Analysis

  • max time kernel
    360s
  • max time network
    319s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2025, 14:59

General

  • Target

    https://github.com/Pyran1/MalwareDatabaseUnsorted/blob/master/Samples/000a5351b371aded2fb7194910ee210cb029199eb65a4f755f23a4f904117607.exe

Malware Config

Extracted

Family

raccoon

Version

1.8.2

Botnet

8d179b9e611eee525425544ee8c6d77360ab7cd9

Attributes
  • url4cnc

    http://teletop.top/agrybirdsgamerept

    http://teleta.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Extracted

Family

redline

C2

95.181.152.12:44159

Attributes
  • auth_value

    c452e27d40203938502cf6d858f9be17

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 16 IoCs
  • Modifies security service 2 TTPs 11 IoCs
  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 2 IoCs
  • Raccoon family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Redline family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 26 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 13 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Downloads MZ/PE file 5 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 47 IoCs
  • Manipulates Digital Signatures 1 TTPs 64 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Boot or Logon Autostart Execution: Print Processors 1 TTPs 2 IoCs

    Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 9 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Modifies system executable filetype association 2 TTPs 54 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 5 IoCs
  • Indicator Removal: Clear Persistence 1 TTPs 47 IoCs

    remove IFEO.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Modifies WinLogon 2 TTPs 13 IoCs
  • Drops file in System32 directory 41 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 11 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 63 IoCs
  • NTFS ADS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 56 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Pyran1/MalwareDatabaseUnsorted/blob/master/Samples/000a5351b371aded2fb7194910ee210cb029199eb65a4f755f23a4f904117607.exe
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9dbc746f8,0x7ff9dbc74708,0x7ff9dbc74718
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:1276
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
      2⤵
        PID:4388
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3
        2⤵
        • Downloads MZ/PE file
        • Suspicious behavior: EnumeratesProcesses
        PID:3840
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:8
        2⤵
          PID:4784
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
          2⤵
            PID:324
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
            2⤵
              PID:516
            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:8
              2⤵
                PID:5032
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4280
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5068 /prefetch:8
                2⤵
                  PID:4932
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:1
                  2⤵
                    PID:5060
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6072 /prefetch:8
                    2⤵
                      PID:2260
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:716
                    • C:\Users\Admin\Downloads\000a5351b371aded2fb7194910ee210cb029199eb65a4f755f23a4f904117607.exe
                      "C:\Users\Admin\Downloads\000a5351b371aded2fb7194910ee210cb029199eb65a4f755f23a4f904117607.exe"
                      2⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:5036
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:1
                      2⤵
                        PID:3532
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:1
                        2⤵
                          PID:2208
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:1
                          2⤵
                            PID:5296
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6468 /prefetch:1
                            2⤵
                              PID:5304
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:1
                              2⤵
                                PID:6036
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3448 /prefetch:8
                                2⤵
                                  PID:2680
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6348 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5176
                                • C:\Users\Admin\Downloads\001aa198dd220207cd3e53c7e8b081dd093beb969f099d0ce61cb0cd452c14b3.exe
                                  "C:\Users\Admin\Downloads\001aa198dd220207cd3e53c7e8b081dd093beb969f099d0ce61cb0cd452c14b3.exe"
                                  2⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Checks whether UAC is enabled
                                  • System Location Discovery: System Language Discovery
                                  PID:5268
                                • C:\Users\Admin\Downloads\001aa198dd220207cd3e53c7e8b081dd093beb969f099d0ce61cb0cd452c14b3.exe
                                  "C:\Users\Admin\Downloads\001aa198dd220207cd3e53c7e8b081dd093beb969f099d0ce61cb0cd452c14b3.exe"
                                  2⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Checks whether UAC is enabled
                                  • System Location Discovery: System Language Discovery
                                  PID:5124
                                • C:\Users\Admin\Downloads\001aa198dd220207cd3e53c7e8b081dd093beb969f099d0ce61cb0cd452c14b3.exe
                                  "C:\Users\Admin\Downloads\001aa198dd220207cd3e53c7e8b081dd093beb969f099d0ce61cb0cd452c14b3.exe"
                                  2⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Checks whether UAC is enabled
                                  • System Location Discovery: System Language Discovery
                                  PID:428
                                • C:\Users\Admin\Downloads\001aa198dd220207cd3e53c7e8b081dd093beb969f099d0ce61cb0cd452c14b3.exe
                                  "C:\Users\Admin\Downloads\001aa198dd220207cd3e53c7e8b081dd093beb969f099d0ce61cb0cd452c14b3.exe"
                                  2⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Checks whether UAC is enabled
                                  • System Location Discovery: System Language Discovery
                                  PID:5528
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4584
                                • C:\Users\Admin\Downloads\001aa198dd220207cd3e53c7e8b081dd093beb969f099d0ce61cb0cd452c14b3.exe
                                  "C:\Users\Admin\Downloads\001aa198dd220207cd3e53c7e8b081dd093beb969f099d0ce61cb0cd452c14b3.exe"
                                  2⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Checks whether UAC is enabled
                                  • System Location Discovery: System Language Discovery
                                  PID:2464
