Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    30s
  • max time network
    27s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    20/03/2025, 00:16

General

  • Target

    build22.exe

  • Size

    7.0MB

  • MD5

    0176388641637593938f5278b326a494

  • SHA1

    39d6cf486e4f292605f8cf0f6a19097e59462d6f

  • SHA256

    3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158

  • SHA512

    b00cd6c016b4844b8ac7b434f2bd7d621879eed815210e9a846741efd49121348755ef4d6ef9609965abbf1a154c0017c56b9fee79854bd031e3eaddfc4e4ca7

  • SSDEEP

    196608:XMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:AA403qakSoR7tfI7ZtXADu8X9Y95GQLJ

Malware Config

Extracted

Family

stealerium

C2

https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Stealerium family
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\build22.exe
    "C:\Users\Admin\AppData\Local\Temp\build22.exe"
    1⤵
    • Checks computer location settings
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:4392
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging
      2⤵
      • Uses browser remote debugging
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff8771edcf8,0x7ff8771edd04,0x7ff8771edd10
        3⤵
          PID:564
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1992,i,17388871595481926658,12806487847890770228,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=1984 /prefetch:2
          3⤵
            PID:4832
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2144,i,17388871595481926658,12806487847890770228,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2140 /prefetch:3
            3⤵
              PID:1696
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2440,i,17388871595481926658,12806487847890770228,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2436 /prefetch:8
              3⤵
                PID:4272
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,17388871595481926658,12806487847890770228,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3136 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:1940
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,17388871595481926658,12806487847890770228,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3160 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:652
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4288,i,17388871595481926658,12806487847890770228,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4376 /prefetch:1
                3⤵
                • Uses browser remote debugging
                PID:2336
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5108,i,17388871595481926658,12806487847890770228,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5096 /prefetch:8
                3⤵
                  PID:3576
              • C:\Windows\SYSTEM32\cmd.exe
                "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                2⤵
                • System Network Configuration Discovery: Wi-Fi Discovery
                • Suspicious use of WriteProcessMemory
                PID:896
                • C:\Windows\system32\chcp.com
                  chcp 65001
                  3⤵
                    PID:3876
                  • C:\Windows\system32\netsh.exe
                    netsh wlan show profile
                    3⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Network Configuration Discovery: Wi-Fi Discovery
                    PID:3984
                  • C:\Windows\system32\findstr.exe
                    findstr All
                    3⤵
                      PID:3004
                  • C:\Windows\SYSTEM32\cmd.exe
                    "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                    2⤵
                      PID:1904
                      • C:\Windows\system32\chcp.com
                        chcp 65001
                        3⤵
                          PID:1884
                        • C:\Windows\system32\netsh.exe
                          netsh wlan show networks mode=bssid
                          3⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          PID:4184
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging
                        2⤵
                        • Uses browser remote debugging
                        • Drops file in Windows directory
                        • Enumerates system info in registry
                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                        • Suspicious use of FindShellTrayWindow
                        PID:4224
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x260,0x264,0x268,0x25c,0x308,0x7ff87695f208,0x7ff87695f214,0x7ff87695f220
                          3⤵
                            PID:1180
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2520,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2512 /prefetch:3
                            3⤵
                              PID:4544
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2460,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2452 /prefetch:2
                              3⤵
                                PID:1256
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2532,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2524 /prefetch:8
                                3⤵
                                  PID:3804
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3452,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3444 /prefetch:1
                                  3⤵
                                  • Uses browser remote debugging
                                  PID:788
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3468,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3456 /prefetch:1
                                  3⤵
                                  • Uses browser remote debugging
                                  PID:3332
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4072,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4068 /prefetch:1
                                  3⤵
                                  • Uses browser remote debugging
                                  PID:2720
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4088,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4076 /prefetch:2
                                  3⤵
                                  • Uses browser remote debugging
                                  PID:4152
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5072,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3604 /prefetch:8
                                  3⤵
                                    PID:4740
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5256,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5252 /prefetch:8
                                    3⤵
                                      PID:5084
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\67e8af48-495a-45bb-b6af-fadbbab14eb3.bat"
                                    2⤵
                                      PID:852
                                      • C:\Windows\system32\chcp.com
                                        chcp 65001
                                        3⤵
                                          PID:2888
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /F /PID 4392
                                          3⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3056
                                        • C:\Windows\system32\timeout.exe
                                          timeout /T 2 /NOBREAK
                                          3⤵
                                          • Delays execution with timeout.exe
                                          PID:1704
                                    • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                      1⤵
                                        PID:2824
                                      • C:\Windows\system32\msiexec.exe
                                        C:\Windows\system32\msiexec.exe /V
                                        1⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2968
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                        1⤵
                                          PID:2444
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                          1⤵
                                            PID:1904

