Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2025, 02:33

General

  • Target

    3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe

  • Size

    7.0MB

  • MD5

    0176388641637593938f5278b326a494

  • SHA1

    39d6cf486e4f292605f8cf0f6a19097e59462d6f

  • SHA256

    3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158

  • SHA512

    b00cd6c016b4844b8ac7b434f2bd7d621879eed815210e9a846741efd49121348755ef4d6ef9609965abbf1a154c0017c56b9fee79854bd031e3eaddfc4e4ca7

  • SSDEEP

    196608:XMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:AA403qakSoR7tfI7ZtXADu8X9Y95GQLJ

Malware Config

Extracted

Family

stealerium

C2

https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Stealerium family
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe
    "C:\Users\Admin\AppData\Local\Temp\3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe"
    1⤵
    • Checks computer location settings
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:3944
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging
      2⤵
      • Uses browser remote debugging
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:5668
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc8e44dcf8,0x7ffc8e44dd04,0x7ffc8e44dd10
        3⤵
          PID:5288
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2016,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=1944 /prefetch:3
          3⤵
            PID:1288
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1808,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=1796 /prefetch:2
            3⤵
              PID:6000
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2280,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2276 /prefetch:8
              3⤵
                PID:6072
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2936,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2932 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:1460
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2960,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2956 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:5140
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4108,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4104 /prefetch:2
                3⤵
                • Uses browser remote debugging
                PID:2568
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4392,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4396 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:2736
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5144,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5140 /prefetch:8
                3⤵
                  PID:1660
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5384,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5380 /prefetch:8
                  3⤵
                    PID:4536
                • C:\Windows\SYSTEM32\cmd.exe
                  "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                  2⤵
                  • System Network Configuration Discovery: Wi-Fi Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4564
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    3⤵
                      PID:2492
                    • C:\Windows\system32\netsh.exe
                      netsh wlan show profile
                      3⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Network Configuration Discovery: Wi-Fi Discovery
                      PID:1440
                    • C:\Windows\system32\findstr.exe
                      findstr All
                      3⤵
                        PID:4524
                    • C:\Windows\SYSTEM32\cmd.exe
                      "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                      2⤵
                        PID:536
                        • C:\Windows\system32\chcp.com
                          chcp 65001
                          3⤵
                            PID:5592
                          • C:\Windows\system32\netsh.exe
                            netsh wlan show networks mode=bssid
                            3⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            PID:2928
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging
                          2⤵
                          • Uses browser remote debugging
                          • Enumerates system info in registry
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of FindShellTrayWindow
                          PID:5960
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x25c,0x7ffc8dd4f208,0x7ffc8dd4f214,0x7ffc8dd4f220
                            3⤵
                              PID:4784
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2212,i,14816422194352660105,3275009408119394763,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2208 /prefetch:3
                              3⤵
                                PID:2172
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2176,i,14816422194352660105,3275009408119394763,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2156 /prefetch:2
                                3⤵
                                  PID:3456
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2592,i,14816422194352660105,3275009408119394763,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2588 /prefetch:8
                                  3⤵
                                    PID:1500
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3444,i,14816422194352660105,3275009408119394763,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3436 /prefetch:1
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:1228
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3460,i,14816422194352660105,3275009408119394763,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3448 /prefetch:1
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:4836
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\c1d8d12c-7f28-4a07-8236-dc64dda61b99.bat"
                                  2⤵
                                    PID:1536
                                    • C:\Windows\system32\chcp.com
                                      chcp 65001
                                      3⤵
                                        PID:452
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill /F /PID 3944
                                        3⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5512
                                      • C:\Windows\system32\timeout.exe
                                        timeout /T 2 /NOBREAK
                                        3⤵
                                        • Delays execution with timeout.exe
                                        PID:868
                                  • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                    1⤵
                                      PID:1164
                                    • C:\Windows\system32\msiexec.exe
                                      C:\Windows\system32\msiexec.exe /V
                                      1⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:100
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                      1⤵
                                        PID:2940
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                        1⤵
                                          PID:868

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                          Filesize

                                          2B

                                          MD5

                                          d751713988987e9331980363e24189ce

                                          SHA1

                                          97d170e1550eee4afc0af065b78cda302a97674c

                                          SHA256

                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                          SHA512

                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          80KB

                                          MD5

                                          fdf842e9aa964aef18ea74dce351bf17

                                          SHA1

                                          74d5cbcbf09bb61041dc06bf6c4ec24986bb596e

                                          SHA256

                                          ab22788eb0daa510b51658b7a14be6a847b2fc3648bea87de18f106bb1985aaf

                                          SHA512

                                          4f9f997526518ad8e1bb8f736617fa5c808896d6cc4dc41f0307b089d42170e598905998b6037342d29ec02e5ec6466af0efd4900fb3c1161214c56c12182e03

