Analysis

  • max time kernel
    102s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-07-2024 13:15

General

  • Target

    https://drive.google.com/drive/folders/1i3gy2rSPwI-_4MlhDGHhfFHjuPhLvgZr

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 39 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/drive/folders/1i3gy2rSPwI-_4MlhDGHhfFHjuPhLvgZr
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3848
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff971f746f8,0x7ff971f74708,0x7ff971f74718
      2⤵
        PID:904
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:2
        2⤵
          PID:5072
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4996
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:8
          2⤵
            PID:2772
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
            2⤵
              PID:3376
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
              2⤵
                PID:2232
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:1
                2⤵
                  PID:444
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5524 /prefetch:8
                  2⤵
                    PID:1980
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:1
                    2⤵
                      PID:4480
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:1
                      2⤵
                        PID:2076
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6440 /prefetch:1
                        2⤵
                          PID:3624
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:1
                          2⤵
                            PID:1808
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:444
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6776 /prefetch:8
                            2⤵
                              PID:544
                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                              "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\robloxapp-20240728-0108573.mp4"
                              2⤵
                              • Suspicious behavior: AddClipboardFormatListener
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of SetWindowsHookEx
                              PID:4784
                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                              "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\robloxapp-20240728-0108573.mp4"
                              2⤵
                                PID:4804
                              • C:\Program Files\VideoLAN\VLC\vlc.exe
                                "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\robloxapp-20240728-0108573.mp4"
                                2⤵
                                  PID:3008
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6776 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5264
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:1
                                  2⤵
                                    PID:852
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5708
                                  • C:\Program Files\VideoLAN\VLC\vlc.exe
                                    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\robloxapp-20240728-0116429.mp4"
                                    2⤵
                                      PID:5868
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,13511217089216573630,12550781816742464181,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5500 /prefetch:2
                                      2⤵
                                        PID:5704
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:368
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:4364
                                        • C:\Windows\system32\AUDIODG.EXE
                                          C:\Windows\system32\AUDIODG.EXE 0x4b0 0x4e0
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5416
                                        • C:\Windows\System32\rundll32.exe
                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                          1⤵
                                            PID:5932

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            04b60a51907d399f3685e03094b603cb

                                            SHA1

                                            228d18888782f4e66ca207c1a073560e0a4cc6e7

                                            SHA256

                                            87a9d9f1bd99313295b2ce703580b9d37c3a68b9b33026fdda4c2530f562e6a3

                                            SHA512

                                            2a8e3da94eaf0a6c4a2f29da6fec2796ba6a13cad6425bb650349a60eb3204643fc2fd1ab425f0251610cb9cce65e7dba459388b4e00c12ba3434a1798855c91

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            9622e603d436ca747f3a4407a6ca952e

                                            SHA1

                                            297d9aed5337a8a7290ea436b61458c372b1d497

                                            SHA256

                                            ace0e47e358fba0831b508cd23949a503ae0e6a5c857859e720d1b6479ff2261

                                            SHA512

                                            f774c5c44f0fcdfb45847626f6808076dccabfbcb8a37d00329ec792e2901dc59636ef15c95d84d0080272571542d43b473ce11c2209ac251bee13bd611b200a

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            1KB

                                            MD5

                                            766c929ac73b6138970f90714a2b55e3

                                            SHA1

                                            80ff7afaa2d6e73e9c5c8991728168e9c707bf38

                                            SHA256

                                            52ac6e0bfbafb666122f16315c0211623ae24f21ad78f1b53bba67d0bf84e278

                                            SHA512

                                            a3cf4ef869882ef67e0d796f6c4d379186279057cb8d3bf8841ecdeaaff1b9bed0e5d1a8d470432207a59648878905df5c2712487742f0189fecc41266edae93

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            1KB

                                            MD5

                                            17c90ddaafadffd68bc9ed2b38c36809

                                            SHA1

                                            48112303da0fe24da7ae4b9db7c93e5c44bbece8

                                            SHA256

                                            83b9149cab5cfa2b473da848cb242748efd7d961ca1d4ab4beddc55c1af1d24d

                                            SHA512

                                            5b25d57af55522e8f102b4301c0be89ba95f9b5b85a4d054a2bbfb6a5fd5e433da6764d721f183047b1303724327c3790402baaf97beccf089de04fe54fe1232

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                            Filesize

                                            111B

                                            MD5

                                            285252a2f6327d41eab203dc2f402c67

                                            SHA1

                                            acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                            SHA256