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\Browsers\Firefox\Bookmarks.txt

                                            Filesize

                                            173B

                                            MD5

                                            70e1643c50773124c0e1dbf69c8be193

                                            SHA1

                                            0e2e6fd8d0b49dddf9ea59013a425d586cb4730c

                                            SHA256

                                            4fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a

                                            SHA512

                                            664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679

                                          • C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\Browsers\Microsoft Edge\Cookies.txt

                                            Filesize

                                            1KB

                                            MD5

                                            02d949e63660e175153314e26124db9f

                                            SHA1

                                            4cc221212641b3dd0b51c9badd1bc05bb6124b7f

                                            SHA256

                                            4509fec21e46c6a9d88281d27c3422771b7ca6b94d54dbb6f0bc5d00085f76c5

                                            SHA512

                                            e96c9e089c7b8609fe79bea3daddfa14928cc88dc688e346333940b3afa884ee3dcc6ef18d9feb6067858186beae72aa237233aa46b2af101bab04bcb126e161

                                          • C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Apps.txt

                                            Filesize

                                            987B

                                            MD5

                                            5910dd35339b766631033522caea88b5

                                            SHA1

                                            c87534522075568495ec691f823922d2a540e194

                                            SHA256

                                            d456ef7a1b3fc616b649e6352d46cf60ccf78049130c63ebac52c78472d5bcff

                                            SHA512

                                            dbf890cb1561df34c12171f3d21f9b6430c2a5666085c932f59b36b802f1d50e4072e3feeb082c0aa9a4c1b5f2a08e1237e21e5ef9f6f9def6e08825ffd90bb5

                                          • C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Apps.txt

                                            Filesize

                                            6KB

                                            MD5

                                            e4ded193433bfaed46da466eefcc2c35

                                            SHA1

                                            56151b0cb50efcac84e88cb623af4fc10f82087d

                                            SHA256

                                            b5190a32744b506ceec36dcdade88886a20d999ff72c93f960665cb90defe05c

                                            SHA512

                                            2948192405d25b8b18258d8f30183d082ae5bd53cc2c17743b6cd48b499f98e0820df59ac99c03dfe719202f95d39e761b3881e79dcb1b07504971e0c6a9bcfb

                                          • C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Process.txt

                                            Filesize

                                            4KB

                                            MD5

                                            5c305a5b5ebf819c3a267c0a8aadb848

                                            SHA1

                                            7a39fbda595cbfaee929095e9e9c5aa4da92a4de

                                            SHA256

                                            a60f124980e8409e7a8eeddd5e3e09cf384f1e9e468036e2742b850b53713352

                                            SHA512

                                            b35d8ad7926bfe76f2f46ba5a2019b8f1fcb896eb96bcf96bcb02e599ae9f3901d4598192372e721e3b938dd81d6aa73ec6fdfbd558a08cf178d7e14a95ccec6

                                          • C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Process.txt

                                            Filesize

                                            573B

                                            MD5

                                            d5ef92b0ddf0ef311c45f7e90f77560a

                                            SHA1

                                            796eedd4871c62477de907d7cb6835fb51cde722

                                            SHA256

                                            4a4a666a553efbebe7ac2c82dc1d847baca15a0dbd1635b68ea0cb78cf9f44f7

                                            SHA512

                                            60b060ae780d6dea3c760322f2327cd1384a42d6b37791fe0522c21d1898a9a64b6d6b67b009764c40eedaaf0adb4d78f23d244fe13cd1391e2a4e6fa147e83f

                                          • C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Process.txt

                                            Filesize

                                            1KB

                                            MD5

                                            d22b8c735b7a771000a3dcc8ff03561b

                                            SHA1

                                            d99eb8b03a9ff9a674a530447e91ee3af97811e7

                                            SHA256

                                            eecb838a62aebf597b7ccd8c0dd8660bf016114d0f267e6da49968d955774d7b

                                            SHA512

                                            0b11b5cec2bcab98a8f73024e931d63da82a85fa0b3ae34a0bcb95dd417230b73dfb0fb267ea95fd97b41a6db26c6cec0b7bda33bbd5f2010d58066d96bf98c3

