Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-10-2023 02:45

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Renames multiple (904) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo
    1⤵
    • Chimera
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb75c46f8,0x7fffb75c4708,0x7fffb75c4718
      2⤵
        PID:2648
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:3
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2276
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2
        2⤵
          PID:1084
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:8
          2⤵
            PID:3488
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
            2⤵
              PID:1312
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
              2⤵
                PID:4844
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:8
                2⤵
                  PID:5064
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4628
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:1
                  2⤵
                    PID:3704
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:1
                    2⤵
                      PID:2952
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:1
                      2⤵
                        PID:4840
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:1
                        2⤵
                          PID:1668
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:1
                          2⤵
                            PID:4764
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3504 /prefetch:8
                            2⤵
                              PID:4304
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5024
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1256 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3248
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:1
                              2⤵
                                PID:1144
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:1
                                2⤵
                                  PID:4056
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:1
                                  2⤵
                                    PID:4356
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:1
                                    2⤵
                                      PID:928
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6456 /prefetch:1
                                      2⤵
                                        PID:4456
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,495417445387414906,168090691115380708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1904 /prefetch:1
                                        2⤵
                                          PID:3980
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:1044
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:1624
                                          • C:\Windows\System32\rundll32.exe
                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                            1⤵
                                              PID:3388
                                            • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\HawkEye.exe
                                              "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\HawkEye.exe"
                                              1⤵
                                              • Chimera
                                              • Drops desktop.ini file(s)
                                              • Drops file in Program Files directory
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2884
                                            • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe
                                              "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"
                                              1⤵
                                                PID:1488
                                                • C:\Users\Admin\AppData\Local\Temp\is-KHEVT.tmp\butterflyondesktop.tmp
                                                  "C:\Users\Admin\AppData\Local\Temp\is-KHEVT.tmp\butterflyondesktop.tmp" /SL5="$20332,2719719,54272,C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Adds Run key to start application
                                                  • Drops file in Program Files directory
                                                  PID:4484
                                                  • C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe
                                                    "C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"
                                                    3⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SendNotifyMessage
                                                    PID:2592
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://freedesktopsoft.com/butterflyondesktoplike.html
                                                    3⤵
                                                      PID:3744
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffb75c46f8,0x7fffb75c4708,0x7fffb75c4718
                                                        4⤵
                                                          PID:1968

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe

                                                    Filesize

                                                    3.0MB

                                                    MD5

                                                    81aab57e0ef37ddff02d0106ced6b91e

                                                    SHA1

                                                    6e3895b350ef1545902bd23e7162dfce4c64e029

                                                    SHA256

                                                    a70f9e100dddb177f68ee7339b327a20cd9289fae09dcdce3dbcbc3e86756287

                                                    SHA512

                                                    a651d0a526d31036a302f7ef1ee2273bb7c29b5206c9b17339baa149dd13958ca63db827d09b4e12202e44d79aac2e864522aca1228118ba3dcd259fe1fcf717

                                                  • C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe

                                                    Filesize

                                                    3.0MB

                                                    MD5

                                                    81aab57e0ef37ddff02d0106ced6b91e

                                                    SHA1

                                                    6e3895b350ef1545902bd23e7162dfce4c64e029

                                                    SHA256

                                                    a70f9e100dddb177f68ee7339b327a20cd9289fae09dcdce3dbcbc3e86756287

                                                    SHA512

                                                    a651d0a526d31036a302f7ef1ee2273bb7c29b5206c9b17339baa149dd13958ca63db827d09b4e12202e44d79aac2e864522aca1228118ba3dcd259fe1fcf717

                                                  • C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe

                                                    Filesize

                                                    3.0MB

                                                    MD5

                                                    81aab57e0ef37ddff02d0106ced6b91e

                                                    SHA1

                                                    6e3895b350ef1545902bd23e7162dfce4c64e029

                                                    SHA256

                                                    a70f9e100dddb177f68ee7339b327a20cd9289fae09dcdce3dbcbc3e86756287

                                                    SHA512

                                                    a651d0a526d31036a302f7ef1ee2273bb7c29b5206c9b17339baa149dd13958ca63db827d09b4e12202e44d79aac2e864522aca1228118ba3dcd259fe1fcf717