                                            5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                            SHA512

                                            11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                            Filesize

                                            3KB

                                            MD5

                                            467b4abb6b91f042d0c2c6864319c303

                                            SHA1

                                            4fb2a7735de2e2e37ee10d796cb7f769620634c4

                                            SHA256

                                            d1cf6821030bb8d536b5ecec9c777f8e0e87ca1e22cec9efc59f2e4ef8f22551

                                            SHA512

                                            bd899477b292964b8d191ee0fafe6423e4a42dd4e440f68c51ef1a34a64cf2914189c3e6ac9305583550d253009f4bea1cd92fd5f75f5de92e6fcbe63907e6b3

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            fd910741b06359f3b1d79ca5f63a5e64

                                            SHA1

                                            3e99f903d5ec714585faa0049e2a6c6674b1571d

                                            SHA256

                                            33d2da0ecbc00b52d42767d0e6c9e75eb3b27b499e3572d309f1447954ad5d4d

                                            SHA512

                                            c7a80dfb96a7d058b1b34aa5313a26aa3bd9174b6da2e048721fe08c4424b1bad0afc46c5a7c5c313a97551608b362c8aef12e169667455204dc4a985fa3b1f6

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            bc7d5d899714fecaeee53549010baaea

                                            SHA1

                                            dc7ce653243f355c6ffd92c15de0a23a1ebacff8

                                            SHA256

                                            fa6bb7f315b670d7506668ddef7505d015ea69f4d4a117c45152e19140accd6d

                                            SHA512

                                            67711db1c30c3be2760f77bc298fba381b8f07abbd81b0184280143b17bfacf3f87d1d0fd6db5ca3aa93e94913557c4f91d09f23d0fea8d654d2c42288eec48a

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            6b04e33701142118c028fcdf52f2f7ef

                                            SHA1

                                            ab004e64147fced4c1ca860d379fa00d119a9bf6

                                            SHA256

                                            03a4cc15a9a9a088edf50202c9f2ada40fafe1ee18eca85aaaa9493588ba7832

                                            SHA512

                                            316ffce452b38fba288c31fefd921e9048eacfef49cf98655b44ebe69b5bdfa76656207e2b3e87b8bccb81e22651c6dfb66cbfdcde8c19dab48e6ea3a0ae3ed8

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            472d4c5393593c01adab605db1349d3d

                                            SHA1

                                            ca9d8b5f19f5206a456dd7d19cec5dd389b3e4cf

                                            SHA256

                                            03cd3fb83793ae24ea61a4a68f9d6a75f521b2c2e1eacfb19ab740fd6b8481f2

                                            SHA512

                                            89c7a91f33f8b56797451c889d4bc6d822c9020a2a80bc8b4cbac3892afb3c86a19d14b16824e1edcbdefd7767255e909fd394e587bca23e45a9ee4ab678e021

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            df87b0d79310bcaae5305fb4b986079e

                                            SHA1

                                            7b6c4decdfdf78c74c558b6c4dffc8c8e0b51e3f

                                            SHA256

                                            c106a25fe6a48ae73c3ec3c266a97dadebbd9aa1be127964f410ccdda985b7c2

                                            SHA512

                                            4adee358ff75e6d800be493136f2960081fce5d92a48f4f5fb7cb8d7de579542842e077c80870bdce04b6f7bb52fb665a493ab435282339f75ee9cb5d982b58a

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            0d308ecb5b69f08fa2eb8901a9b7785b

                                            SHA1

                                            858a21e233fbb73f4fbd7316c9028e22eabcb346

                                            SHA256

                                            32529b8e1f3812a441caad488a6b87dfdcfa3f5533ca95018699da839356b4e2

                                            SHA512

                                            b88263be7bc9cc0d99d2e7fee245ac1ed1c92264c11468b885e5d12a8928c742b00aa71a55d9fb83516f12c34f3dbfdaeb8481b99f86435faf45bf35c3fce4ad

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58052b.TMP

                                            Filesize

                                            867B

                                            MD5

                                            87e029456c777efe8a4b2cf72307b8c0

                                            SHA1

                                            eb73d2cb47fe1eca3bc3ffa5928e20bab51ef2bc

                                            SHA256

                                            7a4c7275ce06d00b848452e2b789398ea2b363f501b6af6888d30c284bcca5c7

                                            SHA512

                                            87ef715b6902fe784251095b6ad7197c14b0b8bf6439d9420f1a49c5b9f9f93762a4f0a46dea9e5c59b8aa30408114bb6f4c9d2b837fcc93349b06d8045c406d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            206702161f94c5cd39fadd03f4014d98

