Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2025, 12:35

General

  • Target

    build22.exe

  • Size

    7.0MB

  • MD5

    0176388641637593938f5278b326a494

  • SHA1

    39d6cf486e4f292605f8cf0f6a19097e59462d6f

  • SHA256

    3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158

  • SHA512

    b00cd6c016b4844b8ac7b434f2bd7d621879eed815210e9a846741efd49121348755ef4d6ef9609965abbf1a154c0017c56b9fee79854bd031e3eaddfc4e4ca7

  • SSDEEP

    196608:XMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:AA403qakSoR7tfI7ZtXADu8X9Y95GQLJ

Malware Config

Extracted

Family

stealerium

C2

https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Stealerium family
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\build22.exe
    "C:\Users\Admin\AppData\Local\Temp\build22.exe"
    1⤵
    • Checks computer location settings
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:4032
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging
      2⤵
      • Uses browser remote debugging
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2448
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffe066dcf8,0x7fffe066dd04,0x7fffe066dd10
        3⤵
          PID:3260
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2052,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2044 /prefetch:3
          3⤵
            PID:380
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=2016,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2008 /prefetch:2
            3⤵
              PID:3164
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2404,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2400 /prefetch:8
              3⤵
                PID:1940
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3016,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3012 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:1672
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2992,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2988 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:3288
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4116,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4112 /prefetch:2
                3⤵
                • Uses browser remote debugging
                PID:4836
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4556,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4508 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:4264
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5184,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5172 /prefetch:8
                3⤵
                  PID:3152
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5452,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5448 /prefetch:8
                  3⤵
                    PID:5104
                • C:\Windows\SYSTEM32\cmd.exe
                  "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                  2⤵
                  • System Network Configuration Discovery: Wi-Fi Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3932
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    3⤵
                      PID:1584
                    • C:\Windows\system32\netsh.exe
                      netsh wlan show profile
                      3⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Network Configuration Discovery: Wi-Fi Discovery
                      PID:1888
                    • C:\Windows\system32\findstr.exe
                      findstr All
                      3⤵
                        PID:3880
                    • C:\Windows\SYSTEM32\cmd.exe
                      "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                      2⤵
                        PID:1136
                        • C:\Windows\system32\chcp.com
                          chcp 65001
                          3⤵
                            PID:4636
                          • C:\Windows\system32\netsh.exe
                            netsh wlan show networks mode=bssid
                            3⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            PID:2512
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging
                          2⤵
                          • Uses browser remote debugging
                          • Enumerates system info in registry
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of FindShellTrayWindow
                          PID:1776
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x29c,0x7fffdcacf208,0x7fffdcacf214,0x7fffdcacf220
                            3⤵
                              PID:3380
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2212,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2208 /prefetch:3
                              3⤵
                                PID:4984
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2172,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2164 /prefetch:2
                                3⤵
                                  PID:1236
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2632,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2628 /prefetch:8
                                  3⤵
                                    PID:1620
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3472,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3468 /prefetch:1
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:1784
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3520,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3508 /prefetch:1
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:4292
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4160,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4156 /prefetch:1
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:4816
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4204,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4288 /prefetch:2
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:2904
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5044,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4388 /prefetch:8
                                    3⤵
                                      PID:4596
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5184,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5168 /prefetch:8
                                      3⤵
                                        PID:2700
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\c0e15053-a07b-4f3b-89fe-4c47c42ebc91.bat"
                                      2⤵
                                        PID:2304
                                        • C:\Windows\system32\chcp.com
                                          chcp 65001
                                          3⤵
                                            PID:1600
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill /F /PID 4032
                                            3⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3140
                                          • C:\Windows\system32\timeout.exe
                                            timeout /T 2 /NOBREAK
                                            3⤵
                                            • Delays execution with timeout.exe
                                            PID:1376
                                      • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                        "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                        1⤵
                                          PID:2424
                                        • C:\Windows\system32\msiexec.exe
                                          C:\Windows\system32\msiexec.exe /V
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4980
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                          1⤵
                                            PID:1652
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                            1⤵
                                              PID:1152

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                              Filesize

                                              2B

                                              MD5

                                              d751713988987e9331980363e24189ce

                                              SHA1

                                              97d170e1550eee4afc0af065b78cda302a97674c

                                              SHA256

                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                              SHA512