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          280B

                                          MD5

                                          c37f9d2c357647fca20f2eaa89c18edd

                                          SHA1

                                          cfd1035ed2d057c317b48546f467209cbbe15f2e

                                          SHA256

                                          2ea3a0b7e6145fd110653b1a77cb827ad7e4a145c29378344bd3d28f595b2072

                                          SHA512

                                          3563f4aca9e47f35de8cb38e42a3c0448bb3ec4c9183fa392abc28fee4ca08bf16da028ffbf31cf0c0f8301ed810238961e745590e5c71621bc5a2a889dd12f7

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4b544b14-1843-4673-a1cd-26e23142833b\index-dir\the-real-index

                                          Filesize

                                          1KB

                                          MD5

                                          7a9c348ac048a620e4ca0aec2a33f485

                                          SHA1

                                          fcb271239ef5f392cfc414df5dae630a12ae9c2b

                                          SHA256

                                          887bce29c94baa1883c6c0ec33b324b3809b1a7eef68cfca6c7460c1c088ebd0

                                          SHA512

                                          f6ec7e3bdfff14a2ab47740ba962c1eda18775e0f4081c54bd6b2aff007a840b3e496946e1aae56b3158ae2de270f4fdc003b296d7f2049c34332dab74a674c8

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4b544b14-1843-4673-a1cd-26e23142833b\index-dir\the-real-index~RFe57bdc2.TMP

                                          Filesize

                                          1KB

                                          MD5

                                          5e13f2a74897bfe462b55c2bcadcd1ed

                                          SHA1

                                          0a4983ce85080e0beb96d66d7c7b518aec791847

                                          SHA256

                                          c46d822959fd672b6466f30b6bef31c8474a7c8cfb14b91b137f5c725c8cd9e8

                                          SHA512

                                          802043b7fc8a0acc7b46187938070c87cc5d750c493ce8163bda62decc70eb7a4c68037c93121fa2f41a29a05600dd8586492b94a8ed1f53ebf56442fef1afb6

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          40KB

                                          MD5

                                          42cacfa5eeace7082db4096227748f12

                                          SHA1

                                          268ce692e05e31381bf40bbe23333d35f3110338

                                          SHA256

                                          3822ed89ae578f5cdf1070d9f943065b9f4e33d7bef0abdbce63bd2571d314b7

                                          SHA512

                                          0d050b6fe32e0b19d25b458c6223ad3f497f051c163b489430720e504c548a9177d32391f216aefd9c605ccbc8237b32006de2114537138dd7b32fa1e36a741b

                                        • C:\Users\Admin\AppData\Local\Temp\c1d8d12c-7f28-4a07-8236-dc64dda61b99.bat

                                          Filesize

                                          152B

                                          MD5

                                          87c5cd74ed15e037858a832576799f60

                                          SHA1

                                          d8d482a9d1da45a9bf1caaf564176d3febd4dbdf

                                          SHA256

                                          acccfd5277e3f58a670175e8a5f79f3c141ed9065940c346d066e0711dbe9a5a

                                          SHA512

                                          66b4bead3e721b15862e162c41593e7a6f1cd1cc185c3a72c89cd1915fa3ad0c594232bdff17f08fc12f39e2f5f42d54eb7894aece1b3539dc4338abe6855398

                                        • C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\Browsers\Firefox\Bookmarks.txt

                                          Filesize

                                          173B

                                          MD5

                                          70e1643c50773124c0e1dbf69c8be193

                                          SHA1

                                          0e2e6fd8d0b49dddf9ea59013a425d586cb4730c

                                          SHA256

                                          4fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a

                                          SHA512

                                          664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679

                                        • C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\Browsers\Microsoft Edge\Cookies.txt

                                          Filesize

                                          1KB

                                          MD5

                                          8992b7cac2426aed96f34d9d5125ff10

                                          SHA1

                                          c5c50c302e0515789b96bda08cb4ce2e316de8ef

                                          SHA256

                                          43f8d2715f7ac556841bcf16bcef414e2e2b8501b284c956ce8b76fe114fd9e2

                                          SHA512

                                          54c2327031f1f817b9eaa1b99030d11a7e7a674a5706319a5788e9051d562316bac46727c5c017b81b7b656944eaef995e5f2a4ab7c6861af0131b26e958b556

                                        • C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\System\Apps.txt

                                          Filesize

                                          6KB

                                          MD5

                                          a326e1a219c861d13c44bf505f69abd5

                                          SHA1

                                          dcdf586a0f8d3259bb0f7fe4b2d5b2440e325bbb

                                          SHA256

                                          ed8d869d56019ef4674af179a339ceb5a8deb7e0e66adb0918bdcd6729d957da

                                          SHA512

                                          fba4e715f05fc00ddbb2123c4f0010fd29e83647eec0cb2309730344c9d433ae6d192894e960320f8d1abe64c949d5eb3101d3c2b8dc6d4ba81a5b49fa6552e3

