Resubmissions

22-02-2025 19:21

250222-x2xk8awqcq 3

Analysis

  • max time kernel
    94s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2025 19:12

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___14EAZ9BR_.txt

Family

cerber

Ransom Note
Hi, I'am CRBR ENCRYPTOR ;) ----- ALL YOUR DOCUMENTS, PH0T0S, DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! ----- The only one way to decrypt your files is to receive the private key and decryption program. To receive the private key and decryption program go to any decrypted folder, inside there is the special file (*_R_E_A_D___T_H_I_S_*) with complete instructions how to decrypt your files. If you cannot find any (*_R_E_A_D___T_H_I_S_*) file at your PC, follow the instructions below: ----- 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://xpcx6erilkjced3j.onion/620E-D4CB-B55C-0098-BEEF Note! This page is available via "Tor Browser" only. ----- Also you can use temporary addresses on your personal page without using "Tor Browser". ----- 1. http://xpcx6erilkjced3j.1n5mod.top/620E-D4CB-B55C-0098-BEEF 2. http://xpcx6erilkjced3j.19kdeh.top/620E-D4CB-B55C-0098-BEEF 3. http://xpcx6erilkjced3j.1mpsnr.top/620E-D4CB-B55C-0098-BEEF 4. http://xpcx6erilkjced3j.18ey8e.top/620E-D4CB-B55C-0098-BEEF 5. http://xpcx6erilkjced3j.17gcun.top/620E-D4CB-B55C-0098-BEEF ----- Note! These are temporary addresses! They will be available for a limited amount of time! -----
URLs

http://xpcx6erilkjced3j.onion/620E-D4CB-B55C-0098-BEEF

http://xpcx6erilkjced3j.1n5mod.top/620E-D4CB-B55C-0098-BEEF

http://xpcx6erilkjced3j.19kdeh.top/620E-D4CB-B55C-0098-BEEF

http://xpcx6erilkjced3j.1mpsnr.top/620E-D4CB-B55C-0098-BEEF

http://xpcx6erilkjced3j.18ey8e.top/620E-D4CB-B55C-0098-BEEF

http://xpcx6erilkjced3j.17gcun.top/620E-D4CB-B55C-0098-BEEF

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Cerber family
  • Contacts a large (1109) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Downloads MZ/PE file 1 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 38 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb726346f8,0x7ffb72634708,0x7ffb72634718
      2⤵
        PID:4464
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:2
        2⤵
          PID:1496
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:3
          2⤵
          • Downloads MZ/PE file
          • Suspicious behavior: EnumeratesProcesses
          PID:2460
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:8
          2⤵
            PID:2248
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
            2⤵
              PID:4980
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:1
              2⤵
                PID:3580
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4064 /prefetch:8
                2⤵
                  PID:1780
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4064 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5012
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:1
                  2⤵
                    PID:4504
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:1
                    2⤵
                      PID:2288
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1
                      2⤵
                        PID:3712
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:1
                        2⤵
                          PID:3356
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5836 /prefetch:8
                          2⤵
                            PID:4072
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:1
                            2⤵
                              PID:1568
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6340 /prefetch:8
                              2⤵
                                PID:3952
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2040,8299024906654705609,4619886064530942368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3600
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4244
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1140
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:4320
                                  • C:\Users\Admin\Downloads\Cerber5.exe
                                    "C:\Users\Admin\Downloads\Cerber5.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Drops startup file
                                    • Executes dropped EXE
                                    • Enumerates connected drives
                                    • Drops file in System32 directory
                                    • Sets desktop wallpaper using registry
                                    • Drops file in Program Files directory
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    • Modifies registry class
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:752
                                    • C:\Windows\SysWOW64\netsh.exe
                                      C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
                                      2⤵
                                      • Modifies Windows Firewall
                                      • Event Triggered Execution: Netsh Helper DLL
                                      • System Location Discovery: System Language Discovery
                                      PID:400
                                    • C:\Windows\SysWOW64\netsh.exe
                                      C:\Windows\system32\netsh.exe advfirewall reset
                                      2⤵
                                      • Modifies Windows Firewall
                                      • Event Triggered Execution: Netsh Helper DLL
                                      • System Location Discovery: System Language Discovery
                                      PID:2708
                                    • C:\Windows\SysWOW64\mshta.exe
                                      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___OJMJ4KG_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:452
                                    • C:\Windows\SysWOW64\NOTEPAD.EXE
                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___OG31B_.txt
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Opens file in notepad (likely ransom note)
                                      PID:3952
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "C" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      PID:2628
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /f /im "C"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5008
                                      • C:\Windows\SysWOW64\PING.EXE
                                        ping -n 1 127.0.0.1
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Runs ping.exe
                                        PID:1260
                                  • C:\Users\Admin\Downloads\Cerber5.exe
                                    "C:\Users\Admin\Downloads\Cerber5.exe"
                                    1⤵
                                    • Executes dropped EXE
                                    • Enumerates connected drives
                                    • System Location Discovery: System Language Discovery
                                    PID:544

