Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17/04/2025, 10:28

General

  • Target

    En-Setup.v.exe

  • Size

    8.6MB

  • MD5

    be6e079bfe85c0c008b9d4ae21b3479d

  • SHA1

    b94fdf95b80e919d81ea4fde3c822b25df99502b

  • SHA256

    e6addc21723a1414a3fb0ef5a1371a9b38ed1ea7ccca849fc1c1e9d1f94914e5

  • SHA512

    5716d2793fbd350dd2ee6cf590a34470f5b78643601c641764e9f9abd7ccda594ea1eeac6fef8e092dda50f940b6022cac946c6630c7df115e398a5051416d3d

  • SSDEEP

    196608:urFMnQitYpY2wD32tGs1TvjFQeO1AWKbdx:uJMnFtYpkDQ/51+vKbD

Malware Config

Extracted

Family

vidar

C2

https://t.me/v00rd

https://steamcommunity.com/profiles/76561199846773220

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Extracted

Family

vidar

Version

13.5

Botnet

0d80c60d314e504eeb06c12f83f4aeb6

C2

https://t.me/v00rd

https://steamcommunity.com/profiles/76561199846773220

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Signatures

  • Detect Vidar Stealer 42 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 11 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 54 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\En-Setup.v.exe
    "C:\Users\Admin\AppData\Local\Temp\En-Setup.v.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Arrangement.psd Arrangement.psd.bat & Arrangement.psd.bat
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2880
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2868
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3012
      • C:\Windows\SysWOW64\findstr.exe
        findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5848
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 154723
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1208
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Staying.psd
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1052
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Margin" Implementing
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4520
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 154723\Sigma.com + Jennifer + Evaluating + Player + Resorts + Graduated + Dem + Paypal + Interracial + Intranet 154723\Sigma.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5060
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Vp.psd + ..\Stripes.psd + ..\Pillow.psd + ..\Clients.psd s
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1020
      • C:\Users\Admin\AppData\Local\Temp\154723\Sigma.com
        Sigma.com s
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:5036
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Drops file in Windows directory
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:856
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xe4,0x108,0x7ffd7b2bdcf8,0x7ffd7b2bdd04,0x7ffd7b2bdd10
            5⤵
              PID:1928
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1956,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=1960 /prefetch:2
              5⤵
                PID:2876
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2216,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2228 /prefetch:11
                5⤵
                  PID:3988
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2368,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2384 /prefetch:13
                  5⤵
                    PID:3224
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3268,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3312 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4516
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3276,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3340 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:5720
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4252,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2420 /prefetch:9
                    5⤵
                    • Uses browser remote debugging
                    PID:4480
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4768,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4752 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:5112
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5308,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5296 /prefetch:14
                    5⤵
                      PID:2308
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5504,i,8110627465979421680,11840283951229995780,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5512 /prefetch:14
                      5⤵
                        PID:4928
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                      4⤵
                      • Uses browser remote debugging
                      • Drops file in Windows directory
                      • Enumerates system info in registry
                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                      • Suspicious use of FindShellTrayWindow
                      PID:5456
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x250,0x7ffd7b29f208,0x7ffd7b29f214,0x7ffd7b29f220
                        5⤵
                          PID:2080
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1844,i,15235996133205116600,4791057867536916263,262144 --variations-seed-version --mojo-platform-channel-handle=2236 /prefetch:11
                          5⤵
                            PID:3368
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2208,i,15235996133205116600,4791057867536916263,262144 --variations-seed-version --mojo-platform-channel-handle=2204 /prefetch:2
                            5⤵
                              PID:820
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2480,i,15235996133205116600,4791057867536916263,262144 --variations-seed-version --mojo-platform-channel-handle=2652 /prefetch:13
                              5⤵
                                PID:3912
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3424,i,15235996133205116600,4791057867536916263,262144 --variations-seed-version --mojo-platform-channel-handle=3504 /prefetch:1
                                5⤵
                                • Uses browser remote debugging
                                PID:3240
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3432,i,15235996133205116600,4791057867536916263,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:1
                                5⤵
                                • Uses browser remote debugging
                                PID:1744
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c timeout /t 11 & del /f /q "C:\Users\Admin\AppData\Local\Temp\154723\Sigma.com" & rd /s /q "C:\ProgramData\kfcjw" & exit
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:1824
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 11
                                5⤵
                                • System Location Discovery: System Language Discovery
                                • Delays execution with timeout.exe
                                PID:1796
                          • C:\Windows\SysWOW64\choice.exe
                            choice /d y /t 5
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2756
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:448
                        • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                          1⤵
                            PID:6024
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                            1⤵
                              PID:2428
                            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                              1⤵
                                PID:3576
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                1⤵
                                  PID:2772
                                • C:\Windows\system32\taskmgr.exe
                                  "C:\Windows\system32\taskmgr.exe" /0
                                  1⤵
                                  • Checks SCSI registry key(s)
                                  • Checks processor information in registry
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:4492