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:1
                                  2⤵
                                    PID:2928
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4924 /prefetch:8
                                    2⤵
                                      PID:180
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6420 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2512
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:1
                                      2⤵
                                        PID:4356
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4056 /prefetch:8
                                        2⤵
                                          PID:5192
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6420 /prefetch:8
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:3276
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6412 /prefetch:1
                                          2⤵
                                            PID:2420
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7088 /prefetch:8
                                            2⤵
                                              PID:2608
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:8
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:1688
                                            • C:\Users\Admin\Downloads\Fagot.a.exe
                                              "C:\Users\Admin\Downloads\Fagot.a.exe"
                                              2⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Modifies WinLogon for persistence
                                              • Modifies firewall policy service
                                              • Modifies security service
                                              • Boot or Logon Autostart Execution: Active Setup
                                              • Boot or Logon Autostart Execution: Port Monitors
                                              • Event Triggered Execution: Image File Execution Options Injection
                                              • Manipulates Digital Signatures
                                              • Boot or Logon Autostart Execution: Print Processors
                                              • Executes dropped EXE
                                              • Impair Defenses: Safe Mode Boot
                                              • Modifies system executable filetype association
                                              • Adds Run key to start application
                                              • Indicator Removal: Clear Persistence
                                              • Installs/modifies Browser Helper Object
                                              • Maps connected drives based on registry
                                              • Modifies WinLogon
                                              • Drops file in System32 directory
                                              • Drops file in Windows directory
                                              • Event Triggered Execution: Netsh Helper DLL
                                              • System Location Discovery: System Language Discovery
                                              • Checks SCSI registry key(s)
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              • Modifies Internet Explorer settings
                                              • Modifies Internet Explorer start page
                                              • Modifies registry class
                                              • Modifies system certificate store
                                              • Suspicious behavior: EnumeratesProcesses
                                              • System policy modification
                                              PID:2164
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
                                              2⤵
                                                PID:5208
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5611954814190757329,8921297092227853478,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3544 /prefetch:2
                                                2⤵
                                                  PID:2716
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:3736
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:2844
                                                  • C:\Windows\System32\rundll32.exe
                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                    1⤵
                                                      PID:5160
                                                    • C:\Users\Admin\Downloads\000a5351b371aded2fb7194910ee210cb029199eb65a4f755f23a4f904117607.exe
                                                      "C:\Users\Admin\Downloads\000a5351b371aded2fb7194910ee210cb029199eb65a4f755f23a4f904117607.exe"
                                                      1⤵
                                                      • Executes dropped EXE
                                                      PID:3368
                                                    • C:\Users\Admin\Downloads\WinNuke.98.exe
                                                      "C:\Users\Admin\Downloads\WinNuke.98.exe"
                                                      1⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6040
                                                    • C:\Windows\System32\smss.exe
                                                      \SystemRoot\System32\smss.exe 000000b0 00000084
                                                      1⤵
                                                        PID:5208
                                                      • C:\Windows\System32\smss.exe
                                                        \SystemRoot\System32\smss.exe 000000ac 00000084
                                                        1⤵
                                                          PID:2716

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\a6915810-deb5-4c1f-911d-42036540335f.dmp

                                                          Filesize

                                                          825KB

                                                          MD5

                                                          c90818d9d99bfa4d465f464953bcd92f

                                                          SHA1

                                                          98b27c4d660f6f3138720e78cd6927c3d04315bf

                                                          SHA256

                                                          ec5c5b44cff13dc53b721d01d82f2a3b9ee09e5d01b6d1e05ffbff85329f36f0

                                                          SHA512

                                                          ecef09ab42fbf6f041a6206d983a72c41a5f996c130761f0d74d2803bcc8728ac33917bc613530957afc1c45b70a14164b8f7ca3e8f68405afbdd51d6d8d3103

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          830046cdf9c0ae18c66ab451c0c67a8b