                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              80KB

                                              MD5

                                              bace49cf00968389e1287531fa5583d8

                                              SHA1

                                              4567515430fdcf5139b0edad5b2b19f38783f1f3

                                              SHA256

                                              809b70a4b53bea4b4cb83a49025b783cbe18e3f43946c3381e9ac7510d19554e

                                              SHA512

                                              68dcb5fea5f2e6aa42507e1779e3b67763d266803dffd18ebfb54be66d8f7e98e09cdcde7bcb7e4086c2f612a8172f80a8ec993b0c3ec4c15a356680f6dafbf4

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              280B

                                              MD5

                                              049e5a246ed025dee243db0ba8e2984c

                                              SHA1

                                              15ec2d2b28dcfc17c1cfb5d0c13482d0706f942d

                                              SHA256

                                              33071ca42c472861a2fabd0f82f8b03ef0daaa6796b24b83f3df02587e4c3d12

                                              SHA512

                                              bc5f6fa6a8cae20ab40eae4552650d75f38ebb158c95288a79d9f332623bb507946513c39d19c00a5aee323df01f0f1a51c54594ef1c293289baf45f4ae2145b

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              280B

                                              MD5

                                              4facd0ff10154cde70c99baa7df81001

                                              SHA1

                                              65267ea75bcb63edd2905e288d7b96b543708205

                                              SHA256

                                              a13534df0cd0a79a3a1b91085a6d575b47d5a9aad7fc6d712fd2616c0e95a23b

                                              SHA512

                                              ad8d2b965851c0ddc23e92ae151b3b0b2bcda850c446f4278bdb0754d6b42ead8fc034b394749578a27b33ad7e4ab0633f974dfd4773fbe4d93ae477f00b73f2

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                              Filesize

                                              69KB

                                              MD5

                                              164a788f50529fc93a6077e50675c617

                                              SHA1

                                              c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                              SHA256

                                              b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                              SHA512

                                              ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc742e8e-8d86-4c2c-a946-d520a388195f\index-dir\the-real-index

                                              Filesize

                                              1KB

                                              MD5

                                              79cfa396fe50ab43108336ca42352432

                                              SHA1

                                              e1f5af3db0582f87f3a177149040b43f45220cd0

                                              SHA256

                                              60fe790283f02740d32e42cb6b096586417e3d4d3cdd637c53ce25bbc4490ad2

                                              SHA512

                                              488576995fd432283441fb61e71632c7e2b0a65ef81637ddb2178b376d224e204ffa8c7a972db452c3f3675cd345f07aa2e0ddf36fd499a6ca24c15f8e6b4a2c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc742e8e-8d86-4c2c-a946-d520a388195f\index-dir\the-real-index~RFe57e639.TMP

                                              Filesize

                                              1KB

                                              MD5

                                              ee2cdbfe8db0d81d85cfa6d6669818d8

                                              SHA1

                                              b74d34db6ac386e48891c5243350357a77d50df8

                                              SHA256

                                              fe34b1099594c0ce45b166a9753269c87a282c460ccdc9a919406431b4ea79f5

                                              SHA512

                                              3b54d7c6ce04d787b15305beb2a363cce366ea410893bc6455c1b41ae40b13e1b81f05e3eb1046b5e804b86f4f427ac8e463ae0e5d3f0c8a1c002f89d901f4e0

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              6KB

                                              MD5

                                              9de93a7508bcec6159e8fe9b197c12c3

                                              SHA1

                                              a0f0a8a30cd2e6e87398b8a0a22116c01bc0bb6a

                                              SHA256

                                              ad4f791cbc0c59ff972afac9028f68d5ba59716cd282b34e56577fccaa4d3571

                                              SHA512

                                              232c045fb6f755400fd3339e28950a552b20fcc98225e13f6b4920bda43df417db03d9a519692bdf9caf2e113b18be49eafee1f897e853ad2a98493d3c1de29f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              7KB

                                              MD5

                                              c5ae734176a496c652598a1b903f63b4

                                              SHA1

                                              8fddb685c1b8c2254dda09eaf7af574cb1f447a8

                                              SHA256

                                              955b52483212796979935ec845ea2d6bc2a7e1a6315d53cf22d3067897aac7c0

                                              SHA512

                                              fc6d450709fb6a135e41ee0a53e7932464879744b18117fe44b4c16d3046b58c32c5f07f57d0c301c0d769605ae8f99008e430ebf0c2bd28356c08772a7a89fd

