Analysis

  • max time kernel
    69s
  • max time network
    75s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-05-2024 13:46

Errors

Reason
Machine shutdown

General

  • Target

    https://www.xbox.com/en-US/apps/xbox-app-for-pc

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.xbox.com/en-US/apps/xbox-app-for-pc
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4516
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa35963cb8,0x7ffa35963cc8,0x7ffa35963cd8
      2⤵
        PID:3268
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:2
        2⤵
          PID:2016
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3988
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:8
          2⤵
            PID:1276
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
            2⤵
              PID:3516
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
              2⤵
                PID:2832
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:1
                2⤵
                  PID:900
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5300 /prefetch:8
                  2⤵
                    PID:3580
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:1
                    2⤵
                      PID:3568
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:1
                      2⤵
                        PID:3356
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:1
                        2⤵
                          PID:4540
                        • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6156 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1180
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4628
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:1
                          2⤵
                            PID:664
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:1
                            2⤵
                              PID:1200
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6352 /prefetch:8
                              2⤵
                                PID:3448
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6300 /prefetch:1
                                2⤵
                                  PID:3592
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:1
                                  2⤵
                                    PID:1004
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:1
                                    2⤵
                                      PID:228
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                                      2⤵
                                        PID:2580
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6700 /prefetch:8
                                        2⤵
                                        • NTFS ADS
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1436
                                      • C:\Users\Admin\Downloads\XboxInstaller.exe
                                        "C:\Users\Admin\Downloads\XboxInstaller.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Enumerates connected drives
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2488
                                        • C:\Users\Admin\Downloads\XboxInstaller.exe
                                          "C:\Users\Admin\Downloads\XboxInstaller.exe" -cv wfZeoykEO02dyji7.0 -enableservices
                                          3⤵
                                          • Executes dropped EXE
                                          PID:340
                                          • C:\Windows\SysWOW64\sc.exe
                                            "C:\Windows\System32\sc.exe" config wuauserv start=demand
                                            4⤵
                                            • Launches sc.exe
                                            PID:4444
                                      • C:\Users\Admin\Downloads\XboxInstaller.exe
                                        "C:\Users\Admin\Downloads\XboxInstaller.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Enumerates connected drives
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3928
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:1872
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:2876
                                        • C:\Windows\system32\AUDIODG.EXE
                                          C:\Windows\system32\AUDIODG.EXE 0x00000000000004E0 0x00000000000004C8
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3556
                                        • C:\Windows\system32\LogonUI.exe
                                          "LogonUI.exe" /flags:0x4 /state0:0xa3a2e855 /state1:0x41c64e6d
                                          1⤵
                                          • Modifies data under HKEY_USERS
                                          • Suspicious use of SetWindowsHookEx
                                          PID:5272

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\XboxInstaller.exe.log

                                          Filesize

                                          1KB

                                          MD5

                                          8ccfffa52ca088226b39888af5b15ed0

                                          SHA1

                                          af68e813d78a4ba1ea11792794ec5d3463672dfe

                                          SHA256

                                          0068ef3d6122838325c5c31a80ca418fd958e7a7d8c2fb3fbf13e841b778f0e4

                                          SHA512

                                          1546eac581b100f78bbf9fd0136d5dc76e84fa336a19bed16dd487be45b446da80d28dc3c1f9857719382bc2d7f0a6c946f76d4f3effa9fd24c1c308b6285f4b

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          1e4ed4a50489e7fc6c3ce17686a7cd94

                                          SHA1

                                          eac4e98e46efc880605a23a632e68e2c778613e7

                                          SHA256

                                          fc9e8224722cb738d8b32420c05006de87161e1d28bc729b451759096f436c1a

                                          SHA512

                                          5c4e637ac4da37ba133cb1fba8fa2ff3e24fc4ca15433a94868f2b6e0259705634072e5563da5f7cf1fd783fa8fa0c584c00f319f486565315e87cdea8ed1c28

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          8ff8bdd04a2da5ef5d4b6a687da23156

                                          SHA1

                                          247873c114f3cc780c3adb0f844fc0bb2b440b6d

                                          SHA256

                                          09b7b20bfec9608a6d737ef3fa03f95dcbeaca0f25953503a321acac82a5e5ae

                                          SHA512

                                          5633ad84b5a003cd151c4c24b67c1e5de965fdb206b433ca759d9c62a4785383507cbd5aca92089f6e0a50a518c6014bf09a0972b4311464aa6a26f76648345e

