Resubmissions

23-01-2025 16:49

250123-vbml8awlc1 10

Analysis

  • max time kernel
    91s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2025 16:49

General

  • Target

    https://darknessonyx.com/ryoss

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://sheayingero.shop/api

https://toppyneedus.biz/api

https://suggestyuoz.biz/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Drops file in Windows directory 12 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 26 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://darknessonyx.com/ryoss
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff86db546f8,0x7ff86db54708,0x7ff86db54718
      2⤵
        PID:3824
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
        2⤵
          PID:1920
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1604
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:8
          2⤵
            PID:4456
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
            2⤵
              PID:2428
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2676 /prefetch:1
              2⤵
                PID:4420
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:8
                2⤵
                  PID:2232
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3344
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:1
                  2⤵
                    PID:1968
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:1
                    2⤵
                      PID:2144
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:1
                      2⤵
                        PID:4536
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:1
                        2⤵
                          PID:1376
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:1
                          2⤵
                            PID:4608
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5764 /prefetch:8
                            2⤵
                              PID:2440
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:1
                              2⤵
                                PID:4156
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,6016584702350176187,2669663750685161941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6280 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4324
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:744
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:2816
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:2192
                                  • C:\Program Files\7-Zip\7zG.exe
                                    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Op3nM3\" -spe -an -ai#7zMap10818:74:7zEvent29783
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    PID:4752
                                  • C:\Program Files\7-Zip\7zG.exe
                                    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Op3nM3\Release\" -spe -an -ai#7zMap14837:90:7zEvent53
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    PID:4468
                                  • C:\Users\Admin\Downloads\Op3nM3\Release\Bootstrapper.exe
                                    "C:\Users\Admin\Downloads\Op3nM3\Release\Bootstrapper.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    PID:460
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c copy Peak Peak.cmd & Peak.cmd
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4752
                                      • C:\Windows\SysWOW64\tasklist.exe
                                        tasklist
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3464
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /I "opssvc wrsa"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1952
                                      • C:\Windows\SysWOW64\tasklist.exe
                                        tasklist
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4600
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3652
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c md 177979
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2240
                                      • C:\Windows\SysWOW64\extrac32.exe
                                        extrac32 /Y /E Flyer
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:960
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /V "tone" Intensity
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3532
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c copy /b 177979\Flows.com + Baby + Monday + Franklin + Keyword + Native + Box + Indeed + On + Mutual 177979\Flows.com
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4192
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c copy /b ..\Scheduled + ..\Metadata + ..\Columns + ..\Challenges + ..\Age + ..\Burner + ..\Ideas + ..\Three I
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4712
                                      • C:\Users\Admin\AppData\Local\Temp\177979\Flows.com
                                        Flows.com I
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:4340
                                      • C:\Windows\SysWOW64\choice.exe
                                        choice /d y /t 5
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2260
                                  • C:\Users\Admin\Downloads\Op3nM3\Release\Bootstrapper.exe
                                    "C:\Users\Admin\Downloads\Op3nM3\Release\Bootstrapper.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    PID:3064
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c copy Peak Peak.cmd & Peak.cmd
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1056
                                      • C:\Windows\SysWOW64\tasklist.exe
                                        tasklist
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1204
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /I "opssvc wrsa"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2976
                                      • C:\Windows\SysWOW64\tasklist.exe
                                        tasklist
                                        3⤵
                                        • Enumerates processes with tasklist
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3948
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3672
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c md 177979
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:940
                                      • C:\Windows\SysWOW64\extrac32.exe
                                        extrac32 /Y /E Flyer
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3648
                                      • C:\Windows\SysWOW64\findstr.exe
                                        findstr /V "tone" Intensity
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1576
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c copy /b 177979\Flows.com + Baby + Monday + Franklin + Keyword + Native + Box + Indeed + On + Mutual 177979\Flows.com
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3464
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c copy /b ..\Scheduled + ..\Metadata + ..\Columns + ..\Challenges + ..\Age + ..\Burner + ..\Ideas + ..\Three I
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1656
                                      • C:\Users\Admin\AppData\Local\Temp\177979\Flows.com
                                        Flows.com I
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SendNotifyMessage
                                        PID:2376
                                      • C:\Windows\SysWOW64\choice.exe
                                        choice /d y /t 5
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2260
                                  • C:\Windows\system32\taskmgr.exe
                                    "C:\Windows\system32\taskmgr.exe" /0
                                    1⤵
                                    • Checks SCSI registry key(s)
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of SendNotifyMessage
                                    PID:4568

