Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04-08-2024 21:03

General

  • Target

    https://drive.google.com/file/d/1QRl0tcABN-H3-jxOVN0bKRYMPVGdoR22/view?usp=sharing

Malware Config

Signatures

  • Downloads MZ/PE file
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 24 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1QRl0tcABN-H3-jxOVN0bKRYMPVGdoR22/view?usp=sharing
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffaa90d3cb8,0x7ffaa90d3cc8,0x7ffaa90d3cd8
      2⤵
        PID:5592
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1876 /prefetch:2
        2⤵
          PID:1888
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4928
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:8
          2⤵
            PID:2140
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
            2⤵
              PID:3920
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1
              2⤵
                PID:808
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:1
                2⤵
                  PID:5604
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5420
                • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5720
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:1
                  2⤵
                    PID:4020
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1736 /prefetch:1
                    2⤵
                      PID:3580
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:1
                      2⤵
                        PID:6112
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:1
                        2⤵
                          PID:6100
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1236 /prefetch:1
                          2⤵
                            PID:1868
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1752 /prefetch:8
                            2⤵
                            • NTFS ADS
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2252
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:1
                            2⤵
                              PID:4356
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6456 /prefetch:1
                              2⤵
                                PID:2456
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:1
                                2⤵
                                  PID:1672
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:1
                                  2⤵
                                    PID:4812
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6412 /prefetch:1
                                    2⤵
                                      PID:2348
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:1
                                      2⤵
                                        PID:5972
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5440 /prefetch:8
                                        2⤵
                                          PID:5332
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6704 /prefetch:8
                                          2⤵
                                          • Modifies registry class
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:4392
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:1
                                          2⤵
                                            PID:3036
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:1
                                            2⤵
                                              PID:5260
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:1
                                              2⤵
                                                PID:2644
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6852 /prefetch:1
                                                2⤵
                                                  PID:1656
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5420 /prefetch:8
                                                  2⤵
                                                    PID:5704
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6956 /prefetch:8
                                                    2⤵
                                                    • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                    • NTFS ADS
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:1232
                                                  • C:\Users\Admin\Downloads\7z2407-x64.exe
                                                    "C:\Users\Admin\Downloads\7z2407-x64.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Drops file in Program Files directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:6048
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5320 /prefetch:2
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5476
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,5239232794809792444,16424974944380270229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:1
                                                    2⤵
                                                      PID:612
                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                    1⤵
                                                      PID:5236
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:3404
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                                        1⤵
                                                          PID:2820
                                                        • C:\Windows\system32\OpenWith.exe
                                                          C:\Windows\system32\OpenWith.exe -Embedding
                                                          1⤵
                                                          • Modifies registry class
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1388
                                                        • C:\Windows\system32\OpenWith.exe
                                                          C:\Windows\system32\OpenWith.exe -Embedding
                                                          1⤵
                                                          • Modifies registry class
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:5256
                                                        • C:\Windows\System32\rundll32.exe
                                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                          1⤵
                                                            PID:5616

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Program Files\7-Zip\7-zip.dll

                                                            Filesize

                                                            99KB

                                                            MD5

                                                            8af282b10fd825dc83d827c1d8d23b53

                                                            SHA1

                                                            17c08d9ad0fb1537c7e6cb125ec0acbc72f2b355

                                                            SHA256

                                                            1c0012c9785c3283556ac33a70f77a1bc6914d79218a5c4903b1c174aaa558ca

                                                            SHA512

                                                            cb6811df9597796302d33c5c138b576651a1e1f660717dd79602db669692c18844b87c68f2126d5f56ff584eee3c8710206265465583de9ec9da42a6ed2477f8

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            2ee16858e751901224340cabb25e5704

                                                            SHA1

                                                            24e0d2d301f282fb8e492e9df0b36603b28477b2

                                                            SHA256

                                                            e9784fcff01f83f4925f23e3a24bce63314ea503c2091f7309c014895fead33c

                                                            SHA512

                                                            bd9994c2fb4bf097ce7ffea412a2bed97e3af386108ab6aab0df9472a92d4bd94489bb9c36750a92f9818fa3ea6d1756497f5364611e6ebd36de4cd14e9a0fba