                                            • C:\Users\Admin\AppData\Local\Temp\c0e15053-a07b-4f3b-89fe-4c47c42ebc91.bat

                                              Filesize

                                              152B

                                              MD5

                                              2415b4db26f526d787a581cbdbc86595

                                              SHA1

                                              dfb04b6abfaacaa4bb6857e272c11cfaa6982ab7

                                              SHA256

                                              5fef0f969efd45bc70c150c8d43400c1e21e7624ab7c4bfe9070c97684447d3f

                                              SHA512

                                              10e11f23ed3325f4de5aec0a3bc2ba94ee9600e698770cfb9154dc1c0f95cfdbfe67ce4acfbc6dc49419989fb4069295861fe919e15610803ad6c54d2753c2e0

                                            • C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\Browsers\Firefox\Bookmarks.txt

                                              Filesize

                                              173B

                                              MD5

                                              70e1643c50773124c0e1dbf69c8be193

                                              SHA1

                                              0e2e6fd8d0b49dddf9ea59013a425d586cb4730c

                                              SHA256

                                              4fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a

                                              SHA512

                                              664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679

                                            • C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\Browsers\Microsoft Edge\Cookies.txt

                                              Filesize

                                              1KB

                                              MD5

                                              6caecbd237bf9a627d697986f534561a

                                              SHA1

                                              564533f95a1adbcd0b5d4d1a8a79cbd6f516b335

                                              SHA256

                                              1501d94d1f3aa150ec16aa10032cef7ee90a528e53a6608aebf77bd3d707f661

                                              SHA512

                                              c4510e379dd673e8e256c0d7747497264d3cd1b418467802b85cf4202df18c005a0e49339d32f3fc1587fa0675d04b02eb125bc99662bd8f155064386489f672

                                            • C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\System\Apps.txt

                                              Filesize

                                              846B

                                              MD5

                                              810c1a2dc826cfe53b97393087e70545

                                              SHA1

                                              664813d995f98b54c1a57992bbf827901a7be644

                                              SHA256

                                              3bb06f31828639a6740c269217c1135a24aff002ce1ca87226ea1f1fb185bbe0

                                              SHA512

                                              54007e7636e689e8c4f6b1bc768a48413587a2c5add1c64bcaf6c317f9cd29ffd4d0150f2163e0f2f819b8397604e0cd33e6af6335a95c63a1a0dacee60ed700

                                            • C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\System\Apps.txt

                                              Filesize

                                              6KB

                                              MD5

                                              286b8dc0b1a7469ef63c4577e6a0a17b

                                              SHA1

                                              7f6f1a19dfeb67fdf7f1f3512c3b67f1c6eb4a55

                                              SHA256

                                              22990aaf8d380c99d0dd9593b6f607fc889e3064cdb78735e62c75556922038b

                                              SHA512

                                              6ca0dc36d4a0f6d2363772762a2c32abdaa520a9d41113b3839657b1330f703a3f1e573dfd071abc038ef98a1d33dc11af31f08931e88f307b565f4b472c1b56

                                            • C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\System\Process.txt

                                              Filesize

                                              3KB

                                              MD5

                                              3f256aa76b239378f703bc49f57978f8

                                              SHA1

                                              993b598f90c479f475b7a6e147970b7c1b4111a8

                                              SHA256

                                              d7b47636d892dea3afd56aebdb0714cab03ae2f2b3c0ade0c1043c22e5cbc2ba

                                              SHA512

                                              89df2d2d8705c2c4133357f8010e69792718a22379429545ce61e88d417af4e5e3be1ec1b1859812316ff6acada56f812abcb34c50888a848f7671be84e45afe

                                            • C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\System\Process.txt

                                              Filesize

                                              3KB

                                              MD5

                                              0738e0bb4c58bd206953002da41b22b3

                                              SHA1

                                              a9d2ea6c22812c5c28310cb6bfc1e0d056f58df9

                                              SHA256

                                              5fcb3bb9d5f2168ee99e2596e5f02626af515c64310d80a164b4676fdc1d5852

                                              SHA512

                                              b5caf3771323b6468d75db4483dc83e19044799e628e419df9f4e13aef6f02cad0d95d7524aca53fd4ab603ea683c53467df68e79e0555b8787bba8b0b4ea160