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    6960857d16aadfa79d36df8ebbf0e423

                                    SHA1

                                    e1db43bd478274366621a8c6497e270d46c6ed4f

                                    SHA256

                                    f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32

                                    SHA512

                                    6deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    f426165d1e5f7df1b7a3758c306cd4ae

                                    SHA1

                                    59ef728fbbb5c4197600f61daec48556fec651c1

                                    SHA256

                                    b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841

                                    SHA512

                                    8d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    192B

                                    MD5

                                    aac06542b3a2cd1eea2c6d21ef3fb43f

                                    SHA1

                                    7cb3f9b979c1c4d03ce0ca0bad6a00be55e78ae9

                                    SHA256

                                    36673a1f283a6ce0834faeda517b696834ceddc067fd996106f15b155c0b656b

                                    SHA512

                                    51852ab0bbdb852ada88905a9d7cdb6d0799705a93eb77236fc25ffec1df0b61103aeba920dfc30e834831d0ffc6c7e65a679153dbc0d3fb7f5802a912213f44

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    1KB

                                    MD5

                                    69c110c2a49207cbb237a874a9dc6b89

                                    SHA1

                                    ddf789f68e7a3caf0c693a8184fbe30531777b42

                                    SHA256

                                    1bfc69851d218c3eb2f7f9a400c911e817e2ec8e8c129c9f8fbf56953a81b823

                                    SHA512

                                    c655fe63703f59431923bdeb78b6696f30159558e2924d0504219d3f96bf0b7f6efe50ecb7e8c2d28ebbaab75056fa06761025e2ae3cf7ba4afb795d62c63ffe

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    28e0a445d599454595fd7107c1e0d755

                                    SHA1

                                    6bffb57aa96e183e82f145395f26346bb62ccf0a

                                    SHA256

                                    42864f82de91f8584a1eb7b3642cdffe7b00c100d869a845eb9e80ed32af9ffc

                                    SHA512

                                    8b07891f19802b2fa794e95dfbcdd64d6697fb46b1fd9a24661178994da3ecad64eaed53f6a5d4761199df5796b09131055fe79d1c9bbf0f9b6f2a50ee531c64

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    40437d4bd0c3424df0785e28627b37c5

                                    SHA1

                                    0ba47185fce08cbf513ffd6fea40e69da5e3176d

                                    SHA256

                                    69598a9ad0ecf775404aae388c6e47abcb9aec30a7fb6475bcab601ff794784a

                                    SHA512

                                    33cb9fd8bc9acc69f88b0bd3ae83be6b3f58d75fbdaa83e7d0018524b6d641b7ae90da839d4633882330cbc1407f4bc813de5465c0c763dc94a5123164830659

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    6359f251020ed995fa4418e6720704f4

                                    SHA1

                                    6e04a3bfa1a980344a687317c7c779d6814ef03a

                                    SHA256

                                    a776eff78b4b856d524b927d5c5e77300a663b402f8bef6aae9d46448e096f0b

                                    SHA512

                                    906ed9a7a3078b6c292d97eac5b1ec91758e06181778f45fd437b81533d55a61d55e7f7a05cbc9b6c06d4407f20f893db6cdb1e71043fc91f7df132c0bdde071

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                    Filesize