                                          • C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Process.txt

                                            Filesize

                                            2KB

                                            MD5

                                            13f511d662ced77a25ba804866afc15b

                                            SHA1

                                            5036e9d0c6eda56cd89ec205c659a2a7e04242d2

                                            SHA256

                                            3c8bb5bab50dbefde7234cb5150898f6ff29cc0a3024e8b3eb3c73fd923bb8b8

                                            SHA512

                                            be88ed3b3245b6dcfbab5aaf7e13c74a94a55745a91377cf2972ba7af9e961c8c02caa80809ac226b8e539d0786d0e88ed096b9e622ce4888473b2bad9595b96

                                          • C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Process.txt

                                            Filesize

                                            2KB

                                            MD5

                                            bf12552d215aba8cc8a041bd67bd1c0b

                                            SHA1

                                            9cf6c798f9316e2c454b69031eedb9839243b8da

                                            SHA256

                                            3ac67ff7bf60c1cb0e4e3e4bb51bdd231d7af9ef04a21622662f28e470d462ce

                                            SHA512

                                            a8e86d64b461ac443b92d6c9313172f62c40a54ffe896a0687cde1c496eaa6312c1be53606c381e661dda41747a13aab06f4aa42ecc92a3e5daf48cbe69d8837

                                          • C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Process.txt

                                            Filesize

                                            3KB

                                            MD5

                                            bf4444b53a5114e67f46b2bbd7b62eb6

                                            SHA1

                                            0f805cc80c674568c4e31ea3d115e69eb65f5254

                                            SHA256

                                            d90547e9e43a1d3b6e454e0b225971b034b81804387632749b7a6dc4343c8d98

                                            SHA512

                                            ef5849a927a1fb8a4bc0f3ac443d12322ede9dfe245eb772d3cfa8cd430fe24c5769898dd0a4c43a9967e215d2e11e63c5a9464ebf0a9578931c0f7791b51cce

                                          • C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Process.txt

                                            Filesize

                                            3KB

                                            MD5

                                            3a862a349799bdd80c7bc623e9d2eabf

                                            SHA1

                                            100ecfbb89474d0ce1ef1df09fb915a83c36561c

                                            SHA256

                                            c8e0cbfdfa8393656900428bed104b45e71d5c446bb80a2a3e0da11a1c5e8449

                                            SHA512

                                            2c86ffc472bb1ae93a7aa67934a0825d9241169797809cb7abf12ba9a58d72c7ab60c03d99ec85ee3b3c00ca9686b507ebf2cd7f688bbc4da1dfc599915b235b

                                          • C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\msgid.dat

                                            Filesize

                                            4B

                                            MD5

                                            882735cbdfd9f810814d17892ae50023

                                            SHA1

                                            bb3e29ac93b725f6eefbfcf1bf0bee67783cd519

                                            SHA256

                                            0670783b46c5906cf84d0501e8a44dc5a1e446dad06a4b2f443d54242cb78054

                                            SHA512

                                            adb55476e0a049af61e2382c6dfcc512af68439dc4a7e92ccc4b54d36d3f1682b391e27f426c3749fd1add9fd92ee383545a6f6431ce19dbac14ff9f9dd023b6

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                            Filesize

                                            2B

                                            MD5

                                            d751713988987e9331980363e24189ce

                                            SHA1

                                            97d170e1550eee4afc0af065b78cda302a97674c

                                            SHA256

                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                            SHA512

                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            80KB

                                            MD5

                                            dd54d39df5db4f91911498a905a4eb36

                                            SHA1

                                            015c5702767bca6876042c34a09f294bf9e9ae5c

                                            SHA256

                                            05f7815ca0c9176c117af1d29ba5e25b17d1fc787efb3ddeeed8931611df53c8

                                            SHA512

                                            ef41d7f18e955b40434c59acbb3022c3a864d903564e66c3debe8ca116d70809c19140a6d59956ccb2413b3d5505aeadfdeb6828c7292526fdf985ef28fe58df

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            280B

                                            MD5

                                            632acbd01044af3d96e0f44fb0f15691

                                            SHA1

                                            5ebb0fb12ab66a70cba8a11e2115a296126ff4e3

                                            SHA256

                                            40305632b5754f1dbe0b05dbc249cee00a2774abd2160d7c7a1612e5967039c9

                                            SHA512

                                            0876c300d769ee764886a2b1b542c7421129b1c796a18d220ff9cd7681ab0001f98b1420a685c9cae49a34f5b58586c6313ed27776b703763e978864f4b8eae5

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            280B

                                            MD5

                                            5df6a0445942b5f7817d6658ccb534a6

                                            SHA1

                                            44ce1e163d04d8513faed7f85384783167add22e

                                            SHA256

                                            51e05249c6a2f4b0dfbdf04fc331b18deca176024c134e901e9319e1b54c6bba

                                            SHA512

                                            ec867d77c784e30e6cc163b3178d79af0383d2d50cd6f396fa52133a8227aa517d8e64d16b1083d58dd5810b8e47bd5b6356bd21a1b653b853c5624b5f18519b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                            Filesize

