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1536
        • C:\Windows\System32\eventvwr.exe
          "C:\Windows\System32\eventvwr.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3496
          • C:\Windows\system32\mmc.exe
            "C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc"
            4⤵
            • Drops file in System32 directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2856
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\New Client.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1040
        • C:\Windows\system32\choice.exe
          choice /C Y /N /D Y /T 5
          3⤵
            PID:2692
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Drops startup file
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4792
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3508
      • C:\Users\Admin\AppData\Roaming\discord.exe
        C:\Users\Admin\AppData\Roaming\discord.exe
        1⤵
        • Executes dropped EXE
        PID:4032
      • C:\Users\Admin\AppData\Roaming\discord.exe
        C:\Users\Admin\AppData\Roaming\discord.exe
        1⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1360
        • C:\Windows\system32\taskkill.exe
          taskkill /f im discord.exe
          2⤵
          • Kills process with taskkill
          PID:2536
        • C:\Windows\system32\schtasks.exe
          schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f
          2⤵
            PID:2408
          • C:\Windows\system32\schtasks.exe
            schtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\discord.exe
            2⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1212
          • C:\Windows\system32\cmd.exe
            "cmd.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:380
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://soundcloud.com/discover
              3⤵
              • Enumerates system info in registry
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2508
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdce9646f8,0x7ffdce964708,0x7ffdce964718
                4⤵
                  PID:5056
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:2
                  4⤵
                    PID:1228
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:3
                    4⤵
                      PID:1844
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:8
                      4⤵
                        PID:4400
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1
                        4⤵
                          PID:4484
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
                          4⤵
                            PID:3972
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3852 /prefetch:8
                            4⤵
                              PID:1400
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4876 /prefetch:8
                              4⤵
                              • Modifies registry class
                              PID:5004
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:8
                              4⤵
                                PID:4780
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:8
                                4⤵
                                  PID:5028
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:1
                                  4⤵
                                    PID:1748
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:1
                                    4⤵
                                      PID:4448
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:1
                                      4⤵
                                        PID:3336
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:1
                                        4⤵
                                          PID:1056
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:1
                                          4⤵
                                            PID:388
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,12434065254435359360,1374700032213299608,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4648 /prefetch:2
                                            4⤵
                                              PID:4948
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\df78c3f9e2764f65801e202beab76d66.bat" "
                                          2⤵
                                            PID:3684
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://soundcloud.com/discover
                                              3⤵
                                                PID:1940
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdce9646f8,0x7ffdce964708,0x7ffdce964718
                                                  4⤵
                                                    PID:1848
                                              • C:\Windows\system32\cmd.exe
                                                cmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Roaming\discord.exe"
                                                2⤵
                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                PID:3756
                                                • C:\Windows\system32\PING.EXE
                                                  ping 0 -n 2
                                                  3⤵
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Runs ping.exe
                                                  PID:380
                                            • C:\Users\Admin\AppData\Roaming\discord.exe
                                              C:\Users\Admin\AppData\Roaming\discord.exe
                                              1⤵
                                              • Executes dropped EXE
                                              PID:4144
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:2260
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:3648
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:872
                                                  • C:\Users\Admin\AppData\Roaming\discord.exe
                                                    C:\Users\Admin\AppData\Roaming\discord.exe
                                                    1⤵
                                                    • Executes dropped EXE
                                                    PID:3200
                                                  • C:\Windows\system32\OpenWith.exe
                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                    1⤵
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1996
                                                  • C:\Users\Admin\AppData\Roaming\discord.exe
                                                    C:\Users\Admin\AppData\Roaming\discord.exe
                                                    1⤵
                                                    • Executes dropped EXE
                                                    PID:4956
                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                    1⤵
                                                      PID:3560
                                                    • C:\Users\Admin\AppData\Roaming\discord.exe
                                                      C:\Users\Admin\AppData\Roaming\discord.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:3144
                                                    • C:\Windows\system32\OpenWith.exe
                                                      C:\Windows\system32\OpenWith.exe -Embedding
                                                      1⤵
                                                      • Modifies registry class
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1776

