Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2025, 12:44

General

  • Target

    build22.exe

  • Size

    7.0MB

  • MD5

    0176388641637593938f5278b326a494

  • SHA1

    39d6cf486e4f292605f8cf0f6a19097e59462d6f

  • SHA256

    3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158

  • SHA512

    b00cd6c016b4844b8ac7b434f2bd7d621879eed815210e9a846741efd49121348755ef4d6ef9609965abbf1a154c0017c56b9fee79854bd031e3eaddfc4e4ca7

  • SSDEEP

    196608:XMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:AA403qakSoR7tfI7ZtXADu8X9Y95GQLJ

Malware Config

Extracted

Family

stealerium

C2

https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Stealerium family
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\build22.exe
    "C:\Users\Admin\AppData\Local\Temp\build22.exe"
    1⤵
    • Checks computer location settings
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:6000
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging
      2⤵
      • Uses browser remote debugging
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4496
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe2e9adcf8,0x7ffe2e9add04,0x7ffe2e9add10
        3⤵
          PID:4492
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1960,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=1952 /prefetch:2
          3⤵
            PID:4348
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2136,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2132 /prefetch:3
            3⤵
              PID:4380
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2280,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2276 /prefetch:8
              3⤵
                PID:2196
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3012,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3008 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:3268
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3052,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3048 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:5084
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4148,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4144 /prefetch:2
                3⤵
                • Uses browser remote debugging
                PID:2064
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4588,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4584 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:5152
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5116,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5112 /prefetch:8
                3⤵
                  PID:4216
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5400,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5396 /prefetch:8
                  3⤵
                    PID:5672
                • C:\Windows\SYSTEM32\cmd.exe
                  "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                  2⤵
                  • System Network Configuration Discovery: Wi-Fi Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4812
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    3⤵
                      PID:4772
                    • C:\Windows\system32\netsh.exe
                      netsh wlan show profile
                      3⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Network Configuration Discovery: Wi-Fi Discovery
                      PID:4224
                    • C:\Windows\system32\findstr.exe
                      findstr All
                      3⤵
                        PID:3312
                    • C:\Windows\SYSTEM32\cmd.exe
                      "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                      2⤵
                        PID:872
                        • C:\Windows\system32\chcp.com
                          chcp 65001
                          3⤵
                            PID:4008
                          • C:\Windows\system32\netsh.exe
                            netsh wlan show networks mode=bssid
                            3⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            PID:5716
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging
                          2⤵
                          • Uses browser remote debugging
                          • Enumerates system info in registry
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of FindShellTrayWindow
                          PID:6028
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x254,0x7ffe2ce0f208,0x7ffe2ce0f214,0x7ffe2ce0f220
                            3⤵
                              PID:5540
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2212,i,975868797165471255,6471958975750008305,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2208 /prefetch:3
                              3⤵
                                PID:5884
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2172,i,975868797165471255,6471958975750008305,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2164 /prefetch:2
                                3⤵
                                  PID:1504
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2252,i,975868797165471255,6471958975750008305,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2936 /prefetch:8
                                  3⤵
                                    PID:456
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3492,i,975868797165471255,6471958975750008305,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3488 /prefetch:1
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:1984
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3536,i,975868797165471255,6471958975750008305,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3544 /prefetch:1
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:5176
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\56a38433-58a3-4270-beb7-9918367c59af.bat"
                                  2⤵
                                    PID:5796
                                    • C:\Windows\system32\chcp.com
                                      chcp 65001
                                      3⤵
                                        PID:5836
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill /F /PID 6000
                                        3⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3748
                                      • C:\Windows\system32\timeout.exe
                                        timeout /T 2 /NOBREAK
                                        3⤵
                                        • Delays execution with timeout.exe
                                        PID:4064
                                  • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                    1⤵
                                      PID:2264
                                    • C:\Windows\system32\msiexec.exe
                                      C:\Windows\system32\msiexec.exe /V
                                      1⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3976
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                      1⤵
                                        PID:1252
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                        1⤵
                                          PID:2896

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\Browsers\Firefox\Bookmarks.txt

                                          Filesize

                                          173B

                                          MD5

                                          70e1643c50773124c0e1dbf69c8be193

                                          SHA1

                                          0e2e6fd8d0b49dddf9ea59013a425d586cb4730c

                                          SHA256

                                          4fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a

                                          SHA512

                                          664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679

                                        • C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\Browsers\Microsoft Edge\Cookies.txt