                                    706B

                                    MD5

                                    ebe50712fdb8c87211d139ada9b138a8

                                    SHA1

                                    a9a057d1dfd674b0e956e234483f9692d7c2e508

                                    SHA256

                                    a1e266ad234e0a36f30b9fc656cbe12b633b962eb5ae5ab8c168b2482d4df05e

                                    SHA512

                                    519c5ef9f5784183fbfb90781345093f30f155f4a07e778a2bda6b9938042c8b0ed7c554b265ed1ee0572004031620175eac445519c97a85a30ecbedf8d04bbf

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57f472.TMP

                                    Filesize

                                    371B

                                    MD5

                                    5a0ed07daf91f689355eccbe65d3c185

                                    SHA1

                                    5202dbab315b77bf2c819ee1db92d998a5843d17

                                    SHA256

                                    ec3ac1663900131e97b735adc25e32c4dcee3588f3d045bb4acda00667465c42

                                    SHA512

                                    6ee8364f97ca992481204d337ba4ff9e361808e83df4b133ab82966aacc9f8c7b7211375612c147fa2c694a8bcbd6d136b55d079f5c1a16bd337c89d49807777

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    7dac97bec4f372041745d4df9deef97c

                                    SHA1

                                    e8aa2f18200e4250ffeca5625554b2d1e69f0003

                                    SHA256

                                    c34a404389353278dfeb622422d63ed376410a2aed32bac00b4c0f1512e5c165

                                    SHA512

                                    99cd4d82538609cd87950784d1af69f636fea978a7459bf7db691a25a56f5fdf1725dbeb1c66d8f9a655e7cd47ca07cbcc96177f8ca2af18343c949071b5bbc0

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    b0689f4638fb291a6f270b3acd108585

                                    SHA1

                                    e9a77313945e1104198e0fd6897b3b5ae91b3dc6

                                    SHA256

                                    099fe2705c99a5d665e8e7c01bf67bea461c0935343dfbacb30252de1296fdb7

                                    SHA512

                                    cb4452680cce1a36e449e99064cf364c9f032d95bf675020e0901cce1576b635cf5872183879b28a97232f2578a7a7629e0cc98513ea5c7c06e2973864cf869a

                                  • C:\Users\Admin\AppData\Local\Temp\177979\Flows.com

                                    Filesize

                                    1KB

                                    MD5

                                    8f9d821f8d7a79581a2ab3a0986a78f1

                                    SHA1

                                    b7bf35a298f8c440c28957e54f636dd91e35e31c

                                    SHA256

                                    a22de98030a228592c7d75a2c6fae0a637d7b4e8a2c52da61fef50f88478a86c

                                    SHA512

                                    0989650bd42270d5dc15bc77f8ee01e37b8dcbb3043a623cc5c1e8fff9bba8970b149cbc57281f4facb41509455f5af684a03cf96fadaedcb50d1e0f856ab9d6

                                  • C:\Users\Admin\AppData\Local\Temp\177979\Flows.com

                                    Filesize

                                    925KB

                                    MD5

                                    62d09f076e6e0240548c2f837536a46a

                                    SHA1

                                    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                    SHA256

                                    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                    SHA512

                                    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                                  • C:\Users\Admin\AppData\Local\Temp\177979\I

                                    Filesize

                                    477KB

                                    MD5

                                    8ce37257e647eafc2b435f2b56f2b33e

                                    SHA1

                                    beb990946ba7aa30d7f3f0c5242c5ff74ad2290d

                                    SHA256

                                    7385853f9d1e0473cffea742bdc89c69eabae19750402f7644c5e9c7274685db

                                    SHA512

                                    9e43b761faee231f440d405a429cdd4c45e155602988929ace1f34946951d18fd08a6b833e866642001a58b42971cee678667e5490adfb80f004a025f377e7d6

