Analysis

  • max time kernel
    66s
  • max time network
    67s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2025, 18:08

General

  • Target

    https://www.mediafire.com/file/9loe4v9lx5zi0qp/Discord-image-logger.zip/file

Malware Config

Extracted

Family

mercurialgrabber

C2

https://dcwh.my/post?uniqueid=7b57f570

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Mercurialgrabber family
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks SCSI registry key(s) 3 TTPs 1 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.mediafire.com/file/9loe4v9lx5zi0qp/Discord-image-logger.zip/file
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa400146f8,0x7ffa40014708,0x7ffa40014718
      2⤵
        PID:2456
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
        2⤵
          PID:3116
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:5040
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:8
          2⤵
            PID:3252
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
            2⤵
              PID:5008
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:1
              2⤵
                PID:5176
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 /prefetch:8
                2⤵
                  PID:4028
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4544
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:1
                  2⤵
                    PID:3444
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:1
                    2⤵
                      PID:1748
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:1
                      2⤵
                        PID:208
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:1
                        2⤵
                          PID:5704
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5496 /prefetch:8
                          2⤵
                            PID:6080
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6372 /prefetch:1
                            2⤵
                              PID:848
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6460 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5716
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:1
                              2⤵
                                PID:5284
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:1
                                2⤵
                                  PID:1432
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6380 /prefetch:1
                                  2⤵
                                    PID:1916
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6780 /prefetch:1
                                    2⤵
                                      PID:3876
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6964 /prefetch:1
                                      2⤵
                                        PID:1852
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:4936
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:5296
                                        • C:\Windows\System32\rundll32.exe
                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                          1⤵
                                            PID:1116
                                          • C:\Program Files\7-Zip\7zG.exe
                                            "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Discord-image-logger\" -spe -an -ai#7zMap20765:102:7zEvent1429
                                            1⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of FindShellTrayWindow
                                            PID:5620
                                          • C:\Users\Admin\Downloads\Discord-image-logger\output.exe
                                            "C:\Users\Admin\Downloads\Discord-image-logger\output.exe"
                                            1⤵
                                            • Looks for VirtualBox Guest Additions in registry
                                            • Looks for VMWare Tools registry key
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Maps connected drives based on registry
                                            • Checks SCSI registry key(s)
                                            • Checks processor information in registry
                                            • Enumerates system info in registry
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1956
                                          • C:\Windows\system32\NOTEPAD.EXE
                                            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Discord-image-logger\tutorial.txt
                                            1⤵
                                              PID:2184
                                            • C:\Windows\system32\NOTEPAD.EXE
                                              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Discord-image-logger\LICENSE.txt
                                              1⤵
                                              • Suspicious use of FindShellTrayWindow
                                              PID:1776

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              39c51e5592e99966d676c729e840107b

                                              SHA1

                                              e2dd9be0ffe54508a904d314b3cf0782a9a508b7

                                              SHA256

                                              29f29a3495976b65de3df2d537628d260bc005da5956b262ff35e9f61d3d9ed3

                                              SHA512

                                              b20532d0131b12603410c3cb425cb5df0ddc740f34e688455eff757802ffc854be771b30c3ff196e56b396c6fe53928a1577c8330b00f3f7b849fcf625e51bf4

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              39e376ee2f541e6b1ed0bca701e8fb59

                                              SHA1

                                              bfe3cc2eed8721339d433533aef6e18e0a13a9a3

                                              SHA256

                                              80eda1e4d8c05e257ff17ef734d606e67d8ab70b3e351430b2b231631eed5e04

                                              SHA512

                                              a3f082c32857db0e3dec24394a259fff85e21b6a7b057ef55933504c23ec38cbb3237eb519d38385fc53cbc584c52aaf66291f44231245d9afee509a108a3350

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001b

                                              Filesize

                                              214KB

                                              MD5

                                              d20fef07db1e8a9290802e00d1d65064

                                              SHA1

                                              71befda9256ed5b8cd8889f0eeab41c50d66e64e

                                              SHA256

                                              f9cb4624d03224bfce50c4c0e484418acd462c249f38b4684e72b27a1f30144d

                                              SHA512

                                              ad5b2c8df60027c6dd5104bb8c2357b04eb24d69245c607ff99a6f2a887f929428252ad793d9aaa8c903c7b1e1bf9653cd35f79747d5281e7e3d2c21fa828537

