Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    30s
  • max time network
    26s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/03/2025, 00:16

General

  • Target

    build22.exe

  • Size

    7.0MB

  • MD5

    0176388641637593938f5278b326a494

  • SHA1

    39d6cf486e4f292605f8cf0f6a19097e59462d6f

  • SHA256

    3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158

  • SHA512

    b00cd6c016b4844b8ac7b434f2bd7d621879eed815210e9a846741efd49121348755ef4d6ef9609965abbf1a154c0017c56b9fee79854bd031e3eaddfc4e4ca7

  • SSDEEP

    196608:XMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:AA403qakSoR7tfI7ZtXADu8X9Y95GQLJ

Malware Config

Extracted

Family

stealerium

C2

https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Stealerium family
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\build22.exe
    "C:\Users\Admin\AppData\Local\Temp\build22.exe"
    1⤵
    • Checks computer location settings
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:1044
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging
      2⤵
      • Uses browser remote debugging
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3320
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbea40dcf8,0x7ffbea40dd04,0x7ffbea40dd10
        3⤵
          PID:2056
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2920,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2916 /prefetch:3
          3⤵
            PID:2636
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=2888,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2880 /prefetch:2
            3⤵
              PID:4720
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2996,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2956 /prefetch:8
              3⤵
                PID:5084
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3068,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3064 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:3036
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3336,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3332 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:2052
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4168,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4164 /prefetch:2
                3⤵
                • Uses browser remote debugging
                PID:4980
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4504,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4440 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:392
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5160,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5156 /prefetch:8
                3⤵
                  PID:5016
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5360,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5356 /prefetch:8
                  3⤵
                    PID:2044
                • C:\Windows\SYSTEM32\cmd.exe
                  "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                  2⤵
                  • System Network Configuration Discovery: Wi-Fi Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2492
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    3⤵
                      PID:920
                    • C:\Windows\system32\netsh.exe
                      netsh wlan show profile
                      3⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Network Configuration Discovery: Wi-Fi Discovery
                      PID:1320
                    • C:\Windows\system32\findstr.exe
                      findstr All
                      3⤵
                        PID:64
                    • C:\Windows\SYSTEM32\cmd.exe
                      "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                      2⤵
                        PID:3916
                        • C:\Windows\system32\chcp.com
                          chcp 65001
                          3⤵
                            PID:4196
                          • C:\Windows\system32\netsh.exe
                            netsh wlan show networks mode=bssid
                            3⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            PID:3432
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging
                          2⤵
                          • Uses browser remote debugging
                          • Enumerates system info in registry
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of FindShellTrayWindow
                          PID:916
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x2b0,0x7ffbe8a1f208,0x7ffbe8a1f214,0x7ffbe8a1f220
                            3⤵
                              PID:2872
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2164,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2156 /prefetch:2
                              3⤵
                                PID:2632
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2220,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2216 /prefetch:3
                                3⤵
                                  PID:4580
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2392,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2388 /prefetch:8
                                  3⤵
                                    PID:3240
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3476,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3472 /prefetch:1
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:2596
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3488,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3456 /prefetch:1
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:4876
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4500,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4496 /prefetch:1
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:1204
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4516,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4544 /prefetch:2
                                    3⤵
                                    • Uses browser remote debugging
                                    PID:4632
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=3620,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3648 /prefetch:8
                                    3⤵
                                      PID:4572
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5132,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5124 /prefetch:8
                                      3⤵
                                        PID:2644
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\a37dee5d-8b26-49ac-a893-2cee5c3943e0.bat"
                                      2⤵
                                        PID:2420
                                        • C:\Windows\system32\chcp.com
                                          chcp 65001
                                          3⤵
                                            PID:4896
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill /F /PID 1044
                                            3⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2240
                                          • C:\Windows\system32\timeout.exe
                                            timeout /T 2 /NOBREAK
                                            3⤵
                                            • Delays execution with timeout.exe
                                            PID:3284
                                      • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                        "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                        1⤵
                                          PID:4840
                                        • C:\Windows\system32\msiexec.exe
                                          C:\Windows\system32\msiexec.exe /V
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1336
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                          1⤵
                                            PID:3172
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                            1⤵
                                              PID:4284

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\39608079-1bf7-4d32-bdf9-b3e1550e420a.tmp

                                              Filesize

                                              2B

                                              MD5

                                              d751713988987e9331980363e24189ce

                                              SHA1

                                              97d170e1550eee4afc0af065b78cda302a97674c

                                              SHA256

                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                              SHA512

                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              80KB

                                              MD5

                                              f693e00e2c30d7bbfbcb6fb0c0ecf2d6

                                              SHA1

                                              cd851f39f3b34c584156221a545e080e03b9a636

                                              SHA256

                                              3b5be385976b5fa6a5db4282d4c800db9d8da9a2fcd1e2dbb862260def71f287

                                              SHA512

                                              ad228d23811107d42f906beaae476fff98416284303fbb2eb44c291d6c3975a6e32d0124cff307f065f5bd77b25e94bda20cc7348c006c8073dd95f87b0013b2