                                            SHA1

                                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                            SHA256

                                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                            SHA512

                                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            46295cac801e5d4857d09837238a6394

                                            SHA1

                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                            SHA256

                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                            SHA512

                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            74bd53271519388c586af40d06ea1bdc

                                            SHA1

                                            250396ac0a0526964f16bfb21d17bddfab7ac882

                                            SHA256

                                            e72bd06349998269db233eccf7826a9a3cf155f5db5623bd68907b1295088df3

                                            SHA512

                                            5b9d9dd83b6883c628185c0b5fced4b0a76be5d3be05846df0bac22398c34ee0b370d43e7f6b2832e71f907ce6e587a02faa8aeeb73d9ace5ff561e646e963d4

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            984f91733bae7820e00b8e157854f207

                                            SHA1

                                            e7913d2c4decca5b0de11e58a523cb8fd7dc651e

                                            SHA256

                                            697ee8d08b618240a8759a1f252557d4ca59540c2c80c42e48599648d30aeff8

                                            SHA512

                                            f9dcb70d8952f641ee258fddaaf9b6937200276f6e844f0a652cb136714d6256b3b7f5fc8a8aafbe585a39ed195a333b39997a31a0741ac21bce8c46bfad57e2

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            12KB

                                            MD5

                                            7544e28fd3e6a8a7753307b460372b42

                                            SHA1

                                            be091e23453806ab2008d52b24559919093d901c

                                            SHA256

                                            39c7aed2ec351413261606dcec67430e7f2f93f9292470b8fc011baf973e3941

                                            SHA512

                                            5a10d6f21c670e570a7dbe529b0aaea80116ad66857beeaed22d89c02d142363cee64c00b159f5de2b1189ba5bc4939e9001d709368be36fca65d4b0f5e8086f

                                          • C:\Users\Admin\AppData\Roaming\vlc\ml.xspf

                                            Filesize

                                            304B

                                            MD5

                                            781602441469750c3219c8c38b515ed4

                                            SHA1

                                            e885acd1cbd0b897ebcedbb145bef1c330f80595

                                            SHA256

                                            81970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d

                                            SHA512

                                            2b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461

                                          • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

                                            Filesize

                                            548B

                                            MD5

                                            7f181e7ab065a5bb7a62489b084a034d

                                            SHA1

                                            b1397e6be1eca5af86ed47570052e374648dc2b9

                                            SHA256

                                            9291fb5346868e4677d1bb21b5812786429f788271d53a50381d065337418481

                                            SHA512

                                            d0d5d819479191e8df417238d97c0abfaed252a86ba63f9109bd2904aca093c001096a843b176ef7ba756d780d5c9a5be008ca4dc8382e2e5a1e68d8f1a25f2b

                                          • C:\Users\Admin\AppData\Roaming\vlc\vlcrc

                                            Filesize

                                            94KB

                                            MD5

                                            7b37c4f352a44c8246bf685258f75045

                                            SHA1

                                            817dacb245334f10de0297e69c98b4c9470f083e

                                            SHA256

                                            ec45f6e952b43eddc214dba703cf7f31398f3c9f535aad37f42237c56b9b778e

                                            SHA512

                                            1e8d675b3c6c9ba257b616da268cac7f1c7a9db12ffb831ed5f8d43c0887d711c197ebc9daf735e3da9a0355bf21c2b29a2fb38a46482a2c5c8cd5628fea4c02

                                          • C:\Users\Admin\Downloads\robloxapp-20240728-0108573.mp4.crdownload

                                            Filesize

                                            11.9MB

                                            MD5

                                            bc412c80705beba74b31b6ccdfe3d283

                                            SHA1

                                            411ab537109855bd9adccc82327d39d07aa2c574

                                            SHA256

                                            1f57f497322034726d6a9ed59f53532c14437b5594dc59684371690bdd09dbf4

                                            SHA512

                                            02fa501446dbda7a3a444867d1f706e4eb21e658f8df75f08c8ff37bcbfb98b34f7a94b2619eb78bbd11ac7e251164eef711240f3380b66b97613b0034602e20