                                            • C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\System\Process.txt

                                              Filesize

                                              4KB

                                              MD5

                                              8be27b84b49603f2d7621658c15a6da0

                                              SHA1

                                              20472ac08d320c7e90bd2988d1e0b027d37e22cc

                                              SHA256

                                              8e291623e70e6972c79071624a974acd8e1248bc742e6c69cba90295db16c58c

                                              SHA512

                                              28071ee6e20adaeda79aad62b575ecdb5927213d71ab53bac8611c0781c6edb1977efc85434c6fe45989ac1ca415d237425c10ffcf77b855c9263130ce03ec2f

                                            • C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\System\Process.txt

                                              Filesize

                                              773B

                                              MD5

                                              63619097a19aabe5543969d5363b4878

                                              SHA1

                                              12d2d84ad9c639bcff461805f5aa6a679ea87351

                                              SHA256

                                              4cdaf79ed834e2c4572c44b3af6178af7a5d62e80db59f7f1237bfaab9f8bcaa

                                              SHA512

                                              6ec2e77c703825d4dd0e2b19c3cede950c206a75982da1a36eef6d8ec051f98b5b11f393c6e6658387ad789b8e1f5e7bedad876e8f1a8127ba1b8bd7b1a7f8a4

                                            • C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\System\Process.txt

                                              Filesize

                                              1KB

                                              MD5

                                              828c5b1ad51450a736116534eca04030

                                              SHA1

                                              803d282808898fe528186ed497cb3a36431b1408

                                              SHA256

                                              bbfaed6465a120fe949d716305e0135ec6a80a39843104a8f25731c2e808e836

                                              SHA512

                                              7a84efce2d76dee577346d55ee9c7678affb3f38fe236b57e3a6cddb14e3eeb2b85a117cce01225daac53da4da28ebb48b9781ac451686b872252b4a037846d6

                                            • C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\System\Process.txt

                                              Filesize

                                              2KB

                                              MD5

                                              d05e1fa96a2adb3bbb06b12775c55107

                                              SHA1

                                              78c57e7d350bf222bed7a072b7f26e5faeb3a3ea

                                              SHA256

                                              285e680314a3ff5a5d02882ca9ac4f608f26945933b5036e600953215d0c37bf

                                              SHA512

                                              c0063fd479ce74fb5b9dad8151d3e40b11fb910c559a4124546d2da18f7c23bb639acc9195a3c9bf1c9e0fc2a1f948b48e1d9eb88acd6feb35409ad619995a4a

                                            • C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\msgid.dat

                                              Filesize

                                              4B

                                              MD5

                                              e8dfff4676a47048d6f0c4ef899593dd

                                              SHA1

                                              b64b34db6b0bccc0a3efb43d0d0fb014e40dccb7

                                              SHA256

                                              9e645831962e43f534afd60532328ba5ab4eefea6e73765fb9690e4d395112f8

                                              SHA512

                                              9f4ecf9a843114685ec8b12e7e7ab3f5e006da1146ac5d5628fff8c6ee5a073ea87de4b2de95e3e4b0978cf6a155154e3a1d7d9c44d63fca1bc5cab87214cfe8

                                            • memory/4032-0-0x00007FFFE1C93000-0x00007FFFE1C95000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/4032-23-0x000001ECC6560000-0x000001ECC6612000-memory.dmp

                                              Filesize

                                              712KB

                                            • memory/4032-166-0x000001ECC7970000-0x000001ECC7992000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/4032-160-0x00007FFFE1C90000-0x00007FFFE2751000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4032-379-0x000001ECC7930000-0x000001ECC7974000-memory.dmp

                                              Filesize

                                              272KB

                                            • memory/4032-380-0x000001ECC79E0000-0x000001ECC79FA000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/4032-2-0x00007FFFE1C90000-0x00007FFFE2751000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4032-155-0x00007FFFE1C93000-0x00007FFFE1C95000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/4032-1-0x000001ECAB4F0000-0x000001ECABBFE000-memory.dmp

                                              Filesize

                                              7.1MB

                                            • memory/4032-502-0x00007FFFE1C90000-0x00007FFFE2751000-memory.dmp

                                              Filesize

                                              10.8MB