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          1KB

                                          MD5

                                          46cc3d4bd61be1d70244f50996e5b58f

                                          SHA1

                                          5c7deb5ea71a41a06b017ff0733078823938b590

                                          SHA256

                                          ff5afb78b328304d6dbaa9fcf916e757952e96f6c9d73ac676e1b3522ac8beb6

                                          SHA512

                                          2fe393bb6ba066328dabbc9f388c02132e5a08e6a2ddcb0dab407ea06b6b4fc5157f92b5061b7606e570d760735f7b81e2741e92265dc6501ef177c9ea376003

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          a02acfb0aea6f08133c23626c9e41d1d

                                          SHA1

                                          5586119b1bbce6e23203ab5a0eb22735ffc9fd0a

                                          SHA256

                                          d980adc5b3c990a80bb5432e2ae030d4429c1f2a8a68ded0c1203e5316185fb7

                                          SHA512

                                          d1ffba13643b606043cb1d3a8edf83cec03edb4d946cad2944c497471f26a3cb2e4aa5b76ec9f408fad6d463e479d0865c2b0de0e5f4796b7d5417b5795cd0af

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          f1e5acea749a07f9d7ea5880c7797808

                                          SHA1

                                          7e9c14941bdfbee9f81b28c34449ad30416373fe

                                          SHA256

                                          c60c88a6c10d12e24fafbe5cc046c71d999f05af1cd4ba3f7a608c072cfbb405

                                          SHA512

                                          6dd1c3b3c2425c59b85d559c10edd333207fa417ff471699cb254da25cc738d8d468db119ed515d5832b0ff647a3fce7c32ad8c4d67231e74c26b133d0edc44b

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                          Filesize

                                          1KB

                                          MD5

                                          05757b6e06680a1dcbd55b76bbdded3f

                                          SHA1

                                          d9231137878f81b2b0a0764c184607840d9b43f6

                                          SHA256

                                          2bb72b9847336eb254713b608cddb46816fd4b824c4e825cdfc65d452c0d7602

                                          SHA512

                                          cb62e56b067cc5f391182d127dc568485ab5365222e6f5b2d7c970d78ad445b72f97088a77f0a832d96c9fa9eaf11d08f75f64cc4a0ffe6710f87144d08fa962

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                          Filesize

                                          1KB

                                          MD5

                                          ba1e073dac8c1b7fc13f09ea3658e35b

                                          SHA1

                                          08f9b3d37ae5be0fada761a5b6fed04f9016a6a1

                                          SHA256

                                          183360d82b9834a10f9c6afa6d0e07a924b680badcb792e3b0c0807368124145

                                          SHA512

                                          8be9797829b3efc91b84465b8c2e66f1108291e3f192a4b851895b46a6829288e9b63cef8493b0693cd4cc804d9087c77da27d05836dd7e32013768dd1c46cfb

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57d90a.TMP

                                          Filesize

                                          1KB

                                          MD5

                                          f5188815e45f47b0324798824c2217ec

                                          SHA1

                                          5633287bf7b0807cda288eae42aefd65a88d1deb

                                          SHA256

                                          682a50cd7e3da9661e2d8de5618bbc6c4444cd02b0dea667cc80f37a44025ea0

                                          SHA512

                                          7d4dc4e504297de83567728540e1d05a8e8dd7b6f07bbffe68464fd574f7119a709702acb214f38d8e9def96dd9e340ddd3745f92236d29b395d9df6c3a87fd9

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          46295cac801e5d4857d09837238a6394

                                          SHA1

                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                          SHA256

                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                          SHA512

                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          206702161f94c5cd39fadd03f4014d98

                                          SHA1

                                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                          SHA256

                                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                          SHA512

                                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          11KB

                                          MD5

                                          6f8b2362422958e11054df94c21bb752

                                          SHA1

                                          0e6eaed67f5e965342b59f69516f053e13dd6897

                                          SHA256

                                          68cf6a5bfd72268e1bb30de1238d49781b757f6f87b15cd619db2a453c295fe1

                                          SHA512

                                          2ae7eb1f565421c6881f7134104fc5a3014a12504ca755ac9150797a8ec4a029d2bac7837c3ff1fa86d29b604f92b715076dd72244906dcac74ad84386e6801f

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          11KB

                                          MD5

                                          f49bcef5508103407223d5f4f51235bb

                                          SHA1

                                          ac3ec2c2a4878c85ad997ff17ab8f0b18332e1ce

                                          SHA256

                                          a36bd7ec07c0454271304a377cb90a3b312dbfc9a61f7aea4fbbc7aa160d8569

                                          SHA512

                                          8ee4585202d1f92bc782c39da212ec1355f03ea5e49cc69b880194181d1569c290ffd2d5bdc263e1697e8296c3eb743675de28c549118e39d2b2fb1c49435292