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              1KB

                                              MD5

                                              a2f2c5986228390b3c091a56d311fefb

                                              SHA1

                                              c1f6ac6fcc06be62233a6933b5e3ff561f47c055

                                              SHA256

                                              82804b7d8b5ae91b3a4f26a5dcb99c0143af6ac08dc509a78f58ee5579279b72

                                              SHA512

                                              864f3fe664b713e49a7e4ffe92aa619cf2c949587bce48ca40cdfa5638d60f8c90db77767545f6a6c0ac7225de949465e1720ae713d1208497f793fc630496a1

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              8KB

                                              MD5

                                              a7c3f49586ac2a63654568884299425d

                                              SHA1

                                              f0a0c30d6a4d32a924e36ee00c239e8904aeb20d

                                              SHA256

                                              5107f329b0733f3f3f86d5526e943d968e07f5c037325b1aa455e7b21577a051

                                              SHA512

                                              70b259329102dcc0f3a282077c38cb7767f388c069e5796b236ef5c779ab9315c1d0a6cf46274bdab7f7df2be040270b874f63c403b141b433ee6f0fdda135fe

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              8KB

                                              MD5

                                              36c36993ad9a6862a868b52a4acb4d35

                                              SHA1

                                              6c22dc58a5b50f11cbd4d2ee2f543ce40284699a

                                              SHA256

                                              1badd8ba7f861cb6846c1104da17ac979cbb6125fd42fa63eac40362aedfbf24

                                              SHA512

                                              9dac1633df9132e39bda650b537b19337cd0cd0069317a978efd53bccb4da25eccf9e5b34c14811e956eda67c6f728226f164ec2adc5f385d6395a2ebb945cf6

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              fe8c14704f2b9262c4b8cabe8f4c0d60

                                              SHA1

                                              c7ab01c38ab0ddee89bd2e81bc270ca6199129bd

                                              SHA256

                                              4f4459f9a5c42354a44ffe8948459fbae2e58447cd1df58d6cbf223af6b08869

                                              SHA512

                                              da6acf8c337992dc8d29a28f10f147677b0b1554f44cae9e1fb5999bef3dcda8ea2f127aaa933ad013ae0ecf8bc726c70fb2d5099fc81d3efedb597ae73d3d76

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                              Filesize

                                              72B

                                              MD5

                                              784ab146c95aaa4103f73ea25ef89e6f

                                              SHA1

                                              8575060a2271089cdd920cde22f87ce2dc01fb2a

                                              SHA256

                                              ae7c0f35992a7509aa1ba442afa34dc178ca2a013a64afdc78d56747bf1ee776

                                              SHA512

                                              1febf8069c94ca542ccec80bbaa9214d9ec11ef31d65bd505f9e7c72a153604fbe84dff82b5c96f5469a7d1cd5843fa4a4b74553181495a1b4fe10dbdad962fd

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe582b12.TMP

                                              Filesize

                                              48B

                                              MD5

                                              4194b838dcae12141bef50f22253da20

                                              SHA1

                                              6e7de05d02fd7bcb3ef7d4294756d8a6b9443c9e

                                              SHA256

                                              41b971c86373ec9808f4c92628e6247e54d0498443d1f5aa27b6a109045c53cf

                                              SHA512

                                              abe68e6ec5641fa1a247c48748e7082d54bcefe44542c13a1adb8b42fee713cc76a010ace42cab8aa5ab9879f7582fba5e4682cfa72b686ea50abcddceb54721

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              296701983b4d5714dfdffc80090de8e3

                                              SHA1

                                              0efce66ee0b04e07b49854bb06cb6a54684b199d

                                              SHA256

                                              dccbf23053cd5a2f4bd41053218bd3471914c4e82ddb0784fd11a6e178fc90b6

                                              SHA512

                                              5693cde2740149f1d449c237f73dbdc54199d1abfb2a6aaf9f52acb033a19a08994c14cd1cd7f47b1db038f00abbc636d075810f80bdbe316265d20073495f40