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              280B

                                              MD5

                                              8734b4a181214bb62f91cfa36c7e2c98

                                              SHA1

                                              9cff323f10778a23d73ac3dcffc038d3bf661b78

                                              SHA256

                                              e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5

                                              SHA512

                                              e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              280B

                                              MD5

                                              0db1d88802048ff847bfcf47035335bd

                                              SHA1

                                              bb54059e5b145da464f6521ae67353889ce00771

                                              SHA256

                                              416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a

                                              SHA512

                                              32c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\564f2dcc-19ba-47c1-ab9b-337426fce503.tmp

                                              Filesize

                                              69KB

                                              MD5

                                              164a788f50529fc93a6077e50675c617

                                              SHA1

                                              c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                              SHA256

                                              b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                              SHA512

                                              ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              6KB

                                              MD5

                                              a391b32b7752918c765e6fe24cf60db3

                                              SHA1

                                              9c1a57e367db75a4e74d3a05bad8096cb2f00199

                                              SHA256

                                              56131a6fba5bd423ad18748d6b92729cdd004d751d8e59bc86f61dc0b7ab882f

                                              SHA512

                                              f423a97f173415a4e80f2d3068c7c2ace411a5b9ded9e44c1a6d00242a3e14d1fc2aaddaa5a1e095c5b0c29442adc2a6ec0b9b03b8041edcfda57f8fa337b2b8

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              7KB

                                              MD5

                                              9f015074359b6541b4de5bbd233f5035

                                              SHA1

                                              ba4d45764340b3bf141ce55a50f47ab2fbaea67e

                                              SHA256

                                              8263f6612c65f5bae7503d447432481e90c738144a86ac066682ecf239757ccc

                                              SHA512

                                              e3054753669af342a5038444a2d697fa7d13eff7e6f8c3f7ed024daf708b4697474c594fc4fa3d7a17650bc115256bf97f11c96774cd4f076f43be1ef07342d8

                                            • C:\Users\Admin\AppData\Local\Temp\a37dee5d-8b26-49ac-a893-2cee5c3943e0.bat

                                              Filesize

                                              152B

                                              MD5

                                              f14d44e1cbc696482dbec08f2f4c2f89

                                              SHA1

                                              b9f42dbbc3de9ed6523631e4d43e0d8735d77c6c

                                              SHA256

                                              b31e04c6a2ed9e57e85e872ba15808d074d1ef140355cf23a7131098f4b22cbe

                                              SHA512

                                              c30462aa5e1ef76bcc1f4a516d905db04a87960179d6e6f632f6f3c2cde975a8b1081b1faf337ad624012d04996f2446c2c83c49b2d041e2fd186ace6a3fc851

                                            • C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\Browsers\Firefox\Bookmarks.txt

                                              Filesize

                                              173B

                                              MD5

                                              70e1643c50773124c0e1dbf69c8be193

                                              SHA1

                                              0e2e6fd8d0b49dddf9ea59013a425d586cb4730c

                                              SHA256

                                              4fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a

                                              SHA512

                                              664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679

                                            • C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\Browsers\Microsoft Edge\Cookies.txt

                                              Filesize

                                              1KB

                                              MD5

                                              9f4f3b6085ef3aeb869bc1298330da0a

                                              SHA1

                                              0965c734d6ead16d3cd407711766c6b00932e399

                                              SHA256

                                              6758281d56e338fb59284f77037795e56c871e64737da421859db28e242dc791

                                              SHA512

                                              f2166533ddb3ac68dc4c487f897e01806a25c8dd645934e2dcb29f11499e2a7a0edd6aa7a94dd39d766863856ada85de6577f285bdc26842b7b877be8866c085

                                            • C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\System\Apps.txt

                                              Filesize

                                              846B

                                              MD5

                                              2d8a541571dcb2f16fc07676bff7aea7

                                              SHA1

                                              c9a233068b97845dc4a52612a4cd6d284745f1ba

                                              SHA256

                                              683a1cac2cdca1bed6d448d8681ff75c1ffd86290627313424530208a5835b11

                                              SHA512

                                              3e91e2d7510e55b1013459993633489991d8ab90e0ec60da0e36aa1514980e6ffe1fba7465f28949ea0d77ddf843383b6853a28d4b581a3368eaa82862d7b548

                                            • C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\System\Apps.txt

                                              Filesize

                                              1KB

                                              MD5

                                              cb499444f2a7386daf360a0544518432

                                              SHA1

                                              ffd5bc9b9370f1c205b34984f7f85b6a1e643b20

                                              SHA256

                                              d6977cc1738ee682a8c3f6530e75580643fffb36c8346fcab84d6c62c7a60475

                                              SHA512

                                              903d0f3679a746e902f2f2a036446610a995bf3f3f0341922990a93392c1e11c575d017e95956746999cc2496f1a81c7070e4ba15aeba814012593dd738e8bbd