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\discord.exe.log

                                                      Filesize

                                                      319B

                                                      MD5

                                                      26ca4897aad21f536806c5e7925976e7

                                                      SHA1

                                                      f072e5b6bfd7ce28dbb16f162d9a4e05690fcbd8

                                                      SHA256

                                                      1c5b33fb22baaa5f9f1400e86f650aa4694387cdfa4835d3f60bebf203a491fd

                                                      SHA512

                                                      0f16a7f7fb34550bd91f042b2005cdc4233ca3e4be650abb832ff2f253358d7aa5fde1de4e1d9fc9e6cf971f1ed343ae6b575988083d9c4e3c6af96bdfb5d5a1

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      fab8d8d865e33fe195732aa7dcb91c30

                                                      SHA1

                                                      2637e832f38acc70af3e511f5eba80fbd7461f2c

                                                      SHA256

                                                      1b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea

                                                      SHA512

                                                      39a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      36988ca14952e1848e81a959880ea217

                                                      SHA1

                                                      a0482ef725657760502c2d1a5abe0bb37aebaadb

                                                      SHA256

                                                      d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6

                                                      SHA512

                                                      d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000001

                                                      Filesize

                                                      32KB

                                                      MD5

                                                      89752ce8682a74ed3932bb4b86f30d61

                                                      SHA1

                                                      b93e0960604962001f7ceaf9be3fd106e48b2f7c

                                                      SHA256

                                                      490275164d7fbc174d4ab60c3d10b163e0cdf4d680dbdd3e8ba1fc6bade88d5c

                                                      SHA512

                                                      1fbda7741a7b983690805f9199b642e02a2003417212d74f99a82818b5785588a16e3ef07f5df549d4dafab966e82e70c177338c0e10ea3d3e21feb659be87ec

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      ccf7b69815f330922d18cafd240b316d

                                                      SHA1

                                                      b1ef8ba34eaad4a5916bfb76b7c94ce15a4575e7

                                                      SHA256

                                                      7e1f4d14b97dfb8eb7b014cac910adfb6b16acc357009b1260c993d62dba4956

                                                      SHA512

                                                      662fe7b0dfe2c43363d3148f82f86f4ebb9db07cdd91787271c34e54e3a2add881620889ce2059448b2349246693673ba0bb506cc9f83eb6afbf576b02894122

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      816B

                                                      MD5

                                                      6e50c0b8e74c2c2d6911bf38048571da

                                                      SHA1

                                                      3124883ca7194c86d381f64ba325b464998e7c8f

                                                      SHA256

                                                      d07a829b1d503772f1a136e0533b69ee11212320b6a1ce19f98e8ea2eb951778

                                                      SHA512

                                                      7e7ba72def8eec8b45f9eae0b350ff24d8e90caff846e261744e760b4f5d22bdb970dc475f6ec5cf365b19f6b3cc0cb2a6aca39bd08da4321d97a7137870742b

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      7626a9ca382cc37cdb6aae2b10b88d28

                                                      SHA1

                                                      8bb909e25041db6c967205aa25e2d5499c0cbfa5

                                                      SHA256

                                                      433f4cd24153b825e72a1377be08d5169b074741c4691e83f1c4a8e712186fa8

                                                      SHA512

                                                      153dffbcb50a76001927bb3f58c1f3541d7974b07abcdd6ed5aa8a5e82d2a3ce510f78abfa05bc3fd2e16f2873f3cababc2875f3625c664b799b9b20b158891e

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      effbeb195f9f0c34ef51266511ba7a22

                                                      SHA1

                                                      9fac800c9d5f80c61c336cd474e336e637ae4515

                                                      SHA256

                                                      56f6c26d08d3f3c9721df5b921d984cc507ca53506a0e8cbb69e381d61b4fc2e

                                                      SHA512

                                                      c5513ebecf2005a7498bf5a7bc854fbb937ff4ce46f1942fb5f57237155b75733c1aa27a7ad521eb532c1372ad580fabd7d5ac9f92b5166ed3f218b4659d08b6

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      c8b3dfa82228fcfd13b1c93ee97e3c28

                                                      SHA1

                                                      5de59f5d955c1f9ed5c3dbb5b464d1c4e8d0bdde

                                                      SHA256

                                                      f630a0f04ade2f08da439031c32aaaafb5ba7ea29d84d32b1576e080daca87ca

                                                      SHA512

                                                      41d041b2da8ede58d0f584aab17a0ae4d4d600a9e2692ea8e86a64b32e631cec3fb44329ecdf46f76022845c2354b55d238374c8bc7237fbe6ecb58640bd4ff5

