Analysis

  • max time kernel
    66s
  • max time network
    66s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2025 11:05

General

  • Target

    https://www.4sync.com/web/directDownload/WTdX34oq/xg1FGwkJ.f73e120fd9572ac6e4d912c0de40bf72

Malware Config

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 46 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.4sync.com/web/directDownload/WTdX34oq/xg1FGwkJ.f73e120fd9572ac6e4d912c0de40bf72
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4740
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff08b946f8,0x7fff08b94708,0x7fff08b94718
      2⤵
        PID:3388
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,9998507061592573617,1536709511630754129,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:2
        2⤵
          PID:4820
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,9998507061592573617,1536709511630754129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1576
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,9998507061592573617,1536709511630754129,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:8
          2⤵
            PID:4856
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9998507061592573617,1536709511630754129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
            2⤵
              PID:4872
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9998507061592573617,1536709511630754129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
              2⤵
                PID:2284
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,9998507061592573617,1536709511630754129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:8
                2⤵
                  PID:1964
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,9998507061592573617,1536709511630754129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3152
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9998507061592573617,1536709511630754129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:1
                  2⤵
                    PID:3440
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9998507061592573617,1536709511630754129,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:1
                    2⤵
                      PID:1716
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2060,9998507061592573617,1536709511630754129,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3428 /prefetch:8
                      2⤵
                        PID:4228
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9998507061592573617,1536709511630754129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:1
                        2⤵
                          PID:1196
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2060,9998507061592573617,1536709511630754129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:944
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9998507061592573617,1536709511630754129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:1
                          2⤵
                            PID:4456
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9998507061592573617,1536709511630754129,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:1
                            2⤵
                              PID:1132
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:764
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3456
                              • C:\Windows\system32\OpenWith.exe
                                C:\Windows\system32\OpenWith.exe -Embedding
                                1⤵
                                • Modifies registry class
                                • Suspicious behavior: GetForegroundWindowSpam
                                • Suspicious use of SetWindowsHookEx
                                PID:2004
                                • C:\Program Files\VideoLAN\VLC\vlc.exe
                                  "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\Payment_198.rar"
                                  2⤵
                                  • Suspicious behavior: AddClipboardFormatListener
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  • Suspicious use of SetWindowsHookEx
                                  PID:4220
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:3680
                                • C:\Program Files\7-Zip\7zG.exe
                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Payment_198\" -ad -an -ai#7zMap8429:84:7zEvent16248
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:4320
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\Payment_198\Payment_198.js"
                                  1⤵
                                  • Blocklisted process makes network request
                                  • Checks computer location settings
                                  • Adds Run key to start application
                                  PID:4176
                                  • C:\ProgramData\815s8bd\client32.exe
                                    "C:\ProgramData\815s8bd\client32.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    PID:4460
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\Payment_198\Payment_198.js"
                                  1⤵
                                  • Checks computer location settings
                                  • Adds Run key to start application
                                  PID:4464
                                  • C:\ProgramData\vno1fsk\client32.exe
                                    "C:\ProgramData\vno1fsk\client32.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:216

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\ProgramData\815s8bd.zip

                                  Filesize

                                  2.2MB

                                  MD5

                                  d033258631c7c640c40660909a4eff5a

                                  SHA1

                                  98b50cb5c66fd86aa0a76c3b92976a2423489a7a

                                  SHA256

                                  1394bde6dfa6e9f1b20492b67b3dddaf12ffab4699b581f48ec55245fa75841f

                                  SHA512

                                  49d1b540b3351f3cf4c649b0f1d6b362229b2bd650f5db631024cc668e3dde2c3984d081e1d7dcc7853bd5afb5912b0bfa70a98024de7722708b86156b47e181

                                • C:\ProgramData\815s8bd\HTCTL32.DLL

                                  Filesize

                                  320KB

                                  MD5

                                  c94005d2dcd2a54e40510344e0bb9435

                                  SHA1

                                  55b4a1620c5d0113811242c20bd9870a1e31d542

                                  SHA256

                                  3c072532bf7674d0c5154d4d22a9d9c0173530c0d00f69911cdbc2552175d899

                                  SHA512

                                  2e6f673864a54b1dcad9532ef9b18a9c45c0844f1f53e699fade2f41e43fa5cbc9b8e45e6f37b95f84cf6935a96fba2950ee3e0e9542809fd288fefba34ddd6a