                                Network

                                MITRE ATT&CK Enterprise v16

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\ProgramData\kfcjw\hdj5fc

                                  Filesize

                                  64KB

                                  MD5

                                  9efc7b850853ee518964dd7e5351286d

                                  SHA1

                                  bb797c87b17a9dab355b1b3db8eaeab3bd8d703b

                                  SHA256

                                  1372b3fb7c047ba7f07270ac4e68ff3316d21e9596a126f0071c00393eb36e3a

                                  SHA512

                                  502606b8d566b56a142760cc6a94bb4ad55b14511fb64e0dd67d8a3d6df36e2b4861296d04b8b4a6cffc164258df9b518b063609b6e71a20d77db5884eef0b8d

                                • C:\ProgramData\kfcjw\ozu37q

                                  Filesize

                                  512KB

                                  MD5

                                  59071590099d21dd439896592338bf95

                                  SHA1

                                  6a521e1d2a632c26e53b83d2cc4b0edecfc1e68c

                                  SHA256

                                  07854d2fef297a06ba81685e660c332de36d5d18d546927d30daad6d7fda1541

                                  SHA512

                                  eedb6cadbceb2c991fc6f68dccb80463b3f660c5358acd7d705398ae2e3df2b4327f0f6c6746486848bd2992b379776483a98063ae96edb45877bb0314874668

                                • C:\ProgramData\kfcjw\vs26f3

                                  Filesize

                                  64KB

                                  MD5

                                  ea087e09d744196d7cd248139123abda

                                  SHA1

                                  3ae0fa0affd701477eb7fb2c61afe3374c3b5fa4

                                  SHA256

                                  e2156834e223f80007dd8086a33cd8e6b3c8bdb92cd386805997826550a9cc01

                                  SHA512

                                  7b5ee77323931329589817e786b63c4d0679a808e849bd2b8032360e0ea327f5aed2f70c0f6c18747e59c8807c752c6758c34a039e609393db2c1c61604b64cc

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                  Filesize

                                  414B

                                  MD5

                                  bc39ef2353690e4a80886866ceffa38d

                                  SHA1

                                  74da1f0f1bb3718eafed552aa8e47c20f571ad6d

                                  SHA256

                                  ee625e8a2080ad7985e3f6a2a961f131140f39adb8183a3e04aa674e3170ee24

                                  SHA512

                                  97aa9355a09f511a7133d2988c376cbe1b05826b92cca4eee551bf29303a31405c359c3c27b1810c4c2dd0ed967189a2e3793e61e6b1edc2747ed471d9b64e4b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  78KB

                                  MD5

                                  b840fb0b2902e8f4ef2a50e13d59c347

                                  SHA1

                                  ac21f7134c1590d344cb811c1c96d9d508a79409

                                  SHA256

                                  75ecb47bc7e0fc5203506d1235c9dfe664063b6f46cd6262ccc255418cae84a7

                                  SHA512

                                  0330e8e4533ac577dec5ddb6316d87bab0717c610b99898f04a762e02b690904cc4545ff4e6036fea5b3aafb415995e88cef22d113bfe79d1016f39a30b972e5