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      66a84f799aadbcce69b74675d7aa24d4

                                                      SHA1

                                                      9c7609c23bcf6f47ef46ac7d0c395abd953a7912

                                                      SHA256

                                                      af81c9962e7141d14ab14af0fdf59aa6e3452cf843fcaa0d3861c3ae25d3eef9

                                                      SHA512

                                                      1775f62d37f237ff428a8ef2c0598d528808f24c26d328a5a661c27ace933b706d2e5ce287c93f13f136a92472be325784d7b203c53560d74dd330529876645b

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      fcfc52887d9fe6982ce2e92d74887378

                                                      SHA1

                                                      fa86e8ab6ad4af69ed14150445a782b82cdcaf84

                                                      SHA256

                                                      e2f3f9928c2451707655754ff159cfcc90c3aee45e12171b2c932d92850a3400

                                                      SHA512

                                                      9f45dd103be93fd1461ba9797a78d97ff9ba86eaf3d2b2e92605ffbfca6fbb96e705e99d84166520a67c8027df3de3fe5aa70e948727495b060c88af70d98deb

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3ee6de3563d833b2fb341c8239a59d7a4a0767be\5cbfd411-d1f5-41fe-8072-2244b900ca53\index-dir\the-real-index

                                                      Filesize

                                                      96B

                                                      MD5

                                                      974ff52dab829719162c6f34e36eb43a

                                                      SHA1

                                                      a6d1a1f265c9ffc4a4a5535dd039f7801eddf4b2

                                                      SHA256

                                                      16a20433c5e021c02e4d3a977f58d09ddaf689e780cb5df73aecf6d79115fe47

                                                      SHA512

                                                      91dc6fb4cee68ca8853dec68f757ca11b5c3b4b55d62b2b46f7e449477aefe5c52f33dbc9f08d9526d63a4db8cab30b087ffbca56e9571b08b6af4b73306f39c

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3ee6de3563d833b2fb341c8239a59d7a4a0767be\5cbfd411-d1f5-41fe-8072-2244b900ca53\index-dir\the-real-index~RFe5b51e5.TMP

                                                      Filesize

                                                      48B

                                                      MD5

                                                      43fb717addfbae75a0386b1ec652f98b

                                                      SHA1

                                                      4212dd4b7515a93b2781d3dc27b030619c3b6dec

                                                      SHA256

                                                      801199e8cfbc4eb53fda0b4c70f8e0efced25fa562adae92030c255dc119ac62

                                                      SHA512

                                                      75895647f34fd77fd80ee5dd2b3f0da6ac0d6cfe5b4e6c0e274cdeafb45050ea152e20f89149c5595addbeb4969260f5d1e16099cc6d06aeb942d7838db9db04

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3ee6de3563d833b2fb341c8239a59d7a4a0767be\index.txt

                                                      Filesize

                                                      87B

                                                      MD5

                                                      326b86efe684b73dc98b75252ade225d

                                                      SHA1

                                                      db381a3f79f5ca0473181f70e33dd923c0b93a53

                                                      SHA256

                                                      c53932ee767c19c6e3b2cf6db49839ee77f6f296901b359e99c6cf4331d6f002

                                                      SHA512

                                                      edda63fe988b25874d325b87b88160fb6841332ba095ed42e6f5ed64b63f165b1b33dbea1d228988a6c76981e9fa4d08afdc3d5359f400295fef564e7c93d04a

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3ee6de3563d833b2fb341c8239a59d7a4a0767be\index.txt

                                                      Filesize

                                                      82B

                                                      MD5

                                                      1bf4b04db28488b6718bdeeed3e642a5

                                                      SHA1

                                                      297ae819cf080f4b237c4375687574c1560ed30e

                                                      SHA256

                                                      b6ffd394a8d49c9fb833c62fb605d3762640e7f237d0bc86893ae66de4aa0fef

                                                      SHA512

                                                      ea0322d9791bbb1c8b7a848e3728628ab3beca034af959993fd63928d1cf0d5661846721b87c8ccf57f7ba95b9739c22065ad4a43ba9af8a602ece9ea6e6bf23