                                                          SHA1

                                                          8c8763173b45f9f751d869b3ffcaa8b8f54120b2

                                                          SHA256

                                                          23929a828521bc566ba7b04a70b66f68ca7138b4a3c0ecf07eadecc680bb17a7

                                                          SHA512

                                                          495c87451008286022c112afb71b5f6bb2a6d2ed02f5765ead5b3d94c29733af6b8c83dcc64de6b0cd890f0cc3afc1d5fdc59140e04082a6a42d658aab2b3697

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          0d47548749f21064e18eeb2a53583399

                                                          SHA1

                                                          6c4623c7977090ccde01d48745b02d9485de838e

                                                          SHA256

                                                          2cfa2f680e7a0b94fe69e1cf5415effa1bc7982754a4adb806c04b5666f1ac45

                                                          SHA512

                                                          148ad4ea174563b4effcf6f4a0fdf5f0c86f9637c21a11407974ab603e0867b3a0dcfd9f53b57bfec7fdf1767edd74d09fb58cb806cde17fad50158ba5cc8f40

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          530542a18a6a8ed6ee368e1ef7dc5b6c

                                                          SHA1

                                                          dbe2ed90dc289b52318ab71c4e1afd4761458a2b

                                                          SHA256

                                                          d82bae18f65b2d3bfba38ea5eaada2191503fb0d723b8788eb4f664ac553a718

                                                          SHA512

                                                          50d2ab00f22e942d3fc7293ba30dc7cb91bff5faf91c16b970d99f59865d5f1f7c58b4e886658779cb4b15bc21cc998d04d20fe3043cf5a2379f9a6befb37571

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                                          Filesize

                                                          21KB

                                                          MD5

                                                          59fedd41e3287d05e9b9c44352da74d4

                                                          SHA1

                                                          cb0e50d8060ecf457116c2711b1cfacc595763f0

                                                          SHA256

                                                          49b133300b409b02cad9a1f3ba3eede1da07d8c482b7b37d4d1a56b6166da721

                                                          SHA512

                                                          7f374c04f574347992d5aff304cea0828f8359e794ba4bb9572acdc026c0cdde704a2f77b8856f834d18cd65ddd092a84049dc427151b087ce97a1651e2ec0f3

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000017

                                                          Filesize

                                                          45KB

                                                          MD5

                                                          1b2510252d927858a861b7567b09193f

                                                          SHA1

                                                          cd2ccc85e7e438aae22e27ad692c5f25cbd0b1ac

                                                          SHA256

                                                          c916ec16688b5ef1f60c29272d80b9121566c8dab4b228cc338fc8ca2447042f

                                                          SHA512

                                                          c4c610241f50e011f19e248041f8fdeb644092aba6795a5470b2a5ad516e7bf6ee9555dd99ce7376502e4bebada57469ffdce9433a74f2afa001aad9660750fe

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\temp-index

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          feb52abf829fb6b1087730aa58e8405f

                                                          SHA1

                                                          1ffb201a4c719ef48b0083c8704243adf41d4c89

                                                          SHA256

                                                          25151e7e5533d92457aeb32fd3a97eb80c820dd6e4e1266d6a2a637a17c0c863

                                                          SHA512

                                                          7debb203bd91d6b6b26de900f4e115dbc51a508907f3fe77e31278426c62a786dc526e4df0d5a68eb0e458ae7582e45a89bd3a68f6329c07afefff9d61a13c26

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          d4345916e7a599252a6f5db049acca57

                                                          SHA1

                                                          198700c5fbfa61c9ac790f01008e78e4a504afa1

                                                          SHA256

                                                          962fefebe629bf9c3ae3cadaefa28e014859716170034bd6d46d8fcc599df898

                                                          SHA512

                                                          da555271a8490588c3bb71bc630f4980f4786a7fe669869ddb2a0cbd73030c029d1d18d5cd8cf216fb2a9156e0f4ac08f006b8aa78bb258459adf7d608574fa5

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                          Filesize

                                                          579B

                                                          MD5

                                                          f27ed958e1ac5d59278dbe10e34865e2

                                                          SHA1

                                                          c003f415b2942510a0f7adc5b41f7e2bc14394f4

                                                          SHA256

                                                          c3a7404c67078e04ba08b496bd13fd25416feb35d6cd8c021b2a2f79fa7b1598

                                                          SHA512

                                                          dff1a1812ff4e30dbd1cdc7addca61afed9db876813c13779446901ae0361e9cfa31ddcb67ab46a44d235971eabef17fc05f3badb926be3869ad9e2f6a43a049