                                          Filesize

                                          1KB

                                          MD5

                                          7dcd9f390d45bdd4e6e68b3e02b5a081

                                          SHA1

                                          59eb5dd7bd0feeda37f23494934077cc8fe36178

                                          SHA256

                                          c81f4f600d1743d00c90a84892a4b1b9dfd479f0df74b3a0aa4f8e57391bb816

                                          SHA512

                                          b86f2d50aba9f8ce6c9ba30c441a695d38ca65a3f9508c0af4f64cbde0378b0b3c3b8842aa9a48daba80020996696fd4897b7c2ca8550c407c8298b77e1abcb5

                                        • C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Apps.txt

                                          Filesize

                                          2KB

                                          MD5

                                          3e3d169b3c3dc0a1d3b69dc6fe081c01

                                          SHA1

                                          308fb934b327e2731d7b3504af462944cadc9245

                                          SHA256

                                          ee7b70d356882b2221d413b697d8552fbbe252b8e6c73a66df4a03e72bdb8654

                                          SHA512

                                          6da26caa4cfcba082890755d22f869895cca53a9e2c7582975c4f45794c2c5b0e31dd2b4e2bbe2550fc935ed1252a9cb232846cb262709c3f14ee5af6ec47da1

                                        • C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Apps.txt

                                          Filesize

                                          3KB

                                          MD5

                                          18649d5924d8048eec12b9b525efac79

                                          SHA1

                                          598592e19fc69e3f86d229d219229a3b0dc22272

                                          SHA256

                                          01e5b309e5239a00c88cfcdf2dcbf094fe25f29f55915d589f4a76d362edea81

                                          SHA512

                                          53edd1072e9421c7af2bb6d27fa9d5d8729be9144d4ac781b9506799abf115446fdec57b84d77d59bb6e45a088db957873260d582c9c0a99ecf5be290d4ba160

                                        • C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Apps.txt

                                          Filesize

                                          6KB

                                          MD5

                                          286b8dc0b1a7469ef63c4577e6a0a17b

                                          SHA1

                                          7f6f1a19dfeb67fdf7f1f3512c3b67f1c6eb4a55

                                          SHA256

                                          22990aaf8d380c99d0dd9593b6f607fc889e3064cdb78735e62c75556922038b

                                          SHA512

                                          6ca0dc36d4a0f6d2363772762a2c32abdaa520a9d41113b3839657b1330f703a3f1e573dfd071abc038ef98a1d33dc11af31f08931e88f307b565f4b472c1b56

                                        • C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Process.txt

                                          Filesize

                                          4KB

                                          MD5

                                          e7efefe7c34f962eb711bb3b9ebb3353

                                          SHA1

                                          57aa04fc8d7d5559bbb13a99f7e607e013ca30d1

                                          SHA256

                                          45978f900da87f6f8172cd83c54d309aac1ee852562bcb9c501cfa0a78d38bd8

                                          SHA512

                                          53a83103045a8e7848227b647f17d65428c2d7238e8cfafc5d51fb3414339c590c9aac1f2335c415d4f4283b5f6b13ba7588a62a7d955eb39662a6506f147fe2

                                        • C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Process.txt

                                          Filesize

                                          673B

                                          MD5

                                          aeb5b6dc5bf00a3e5e3d596427f243a4

                                          SHA1

                                          cb9cfe191db1ca6d7ac0da9660f7fca8513b9eff

                                          SHA256

                                          7c9cd37f146db5807bbe1d4b5911ddd68fb05a240892b34d50b571e68981cf45

                                          SHA512

                                          b0395a89821b4fb6864af7218fa5819971c8abf5c899d04a20ac65f89fa49cfae2344a91eeb87dba26b8294910d30033812a123e72771b58a1a70a2a7e29bce1

                                        • C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Process.txt

                                          Filesize

                                          1KB

                                          MD5

                                          2cfe7a68df27c4d2aa103198ca976dff

                                          SHA1

                                          6cd41b4b5d4a41eb1e078066fbafaa8f63d66a3d

                                          SHA256

                                          7a57786a3b12c566ee8c027b9259e23eb1d8b31a2e3368de770e2956e91bd187

                                          SHA512

                                          d6cf77d7a0b3c63a4bff196dc0790ca731e6f3bc45584ff5e01ecb4b214c7e64d2ac2e79485a6b6bc1eaed4aea87926129a958d97893062bd71afc1c1b563c2e