                                • C:\ProgramData\815s8bd\NSM.LIC

                                  Filesize

                                  195B

                                  MD5

                                  e9609072de9c29dc1963be208948ba44

                                  SHA1

                                  03bbe27d0d1ba651ff43363587d3d6d2e170060f

                                  SHA256

                                  dc6a52ad6d637eb407cc060e98dfeedcca1167e7f62688fb1c18580dd1d05747

                                  SHA512

                                  f0e26aa63b0c7f1b31074b9d6eef88d0cfbc467f86b12205cb539a45b0352e77ce2f99f29baeab58960a197714e72289744143ba17975699d058fe75d978dfd0

                                • C:\ProgramData\815s8bd\PCICHEK.DLL

                                  Filesize

                                  18KB

                                  MD5

                                  104b30fef04433a2d2fd1d5f99f179fe

                                  SHA1

                                  ecb08e224a2f2772d1e53675bedc4b2c50485a41

                                  SHA256

                                  956b9fa960f913cce3137089c601f3c64cc24c54614b02bba62abb9610a985dd

                                  SHA512

                                  5efcaa8c58813c3a0a6026cd7f3b34ad4fb043fd2d458db2e914429be2b819f1ac74e2d35e4439601cf0cb50fcdcafdcf868da328eaaeec15b0a4a6b8b2c218f

                                • C:\ProgramData\815s8bd\PCICL32.dll

                                  Filesize

                                  3.6MB

                                  MD5

                                  d3d39180e85700f72aaae25e40c125ff

                                  SHA1

                                  f3404ef6322f5c6e7862b507d05b8f4b7f1c7d15

                                  SHA256

                                  38684adb2183bf320eb308a96cdbde8d1d56740166c3e2596161f42a40fa32d5

                                  SHA512

                                  471ac150e93a182d135e5483d6b1492f08a49f5ccab420732b87210f2188be1577ceaaee4ce162a7acceff5c17cdd08dc51b1904228275f6bbde18022ec79d2f

                                • C:\ProgramData\815s8bd\client32.exe

                                  Filesize

                                  101KB

                                  MD5

                                  c4f1b50e3111d29774f7525039ff7086

                                  SHA1

                                  57539c95cba0986ec8df0fcdea433e7c71b724c6

                                  SHA256

                                  18df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d

                                  SHA512

                                  005db65cedaaccc85525fb3cdab090054bb0bb9cc8c37f8210ec060f490c64945a682b5dd5d00a68ac2b8c58894b6e7d938acaa1130c1cc5667e206d38b942c5

                                • C:\ProgramData\815s8bd\client32.ini

                                  Filesize

                                  673B

                                  MD5

                                  09d7449585729adaaa29f0041ecec48d

                                  SHA1

                                  bbc92d987840035347cede33d8ac78676f7a564f

                                  SHA256

                                  8c86524231255266fa3dec02ddb62ac558efc8662609c1e43f37a8f4586ee693

                                  SHA512

                                  8769b1afba4608cd1cf7151786716727ff8b77757679699658a31b2cd88667b0f657ee3fa05a18c984cd8e3e44eefe3de836c83271c5a89cda7dfa8a4fcfbe16

                                • C:\ProgramData\815s8bd\msvcr100.dll

                                  Filesize

                                  755KB

                                  MD5

                                  0e37fbfa79d349d672456923ec5fbbe3

                                  SHA1

                                  4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

                                  SHA256

                                  8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

                                  SHA512

                                  2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

                                • C:\ProgramData\815s8bd\pcicapi.dll

                                  Filesize

                                  32KB

                                  MD5

                                  34dfb87e4200d852d1fb45dc48f93cfc

                                  SHA1

                                  35b4e73fb7c8d4c3fefb90b7e7dc19f3e653c641

                                  SHA256

                                  2d6c6200508c0797e6542b195c999f3485c4ef76551aa3c65016587788ba1703

                                  SHA512

                                  f5bb4e700322cbaa5069244812a9b6ce6899ce15b4fd6384a3e8be421e409e4526b2f67fe210394cd47c4685861faf760eff9af77209100b82b2e0655581c9b2

                                • C:\ProgramData\vno1fsk\NSM.ini

                                  Filesize

                                  6KB

                                  MD5

                                  88b1dab8f4fd1ae879685995c90bd902

                                  SHA1

                                  3d23fb4036dc17fa4bee27e3e2a56ff49beed59d

                                  SHA256

                                  60fe386112ad51f40a1ee9e1b15eca802ced174d7055341c491dee06780b3f92

                                  SHA512

                                  4ea2c20991189fe1d6d5c700603c038406303cca594577ddcbc16ab9a7915cb4d4aa9e53093747db164f068a7ba0f568424bc8cb7682f1a3fb17e4c9ec01f047