                                            69KB

                                            MD5

                                            164a788f50529fc93a6077e50675c617

                                            SHA1

                                            c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                            SHA256

                                            b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                            SHA512

                                            ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4ad0fc24-14c3-4a53-bdc8-24ae321a49ae\index-dir\the-real-index

                                            Filesize

                                            1KB

                                            MD5

                                            ea65991c5ddeac9e7aeea8982fec4508

                                            SHA1

                                            d4453e21e9e6f1f3f6384e54bc186d955a18fede

                                            SHA256

                                            d0a9fd43999bc3c972dceb78a7daafd43d9e7c4c22028a05088e3d8f5e08eccc

                                            SHA512

                                            e36567166daed028eaf49f8874afc2aa82aeee7d8d82c5e73603998f1ecc8b600519b2a32c3087f9c8705a7dec5300342f93a13123a58acb14ff3adf2e9ada87

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4ad0fc24-14c3-4a53-bdc8-24ae321a49ae\index-dir\the-real-index~RFe57b5c3.TMP

                                            Filesize

                                            1KB

                                            MD5

                                            647e4b1c571ab0736ad8345575730d67

                                            SHA1

                                            6037b70159ceb9de49cd5ba11454bccf678342aa

                                            SHA256

                                            813c1eec147b3c3a64fb6f8e8d8cf4b9c6678fefb729ef6dc490fd5ccd479a25

                                            SHA512

                                            1f9d0e1b153a593d2ed94de27a453e6947e52d49904dcf003901d5cb92ba3827429964a527bfbebf43aee21727ef82a0a195560c4e8ae998bd81320dee7e5274

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            6KB

                                            MD5

                                            2281700256fd7d2cd8b5a3b83f574035

                                            SHA1

                                            e84e6da2b538eee930142abafc3a70657ff82cb9

                                            SHA256

                                            fecef52b42f657323dcb0ca552024ab7cd5f203f89676c7c87a7da97d1144c21

                                            SHA512

                                            d42dc62e24af15b1a3b84eb5098440bb7f64a2a1eadfadf508b111eb275a6f3a001de3d0d9670ab9618c5233b828988ae6db7ab7c5d5ed5c4c35ab93a8f95744

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            7KB

                                            MD5

                                            0db262d50edad023a84f8827bea797c4

                                            SHA1

                                            d1b5a154860ba963f88fa0864a4244ff4a29b7ef

                                            SHA256

                                            adac4813a8008c551cb493f495572cc87f7a8dd4169399042827a48ce418c800

                                            SHA512

                                            63e4a08cc2af4058d9d52d1563d5afced93fac6d96b6d3e7cc33c4bd61b5004a5bf530f2114308871f96f66b6034ae989d1f8e3eb90e53c15dbce9088dcd434e

                                          • C:\Users\Admin\AppData\Local\Temp\67e8af48-495a-45bb-b6af-fadbbab14eb3.bat

                                            Filesize

                                            152B

                                            MD5

                                            d620b0fbd6ab4049dee1c2fb3abc1cf4

                                            SHA1

                                            45104aafce5017f86ebaaf5f44bbc5190ca3d99b

                                            SHA256

                                            e90425bdccea58891bbfd4aa3450d34c7569174e0b7756ac922d68db23a62d1c

                                            SHA512

                                            9e3bc2ae7f85f10959f216f6d8d6ec3fc81e73841c0f30609123a8d7cd59164055097ca496c16fff76c98a9b5a34a305e6f45b058fcfe50921b298729578cd28

                                          • memory/4392-128-0x00007FF87C0C3000-0x00007FF87C0C5000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/4392-134-0x000001B542AC0000-0x000001B542AE2000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/4392-3-0x000001B542430000-0x000001B5424E2000-memory.dmp

                                            Filesize

                                            712KB

                                          • memory/4392-2-0x00007FF87C0C0000-0x00007FF87CB82000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/4392-344-0x000001B542AF0000-0x000001B542B34000-memory.dmp

                                            Filesize

                                            272KB

                                          • memory/4392-345-0x000001B542660000-0x000001B54267A000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/4392-1-0x000001B5273D0000-0x000001B527ADE000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/4392-131-0x00007FF87C0C0000-0x00007FF87CB82000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/4392-0-0x00007FF87C0C3000-0x00007FF87C0C5000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/4392-407-0x00007FF87C0C0000-0x00007FF87CB82000-memory.dmp

                                            Filesize

                                            10.8MB