                                  • C:\Users\Admin\AppData\Local\Temp\Age

                                    Filesize

                                    60KB

                                    MD5

                                    84692b422690f4852cb88836dbb1e0b0

                                    SHA1

                                    931fd3f161113cb84407455b7786dd63bba3c15a

                                    SHA256

                                    cc2f5e9bac8af1aaf86d2c004f1b2234261b6722c1b821c2153d1835372ee875

                                    SHA512

                                    74f5610074976dc96c6e387e9719f789b4a2c4ec0cb1cafd20452df7b268a9468672a38169c447d534261ab7b085c135828bc0c84dc5831d5c82e3cd36161fa7

                                  • C:\Users\Admin\AppData\Local\Temp\Baby

                                    Filesize

                                    133KB

                                    MD5

                                    a86c655555e2e198272d833d78eb743b

                                    SHA1

                                    0f6bb609d65d8ae521f15f2306162e69469c57c8

                                    SHA256

                                    d6108619ca2f1670ef01ec58fd62d98c84877c7d6cec6075f27e7b926d71de12

                                    SHA512

                                    26b4319d1fd657f3e66395fd8db2b229358d487c685a4d6ac42d61c7604eb9920b2da6c16fcfd6e81ed512edc715630122fd8b9a6066ee3e96c0155ea1273eb5

                                  • C:\Users\Admin\AppData\Local\Temp\Box

                                    Filesize

                                    71KB

                                    MD5

                                    1b2da465247a01a3b76472249a3d0deb

                                    SHA1

                                    616f32ade9272c6d240506b8a74bdcccea9304ae

                                    SHA256

                                    94d5c530034c5ec9506c5e3b52def91b4e79b9222d7da2b712d00fe6f002d35b

                                    SHA512

                                    dfe9da0f3b449c24c751d4c0cda6a0377d1070461c4f25b1900057a02108c5768e350f0c0e217716cec77001a4f629e14f64d55894ff19f73f36c3e24abbeef4

                                  • C:\Users\Admin\AppData\Local\Temp\Burner

                                    Filesize

                                    64KB

                                    MD5

                                    878f18ed4b302e6c94d0a190d145f697

                                    SHA1

                                    c67320a66d6148485dec9075081db6957ef50e3c

                                    SHA256

                                    96e0e15abacaa99c9120b398a4d0c9eecfb08d789666940b74759ce913979713

                                    SHA512

                                    8545bcf1a979bae7c1de2aa34a5198ec772161d021e3fb302de4bb631a6796dddc9093f91b7ba14e4d41327c463bb61d2ff0b1fa8bb48c7cdc9808d5cc2f652f

                                  • C:\Users\Admin\AppData\Local\Temp\Challenges

                                    Filesize

                                    94KB

                                    MD5

                                    0fd905bd29e18e664e3d3d9a6bb06ae6

                                    SHA1

                                    f532f1ba93228a60a483b40e4cd9c41e08877a27

                                    SHA256

                                    958643e7eba918e3867e1813480038d19716f39740d882755b7030ad8ac3bffc

                                    SHA512

                                    22416b891d9cb11adb5a5483e7eda868df6e5439ccfc635c077206c030d1814070c52718dedd3307983982d92a57b9644afd66f8e4936905da04ad4a3837f7a2

                                  • C:\Users\Admin\AppData\Local\Temp\Columns

                                    Filesize

                                    56KB

                                    MD5

                                    1c070e2cfeee36acf2fc7eb8c940ea66

                                    SHA1

                                    bb0e3d8db79e93bc732227bf3b5328c34e2dc254

                                    SHA256

                                    9a34487568789c5baff8a4fc46f0759d8d7cc06189ccbff928c3f6f2a0cb3cbd

                                    SHA512

                                    d58a8eaa563a6f092d062f5d31b16195c48b9ac5a657c8e2dbcf658c000b24bbc092d2526a4976f820318a0586037b9e707b1b2f06b8c972e34b7f767c5024c7