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          3cb0607b054037c711f1d00e4165502f

                                                          SHA1

                                                          0ad1420d0a8fa775831c24d9a3b2f68357f579a2

                                                          SHA256

                                                          5b115828afb20e8ac73fc0882f1cff32ac99882455efaa04de9705537f376d08

                                                          SHA512

                                                          f6b35aee10910931fc8bd4925e9ccf9b91a66e2694fb3e036b0f31e9feacde4e0ca1e7d589809205f3d4df910a723447a19491248f8588a59212af4c861d5061

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          c14d798b5bd4196e53c4c61575f3b927

                                                          SHA1

                                                          200c187b2a636aa5902f10bd04c89a179d9b2f44

                                                          SHA256

                                                          f15024aae0336de3ac32a4dca0390653a5b0cf47b97023cd62128ffa585d41fa

                                                          SHA512

                                                          14d074aee70ae200eb4755516ca8fe3327edc370aec9472e1c31ad85351aca69966c9f23cedb57ce199b6d978fdbdf4c154528efbe7fd132847b67cb2d2914e3

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          e9426563d1e1e9e3ebd5144de6e2602b

                                                          SHA1

                                                          fbbcc0b10a409e4ace9b6beff98726eb12037fa5

                                                          SHA256

                                                          4bc662b76e3abb365212a0138fc809b755f26e0a4d7ebcd665b786a0427f2d54

                                                          SHA512

                                                          081b669c115c26972d40805750e634f3b787bfb79fa5b6a6881761e216149e2b879f6d58a1fb4afea72d5afff2ec6aa548df95960571c0e78351aaaaefa1a447

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          57ec1d55c97a235e7ff3d44463dc341a

                                                          SHA1

                                                          e79b7cbfdbe0775f93a69dd2c38a39fd0a58de3b

                                                          SHA256

                                                          b89374bc4dfb12ea8d94594eaa64213972fdf2fae2c6a63c35dcb114fb6183e0

                                                          SHA512

                                                          eb62e04260d3b8cf4cb0282a8c15ea3cbefa6640766846733257443cf2b5dd79cf681c5fbb6c272e1b62892c016507705cb1cc3da9a15028f1ba706a21ccd576

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          efc4e674443645bd239c3fe93d329e73

                                                          SHA1

                                                          e73a6e19a0564de82aa5801d0d523b945eef49c8

                                                          SHA256

                                                          8d628bdc50fbe7be02b97b9e0d2d8e4a236d7e4594a9d3e2aaa683b1453a9fb4

                                                          SHA512

                                                          193241fc87ba1a40a4d70b8539f6c861e81b6264dac13409dfee7598078676f659170f25869abf4e4e863ee5c6fbdb175a3937c94c0d00b75662af7ba9b518c5

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          9ab95916df3ce897b4957ecd21bc531d

                                                          SHA1

                                                          80611442353416e1baad09153a5b46c1c3df0ac6

                                                          SHA256

                                                          c6bcc9806f3b722280667d71fe3207e21585d497b65f5ffff4124cd0eb4f1ba5

                                                          SHA512

                                                          ab22f328c27355fdd4fe03f1031189dc71aa0a16cf1b5f58236868f78059e9de1567a65b1a7c1f21bad613cea887d8b318ecccd57e09a2e96c85020d38a80a40

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          55cccd6455a8cac8d89f5435fffa9659

                                                          SHA1

                                                          1aa9de96d667b51dd34ce96af2eb99949da8c836

                                                          SHA256

                                                          d5f804d1faf6729d432f1d3fa9e761af8d8fbe62fcfd1a20c65d0136cdf25c39

                                                          SHA512

                                                          e56bc924fca38b534f20e02a3298011e64153c4ad349fdfeb190db9308c2c0cad3f479084c25a78f1a1351efb54f462f2b0ce4c73fe09fa9b0b0ffd44703404a

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          cb6fc34faed64683507d8acb66bce865

                                                          SHA1

                                                          4ad617c221726fb94627b6688132cda2712cfe55

                                                          SHA256

                                                          7ec56d7eaa20292bc755349e83f5c016a9c9919664a5d019af0114af77043a7a

                                                          SHA512

                                                          74453618befe772e41663909a4ff55e16821a95ca19b467660f081af7ca80a439e411562ae5a4f0bdc7b9344501cda85bbfacfae4ae19010d9627939396be01e

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          ba85b197cf67a7b1d073ce747d1670f7