                                          • C:\Users\Admin\Downloads\robloxapp-20240728-0116429.mp4

                                            Filesize

                                            31.6MB

                                            MD5

                                            e9eb27d899554cc12e44ff5e1d2d0ff3

                                            SHA1

                                            4d598c801cc02b8711ac5aee8c888a5401762f3b

                                            SHA256

                                            7925389a8abfebeac105b67909e0c3d8a594cd346744a42a97e545a2618e2851

                                            SHA512

                                            fad509158dd8e37b0695c7c0271946631a737a9979bb51e80e0dd42371f0800078dc5adfed7531ca3973a1266c277ace67ac98122fc6809df698aab3b2f00cd8

                                          • memory/3008-219-0x00007FF95F2A0000-0x00007FF95F556000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/3008-217-0x00007FF788C90000-0x00007FF788D88000-memory.dmp

                                            Filesize

                                            992KB

                                          • memory/3008-225-0x00007FF971670000-0x00007FF971681000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/3008-224-0x00007FF9718F0000-0x00007FF971907000-memory.dmp

                                            Filesize

                                            92KB

                                          • memory/3008-223-0x00007FF95FA40000-0x00007FF95FA58000-memory.dmp

                                            Filesize

                                            96KB

                                          • memory/3008-218-0x00007FF95FA60000-0x00007FF95FA94000-memory.dmp

                                            Filesize

                                            208KB

                                          • memory/4784-247-0x00007FF95F2A0000-0x00007FF95F556000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/4784-255-0x00007FF971650000-0x00007FF971667000-memory.dmp

                                            Filesize

                                            92KB

                                          • memory/4784-254-0x00007FF971670000-0x00007FF971681000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/4784-253-0x00007FF9718F0000-0x00007FF971907000-memory.dmp

                                            Filesize

                                            92KB

                                          • memory/4784-248-0x00007FF95FA40000-0x00007FF95FA58000-memory.dmp

                                            Filesize

                                            96KB

                                          • memory/4784-246-0x00007FF95FA60000-0x00007FF95FA94000-memory.dmp

                                            Filesize

                                            208KB

                                          • memory/4784-245-0x00007FF788C90000-0x00007FF788D88000-memory.dmp

                                            Filesize

                                            992KB

                                          • memory/4784-263-0x00007FF95F5D0000-0x00007FF95F611000-memory.dmp

                                            Filesize

                                            260KB

                                          • memory/4784-269-0x00007FF95CAD0000-0x00007FF95CB05000-memory.dmp

                                            Filesize

                                            212KB

                                          • memory/4784-268-0x00007FF95F590000-0x00007FF95F5A1000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/4784-267-0x00007FF95F5B0000-0x00007FF95F5C1000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/4784-266-0x00007FF95FA20000-0x00007FF95FA31000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/4784-259-0x00000243C1B20000-0x00000243C2BD0000-memory.dmp

                                            Filesize

                                            16.7MB

                                          • memory/4784-265-0x00007FF971590000-0x00007FF9715A8000-memory.dmp

                                            Filesize

                                            96KB

                                          • memory/4784-264-0x00007FF963B00000-0x00007FF963B21000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/4784-262-0x00007FF95DD80000-0x00007FF95DF8B000-memory.dmp

                                            Filesize

                                            2.0MB

                                          • memory/4784-284-0x00007FF95F2A0000-0x00007FF95F556000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/4784-292-0x00000243C1B20000-0x00000243C2BD0000-memory.dmp

                                            Filesize

                                            16.7MB

                                          • memory/4784-256-0x00007FF971630000-0x00007FF971641000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/4784-331-0x00007FF95F2A0000-0x00007FF95F556000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/4784-257-0x00007FF9715D0000-0x00007FF9715ED000-memory.dmp

                                            Filesize

                                            116KB

                                          • memory/4784-258-0x00007FF9715B0000-0x00007FF9715C1000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/4804-226-0x00007FF95FA40000-0x00007FF95FA58000-memory.dmp

                                            Filesize

                                            96KB

                                          • memory/4804-227-0x00007FF9718F0000-0x00007FF971907000-memory.dmp

                                            Filesize

                                            92KB

                                          • memory/4804-222-0x00007FF95F2A0000-0x00007FF95F556000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/4804-228-0x00007FF971670000-0x00007FF971681000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/4804-220-0x00007FF788C90000-0x00007FF788D88000-memory.dmp

                                            Filesize

                                            992KB

                                          • memory/4804-221-0x00007FF95FA60000-0x00007FF95FA94000-memory.dmp

                                            Filesize

                                            208KB