                                        • C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\System\Process.txt

                                          Filesize

                                          3KB

                                          MD5

                                          594b262b926d793798fa692b39e561ff

                                          SHA1

                                          b033f964d3e2f4203285fab116fdd1b17a437eb1

                                          SHA256

                                          02f7847d5ba7fa7287e814e4e65e0c95a68acd142bf4d5520ef9112a268cd741

                                          SHA512

                                          c441e7738f47aaba06e2e372ba1b67db4b77be136a56ec61f3d3764bb52c76f39e7850cdc73299fc92c3506c894bdf3ed4d7305a6f28e25f995712973084b752

                                        • C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\System\Process.txt

                                          Filesize

                                          4KB

                                          MD5

                                          b74b8138cd82bea07128549febd29fc3

                                          SHA1

                                          f490748aee387a103505bf010e51b6b11da4e3f4

                                          SHA256

                                          6b50339ff63748155f0ec01bd9a2614bfeb1580a38247dff4127888b6c87a7d7

                                          SHA512

                                          67794c7128e070663df56e7e50e3c818ef0a9862ff4934f9a6cf349a28cb93e741d73efc3edffebabb992c610663963596493d124bf131a38b3e4ee8529b424e

                                        • C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\System\Process.txt

                                          Filesize

                                          404B

                                          MD5

                                          0abdf062a08d0fdef746e11a294f6796

                                          SHA1

                                          6625e10f254db540f5963be4fc8db8f11cc9d1a0

                                          SHA256

                                          3d8f7a2987a91983e11c49ddfddb9151f8b34ab138e9ac48bf6d306bbdc02624

                                          SHA512

                                          80ed2da6dd81fcaef5fab5e621b846876335ed224993b411c73f1c05ba8329e13ab4ccf25d4d660cf05ebb867a40c40c3307d72786a0bee72d268bc683b3231f

                                        • C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\System\Process.txt

                                          Filesize

                                          986B

                                          MD5

                                          a4899c269973b966545f1eed8e742263

                                          SHA1

                                          bfd80ac178a10212c3b836b35507d910c98b66f9

                                          SHA256

                                          476870a3914e1f70e7eec2e779e523e63d81f4a4c60311c8bd97bd37f6e1c922

                                          SHA512

                                          0277dc746331f3e9a777fcbc9399b01178cde9e646cf5fbfb6ab20d4b85717560ca5134b1857ce128166eddd3339c96268a29d95d44155614e22db20d0a61e0e

                                        • C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\System\Process.txt

                                          Filesize

                                          2KB

                                          MD5

                                          b91f3c0dc9de5873bebb9e95b2c515ee

                                          SHA1

                                          6ee604b099d6564a2acf2ce5385ea4f590f035c4

                                          SHA256

                                          da34cec73013ac166abc7fc93543c1ff2035f2a95cbcac4548ab329f1fc482bf

                                          SHA512

                                          079f2df7883c8823ba5d4d669f4b4b5860df22d6d897b073e427e5696d4db4c13398d6520f5078e97048a51748ce6e44a17b60cedd13e03ffbab49385c5aeb74

                                        • C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\msgid.dat

                                          Filesize

                                          4B

                                          MD5

                                          b59307fdacf7b2db12ec4bd5ca1caba8

                                          SHA1

                                          79e3f0cbcea375142c38c2f8de09344cb9f8eef4

                                          SHA256

                                          b39885a157fd0cbf181d1c17bcc1517638727e04513097d6ddc4c1d51ea5f4b1

                                          SHA512

                                          5ad258728081dd7d142275374fd6b4644dda088abc0f15b5d08fc33c18bbd16f18683ae15b257c9ba2d55c3cfd2b3d7187b175ea2f6d9fac0ca79ae1acf7cf11

                                        • memory/3944-2-0x00007FFC921E0000-0x00007FFC92CA1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/3944-0-0x00007FFC921E3000-0x00007FFC921E5000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/3944-1-0x000002ACB85D0000-0x000002ACB8CDE000-memory.dmp

                                          Filesize

                                          7.1MB

                                        • memory/3944-174-0x000002ACD39A0000-0x000002ACD39C2000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/3944-360-0x000002ACD39D0000-0x000002ACD3A14000-memory.dmp

                                          Filesize

                                          272KB

                                        • memory/3944-361-0x000002ACD3970000-0x000002ACD398A000-memory.dmp

                                          Filesize

                                          104KB

                                        • memory/3944-171-0x00007FFC921E0000-0x00007FFC92CA1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/3944-168-0x00007FFC921E3000-0x00007FFC921E5000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/3944-29-0x000002ACD36A0000-0x000002ACD3752000-memory.dmp

                                          Filesize

                                          712KB

                                        • memory/3944-501-0x00007FFC921E0000-0x00007FFC92CA1000-memory.dmp

                                          Filesize

                                          10.8MB