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  280B

                                  MD5

                                  0c45ee0655e29b0a935a305e66bba8cf

                                  SHA1

                                  ad52868d94ba826e1f0b9db56d8fb7ff1c8fff2e

                                  SHA256

                                  d23f3010a3dd3688741250e254dd07d508883c099e1911c3e7d0854be85ca599

                                  SHA512

                                  479b8d020e5f818a452c050f27488928faed74c6d329ab58befc860f5bf76878efcdd03bd0eb7b83f22afb4e74aa40c7a0d6bb29677cb4cc03ff4dbd2687bb2d

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                  Filesize

                                  2B

                                  MD5

                                  d751713988987e9331980363e24189ce

                                  SHA1

                                  97d170e1550eee4afc0af065b78cda302a97674c

                                  SHA256

                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                  SHA512

                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\21cadfbf-a7e3-4662-88e0-29f664fa1dcc\index-dir\the-real-index

                                  Filesize

                                  2KB

                                  MD5

                                  e43aac4f37017cbd5271772f5824f582

                                  SHA1

                                  ad5f30808d6c8d41b796b639c82fe6a0e77a15c7

                                  SHA256

                                  e926bf5da31b7570172d2edb1292b6b324204d74baae60277410427bd3c92367

                                  SHA512

                                  e24d2d829f319a65da61638edd5db3db3bd3d2466eac6e8ac8e173789dab732b10353de0fb8cf20a1969372146fd2e52d40113c8136400c482882b39df481e1d

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\21cadfbf-a7e3-4662-88e0-29f664fa1dcc\index-dir\the-real-index~RFe581e51.TMP

                                  Filesize

                                  2KB

                                  MD5

                                  02365a80fccbe9d654caf48c62fda5fa

                                  SHA1

                                  e426d0898a22b9d25e77398d1a93c75ec03ca625

                                  SHA256

                                  ccb84dab175ba7c8852a5f8631d913b69924fc08096ea49a6e3a1928870431f2

                                  SHA512

                                  758a3f0a3dd0debd991e7641556e69b0bf7268e9feea52705520a08b4908bec35776f228d2a75a0bda1245a0628b7c7212cc593aca0a951c746f1830dfef6f02

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  40KB

                                  MD5

                                  38e803eb02447120d7bf157f02435b00

                                  SHA1

                                  302bc7b55628dc4006901ec4696d941088cf8ce3

                                  SHA256

                                  e962f62ce96407ea3bd0c02601d576d8cd6b54a42f0abada48049bd1da526de9

                                  SHA512

                                  2d24261819905befb0d4c2a47e2d0bf417cb2bbe62412f2bc2c0cdd669356b2adabcef52aa0916231f561bb74c773975424ea162e7666d7ddd091dd9d3c14cd5

                                • C:\Users\Admin\AppData\Local\Temp\154723\Sigma.com

                                  Filesize

                                  925KB

                                  MD5

                                  62d09f076e6e0240548c2f837536a46a

                                  SHA1

                                  26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                                  SHA256

                                  1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                                  SHA512

                                  32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

                                • C:\Users\Admin\AppData\Local\Temp\154723\s

                                  Filesize

                                  264KB

                                  MD5

                                  a2d8c1190659760ca229784325e5d4e8

                                  SHA1

                                  60982e848b3b8809772970b38f2ccec0e9707d07

                                  SHA256

                                  85177eaf073e8c7216ce06a8be39b6951864a9b6d8c226fc1493a795a24c7951

                                  SHA512

                                  c358720963d1ae3771cc2fbcd08e03191ccebf53fb185524cdd9e8abceb3cea20b4394e2927864a8859c1bc5d24471dcb355ffd7c9071f97d4c277aafdd5659b