                                            • C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\System\Apps.txt

                                              Filesize

                                              4KB

                                              MD5

                                              b64258be0f03d4f4668dcf0a91b754a8

                                              SHA1

                                              713f36f478b1d93a5e7b15aa078a8d433e5fb9f1

                                              SHA256

                                              8045434c6bfc172d84e036ab73e37c8ac392427a40252d12850b56b1351f5dad

                                              SHA512

                                              ec180a1cc5e66821cc3c0ab0a157e83b1d23dc533fe93555c993fb347bdcd2962dce695409624d24009d50d663a400223845377953ff6585c0c245544ac1c8de

                                            • C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\System\Process.txt

                                              Filesize

                                              3KB

                                              MD5

                                              7f7286ea671ee8b34bc48a1c959961de

                                              SHA1

                                              cbf73c57b3056be35a9fd59e769ff565880d509f

                                              SHA256

                                              f3b10921708d9c5afeb3ea0369ab453cd13f9f7608e443740a74abe88f0d1878

                                              SHA512

                                              049a203260c3425741dafe800f3de1810f13eb733255645ff8a02c57120c54b0b13b06b34d9c401828ec9e61b502427890b454c0c4e74f742f6b01510cec2080

                                            • C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\System\Process.txt

                                              Filesize

                                              4KB

                                              MD5

                                              7ae0700171f8b45e7c64fd54a5f1697f

                                              SHA1

                                              f8ebe8650b9fedeaf17f0c4e0ef2aebcd21de1a1

                                              SHA256

                                              7731da1c18a79b9dc64d8e62b09be5c19bbfa4663a92c9ce1f823e27c84c1c69

                                              SHA512

                                              758a2f7390c60f84c2e0ad436adbcfa74e6f42d67ac356f42e62a7b1cb0e5d228480a5aaf4ef672676b98c66e19becb36b1fc871b06643c1ed08ffbf093676ae

                                            • C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\System\Process.txt

                                              Filesize

                                              1KB

                                              MD5

                                              da5698c72d3c326538a9594aed16d777

                                              SHA1

                                              118b6e7c5e5131a3cedb51746e816302fdf1a586

                                              SHA256

                                              4d52a6bb0878a076bb70d227cd613b5d6d1b3f8bd95193945f3551b468234273

                                              SHA512

                                              a1f906e5c1235ebf6959acd6de6ed057a4f899875b0b28693cc8970c31f683b47b920a5cb4eb464433edd82aa6472a966e3ba41625933e0623ed2ae60456a129

                                            • C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\System\Process.txt

                                              Filesize

                                              2KB

                                              MD5

                                              9e16c289f07b9c8e14836c2538b79d10

                                              SHA1

                                              11fbeb5a548b1f5e8646749c52ab9f3168fdf08f

                                              SHA256

                                              09bb34c915287a09ce24705f3fe5be90f45432911b134798730f8f159c5ef2ef

                                              SHA512

                                              43b8feda019289ac8661032f8632174e28f0e938647fa68ed1bd3e656f317864ac0469545bfb28c8ecb1c3b7054eb0ceea2c8fddc0d2f0db4b9e1878a15d4117

                                            • C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\msgid.dat

                                              Filesize

                                              4B

                                              MD5

                                              8abfe8ac9ec214d68541fcb888c0b4c3

                                              SHA1

                                              5b1329f11769d8f4915936ad063125dcc2bfad71

                                              SHA256

                                              4978f72a379aaa535c5bc1dbbadeb26807e3e821ed16889b498f8eb7274ce1a4

                                              SHA512

                                              098b2ef78e07619275606a7bb999fcd92151980c017a95b2a8158f2a6b0e8c8e0eb8da81cbbe4ca1a20eaff89920c3bad039b1f7702ea768e2532ce171970bb5

                                            • memory/1044-20-0x00000204FCA70000-0x00000204FCB22000-memory.dmp

                                              Filesize

                                              712KB

                                            • memory/1044-158-0x00007FFBEE1D0000-0x00007FFBEEC91000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/1044-1-0x00000204F9A10000-0x00000204FA11E000-memory.dmp

                                              Filesize

                                              7.1MB

                                            • memory/1044-157-0x00007FFBEE1D3000-0x00007FFBEE1D5000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/1044-355-0x00000204FDDC0000-0x00000204FDE04000-memory.dmp

                                              Filesize

                                              272KB

                                            • memory/1044-356-0x00000204FDD60000-0x00000204FDD7A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/1044-2-0x00007FFBEE1D0000-0x00007FFBEEC91000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/1044-162-0x00000204FDD90000-0x00000204FDDB2000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/1044-0-0x00007FFBEE1D3000-0x00007FFBEE1D5000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/1044-469-0x00007FFBEE1D0000-0x00007FFBEEC91000-memory.dmp

                                              Filesize

                                              10.8MB