                                • C:\ProgramData\vno1fsk\TCCTL32.DLL

                                  Filesize

                                  387KB

                                  MD5

                                  2c88d947a5794cf995d2f465f1cb9d10

                                  SHA1

                                  c0ff9ea43771d712fe1878dbb6b9d7a201759389

                                  SHA256

                                  2b92ea2a7d2be8d64c84ea71614d0007c12d6075756313d61ddc40e4c4dd910e

                                  SHA512

                                  e55679ff66ded375a422a35d0f92b3ac825674894ae210dbef3642e4fc232c73114077e84eae45c6e99a60ef4811f4a900b680c3bf69214959fa152a3dfbe542

                                • C:\ProgramData\vno1fsk\cksini (2).exe

                                  Filesize

                                  85KB

                                  MD5

                                  953896600dfb86750506706f1599d415

                                  SHA1

                                  80204dd5ff71618de5e09d8090738672eaa966b0

                                  SHA256

                                  f37f6c1c401ebaf3f2879f62a524e1d5bb302e0ef5ae867ccfe7fafc7464f47d

                                  SHA512

                                  06f702a2b09afa24356d2d1fa9331f6351e8ac58394d02edaa6a0673fb25dd02ab790bc8b2b157bdd10e631df59fbbfd5691543e522f92be9922fb95e3140085

                                • C:\ProgramData\vno1fsk\nskbfltr.inf

                                  Filesize

                                  328B

                                  MD5

                                  26e28c01461f7e65c402bdf09923d435

                                  SHA1

                                  1d9b5cfcc30436112a7e31d5e4624f52e845c573

                                  SHA256

                                  d96856cd944a9f1587907cacef974c0248b7f4210f1689c1e6bcac5fed289368

                                  SHA512

                                  c30ec66fecb0a41e91a31804be3a8b6047fc3789306adc106c723b3e5b166127766670c7da38d77d3694d99a8cddb26bc266ee21dba60a148cdf4d6ee10d27d7

                                • C:\ProgramData\vno1fsk\nsm_vpro.ini

                                  Filesize

                                  46B

                                  MD5

                                  3be27483fdcdbf9ebae93234785235e3

                                  SHA1

                                  360b61fe19cdc1afb2b34d8c25d8b88a4c843a82

                                  SHA256

                                  4bfa4c00414660ba44bddde5216a7f28aeccaa9e2d42df4bbff66db57c60522b

                                  SHA512

                                  edbe8cf1cbc5fed80fedf963ade44e08052b19c064e8bca66fa0fe1b332141fbe175b8b727f8f56978d1584baaf27d331947c0b3593aaff5632756199dc470e5

                                • C:\ProgramData\vno1fsk\remcmdstub.exe

                                  Filesize

                                  62KB

                                  MD5

                                  6fca49b85aa38ee016e39e14b9f9d6d9

                                  SHA1

                                  b0d689c70e91d5600ccc2a4e533ff89bf4ca388b

                                  SHA256

                                  fedd609a16c717db9bea3072bed41e79b564c4bc97f959208bfa52fb3c9fa814

                                  SHA512

                                  f9c90029ff3dea84df853db63dace97d1c835a8cf7b6a6227a5b6db4abe25e9912dfed6967a88a128d11ab584663e099bf80c50dd879242432312961c0cfe622

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  9bfb45e464f029b27cd825568bc06765

                                  SHA1

                                  a4962b4fd45004732f071e16977522709ab0ce60

                                  SHA256

                                  ceb8f1b0aaa1ba575c3704e73fd77edf932d68c8be902b33f1ba3b1d130cd139

                                  SHA512

                                  f87cce8bb5489b56027f5a285b948b639a1c7b0f213a111f057235177e5bffc537627c82586736704e398a0185cf2ad8ba8cdee788531fb753a2d08f16e906c7

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  ae2a8f2ebc841509f7b978edf590d3cd

                                  SHA1

                                  91358152e27c0165334913228005540756c35bd3

                                  SHA256

                                  631550765e3db02be0709748c0634a2cfdab711cea94f5890854d0c1dfbcb214

                                  SHA512

                                  e52180dd175f1e6ff72d76400085869387cd70da33919de219a04dc26871e8421e93b22e7c59125c19c6ee54a8a8f742d796ac68ea9077c9dab5f03b80967d11

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  27a7b185f52ab3284f91b3721a18ed57