                                                  • C:\Program Files\Java\jdk-1.8\jre\YOUR_FILES_ARE_ENCRYPTED.HTML

                                                    Filesize

                                                    4KB

                                                    MD5

                                                    4b99c2e92d92f09004c1da6ff0b04700

                                                    SHA1

                                                    746b309b896b536f51f4622ca19ab86022a076f2

                                                    SHA256

                                                    5e8d137a996e6b8ca32932527b1ad74df759cbe7b71db7ee334760b1226997dc

                                                    SHA512

                                                    d49b4b334474bc7220bc352223f90385a0c8c578ce592b4653aff2852842120194c50dd4181960c4c2a92bfed1285f5d9509c9d25b8062b9ca544b86d374db56

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    0629525c94f6548880f5f3a67846755e

                                                    SHA1

                                                    40ef667fc04bb1c0ae4bf2c17ded88594f0f4423

                                                    SHA256

                                                    812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee

                                                    SHA512

                                                    f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    0629525c94f6548880f5f3a67846755e

                                                    SHA1

                                                    40ef667fc04bb1c0ae4bf2c17ded88594f0f4423

                                                    SHA256

                                                    812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee

                                                    SHA512

                                                    f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    ff0adfbac62ddbb25d780725c968d955

                                                    SHA1

                                                    1fdca739fcd6b1924cfc9133ac7fc8d99bb5c617

                                                    SHA256

                                                    ec1ce14fb92f3c87095bae14b5fcec5cdf241bd8f7c67d9a795eed8c0016bfb3

                                                    SHA512

                                                    fb3a8e10ba94341ecd9560dbe982c44f6eeec45b7d643a8c94594efe095398f346d67587350afcd71b65d3396544f007051cfb709e9bda8083f035786ee96dc3

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    111B

                                                    MD5

                                                    285252a2f6327d41eab203dc2f402c67

                                                    SHA1

                                                    acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                    SHA256

                                                    5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                    SHA512

                                                    11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    573B

                                                    MD5

                                                    29d5ccb9d97be7e71a805e020e215f5a

                                                    SHA1

                                                    ad0e558b2883de819f155b4dfca2233918c40001

                                                    SHA256

                                                    36a9bcb2d802fc0f3cc268d78b0c89af6382c476364c443de562df7cd3c88d97

                                                    SHA512

                                                    d3335b34a04146a35ee6b62519888226a22eefec7bd0c09cbfa2d2abf68e0f095c8c9941fbff96c51b7c25e0a804641303388049195d41e9a43590527e56a445

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    833cad4d13f4444ddd52f643818b3548

                                                    SHA1

                                                    d1a2e6bd891c1726ef94d9c84deac6f8a8648c67

                                                    SHA256

                                                    68e3914fe4ae5d9376e7120b4c24953663f2ade3d60745d2278d196ce1a6056b

                                                    SHA512

                                                    a76364714cba910778be721c16d911453868dd62a9b6875291e88761cfd226a24b5bf1b9ffd32787a8d60a59c4b92c62fbe6169ce523e2d80b62f0225b73de9d

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    69627a33a2fb8dd884a2aa30adb2825f

                                                    SHA1

                                                    c086c2db8beb27d57f7f53a6a9ceb4fe6bd3156b

                                                    SHA256

                                                    a0935b41ffad153a756a62f8f652c37b9cd5e16b82fa2c4dd69a131875197bd3

                                                    SHA512

                                                    04f0d34260af0ede4995dadd9c3ba5b63f3a05e30a2645676eac1a600129559e1791012088ef829a1cc39a3723899b51ba90619844789a71612def19974ac09e

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    908f5ac0a35843c87e9e8e0687ffbcf6