                                  • C:\Users\Admin\AppData\Local\Temp\Flyer

                                    Filesize

                                    476KB

                                    MD5

                                    0338ef5a811b1886bc1c34f368cb2ffa

                                    SHA1

                                    d4c5d8a923c3271e1fd283ec1d8163b67db4dbbf

                                    SHA256

                                    3ddd2fe9b650e01e2f8b8940c47d5fc5039962a2f5315646c0baad6a2fdb0fa2

                                    SHA512

                                    8b0596bc09da58e88a959d3d73128e1db6c3095b283ee2e96be7048d055988c27b45f4a256ccaa22d489082262722900b8d01afd511efb8187153265266aced8

                                  • C:\Users\Admin\AppData\Local\Temp\Franklin

                                    Filesize

                                    93KB

                                    MD5

                                    56e4414823fd2b7142284ed6d5a363b7

                                    SHA1

                                    64ee8eff5dc6de329ca71d2bdc8280a55dde95ba

                                    SHA256

                                    c5a5cfbf1ad6b80af7b467a232a5c016f8e077e5e33a84c306bea7fd3c5b319b

                                    SHA512

                                    6e8f863ac5473e528a6eef96c07a56bdf2cd5572f2df68cf6745d5819c367160edcb098a378ef4d7de4814aa4a09705d1d11be2aa949c44b7d56f201952881bd

                                  • C:\Users\Admin\AppData\Local\Temp\Ideas

                                    Filesize

                                    60KB

                                    MD5

                                    7b55e663410315b46b7c6cf9694f2608

                                    SHA1

                                    052f23cbbb5534826753018adc62f29cc7ae94d9

                                    SHA256

                                    37e34e0e46968b68e412ea504b05c5156252dae0b70e0687ba90271f04bb45d1

                                    SHA512

                                    dc4c6c0b7b3d633aa7d07bac7ee093867c043086bab2d0a450a726f9eef7a75f9b6406b567a1dcfbbc6d4fe87b89dfbb772f41e4aa2a90e0464edde3ea6a1479

                                  • C:\Users\Admin\AppData\Local\Temp\Indeed

                                    Filesize

                                    147KB

                                    MD5

                                    09c30eb57d7b8d5b6d2bed9172d72dba

                                    SHA1

                                    fc927ce49b240a9074d7cebc24ca184edbd8a1bf

                                    SHA256

                                    b321aaeea6b3b59d803228074d3d92a1f3c708c6b7ea46147c95511215cc105b

                                    SHA512

                                    fc34121fbbef228a8b250142cc10d47de6969f13d22d539c5e4411fe0af2c1117636413092e8fd756354b634a42f47bd6e584700ca79f8ab3113ad64f6ad2fd4

                                  • C:\Users\Admin\AppData\Local\Temp\Intensity

                                    Filesize

                                    1KB

                                    MD5

                                    f61e65c8b5e558627396ed8261aee6a4

                                    SHA1

                                    9a35551af1d6bf2ffa97d15ec9c5b39d0f6d505a

                                    SHA256

                                    86d914001ade248c24ebdc8e38e39565c4f5bc2bd05deb357cae22d805707d72

                                    SHA512

                                    65be47472dca6c4eb8e099d54dedb8169486449832ff29ed563d632954d48789731b16fb442717efed0b5742e7a672c11e032fd4ccfde6b6e0cd77a32e8c9b92

                                  • C:\Users\Admin\AppData\Local\Temp\Keyword

                                    Filesize

                                    124KB

                                    MD5

                                    6349c17c75b1138329f07491744a9ed4

                                    SHA1

                                    840c353b3f6a3dfc0b75bb389e2d9903c98890d2

                                    SHA256

                                    15c91f0da6a7118a864f230d59149f8d56bf3d50404fd5b5c2b610a5dab0d293

                                    SHA512

                                    bea4e290e2b7a246e42facd5a987894b267881f26154d67f56b179168b1da9c9338d41f9808f63e1d0de8995c50e321e44d228d1cef761ea8faf9f159904b787