                                                          SHA1

                                                          8ff03f489bb9d18490e36da8f7ad88811af3e1d9

                                                          SHA256

                                                          034f919c3509a91fd24970061b329027f53402d100d5a34144b2c0e373a6ada8

                                                          SHA512

                                                          c86caf201cb4b83a79cfba51a5214fc95634c0cae2d5d66b050729e3a7dd6d10c0e6389354113c8ea115f794fdbd7f2c629631d1dd5220dce0fccc9c82cd3781

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                          Filesize

                                                          24KB

                                                          MD5

                                                          7b706f81ccfddbd2defe1dae334468b0

                                                          SHA1

                                                          8eaee7ac615073c268177d2938f08c1d72c9dd92

                                                          SHA256

                                                          fc464dd3dfc999d09fa7bb9c66eecb61dd942e386382027383dd7c8cc71a0221

                                                          SHA512

                                                          7c3a0dd7258c8ae1516e7b3f469c61d53161ee3ae8a3e82050dc70b56be2875eac8e3411636baec9a4e2a9d5cff6a552117d946f39fd9fcea4ad682d6412d995

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          296d67fdc47426ce80c40e9f1d4e85ff

                                                          SHA1

                                                          8102cda50aa71f7729ef547511789bf0b7c1f77b

                                                          SHA256

                                                          a5044da57131aee7e32a88f6d754f7a14539b1cf2427d14e5c7630a2c5c035d1

                                                          SHA512

                                                          fdcd20f57e025f4ddea856255021988f9aa639c506429ebf12d0c14a3dba6448d10d87262a19efdd3792e3af19384128e9695e05e2c32c00fa325d97c386d0fc

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          8b4e359c8b3f8612eee24bd04a6c5060

                                                          SHA1

                                                          e162b601ac1b3af371f88ac09a515774c80e45a3

                                                          SHA256

                                                          256463b61a3df7d23b4604ca224a476f84a8869df32c8b0d64822497b0f5d767

                                                          SHA512

                                                          de2658e3ad5aa4a601784c8de2eec87bbab4173af6d2ba654de1b1450889a77948e1a913b84bf7240f276fa696535057267ce53f7bd952334548d666300fb80f

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          b4b2233b2125e7753ce796a2ef64c328

                                                          SHA1

                                                          895169a08ff683073f054bc434e9ea3fe438aa1a

                                                          SHA256

                                                          36332993bf552309d3627be085065c57d771743be6c9d9616871066c3968e243

                                                          SHA512

                                                          128e22e1e25373e3009408a33aa9439d255d90bc4bb71cb3d9f00b376089068eb71d8494f4bddb437d427f515bcf2e049affc602268d529004853a4cca9cac1d

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          03755b938aac83e48707d5fc8f373bce

                                                          SHA1

                                                          944530a96c134bb5c6544517f3160fb77e0a23ee

                                                          SHA256

                                                          fb04c74bad527f0b70986c5a14415e755cfd1ba37f644a1f9baf33865c6c6eb6

                                                          SHA512

                                                          c23c22ea6aebc0ad8c689d1838f4858e5dfc60d7aa4869ae51ac9c878dc22d104e75105693ff336e94567eb8cfc29411ae9b5cccc6aa5ca74f4cdda646b37341

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          950517922218e29149700596305c51fc

                                                          SHA1

                                                          cee311cb012f047d922038dc82768035eb98bd36

                                                          SHA256

                                                          06763c14a353d5f6935538d96d4b120cb3f2f196f9636b0bf61818050585b3d0

                                                          SHA512

                                                          98236587c98d00c8c3925eaa3764b21d4de806561fa2dfe8eaee8b4c3e004f87bc0fe230603c43e072c3f9c94b943889e7ae9fae182d79e0d3e5f84661f18638

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          f01b22bcf6037ae11194f55ef9989dc6

                                                          SHA1

                                                          d718d632ab61ef041da873331521897b50b12609

                                                          SHA256

                                                          7a767672360d00fc7f8ed7eefa514e2d8645790430c906e6b1db62426d3fd293

                                                          SHA512

                                                          f1231fec95e31d7dcc64e99fd4c6aa3aae5924ec11f66c6a521bbee59b2271ce1ed9a66140d73b2ed5ca453e201ea9248f573dfb6472969b0aa615d0319a230d

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          da2c97339d5edb2b1b9d5d4abdcf20b9