                                • C:\Users\Admin\AppData\Local\Temp\Arrangement.psd

                                  Filesize

                                  17KB

                                  MD5

                                  59f22b8777394031b7922f06b731354e

                                  SHA1

                                  2df54e2ccfdcba08967155381578f19c4ce2cde3

                                  SHA256

                                  2d15a810bd0ae9fb2e96e8eaba68ec46d74d47937cf1fa83c9768297296c14b4

                                  SHA512

                                  0d6b911cf75118567e66f83c8eda462378115a4978b5b2683069c0c4b166623cee9ef17c7779afd3545703350d8a9b4bba462dd9998b8fc4a9c569232b24ed66

                                • C:\Users\Admin\AppData\Local\Temp\Clients.psd

                                  Filesize

                                  39KB

                                  MD5

                                  be18d9adeb2b11ac850cda3935599a1d

                                  SHA1

                                  29d4d198480431e0f9afec9b4642b80aa35d00f2

                                  SHA256

                                  c0cc9737fff5fda8438b9e068707066f29f46e716c6368df9c629855f108373b

                                  SHA512

                                  7b4fd5ab5f55b7ec1900ad6d9a0918c1d3314711256453708a404f98be9a3d554914e851eed99fadabb18dfdb96a747b4854e9508bd1bbac5f0dcd4c5e85904a

                                • C:\Users\Admin\AppData\Local\Temp\Dem

                                  Filesize

                                  149KB

                                  MD5

                                  711f46a515ccdbc546b1c2b38e7e56c2

                                  SHA1

                                  464df67250c5faee6c4b18874c620b16eb911667

                                  SHA256

                                  eed9dccbfd4e0e1342bc33e369b386a2ae8c786c603209c73343a478ce7142d5

                                  SHA512

                                  fef57b76db57817e5449e7000726b07c7700d8c099f901170356268be16ea27132278cfd0b54df49da1ceeedc07d138468e048ebe4049e293a3095fbf6b10f5b

                                • C:\Users\Admin\AppData\Local\Temp\Evaluating

                                  Filesize

                                  52KB

                                  MD5

                                  11d1084471a398c1fc16ba16c3d97c8f

                                  SHA1

                                  21e29e6db32494c7104e92bd804864ee4e8f01ac

                                  SHA256

                                  4c2201c19aad032761603d98a9efa126435ab2b8c11738acaa050898ebfd674b

                                  SHA512

                                  15e29c9bd71ac1b24b61956697858ef9c6bc257cb748be1a10fe6bf9489fdc49ac460b663a4351ab1ad8223beff2c9e6391d14855dabe3aa6605b2dea7d94176

                                • C:\Users\Admin\AppData\Local\Temp\Graduated

                                  Filesize

                                  100KB

                                  MD5

                                  fc03a6660588f9b3385e848f6cd0056c

                                  SHA1

                                  8cd3f9df8e86c06a8b48fae8e808094b22b36765

                                  SHA256

                                  c6d3d80a211ce89ff2619ac65cd3cd70518d3b2db501a7204df9f75b6a1e1849

                                  SHA512

                                  2519bd54e1f9d7a428267bc878f31c4502f358f5f1fef3e0e09e7ab17d1d5dd134647f9679ecb8d6117708fba8390ecd59a25aac6f2d31c6598896fbe47ce266

                                • C:\Users\Admin\AppData\Local\Temp\Implementing

                                  Filesize

                                  1KB

                                  MD5

                                  0764bdc31e68d68b104cbf15607fbf6e

                                  SHA1

                                  42d38abcf810cdf6fa5606006c03f2704c817cad

                                  SHA256

                                  140d6a94377b499d462d222cf83853de19336c7de1880347cf2bc9d505836b3a

                                  SHA512

                                  e3bb25ae503368172c7b542b1ff420c53c3196a167fe4660b347740e9131ae41ac02b2a39176e4b8f1e15aaf4ccfb3c120ad5f01f7cd23a4f07d7b670073339f