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe581085.TMP

                                              Filesize

                                              1KB

                                              MD5

                                              72851d6f290efe2be19b2f73d873a3d1

                                              SHA1

                                              7de43b1a330a896512bfd6c677606f89d8e3f589

                                              SHA256

                                              84c9e802be36feab35532d414a9aa5b833bf3764dbf2c5ea4d9312f8822d6cfb

                                              SHA512

                                              a2b0d59f1e47cd8462af7656806742c8f6c3eace07803da275db204a05f0f4f3da4bfc792b97be7608df247eb079997f5b7147f904232bc4a0c6360d23ef4e36

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              6752a1d65b201c13b62ea44016eb221f

                                              SHA1

                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                              SHA256

                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                              SHA512

                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              d536b2b469afe0c29b76872b0872087a

                                              SHA1

                                              093e40aafa8bfca751b1a85fb7639d4168393797

                                              SHA256

                                              2c808e589d778a4eb1d35b524650c278d4d36334aca83455beb232243ba94114

                                              SHA512

                                              8e8f3476f0e562819cbb23565b81c54a0ab37cf9336c534db309267f6edd8913981f4de4186fabe31921515ea376d7eb326f7385963d65548bdb5c02a7fa7d72

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              630addbfb38bdd069e6dc82ed4c281a0

                                              SHA1

                                              5d687158e394392eb2752c8149de3c7d0c3c02d5

                                              SHA256

                                              7f8508036103f5f97396124f0a8495181da3b633afd613f23d5b2673fc841545

                                              SHA512

                                              0275381f274ca3f0cbe2b5fcb321d0031d8b6ecdfae6edfd3e72e32e7e016a19245485e36c81fa9ab241f607f120ccc9b71d43aa6a242d52e3d9b7415a8828c3

                                            • C:\Users\Admin\Downloads\Discord-image-logger.zip

                                              Filesize

                                              23KB

                                              MD5

                                              0a300eead5c92c4499a2c3ae15c01b8e

                                              SHA1

                                              5f5343e4a65fd391a02238ddaa84ee0348dc8aab

                                              SHA256

                                              138b3330c28bc569bffeeb110199f5d74a36acd88d4083cf1d800e8ba44ce544

                                              SHA512

                                              c2b23043acb8bc34e01ae7cc6d488f65f69cdf37257e9c41ddaeab71951b98cc20cfdf0dc644c50d33375c15cbe73fd1bb77c44cac3e0d4fde310efaa34184f5

                                            • C:\Users\Admin\Downloads\Discord-image-logger\LICENSE.txt

                                              Filesize

                                              11KB

                                              MD5

                                              2b42edef8fa55315f34f2370b4715ca9

                                              SHA1

                                              58853eb8199b5afe72a73a25fd8cf8c94285174b

                                              SHA256

                                              43070e2d4e532684de521b885f385d0841030efa2b1a20bafb76133a5e1379c1

                                              SHA512

                                              42edf58252a01b5858e6cc3c5a1a29bbcdf1295351b6a4383883a189499ec3c1a64cd5f2f6498a9385e85af21732c65afa866a8371afb4bf843f4e8bd38a7a73

                                            • C:\Users\Admin\Downloads\Discord-image-logger\output.exe

                                              Filesize

                                              41KB

                                              MD5

                                              98a87217adbe6adf17a081b6d8decfcb

                                              SHA1

                                              4acb7591160456700369cab9c08e33c32a68fa18

                                              SHA256

                                              658707c46d59a9fa66381766f47dd37f47895a4ac6bb1d16536bd62433148892

                                              SHA512

                                              c1eb5502ffd61bdf0e340b634c8071394ff6b7d2580baebcda8ab94e0102790a1b633d6334286131ae9933321bba24737aceafc3fd7c72a54a893a06b8583e94

                                            • C:\Users\Admin\Downloads\Discord-image-logger\tutorial.txt

                                              Filesize

                                              187B

                                              MD5

                                              0304f31948156aee5319509e349d1b8d

                                              SHA1

                                              fd358d34599d27922944f04813720598a3032cbd

                                              SHA256

                                              1c90177fc706ce8234309d41212daabc26b15283ff1d90f314aca979754aad2c

                                              SHA512

                                              5218a3d129400b24a8e8c2569b971bb9321905173eaf1b5781ee01fefdaf47d49197da74b129f5e80abcbc8d92c98b1605b15a3bd056a7b329bc122ff66f2427

                                            • memory/1956-258-0x0000000000D10000-0x0000000000D20000-memory.dmp

                                              Filesize

                                              64KB