                                  • C:\Users\Admin\AppData\Local\Temp\Metadata

                                    Filesize

                                    68KB

                                    MD5

                                    2a0bf741f448dd30696be8f465b5b833

                                    SHA1

                                    b4a2c57793378236bf3c50c1fb45fcc1920fbbca

                                    SHA256

                                    3a3a09f732bb2b46fd1ef87e67088be5614dffe9fa661afa8acf2d7764ab7496

                                    SHA512

                                    269a5e255b674017086e2bc74ef8c6f7f14176e923283cbf8113ebcd5d585b485f5b43f9aec6ae9ffcdb6e8d5248c8bb70e65b3647ff7f10409938313ec96c5e

                                  • C:\Users\Admin\AppData\Local\Temp\Monday

                                    Filesize

                                    84KB

                                    MD5

                                    b8eac858c394e989430167327a8ae7cf

                                    SHA1

                                    c7226e8012f0888b7bec48d0afade50534db1fdc

                                    SHA256

                                    45dd80aa6a648289f7f13b413884b6e288018c8178bce3df58c53b49e51f68fc

                                    SHA512

                                    5f6005be3db377c0050189d8ddab64f1e43e61f0471a6239d03af705f51cdb3d64ba3011fdb8c9c7d569cf4321f0abb13a0fcf1f088397fae390d5bcc4aaf802

                                  • C:\Users\Admin\AppData\Local\Temp\Mutual

                                    Filesize

                                    67KB

                                    MD5

                                    07d393f56efd3b9326606b437b71f1d4

                                    SHA1

                                    bd63b40e51e2e6c68a266e9f06f20b94e29c882c

                                    SHA256

                                    f0ef7a9e9dce3aebcf8e05805ba9c1c912c4faae9e01b9ca3efd2ec83f528414

                                    SHA512

                                    ad6471df9322535eb862d86cbd342ddf3e744932889972d310412b06c0a66af807f708c115232f29278c074ec9611896e91876a99ba468494bd4304a1378f559

                                  • C:\Users\Admin\AppData\Local\Temp\Native

                                    Filesize

                                    90KB

                                    MD5

                                    b09fe66fe9ba0c96d5f09e3cceaf61a8

                                    SHA1

                                    04e173e7bc1d3c632d206b2f38bdd2bac4b40a21

                                    SHA256

                                    b5f56cd6ac094dec19e7b1ff1ed162dc07d4ca3af7579adca5ac9c43a44640dd

                                    SHA512

                                    746a22266eb2c8d8d89de5dd3c605ead29d2bf0b172bdedcd6d298126dcc02522707e488c3400cd2edb7cd0265a7e12212b16ff336f148a39a252055c653a959

                                  • C:\Users\Admin\AppData\Local\Temp\On

                                    Filesize

                                    114KB

                                    MD5

                                    6c1c4f39f2bb55057641898e3d376930

                                    SHA1

                                    b43b16c85687517d3dd83f82b6b421304f7e628d

                                    SHA256

                                    48e5d116dc1494dbd8905eec10832aa7ce19f4f812d91514ab6fce5ce6f57cf7

                                    SHA512

                                    ff4ee5c654f50bea1fb92ace656c952ef573759f08ce072468d5029e6c38d77609a200de54f49c68c9fecf6ed515dd2864ba3acb1a5ce523d6a3efae9745a3f0

                                  • C:\Users\Admin\AppData\Local\Temp\Peak

                                    Filesize

                                    30KB

                                    MD5

                                    20718b8b13d6d0de153980d6759d39e5

                                    SHA1

                                    d3ac2a4ea8dcbe0f74f4ac148c4567aeb6f707ad

                                    SHA256

                                    abaa9a49fce5f6ee29eb407c9aa85961ab8f256a322e3309cf7c874ef7a56e9b

                                    SHA512

                                    2864b793a479410ea6ba152490ff313e40a6357444245fb4935777d9ebf854918bc5ddbf8d4b3d348a94b5931501664cc1d41b5617b10e62bdd24efba60fd0fc