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          11KB

                                          MD5

                                          66649698036bba200bb3df1472968be7

                                          SHA1

                                          081a717a5100fb2541f9942d1010bdf19859d267

                                          SHA256

                                          a0ec19a5c2d2e8ca67e4f162f8b3daf568b05b336ed8a69d860002ac2f304d7f

                                          SHA512

                                          9196b706dca9fd63b772cbd3f52e87986dd5014e56d63ad31efe2426af08a5548b6b861086082dec216d27261af9bcf2389d9f9db439a5c4c045600aa91bac69

                                        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                          Filesize

                                          384KB

                                          MD5

                                          9d1254af947e5ba3c7ae16bd31118c81

                                          SHA1

                                          31dfd8f5178aaa4244d52cce9ae63fa9da5b34fe

                                          SHA256

                                          a70d5695b2b71191087f14a1122c9a986f4b0f9fe94d8d0d561f8f7a7ae1fc15

                                          SHA512

                                          92e8265512a7fd280fb625803768360c1798f1fc79431c83034867fbf2a3305fddf9289808f880bff48773908385469a8b996a104ad7f4daa8888e8b2f23a12c

                                        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                          Filesize

                                          1024KB

                                          MD5

                                          7d61b5cc157919827489f85b3d5dbe93

                                          SHA1

                                          2c5a1e5c3a4fb7599e1b7e27d178fb2c5782448e

                                          SHA256

                                          7780ef2549cecc5c042eba86a0ab00f8b16137ac510bbc0a6c689ce79a3724b6

                                          SHA512

                                          a31667727c6bd252c7732a1b4f4429624bbfb7500dddeaf65be3f8ea370fe37aaadd069030e947529dbe9c1b90e81b1de602b9e6556554dc6e1be4fcb8703108

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

                                          Filesize

                                          9KB

                                          MD5

                                          7050d5ae8acfbe560fa11073fef8185d

                                          SHA1

                                          5bc38e77ff06785fe0aec5a345c4ccd15752560e

                                          SHA256

                                          cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                                          SHA512

                                          a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                                        • C:\Users\Admin\AppData\Local\Temp\LogoAnimation.gif

                                          Filesize

                                          327KB

                                          MD5

                                          93bd7bf04d77912d98aaed6decad1b8e

                                          SHA1

                                          885cd97fe084cc15c339aa9131dbaa98bdec38fe

                                          SHA256

                                          a90c6244e2202b30a83db9eff60c06ba73c27307c357358f76679477782453c5

                                          SHA512

                                          6d5c070459af13f9564514f975b0ed623518a9277d4bf359be8035dd3e15e81356017baa944042af9b8c61c78b659192aff624a262f41cffe2c282b67afe2eb4

                                        • C:\Users\Admin\Downloads\Unconfirmed 556949.crdownload

                                          Filesize

                                          13.4MB

                                          MD5

                                          33c9518c086d0cca4a636bc86728485e

                                          SHA1

                                          2420ad25e243ab8905b49f60fe7fb96590661f50

                                          SHA256

                                          ba30ea16cd8fbd9209d40ae193206ad00f042d100524cf310982c33369325ca2

                                          SHA512

                                          6c2c470607b88e7cd79411b7a645b395cee3306a23e6ba50b8ac57f7d5529a1b350c34e19da69aeb1ffade44d5187b4a1ef209a53d21a83e9e35add10fc7867d

                                        • C:\Users\Admin\Downloads\XboxInstaller.exe:Zone.Identifier

                                          Filesize

                                          26B

                                          MD5

                                          fbccf14d504b7b2dbcb5a5bda75bd93b

                                          SHA1

                                          d59fc84cdd5217c6cf74785703655f78da6b582b

                                          SHA256

                                          eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                          SHA512

                                          aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                        • memory/2488-293-0x00000000009F0000-0x000000000175A000-memory.dmp

                                          Filesize

                                          13.4MB

                                        • memory/2488-294-0x0000000006730000-0x0000000006756000-memory.dmp

                                          Filesize

                                          152KB

                                        • memory/2488-333-0x0000000016290000-0x00000000162B2000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/2488-334-0x0000000015690000-0x0000000015698000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2488-308-0x000000000BE90000-0x000000000BEC8000-memory.dmp

                                          Filesize

                                          224KB

                                        • memory/2488-309-0x000000000B080000-0x000000000B08E000-memory.dmp

                                          Filesize

                                          56KB

                                        • memory/2488-296-0x0000000006710000-0x000000000671A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/2488-295-0x0000000006700000-0x0000000006708000-memory.dmp

                                          Filesize

                                          32KB