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    f5da507c2059b715761792e7106405f0

                                    SHA1

                                    a277fd608467c5a666cf4a4a3e16823b93c6777f

                                    SHA256

                                    8c1d99de087ac5f2e7b2afce66eff36a646bef46800c0c1d7737d6f0df74b7e8

                                    SHA512

                                    01c92729dd8061aa122b116a674c73bb78016f66d2cb8f7fb64907352758a825e87a1e345334386440699d2a6d1e17baccb400c5aee151eb64e64019cbebb870

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    3c6e13dc1762aa873320bed152204f3c

                                    SHA1

                                    38df427d38ca5ce6ce203490a9fb8461c7444e12

                                    SHA256

                                    5c441148843b7c8dbff4c4a72962a532aaf0bdd484d07a03dd9a32fd461b1371

                                    SHA512

                                    133054cb042e11013bfdad1bd11e3407d08cf26a66d0743bea9708d261aa904a1047bb0097b187ecf8436cb6cff3bec28c89e435862cad0e0fa264799556b70c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    1KB

                                    MD5

                                    43086991af406123777f946544767ed6

                                    SHA1

                                    7568a94100356748e54652e383a93736f7a8ed36

                                    SHA256

                                    fb40c09028a52a3e3098ab7adfc70441cb09219b8d58185d275c13abf5df1f75

                                    SHA512

                                    e1467704e5eda870dceaf09d844782eb84686ff2398add17fec575620b790036c5122fcf808004f53e40b142f5df5c08c4bfea16a07b036ca40bfdf26ff4f710

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    579B

                                    MD5

                                    0170c30b0f125bede7f88c82edc2b0af

                                    SHA1

                                    f6e5afbb5d657f6882b0e285c0cdfeee31c24d76

                                    SHA256

                                    aa9109d46652bfd48f41db8cc18992144b90580d93b2d111f0c6b5954ad71311

                                    SHA512

                                    02b0a5fb22290cd840a416139235128afdea2d612c1266a2813c0e122ba18bd398f3b8bc04f4cf789d5b3a68b26f957c34fa31746c916557f40260c819b42b98

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    fa08b6438b62e0e86575b0e8d689c11c

                                    SHA1

                                    b9adc57a5bec43efb67bc6cee1704a1d8f098658

                                    SHA256

                                    94f246ddbc0cad97eb1a2fe5d7c722a2ec8b6d81af90788c614ebbc8d49af7af

                                    SHA512

                                    e250afb16a673cee155ef88ecfb62a47137c6b1f8e03198a419f279c446f693a13336f30c7449f52f4e1e1b4a94dd06205969ea4fd746ac89ba59719eb073bd3

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    4999374d5191b6d82eb2ec3aa43e3e99

                                    SHA1

                                    c031a4e9deb61409485268a27c35bc93b562d794

                                    SHA256

                                    da886a27e10451fd3bda243c1e369d2ac740f651569f154551cc07d9f7c07cd3

                                    SHA512

                                    5e41126a1d114273d5ed09503dccc3a0f8bea58b79920c857d49dcc9b9eeadfcd75bdfdbb52bb5e28d8b7d1b74dbbe63aabe742bf784091b86d5e0c05aefb0ef

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    f391d8953260638a38ea1cad7a1ce8a6

                                    SHA1

                                    7438ae559ab56245eaed69c82427798b968155cf

                                    SHA256

                                    7d6bc5bf1803d418c5956b785c2118bb81a88cd1448488d17abf630a1c589b2e

                                    SHA512

                                    b4ee1ea390967354f8d5a07eab379886b47216e6cebdbd9de21139c1ad6e6257063c4f143577fdff7fb696f6beac28b17a3d22f215ee33e026c62f22ad55e155

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    98a99786351ae72f671a4507490934a9

                                    SHA1

                                    8d177d6993d810fa24f236134d61997f07c1b73e

                                    SHA256

                                    4e4420757102e7228c58f5923be35317fa3e5e3c545314f9100735c768e18e18

                                    SHA512

                                    fa2e389bae600e58ff1cd195f6bafc6895e1ab911678dd4c31f16333bfa443753d6ad18bb2b015215a04b0910901637e9b2003e9b3057e9feadf55b8c97e481e

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                    Filesize

                                    874B

                                    MD5

                                    811434c72df600d55708f2b492f78cbe

                                    SHA1

                                    9eea12a58facd6eff87b5753fc103a839c843cda

                                    SHA256

                                    c5071fd98e380aa4e76732b7902fd1ee9ecce9468005be1cb9bad46c940ad95e

                                    SHA512

                                    b4050313b9b52013f42fe2a4ddfc7f71fc2100b9d4c21c791bc69e84888aebbbc729d2aad7904dc2715dfbbf3ee62e325d2cbbf498dc10ad5c94b707b635f51e