                                • C:\Users\Admin\AppData\Local\Temp\Interracial

                                  Filesize

                                  74KB

                                  MD5

                                  f9f5cac82344a2a8e0161c3db016d1ab

                                  SHA1

                                  cece8585b8735f65a86c74a0b285a18b7cc3bb18

                                  SHA256

                                  5fceac0e7920e1416fdef7ee05156dcf9069a9851eb4aa33e7288b8c916a8806

                                  SHA512

                                  1db7e46fc1c9531759ace97ffa72273c1edabf2a7b7a2b35a59d73443c77ae9d433cf7d84440b8a8c8bdfc319e08de769472cc1b438712e51f97f6e8fb9d7c68

                                • C:\Users\Admin\AppData\Local\Temp\Intranet

                                  Filesize

                                  133KB

                                  MD5

                                  959fde9361d0a1dd0de9609049c109a9

                                  SHA1

                                  0c1a4a58f79e03dc21866daacf61086e3a706a50

                                  SHA256

                                  5d72ed02bb21accb5c9448d9ba7b83e67bb904dcd2c97a2316cd9137f466bd6c

                                  SHA512

                                  13fecea4532e7d3e575fd3d82e2fb17827faa05c552858dff4523c18a91b80d07203c78589fb14c3dc84530b2c8720305048ca05feea89500543a74ac5e984ea

                                • C:\Users\Admin\AppData\Local\Temp\Jennifer

                                  Filesize

                                  88KB

                                  MD5

                                  59d440c3e91766f5fd8dae8c1db494ba

                                  SHA1

                                  9f728dc537f62ebb9dd3de27cd9337c4022f073b

                                  SHA256

                                  e6baa5c72a90d8647b538f71df2820258bf94d1f08c1d763249fece1318c3735

                                  SHA512

                                  579cf1eca92a0851fea64f39de36ebd9f7dc1dd667a3da36d474e7c0de011f728f426b2c015c70ee443465bc5e4c683f87c0066f6b94cb681dbcc2a1b963b648

                                • C:\Users\Admin\AppData\Local\Temp\Paypal

                                  Filesize

                                  53KB

                                  MD5

                                  53429cceb778c71f22314d295682d45c

                                  SHA1

                                  1c180b4fd39f469b318ed032a800fc12566d6bb1

                                  SHA256

                                  068bb1461aafc63e6089231fe86fd428faacd53a841b1fac849f0e1b85032f67

                                  SHA512

                                  a1299e5699fdab4044a7eff988ee348f12d65d259edcc2320dbe80e8e7a77914286f5a4526a3b11e4165ad7c5506fe8f51b7027c2cd78dc9c47107b414d05d43

                                • C:\Users\Admin\AppData\Local\Temp\Pillow.psd

                                  Filesize

                                  73KB

                                  MD5

                                  5af7681994d86ffda109f1a92ced0ee0

                                  SHA1

                                  859913d36e8d3637dbc108dab41037370797b8e5

                                  SHA256

                                  5f80e592e77d2ac1ab3576893d6b110380f53ab75a221f29bc448561e9e0838d

                                  SHA512

                                  40907b9a066d0fea4206e083d8a75bae8b16dce5d869f38df5f07775167274f25992e39b399a1b3a4ea2557b60f1b481a8f142a481a9c7cd6916735ebdd43573

                                • C:\Users\Admin\AppData\Local\Temp\Player

                                  Filesize

                                  128KB

                                  MD5

                                  52bc12227550c0e894113e2552dff82a

                                  SHA1

                                  2305155178f20a2505fbf29c7e6f6d8785310185

                                  SHA256

                                  931597efcad5fe656f28967697590ae684dbdecbda0421f36bc3fb72bd43e2c1

                                  SHA512

                                  9aef39cfb614a61cf5ea6cc24aa1d5fe8c0690a16b4efa8ef049b4441d3a2d44364fc42d4faaef2d059603d7c5badbc95634d3401f5ac886c0c9ab1fb4f8cb1f