                                                    SHA1

                                                    dd42e3d25299c7ea76a6700f27fc5b4a244b2b23

                                                    SHA256

                                                    719d104665e125d380a3147a6eb5ff8cd089c60387069bca3fa62226e2515886

                                                    SHA512

                                                    88f02b7a92b47cbc5d89503ea65302b5dbf8cb9f2d9187481847203213a4cf507b414da1c3dfb2d7a54db9a2e27d01c478abf7a92cfa419848354f44ee51cfcf

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    7KB

                                                    MD5

                                                    b813a10194d2504664712c1040acd1c9

                                                    SHA1

                                                    757fc6c36d03a7d9e830040ed03648700f94570e

                                                    SHA256

                                                    1054290d6cc2076d7fabce01badc5db28db3343ce5860da9179d060b30e9865c

                                                    SHA512

                                                    a89c5a005dac91dfb630d85b0edd36f37410759375a45878a2223d3dd814d3db611894158fdf0427457f38e3c17f18751308af4e837159ae98bf116f204d0354

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                    Filesize

                                                    24KB

                                                    MD5

                                                    fd20981c7184673929dfcab50885629b

                                                    SHA1

                                                    14c2437aad662b119689008273844bac535f946c

                                                    SHA256

                                                    28b7a1e7b492fff3e5268a6cd480721f211ceb6f2f999f3698b3b8cbd304bb22

                                                    SHA512

                                                    b99520bbca4d2b39f8bedb59944ad97714a3c9b8a87393719f1cbc40ed63c5834979f49346d31072c4d354c612ab4db9bf7f16e7c15d6802c9ea507d8c46af75

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    52033ee035e01ab5e89e186324cc4eef

                                                    SHA1

                                                    4725831b8af1a7ddae24fb919b5d7f4e8dccd439

                                                    SHA256

                                                    6586354cf8aed9971ef37c51fdd8e97124dcf44eeec3b4e14ae1bb19d59791a6

                                                    SHA512

                                                    f1b7bb799976b127579b4b31b4220cff51b36bc078a44713467269abce88cc9cc321e36bc4fff4c79f49e36d3949bb3be8b7fafa1fff6f192e47eb10d6b7ac4a

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    febe5f74fcc25b728a63110ce808077b

                                                    SHA1

                                                    8477e6dfa3b1517f12c8e1bdc110fc89898d38bd

                                                    SHA256

                                                    c081d8b6868808e968e7b5235fddf4aff8f388a549bb2bea7b715b1600bf26f4

                                                    SHA512

                                                    b6e3fd70b2102da4147c28e69c6a83f2e99098f538384fb57bef84d96298efce0c631c646cd6d0470e2ceb55cc65b40e54fed952d84fa2152203149601e62208

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57ee09.TMP

                                                    Filesize

                                                    870B

                                                    MD5

                                                    e9656a3dc8893fe37567e5e9d811d9b6

                                                    SHA1

                                                    57eec51bbc7644b0b585e21c1ca54c5902043dbc

                                                    SHA256

                                                    7c704f387053defc2dad463224cf5410fdefcf32cee65230ed26f05365a459f7

                                                    SHA512

                                                    19e05e2b1ac75a4637ce20613848eb5646183e8579dcbee8eecd85f9c961f3e9ee34b72e48ddd45e1dc58a1ddc22a2760e1a49bd3fe26b889f238875978170e8

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    6752a1d65b201c13b62ea44016eb221f

                                                    SHA1

                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                    SHA256

                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                    SHA512

                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    d8785fc13db184949c3342aff3496e5d

                                                    SHA1

                                                    75343e503c543df9b8146159a65f630aa40560e4

                                                    SHA256

                                                    51385810efc27dd8c6f05332fe8d5d9f3f7988dc0a606b5b2fdbb0fc08906545

                                                    SHA512

                                                    54259a465b70676b769c33e65889f206f1aaf3cf168be7ddea871d057dcb24cab12ceef49a587ede6083a9f3c79734ff6ad9f509ba38e0b39376914715622728

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    291ef8ca2be5ab721d3cd2fe6cdd611c