                                                          SHA1

                                                          2da8bf71055220ff2ab23c787495ad99f01d3bee

                                                          SHA256

                                                          06acc4ec05acab6db327dd17efef9988af813edbd6c3a2f7b6f82d7fcfced31f

                                                          SHA512

                                                          1f9872c707bb4db34ddccfdf45f7059e1d69ff2b81a60a1dd97d6d0b84dd6799597d70ae20a306691c497b60b970d8343c00b52cd1deef2ec8f30021e12bec49

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          19d1f461ba44611c197bd454c31a9e1a

                                                          SHA1

                                                          e8d60df57b8d4cdcd1336a9324ce153f8cc031b7

                                                          SHA256

                                                          c9809b79291d9ff8da2a16d86d34bff6d0c3b6016b38c4726dcbb08308b3a097

                                                          SHA512

                                                          36309325adbe5ccc0d4cf70f0d68c691b72584a59b763363fd6c24f0a74a3c155e081deb851ca86c7aaed22d90ff9332e8cb2315abb1d95b8359f7abba3f3c30

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          11aeb8d8334da526e97e7a310d99e4d1

                                                          SHA1

                                                          58bd90fba502554c4340edf9182cc81486b88a66

                                                          SHA256

                                                          d38cbca08011ad6f383fc3af1c1f9abb021f8fd6f295b9e0971f4b7d5664bfea

                                                          SHA512

                                                          2c8034d23c3b58cdecc695e41f9de3636229c4c896e13a5cfe759e91c1b99f39019fb79e254bcf441923103ce140a722a813e84fdaa204defce97985b0a49a4c

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          27171ca076dd6f8d4d5456b4b654213d

                                                          SHA1

                                                          ccf3273b136bb62e84b15cfca86deb6c367767f2

                                                          SHA256

                                                          b33615918f1e91a3c17cfab5071d28b94c195ddbdef725dd1cc7819b31b552f0

                                                          SHA512

                                                          4c17fad819230ebec00b9fd4be7593344c0e946a9b9d25ea517600ae54be64b2d237b30ef68e11dc3d04a0ccb399b4beecf6f42778e0ee919c58d36dc15a2a84

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          ed23401b6e689845464cd0bf3da53646

                                                          SHA1

                                                          6e8383154ebf7717f14556c970d1d682114d6fc3

                                                          SHA256

                                                          1bd2bd37636c6e25617746120f9e131b0b58069f18e5e335f79a12c46638a285

                                                          SHA512

                                                          4a159a17a00c5f5ab4a03a094b444050ff6f3e1bf5d8be3009a63d4b40e14e3c714ab5f9f537639e93f95c045d9decef904c0fa1c4a05e8afb929dcc164f0d94

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57d14a.TMP

                                                          Filesize

                                                          874B

                                                          MD5

                                                          1d97a2cdb17244b8c16ff8f3fd9dd188

                                                          SHA1

                                                          b476cbf4543744b21aefb511c249676784a1f4ca

                                                          SHA256

                                                          448b0b3cc27be6bbbdf4f44d6eb0942dbae070e707ccbf7b87c0dbe523352589

                                                          SHA512

                                                          a1bda07fa6ef19f62e0bc55db95446e7466c93b236a70224c913999b694eceac79a6988c4f3ca822767a5d4e1f07fc5c96376fd895a8ffcb71a5bc833dbfa58a

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b8720c0f-3efe-42df-ac47-f24ed95295a0.tmp

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          c6dfbc71207b0e6a8c1dc51f90c373f1

                                                          SHA1

                                                          41990be587a665eb1a6360a0e17f0e0b80f3ae16

                                                          SHA256

                                                          7af7ee9c2adba08809bf10cf2baf1cda95c7a1a63065d5d29b9c9c89687baa3a

                                                          SHA512

                                                          b8e3aadd7b18dc0a1dfcaf6a247c454882d0ad4fb2d88185afd322cc364ced3653d696c7a423f4bd41364f0e0dea5424a5aed55b8341bcbb13b340102cfab723

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                          Filesize

                                                          16B

                                                          MD5

                                                          6752a1d65b201c13b62ea44016eb221f

                                                          SHA1

                                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                          SHA256

                                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                          SHA512

                                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          10KB

                                                          MD5

                                                          5d7fb68098e37d4239f0e1bbcad3d2f0

                                                          SHA1

                                                          bbea7b962d30d0f7cba7855315ac65f5fe54ce8a

                                                          SHA256

                                                          7be6e2c69ca7160ab50192f80531ca3eddf8b96509403f05ef92fd0bb880b45f

                                                          SHA512

                                                          344ee47ee9ab9fd3ca379480e17f5ce168778cce382d967ec6fb5014ca9bb0b5ff2558976eef77f073098b8dde71678d9d85e18eb45fd1800b6c5308748120c0