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                      Filesize

                                                      72B

                                                      MD5

                                                      fd31145db9653df68b351a30fc46ed1d

                                                      SHA1

                                                      2794256c6532f0a9956eded14e5ff81a92a74d24

                                                      SHA256

                                                      917e262b45ba323626d649d324c3cc7797a36ace23657ec93a1fc18938d39f84

                                                      SHA512

                                                      6e458f21584ab587824bcd380c09926fec7982ef0ffa9c2fe11e41d148ce61a213c8a8d76900965d083659211b3f0886884e5a567ae5c18c3db03d19ca5eb5d9

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5b4fe2.TMP

                                                      Filesize

                                                      48B

                                                      MD5

                                                      d840ae2f83eef093290b06663deb23ce

                                                      SHA1

                                                      dfdb4577df8654428aa8ddb056bb3f645ab6f9ce

                                                      SHA256

                                                      089760b0189ed40e5e2292977cd742212b7bd68d4f645cded02fcf6ab851e1de

                                                      SHA512

                                                      c53350cbd503798ba81e542447c305aac82f212fa43890be2e925e90f13c8bf931025723614a703d91dcec59cc0b0f039041f807448e56a45ba6806692fbeb33

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      2e653cd35b3f9db8cec258c612437ab5

                                                      SHA1

                                                      603bc5d3a2379b34f059af948b979c30499d7c24

                                                      SHA256

                                                      cafbdd3aacf11ddf3511d8bc402ff1ef819d339e498ff778496d81388774e128

                                                      SHA512

                                                      c27cebc8b7f399fd95105279afde9320f2d6e4b02f10fd28e1b9336d14eede68cf9fd30343a69f7364e32f9ce1563c3db9cbaf8ea6bcadaa9e31b235f14b79f8

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5cdc0f.TMP

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      1b0c5d35938fbefd3f0d8a691a56ab24

                                                      SHA1

                                                      2398db75be92c86f29be410c61eee117546b037f

                                                      SHA256

                                                      f5f6d22bde8eae14e110a1effbe74a27976751cead87e414982b702bc27ab287

                                                      SHA512

                                                      03541063b336580dd8be04334e41a8bf801b576f9999ec84b7d9403cfd9b60e3408270ddac791e1536fa75d42e4ec4be8f23e3649b3767c25d76e5c5aecc9a39

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                      Filesize

                                                      16B

                                                      MD5

                                                      6752a1d65b201c13b62ea44016eb221f

                                                      SHA1

                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                      SHA256

                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                      SHA512

                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      956a1d1ac93102b4560a2a72c0b0e6d8

                                                      SHA1

                                                      3701c554f3e3b5689b812d5929751b33508537a9

                                                      SHA256

                                                      e9a3814eeb448c9fa4a57a0e0e5aaa00cea1c7c387574f439b552999d35b5aae

                                                      SHA512

                                                      d358c9c20cc2e23611a07430fbb7a62e6a374c1351c5061a7e674b1f556015b2b5eaf16f40dfff7593b8054ef9474477e33247d46574d72d9b0b18961fcd85e3

                                                    • C:\Users\Admin\AppData\Local\Temp\df78c3f9e2764f65801e202beab76d66.bat

                                                      Filesize

                                                      56B

                                                      MD5

                                                      94ec7df95de78fb71689283fdc7c4a8d

                                                      SHA1

                                                      1003ce9eacc17a2ce14029656555e409d02d23d6

                                                      SHA256

                                                      ce5162bdbb5135eb6f3c806d0c2d998ca7c0acbf5f9873a6f24cc681c58396c9

                                                      SHA512

                                                      0243800aabd97535097f7665d09e324bc3406dce726405d7411e749e7bb89a78e8d5437e4c8be8a5e7a8ffb2089fe31a3738cbea142fae71a4835e22059524c0

                                                    • C:\Users\Admin\AppData\Local\Temp\ezaqytzmpd.gif

                                                      Filesize

                                                      297KB

                                                      MD5

                                                      c29a3be5142c2304ec7b8a6d8a4fe0f1

                                                      SHA1

                                                      2df712ce87e022d9c69e3bc9f4e17822840715f0

                                                      SHA256

                                                      8d070d9c04be926f34064e585edc84c8837bc4476eacde6b046e855d213f48fc

                                                      SHA512

                                                      62166c06c7e340d779670a75654fe4538133d1f0022a9ae4869192375ca6133802c006fabe0f67d1c7f155a13d6e28f70a3f9c199927ad628227e744d454728b