                                • C:\Users\Admin\AppData\Local\Temp\Resorts

                                  Filesize

                                  146KB

                                  MD5

                                  63723d5cd52217259c3a2083621b1e76

                                  SHA1

                                  621da11b656224f879644152842135e871d58f99

                                  SHA256

                                  35704e8585755ac25d6e0a01077820ecb58e5b7ff2ee04a3a344dca15615f61c

                                  SHA512

                                  70ab6167fa38a3022f45ccd5a5253db0e25245987c13f0f375b1d31a31a6324bfa88fba6d34e32502e403a370833713923313b97f5fe2bd760936a6cc03f91ab

                                • C:\Users\Admin\AppData\Local\Temp\Staying.psd

                                  Filesize

                                  476KB

                                  MD5

                                  84e94fcf7db165dc08891a0eab8a9e7f

                                  SHA1

                                  dac7bb482c67dfb94f3101cf6bac4f644833c9cd

                                  SHA256

                                  7c10a7ac70e8ff1213312cd9bb45afa35b030ff78ea4781fe900c6d6a496b574

                                  SHA512

                                  c4e24d802be8992366a74890954a312cab32cfad7fb5454b2fdc12d9439787e648208ce9fe9f084f81ca0d8434f17b568cf859417bb1201f6d16cea11e2e1d57

                                • C:\Users\Admin\AppData\Local\Temp\Stripes.psd

                                  Filesize

                                  87KB

                                  MD5

                                  f6874fe0b63fd0774feaa8bcd3466ca2

                                  SHA1

                                  123343f5dafb972796ef832e6c20b592aa4dc422

                                  SHA256

                                  0368930e0ee37d40fe154ba522dfceaa12da03493c7f32ee20f7d016cf51f871

                                  SHA512

                                  8839f935a3d1c3517792e1080bd6c4de02c754d30971fe14ce6305d16a0e494d4464f8a8b4bb1a04c67fb15586f65561978b5c8c87b82a5c07d41edae260c39b

                                • C:\Users\Admin\AppData\Local\Temp\Vp.psd

                                  Filesize

                                  65KB

                                  MD5

                                  bc636b825e5b5c6ca5c316de61183ef8

                                  SHA1

                                  0fdd3bdd860bb478524946c0251ec76b34f33ba0

                                  SHA256

                                  e6237034f8287b0a860a8b670ba45311e22d3e618313f14dcdc97f95bb4fe0fa

                                  SHA512

                                  44245ea8d738f4fea15dd452ebe6aaf9537c758318daf185f3f1f7da930d006f61aa22c4c9062521aaf9fa1a32077ee625f0449a73040f8c7b6aa0fb3fe66eea

                                • memory/4492-979-0x00000196DE320000-0x00000196DE321000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4492-973-0x00000196DE320000-0x00000196DE321000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4492-975-0x00000196DE320000-0x00000196DE321000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4492-974-0x00000196DE320000-0x00000196DE321000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4492-985-0x00000196DE320000-0x00000196DE321000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4492-984-0x00000196DE320000-0x00000196DE321000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4492-983-0x00000196DE320000-0x00000196DE321000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4492-982-0x00000196DE320000-0x00000196DE321000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4492-981-0x00000196DE320000-0x00000196DE321000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4492-980-0x00000196DE320000-0x00000196DE321000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/5036-503-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-922-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-502-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-500-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-506-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-510-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-511-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-512-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-516-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-519-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-470-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-469-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-465-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-464-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-463-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-877-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-908-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-911-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-914-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-915-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-916-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-917-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-921-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-501-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-923-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-927-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-928-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-944-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-945-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-949-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-950-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-459-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-963-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-964-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-456-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-455-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-450-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-449-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-437-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-440-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-439-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-438-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-436-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-434-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-435-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB

                                • memory/5036-433-0x0000000003CB0000-0x0000000003CD9000-memory.dmp

                                  Filesize

                                  164KB