                                        • C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Process.txt

                                          Filesize

                                          1KB

                                          MD5

                                          2bf9d8c23d4ca2c4cc426172fdeb51cd

                                          SHA1

                                          2a3b5e2a1d03c58134409c79fc13d284074707dc

                                          SHA256

                                          e984b673cfac99a9e25a1d9221ee128f2739369b35db9ae5ce3f6a10be48a946

                                          SHA512

                                          7e41aa100c7f4b4a70aabe43d939a38e7c157599544bc769881844c722fa5e0ef47b7df810ef7b2671f40c69b1fa806a7cf20a934dc701266ef61786cbae43ad

                                        • C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Process.txt

                                          Filesize

                                          2KB

                                          MD5

                                          47df7580061f96c251acbfec8f4e7bf7

                                          SHA1

                                          6a2fa20a6683f26410f50184556bc0c1c4312890

                                          SHA256

                                          2039ce0e76d2a8aa379e4b61f97fd277fe18d0bb5f2379a74d2065b3b5a8839d

                                          SHA512

                                          4270baca6ee110a1e517751a58ba25ef1bdda4166dffcb6ee274470942309c4a08f4befa6a742df9a5b076837e40f9c8987fa6b6c899f195ce6ad2cb388d3751

                                        • C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Process.txt

                                          Filesize

                                          2KB

                                          MD5

                                          1635a235bf8b22c2e0c47a45ba13fd69

                                          SHA1

                                          384e77fa1e2672ffeab6a9a0cdf75be273434ca3

                                          SHA256

                                          938c67621c50f1e363c0a24368c96aa03abe26b01733425f2d9d76a85e558b93

                                          SHA512

                                          39daaa2b49546f343d2becdd7dde3aebc35c201a1a35d8a71d1dc7e1b47343940da800b888e1ccff3566d43f7ab7d3762dd152adbc6d9894125f9e700de6499a

                                        • C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Process.txt

                                          Filesize

                                          3KB

                                          MD5

                                          9500813727e70387d26ea7d264f43b23

                                          SHA1

                                          01f7902a9a3849885844681b6ca34f0bb2e3f40a

                                          SHA256

                                          18a70567b1d09e97cc22093afc6847e129838d83b209b2ba1c43c814b22b2e08

                                          SHA512

                                          dad92849f1a4d968112b9592792e247d0963f0f03cbeec41bdbad178da242d26f412718598ea371bb63c7de98892799118e31193a66d4ba416131078e36e028b

                                        • C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\msgid.dat

                                          Filesize

                                          4B

                                          MD5

                                          6ae07dcb33ec3b7c814df797cbda0f87

                                          SHA1

                                          6d400b9aec194fd0ea123061c6710c794a9bd517

                                          SHA256

                                          3b7dc65fd47fd991000d80844da28c8699590a1cb30988782bcade39f67794c1

                                          SHA512

                                          11fc9b39c8db974cba7cba31267530482824694774dd0b410454e04b0f0bb8b898fe6cb29fbb7344c7c3aa0188b7fd0fede95c7107fb92ab30018bb8d58c6df6

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                          Filesize

                                          2B

                                          MD5

                                          d751713988987e9331980363e24189ce

                                          SHA1

                                          97d170e1550eee4afc0af065b78cda302a97674c

                                          SHA256

                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                          SHA512

                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          80KB

                                          MD5

                                          10ca21a7a1176dc97f4992afe32437f7

                                          SHA1

                                          092e99163038a1085a609737590a30af5bb54a5f

                                          SHA256

                                          bc1206f520052294d53bbbd91781b9818e79e82c70b2a715b5f3919f70958399

                                          SHA512

                                          687f018de7bce6a41f2f10d816c6d1dc1dcd2f84bbb78eab572bb1b01023f2a6c6b979271f7d48c84d6e7caff9e3c5948e849ad312059c3e62f3a00494005bc8