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\discord.url

                                                      Filesize

                                                      178B

                                                      MD5

                                                      3b35148d7661e41a89ded2a167b81bd2

                                                      SHA1

                                                      3341e6e2522b5f2c39aefe0f752550acbd143ad7

                                                      SHA256

                                                      8375823df91f6dc9d9fc09a83303bdea778eef761f577bbedeccf00eeda7129c

                                                      SHA512

                                                      8cc6e258f8c531230bc6ef4ac778c8f10cf971ba992f63b2847bd3c93c76c884428cee8d337274ef58a782c89a82817cd288e897bed2557da330397b00be8683

                                                    • C:\Users\Admin\AppData\Roaming\discord.exe

                                                      Filesize

                                                      141KB

                                                      MD5

                                                      a5e6869cc1b826c71ef68e6ab6196606

                                                      SHA1

                                                      0185672daadea373d19fa721ec644562eba3a82e

                                                      SHA256

                                                      7471944a136673044e47c277341a4b31d46434a433e902cb2d2bd19b1a79b845

                                                      SHA512

                                                      ba558d98bcaffc4d096d8238fdb5bd30deec836f5d650eec0bf205a3f3984ee770bff921f615aa937bc85bd0376f05076178b2cd774cf27dcedb6b133447564d

                                                    • memory/1360-60-0x0000000001870000-0x000000000187E000-memory.dmp

                                                      Filesize

                                                      56KB

                                                    • memory/1360-58-0x000000001E320000-0x000000001E33C000-memory.dmp

                                                      Filesize

                                                      112KB

                                                    • memory/1360-61-0x000000001DF40000-0x000000001DF60000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/3980-2-0x000000001C5B0000-0x000000001CA7E000-memory.dmp

                                                      Filesize

                                                      4.8MB

                                                    • memory/3980-0-0x00007FFDBF6E5000-0x00007FFDBF6E6000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3980-28-0x00007FFDBF430000-0x00007FFDBFDD1000-memory.dmp

                                                      Filesize

                                                      9.6MB

                                                    • memory/3980-5-0x000000001D030000-0x000000001D0D6000-memory.dmp

                                                      Filesize

                                                      664KB

                                                    • memory/3980-1-0x00007FFDBF430000-0x00007FFDBFDD1000-memory.dmp

                                                      Filesize

                                                      9.6MB

                                                    • memory/3980-3-0x00007FFDBF430000-0x00007FFDBFDD1000-memory.dmp

                                                      Filesize

                                                      9.6MB

                                                    • memory/3980-4-0x0000000001950000-0x000000000197E000-memory.dmp

                                                      Filesize

                                                      184KB

                                                    • memory/4536-35-0x000000001CF70000-0x000000001CFD2000-memory.dmp

                                                      Filesize

                                                      392KB

                                                    • memory/4536-34-0x0000000001030000-0x0000000001038000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/4536-32-0x000000001C500000-0x000000001C59C000-memory.dmp

                                                      Filesize

                                                      624KB

                                                    • memory/4536-36-0x000000001D510000-0x000000001D529000-memory.dmp

                                                      Filesize

                                                      100KB

                                                    • memory/4536-37-0x000000001D530000-0x000000001D53A000-memory.dmp

                                                      Filesize

                                                      40KB

                                                    • memory/4792-14-0x00000264E9780000-0x00000264E9781000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4792-12-0x00000264E9780000-0x00000264E9781000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4792-8-0x00000264E9780000-0x00000264E9781000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4792-7-0x00000264E9780000-0x00000264E9781000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4792-6-0x00000264E9780000-0x00000264E9781000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4792-18-0x00000264E9780000-0x00000264E9781000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4792-17-0x00000264E9780000-0x00000264E9781000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4792-16-0x00000264E9780000-0x00000264E9781000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4792-15-0x00000264E9780000-0x00000264E9781000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4792-13-0x00000264E9780000-0x00000264E9781000-memory.dmp

                                                      Filesize

                                                      4KB