                                  • C:\Users\Admin\AppData\Local\Temp\Scheduled

                                    Filesize

                                    56KB

                                    MD5

                                    99b09fb9fba65c428078b8ccd89f90ea

                                    SHA1

                                    c1ec375fa1c9ac8323fa156596ff7694b4b18dc4

                                    SHA256

                                    86bc96aaf2de8304b80d0ee08ea403686c2dca2c5c623eb7692ab85b41217910

                                    SHA512

                                    8fe7a7ed45a52ce4b6b0b0a325349d14598953f056f331d4aba128c11dbcf06f6b1f1ee58e92dcc7f7569e60fc97561118841dba8a77b0c32e2ee95dde964e24

                                  • C:\Users\Admin\AppData\Local\Temp\Three

                                    Filesize

                                    19KB

                                    MD5

                                    2e94c6d5accc6a1afec513fc9bffce73

                                    SHA1

                                    f58f072d322645b8160adf57e4de7383dd5668c6

                                    SHA256

                                    6f8378f9fbde1d7f59f5ff455f8aab61eea7fa7c591f05bf88f761be2cbaeb65

                                    SHA512

                                    c62b03e9320333c174b04988d33af71dfbd9a37aaa8518847a2bf14a29a1c761481c6869d59b7f089a775cc06f023fc93c5924da47f2ca25fb696e4fccfd4ffe

                                  • C:\Users\Admin\Downloads\Op3nM3\Release.zip

                                    Filesize

                                    12.4MB

                                    MD5

                                    fd36c3117a0339b4fc9af87046b74759

                                    SHA1

                                    6e43ccf3085f11c333467ff6319e2e24d79a74e9

                                    SHA256

                                    7376fcb57281b59f4ed1e0414bcc0d1dccac36497952d643bd30838fd6c4183f

                                    SHA512

                                    13d8caec63594dd0c77c29e49ef35779a2d011f41beeb24117cc534ffd41d53915d7dd7191c163c7372e4e201d362de09b62ee67a76d7d5afa35d4568c9b4287

                                  • C:\Users\Admin\Downloads\Unconfirmed 720562.crdownload

                                    Filesize

                                    12.4MB

                                    MD5

                                    7bf49753d0a5af8bc20aac249e6641b2

                                    SHA1

                                    bda55814d8f27f2c12ef7bf0e68108f4e0ebb20e

                                    SHA256

                                    93f1c15323a4cf03d0933a0c2b5afee5ae49f83f8ff8956b7a79e98cfc50ca35

                                    SHA512

                                    17e70056c18f57792fb65a14f28222ecd8f74cd30879d711a10486ac53f69c45bd93df9306bca05616a85c9c3449f2bec7fc4d24ecc5895870d6b66660ef99a7

                                  • memory/4340-1232-0x0000000004990000-0x00000000049EB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/4340-1234-0x0000000004990000-0x00000000049EB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/4340-1233-0x0000000004990000-0x00000000049EB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/4340-1235-0x0000000004990000-0x00000000049EB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/4340-1236-0x0000000004990000-0x00000000049EB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/4568-1456-0x000001AEEA470000-0x000001AEEA471000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4568-1458-0x000001AEEA470000-0x000001AEEA471000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4568-1471-0x000001AEEA470000-0x000001AEEA471000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4568-1470-0x000001AEEA470000-0x000001AEEA471000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4568-1469-0x000001AEEA470000-0x000001AEEA471000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4568-1468-0x000001AEEA470000-0x000001AEEA471000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4568-1467-0x000001AEEA470000-0x000001AEEA471000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4568-1466-0x000001AEEA470000-0x000001AEEA471000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4568-1465-0x000001AEEA470000-0x000001AEEA471000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4568-1457-0x000001AEEA470000-0x000001AEEA471000-memory.dmp

                                    Filesize

                                    4KB