                                  SHA1

                                  132ccd864f3ad07e897c7a1818c86b97d588e6cf

                                  SHA256

                                  3bcf16f116e12aefa522e3fe0685053e2d273705c890e0d78c87adb0b12e6f96

                                  SHA512

                                  5a10b1b1965b4279fdcfd5a8f856943e48a3f2a3f05546904665e538d17d718491be32107268c3ffd8a285662d7072ee5720a29786891e2b785f5c9527d6ebcd

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  936a6d2c1343af3a28aaf10ace7a3c2d

                                  SHA1

                                  2c67ab8c39fbeb685132fe8545bbe009b828345e

                                  SHA256

                                  fcb2aa5f8918295f530d3bf84802a9f3c4eda04fe85035659177643049dbb098

                                  SHA512

                                  3fbf626a6891c58b29fafb531350c988e2034edf452db05d78be9a46516aaaf929aebbc8557926e695a8cb9b302ce39aad859a477ac300ada6714db877b55de1

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  46295cac801e5d4857d09837238a6394

                                  SHA1

                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                  SHA256

                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                  SHA512

                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  206702161f94c5cd39fadd03f4014d98

                                  SHA1

                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                  SHA256

                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                  SHA512

                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  baceb94fcd3984cf816779893f4fc241

                                  SHA1

                                  ac34bdc76479a82ac40e5642154868f5288ad141

                                  SHA256

                                  b590cac05fe21ab322e5b349b37393f75426d6318417f64d5a7fb5da930bacd4

                                  SHA512

                                  340142d2c1b894afe5d9dea323caa631b21dd49fc0bd8ac5fc10dd0558802b50e6e5139f52f4ff7f1f66c05984dd787e0ca13f180403d19eeea5f3e5a386649a

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  76d46ef3e625c02ea9b08fbc67d2c70f

                                  SHA1

                                  302a32a6b850746109c7b10110ae37a7e503dfac

                                  SHA256

                                  98d25c60c5b4f9537632f6bc2e65c3c73a797dd2f719b496910933f1a935d872

                                  SHA512

                                  33fbc5fcfcda84bcdfd2737ccdf49edb9cf06ab67bb5cafdc3a656d6f6af6854d009b340d27f9d1a225fd6e73aa4164228b7e5e812921386e2241a710330267a

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms

                                  Filesize

                                  10KB

                                  MD5

                                  2b5fad184881daf5129cac9dee4f5598

                                  SHA1

                                  0189d2b6a79e50b9ffb84938a847208f1c7c89c9

                                  SHA256

                                  f405380e08e333691b3dbd95bf756e8fbcb9577d11b87c6431165fc36297ee08

                                  SHA512

                                  0d189d8d5cd616c198811a31aba0d7365cebf553c8f8b6f8b27abf07c83368cd1762b509a0e956d06aaed114094325f6ccbb86bd159f5689873d718558b41c9b

                                • C:\Users\Admin\Downloads\Payment_198.rar

                                  Filesize

                                  489KB

                                  MD5

                                  c7f6d110378e3b12eb9d625ecb4c562c

                                  SHA1

                                  22de460a10d0fffa5d34bc7dd10ab76d9531dc6c

                                  SHA256

                                  3c65f9a6abfbe36909b696a1f08c14fb85b5b709f869e1d163d0c97953f22c94

                                  SHA512

                                  19a864571427d306cf594b09c45c4dc8d36d1d18af8d5241c8f5e8cbf2424015fe2e8822f7b37c48909ae1cffacab853e3c31620c1b5a22b4179464ec61a991f

                                • C:\Users\Admin\Downloads\Payment_198\Payment_198.js

                                  Filesize

                                  2.0MB

                                  MD5

                                  8628ad441bd6faefe0595cad2d6b6c8f

                                  SHA1

                                  7292bb76c1872d06b9f38dbf8f40df44a06180ad

                                  SHA256

                                  1fdf43c4b7b463410c3bc0ca5447061140127deeb5509e5029667620ad9e9d99

                                  SHA512

                                  0eed38dfec4e22e24ce1771f1315f7a96a613ed8f97f64271280248930c9d6e779348ab1c97578560a39072bb1e901f024a43953b05f57626213d55164c5c818

                                • memory/4220-87-0x00007FFEF5190000-0x00007FFEF6240000-memory.dmp

                                  Filesize

                                  16.7MB

                                • memory/4220-88-0x0000020C113F0000-0x0000020C114FE000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/4220-86-0x00007FFEF69A0000-0x00007FFEF6C56000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/4220-85-0x00007FFF04D90000-0x00007FFF04DC4000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/4220-84-0x00007FF7B16A0000-0x00007FF7B1798000-memory.dmp

                                  Filesize

                                  992KB