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          280B

                                          MD5

                                          60d40d2b37759323c10800b75df359b8

                                          SHA1

                                          f5890e7d8fc1976fe036fea293832d2e9968c05c

                                          SHA256

                                          c3a2f26d5aef8b5ed1d23b59ed6fce952b48194bed69e108a48f78aec72126e0

                                          SHA512

                                          0c339563594cc9f930a64903281589886308d4412ee267e976520a58d86b2c339d7b2320e1b3fd6fbf81f092ff1735f0710c669af2986ea5b63d2c1e0a6df902

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\548e3de4-5f7a-478f-be3d-50e211f1a149\index-dir\the-real-index

                                          Filesize

                                          1KB

                                          MD5

                                          0df59f0f74961f2ceabefdbad4b5d45b

                                          SHA1

                                          70c27ff01327b6d0f320373f6e8fc8f0d0ed9395

                                          SHA256

                                          83b83fb1ba0049c9e7abebef8c09e48597af76b4a2a23427a49bbc98e5e196d8

                                          SHA512

                                          4385aed2ae06187502271874d8d0d53f314268e4364da2f02035be72d5e20932980ff29beda7d7b10c0656b998b5c1be3753cad0799451d4bab7eaf3b12976ba

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\548e3de4-5f7a-478f-be3d-50e211f1a149\index-dir\the-real-index~RFe577196.TMP

                                          Filesize

                                          1KB

                                          MD5

                                          f663259ff39f29a9e4318b2c856c5273

                                          SHA1

                                          ed48e6e4c6fc6c5de22deec72cd8d966ffb56203

                                          SHA256

                                          4c58856afc5364fdf405d3a419a02bb02150b3ce038fe66569165c4fce626e5b

                                          SHA512

                                          ff8e53f8a69c3375442b520b4a2d68f5876cdb10fe83724817f67e2a9787e6703909123481cd7f38f19ca2e2a3186bffed2e2d7dde9f3a4724832e05320e116a

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          40KB

                                          MD5

                                          bcd397ed93a428311500397616b95ed7

                                          SHA1

                                          d65e7f25b57d1b4e2b15fb492032edf9ceea448a

                                          SHA256

                                          a6e96ec73352c0af6d8ea6f63603c6edb9a328758e97c9eb8175ef5aa14e8084

                                          SHA512

                                          2d69011f42c4b30ecc1fc2dbd09b1eabe904441bba58ffa46ea3e672da80feac477fdff1bad20f3521194ea98c3af13c5d471850e0bb9950aa88bc67b6a0b087

                                        • C:\Users\Admin\AppData\Local\Temp\56a38433-58a3-4270-beb7-9918367c59af.bat

                                          Filesize

                                          152B

                                          MD5

                                          64c4233ebfed6e44b9dcaea74adf6e86

                                          SHA1

                                          54f0727a8ea1a823e94e3ef046ee833eeaa919a8

                                          SHA256

                                          307530ac412897904df279f7d4b97a6d4efcb3546be4a83033e4a4ef1e5188e7

                                          SHA512

                                          959b400d32a3fb35f6ca7e89f9563ed4590f0a7df87cd53619d8f341e63f6c132ed90441acf52d2dfa39939cf745bc203226152baec3769ffa0fccb8013ef1c3

                                        • memory/6000-147-0x00007FFE31F83000-0x00007FFE31F85000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/6000-0-0x00007FFE31F83000-0x00007FFE31F85000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/6000-150-0x00007FFE31F80000-0x00007FFE32A41000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/6000-12-0x0000020CC2CB0000-0x0000020CC2D62000-memory.dmp

                                          Filesize

                                          712KB

                                        • memory/6000-344-0x0000020CC2EA0000-0x0000020CC2EE4000-memory.dmp

                                          Filesize

                                          272KB

                                        • memory/6000-345-0x0000020CC4130000-0x0000020CC414A000-memory.dmp

                                          Filesize

                                          104KB

                                        • memory/6000-2-0x00007FFE31F80000-0x00007FFE32A41000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/6000-1-0x0000020CA7C70000-0x0000020CA837E000-memory.dmp

                                          Filesize

                                          7.1MB

                                        • memory/6000-153-0x0000020CC2F20000-0x0000020CC2F42000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/6000-434-0x00007FFE31F80000-0x00007FFE32A41000-memory.dmp

                                          Filesize

                                          10.8MB