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          7f6279f711e38adcd83e4a596e2a9aef

                                                          SHA1

                                                          f01865a6c749158bab9a16e618191b8ed655a8d7

                                                          SHA256

                                                          5a174599f9c9b25ffb586d73cf860504f7e5595af7528398b64c742d1ba3c807

                                                          SHA512

                                                          807ae0eec88dff56c46e5508555da776128ea632e87361ddbf2b2f8f79dccf42012a886a0635d506004dc1d159dc2f86bba09de7b2bd288caed97a5976a5fa88

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          640d9006b1ef313318582307b87c45b5

                                                          SHA1

                                                          98ac4036e0d5de134818a54938dd3e0382bc4730

                                                          SHA256

                                                          abf647afaa43f43c1696a8265a53ce3fd748b3bdb680fa671507554bec66f9a8

                                                          SHA512

                                                          cd00c9da6fc2be6012ff27c31393d84bca05e5a1e71dc29daf210f970f7b033af61f49dd21902e2d323f7f95959726fecba5c2a6b1ee07e0406e75e481dc725e

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          aa370fe05effa499d24cd01618469aa3

                                                          SHA1

                                                          b1048587447282d344149db424c02a98de0bb6f8

                                                          SHA256

                                                          c01538ba7016b6e4ba26d88c1ea5605f4988baccd99b31217fa2be680fa3a48b

                                                          SHA512

                                                          9736b7c6e093f4c8295f0d32d230bcbe66f18da2d462f42fc90bc68c194e4ae219de9dd394d1b76a3d6193f09185bb320b72bf391f5c9532d4ea0f693c9fe047

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          2fad38852d229055c094b7173c1f6978

                                                          SHA1

                                                          6c53d39a76fd1bf5fef20912bf6cad39d9296051

                                                          SHA256

                                                          87e66a96eeb3ccc6fa0dda0b8767036a9d19dea8b10d50177511f32c680f0aef

                                                          SHA512

                                                          d313330007c43ee94f0c1871b45fa1b2a3c84c65f95d75acd637f6c859b0eefc0acfad1a8335d832fa0a7a6d4e63389d07ef85974add6e1e5fa531969b31eca2

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          10KB

                                                          MD5

                                                          422a4991b3b711327cb14bfc4931c024

                                                          SHA1

                                                          7567c5c28635709982180eed73548a5c16956598

                                                          SHA256

                                                          5529d75c7b86fd802150bfea8bedff5394a61b9db2a3146f3c79f7ae1443477c

                                                          SHA512

                                                          320dd372b4983af539ff1316641fcea3393a21dc4c5a2a676605fe380b1a38901191824f2411b1c16a4b7313b710267701382b7adc2538ef605ef757c80e599b

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                          Filesize

                                                          264KB

                                                          MD5

                                                          1897ac06938a832e966b406338f396eb

                                                          SHA1

                                                          dfd688b453141fa07fbf94eb616db03c4e2fad6b

                                                          SHA256

                                                          ee45cc28ba4fe83813337a34cce084d9423ecd7894647719b96b7befafc11364

                                                          SHA512

                                                          cab29594ce6979c22b56fba37bb34ca5c0b7723708a49065e1dc58d68ab42d80984207cfd351d077b676d38d2bede0317ba8297deb9f696eedcee7a883f31b1c

                                                        • C:\Users\Admin\Downloads\Unconfirmed 370119.crdownload

                                                          Filesize

                                                          1.3MB

                                                          MD5

                                                          27c325bb5e2dc3a9fb5c0b4437bc243f

                                                          SHA1

                                                          9880c96589a67b363377cffd1c565e1e60502afa

                                                          SHA256

                                                          001aa198dd220207cd3e53c7e8b081dd093beb969f099d0ce61cb0cd452c14b3

                                                          SHA512

                                                          916c2b7890a83e650efbedf669fef1883771d17d745a5d3affe942825da44b7467b16ee12cd83c7d6f50cb5ba92a86dfa0f7fc6124bcbc73b1ffc36cf95e6691

                                                        • C:\Users\Admin\Downloads\Unconfirmed 594842.crdownload

                                                          Filesize

                                                          32KB

                                                          MD5

                                                          eb9324121994e5e41f1738b5af8944b1

                                                          SHA1

                                                          aa63c521b64602fa9c3a73dadd412fdaf181b690

                                                          SHA256

                                                          2f1f93ede80502d153e301baf9b7f68e7c7a9344cfa90cfae396aac17e81ce5a

                                                          SHA512

                                                          7f7a702ddec8d94cb2177b4736d94ec53e575be3dd2d610410cb3154ba9ad2936c98e0e72ed7ab5ebbcbe0329be0d9b20a3bcd84670a6d1c8d7e0a9a3056edd2