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    fd662bd816fa9c04f847b4879d793e6f

                                    SHA1

                                    b9683b77270b4b93da1f0bd69b9ebdd474e21c86

                                    SHA256

                                    188881bd515f9e3aa16be942651e1e90a44f4b94cea513f891125159acefd4cb

                                    SHA512

                                    3906194b8c62a10dd8d6b9f3b221b0f13ed4b5fcfe5ddacd0566232d44b5459a20656649d686900dedcb0ddd8be91cf71d736fa10beb973fc2c0dde72bad83c9

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5815f4.TMP

                                    Filesize

                                    874B

                                    MD5

                                    1fa7fe9135bea97e516bdcc20e6e073d

                                    SHA1

                                    9d066106eb3bed302488e84eba30c5ed3d364d59

                                    SHA256

                                    8f5340128e0060a122ba30e8d63bb37274041c838f0de5934633e293b6c0f13c

                                    SHA512

                                    919a6dfb0bb863bc88b0b39603f6a644b71ce28d98246e139e6ce27920e9629ccf048ead931905e3f65cb9888a01f7d813394e850eb23667b4050de7bed20a93

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    b6c3815ff03b9aece06224498d335c32

                                    SHA1

                                    c389b19e0a8016c5d0e4ce42606eaa5b7aa44c5e

                                    SHA256

                                    8df206cbe8f3ec0964a429544e4f927b2d604ad5e7fe3201eb3b578db36f3921

                                    SHA512

                                    44cb6d2d892642471427c687b3455a3103d4e56db94eac05e5e8528b050283bdc6d561a3073d1a91b0641018ebdbe2cb62b86fb17a2552906cceedb7b1b8fd3b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    b33ecf0c9eeffa6e86e4f868ba4bcc1f

                                    SHA1

                                    155c89696359014681b65c870ca9a9e4ae779f6a

                                    SHA256

                                    f60d556a091f8b26b9f52b4602be2ae9ace0e115956a5f382c6e1895e05e6b9e

                                    SHA512

                                    c503e6c585807e038cdb9f2b672666747d57c778c5a78542decbc1ee6e0914da0a97ae9e6d6590b38df150ed453c874aaa77e75684c9d7772326ed6be02fbdf6

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___14EAZ9BR_.txt

                                    Filesize

                                    1KB

                                    MD5

                                    3ea6c24edff0fa6adf6fa817c635cbb1

                                    SHA1

                                    47234456dc8eb3afa2fe41de4cd7f47bb668e68e

                                    SHA256

                                    e61568de6b8d3ed97e96ce989f6792ab1063aca269bc5d193625cb0baec19ac7

                                    SHA512

                                    829f8e414358e14a0f5338474c75b2a2e32277219515830a6e0f9747decda50de12506eebdf91855dd128312916b755f202cf24ab4b41b9f722b908c56890545

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___HORH0TJT_.hta

                                    Filesize

                                    76KB

                                    MD5

                                    40ad3b0476a6bedb1677b6352e005a55

                                    SHA1

                                    d69325a050f21327533fb7c03f2d16668998bc0e

                                    SHA256

                                    0af582c9831925e7a1a3baefdb97be214a31818cbec1641d5d532bb50b76844a

                                    SHA512

                                    2c647c8ce0f1f131597ac5b548f7366daac52abc614a041aa94dc52c8e717f7ad683bd8380471b7dd773bb77f0febce752ff50c49d722495b00d41e1a227bfa5

                                  • C:\Users\Admin\Downloads\Unconfirmed 65497.crdownload

                                    Filesize

                                    313KB

                                    MD5

                                    fe1bc60a95b2c2d77cd5d232296a7fa4

                                    SHA1

                                    c07dfdea8da2da5bad036e7c2f5d37582e1cf684

                                    SHA256

                                    b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d

                                    SHA512

                                    266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89

                                  • memory/544-285-0x0000000000440000-0x000000000044E000-memory.dmp

                                    Filesize

                                    56KB

                                  • memory/752-300-0x0000000000400000-0x0000000000433000-memory.dmp

                                    Filesize

                                    204KB

                                  • memory/752-665-0x0000000000400000-0x0000000000433000-memory.dmp

                                    Filesize

                                    204KB

                                  • memory/752-660-0x0000000000400000-0x0000000000433000-memory.dmp

                                    Filesize

                                    204KB

                                  • memory/752-274-0x0000000000400000-0x0000000000433000-memory.dmp

                                    Filesize

                                    204KB

                                  • memory/752-713-0x0000000000400000-0x0000000000433000-memory.dmp

                                    Filesize

                                    204KB