                                                    SHA1

                                                    bc041438355ad8d8ab9e9068305c67bc8d0becf0

                                                    SHA256

                                                    5422f3cc06a861f42286ab0cd43c60bf0125a2f90ecd80a435ba25c00a7aadfc

                                                    SHA512

                                                    a66deb73257f30f8a1bb054b38ff5f6da3a24e17a0898a0707fadf5554cf81be2c3cf9fd4a909a4f752bdbf00303a8aaf1624daff5252a7ddae22e3f5fd95478

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    761e16fc9d88c6343733dbf481a07988

                                                    SHA1

                                                    9c678e109604ec3dadc748f337caa96525309d6b

                                                    SHA256

                                                    06291fc0d81eb47db1191bff63f29d1cabb858a95b5c03bbf6c1e42456133a2d

                                                    SHA512

                                                    a093e3c7a967bbcbbe5becfdb39c5ab884dcd45393e465785dd6ab796dfc17b860cb632e566ad239bca0f362cd0337026086db1ac59de3078f3440c8471722ad

                                                  • C:\Users\Admin\AppData\Local\Temp\is-KHEVT.tmp\butterflyondesktop.tmp

                                                    Filesize

                                                    688KB

                                                    MD5

                                                    c765336f0dcf4efdcc2101eed67cd30c

                                                    SHA1

                                                    fa0279f59738c5aa3b6b20106e109ccd77f895a7

                                                    SHA256

                                                    c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

                                                    SHA512

                                                    06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

                                                  • C:\Users\Admin\AppData\Local\Temp\is-KHEVT.tmp\butterflyondesktop.tmp

                                                    Filesize

                                                    688KB

                                                    MD5

                                                    c765336f0dcf4efdcc2101eed67cd30c

                                                    SHA1

                                                    fa0279f59738c5aa3b6b20106e109ccd77f895a7

                                                    SHA256

                                                    c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

                                                    SHA512

                                                    06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

                                                  • memory/1488-1019-0x0000000000400000-0x0000000000414000-memory.dmp

                                                    Filesize

                                                    80KB

                                                  • memory/1488-964-0x0000000000400000-0x0000000000414000-memory.dmp

                                                    Filesize

                                                    80KB

                                                  • memory/1488-892-0x0000000000400000-0x0000000000414000-memory.dmp

                                                    Filesize

                                                    80KB

                                                  • memory/2592-1114-0x0000000002470000-0x0000000002471000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2592-1013-0x0000000002470000-0x0000000002471000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2592-2144-0x0000000000400000-0x000000000070B000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/2592-1113-0x0000000000400000-0x000000000070B000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/2884-810-0x0000000000B70000-0x0000000000C70000-memory.dmp

                                                    Filesize

                                                    1024KB

                                                  • memory/2884-234-0x0000000074760000-0x0000000074D11000-memory.dmp

                                                    Filesize

                                                    5.7MB

                                                  • memory/2884-237-0x0000000010000000-0x0000000010010000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/2884-236-0x0000000001140000-0x0000000001150000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/2884-618-0x0000000001140000-0x0000000001150000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/2884-245-0x0000000074760000-0x0000000074D11000-memory.dmp

                                                    Filesize

                                                    5.7MB

                                                  • memory/2884-235-0x0000000074760000-0x0000000074D11000-memory.dmp

                                                    Filesize

                                                    5.7MB

                                                  • memory/2884-244-0x0000000004FE0000-0x0000000004FFA000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/2884-243-0x0000000004FE0000-0x0000000004FFA000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/2884-242-0x0000000000B70000-0x0000000000C70000-memory.dmp

                                                    Filesize

                                                    1024KB

                                                  • memory/4484-898-0x0000000000660000-0x0000000000661000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4484-968-0x0000000000400000-0x00000000004BC000-memory.dmp

                                                    Filesize

                                                    752KB

                                                  • memory/4484-1017-0x0000000000400000-0x00000000004BC000-memory.dmp

                                                    Filesize

                                                    752KB

                                                  • memory/4484-969-0x0000000000660000-0x0000000000661000-memory.dmp

                                                    Filesize

                                                    4KB