                                                        • C:\Users\Admin\Downloads\Unconfirmed 649406.crdownload

                                                          Filesize

                                                          373KB

                                                          MD5

                                                          30cdab5cf1d607ee7b34f44ab38e9190

                                                          SHA1

                                                          d4823f90d14eba0801653e8c970f47d54f655d36

                                                          SHA256

                                                          1517527c1d705a6ebc6ec9194aa95459e875ac3902a9f4aab3bf24b6a6f8407f

                                                          SHA512

                                                          b465f3b734beaea3951ff57759f13971649b549fafca71342b52d7e74949e152c0fbafe2df40354fc00b5dc8c767f3f5c6940e4ba308888e4395d8fd21e402b3

                                                        • C:\Users\Admin\Downloads\Unconfirmed 649406.crdownload:SmartScreen

                                                          Filesize

                                                          7B

                                                          MD5

                                                          4047530ecbc0170039e76fe1657bdb01

                                                          SHA1

                                                          32db7d5e662ebccdd1d71de285f907e3a1c68ac5

                                                          SHA256

                                                          82254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750

                                                          SHA512

                                                          8f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e

                                                        • C:\Users\Admin\Downloads\Unconfirmed 649753.crdownload

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          a56d479405b23976f162f3a4a74e48aa

                                                          SHA1

                                                          f4f433b3f56315e1d469148bdfd835469526262f

                                                          SHA256

                                                          17d81134a5957fb758b9d69a90b033477a991c8b0f107d9864dc790ca37e6a23

                                                          SHA512

                                                          f5594cde50ca5235f7759c9350d4054d7a61b5e61a197dffc04eb8cdef368572e99d212dd406ad296484b5f0f880bdc5ec9e155781101d15083c1564738a900a

                                                        • C:\Users\Admin\Downloads\Unconfirmed 673524.crdownload

                                                          Filesize

                                                          454KB

                                                          MD5

                                                          a29b233216094ad01ecd5c5405bda21c

                                                          SHA1

                                                          874b0eab36e5951df9a129ae272c627d661a69a4

                                                          SHA256

                                                          000a5351b371aded2fb7194910ee210cb029199eb65a4f755f23a4f904117607

                                                          SHA512

                                                          11365254b7b91b1ea81ce84a4c05ff18b9c60f4e97c32d8c770adc9168798553768ef271ccfca812b8d10e2330fb3c95d8fbcb9a01d61454619483682cdae63e

                                                        • memory/428-405-0x0000000000400000-0x00000000006FE000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/428-406-0x0000000000400000-0x00000000006FE000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/428-403-0x0000000000400000-0x00000000006FE000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/2464-442-0x0000000000400000-0x00000000006FE000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/2464-441-0x0000000000400000-0x00000000006FE000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/3368-291-0x0000000000400000-0x0000000000491000-memory.dmp

                                                          Filesize

                                                          580KB

                                                        • memory/5036-258-0x0000000000400000-0x0000000000491000-memory.dmp

                                                          Filesize

                                                          580KB

                                                        • memory/5124-401-0x0000000000400000-0x00000000006FE000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/5124-400-0x0000000000400000-0x00000000006FE000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/5268-397-0x0000000006500000-0x000000000653C000-memory.dmp

                                                          Filesize

                                                          240KB

                                                        • memory/5268-398-0x00000000065D0000-0x000000000661C000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/5268-396-0x00000000063F0000-0x00000000064FA000-memory.dmp

                                                          Filesize

                                                          1.0MB

                                                        • memory/5268-395-0x00000000063D0000-0x00000000063E2000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/5268-394-0x0000000005D10000-0x0000000006328000-memory.dmp

                                                          Filesize

                                                          6.1MB

                                                        • memory/5268-393-0x0000000000400000-0x00000000006FE000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/5268-392-0x0000000000400000-0x00000000006FE000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/5268-390-0x0000000000400000-0x00000000006FE000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/5528-407-0x0000000000400000-0x00000000006FE000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/5528-409-0x0000000000400000-0x00000000006FE000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/5528-408-0x0000000000400000-0x00000000006FE000-memory.dmp

                                                          Filesize

                                                          3.0MB