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            ea667b2dedf919487c556b97119cf88a

                                                            SHA1

                                                            0ee7b1da90be47cc31406f4dba755fd083a29762

                                                            SHA256

                                                            9e7e47ebf490ba409eab3be0314fa695bf28f4764f4875c7568a54337f2df70f

                                                            SHA512

                                                            832391afcac34fc6c949dee8120f2a5f83ca68c159ff707751d844b085c7496930f0c8fd8313fd8f10a5f5725138be651953934aa79b087ba3c6dd22eaa49c72

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                            Filesize

                                                            408B

                                                            MD5

                                                            3c85de1f4a8749316e3ea4a56d20e162

                                                            SHA1

                                                            f4b4eb5d334f13ad4390476bd01fecad6f821c9f

                                                            SHA256

                                                            a408c9e51a5af687e092ec168e208a0a63a12027d7b5baafbc1dfcda6a7aa8d1

                                                            SHA512

                                                            39db45006c8a4f64703621bdf8bbbb5fb42bd94886d9434492fd8c44437d4cc0fda46667cd862057e9697e52919f9bca5a522ec01a2d63d63b61a3a12eba1275

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            7bb8e0e00bbf934d709dc7a1bd3aef9e

                                                            SHA1

                                                            fa99668a8a5eaeeeba9802ef92f48d4629231baa

                                                            SHA256

                                                            1f8f32ec35a2b6aa62f59291871792a7b483809259ac5ec7dd3439fb0f3b8c10

                                                            SHA512

                                                            41b5ce18c86420044d9b1b02f1804f425cd89ebb80a06eed50ad7f910d4d66ea772cdfa737bd7ba0fa082fa8676f76e42a22aa6fdca9baf980b9e332e8a2681e

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                            Filesize

                                                            4KB

                                                            MD5

                                                            3e53cb2a1bc4ce6c0cd4b93815b7b459

                                                            SHA1

                                                            f103efb0a59f26e7b1048d3368847cddae3bb833

                                                            SHA256

                                                            e72071237d068622aabbfbcc62c68fd0024797a6ec7790096e85d310446c2609

                                                            SHA512

                                                            310c8849c22dc72d4fa0b2fd6b48c1243b436460118a4ddce4102b4d3ddd1cf6f010915f47eeb9cf984ec55004e078b0cc6ae9fd0094272077c9a7ab662395b7

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                            Filesize

                                                            3KB

                                                            MD5

                                                            feaefe912a151e55bbd43fc866332aef

                                                            SHA1

                                                            be8f53e27b2e190e2485857dd8e0dc3d7eaa8799

                                                            SHA256

                                                            7296f4540a34f8859351174f66c4ca4f056225080abc82603f8fada35d0c2c2e

                                                            SHA512

                                                            ef290318e8eda36990db32baf24752431dd0f7d0cbb0a6fd8f29f0a23b5b207547fd5aef7f632b1661e87ef4b7cda29a9ed0cfcf6fffc2d9b35f1a576655cd00

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            5b035ff24114bb64183b551f129f46ec

                                                            SHA1

                                                            a6c5adfb2ddf931d4f9598322fe83b590ae19179

                                                            SHA256

                                                            3ba00f005c496a02dd4a4bd16fd1c6e524e49854370a260639e594ba74b83e33

                                                            SHA512

                                                            d943b1c11862f1f4fc289c115d3889ad058f68e5c538f9376f070a56e79d8418fd0d41f74b1d71595297ef775acb6e7409d2e04790a8b9fb58e23fc2caf2b1db

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            e2d2b5e3d99fab8c49e100ddaf1c6e9d

                                                            SHA1

                                                            36c6e869df6303396c38428d8c51d564afca059f

                                                            SHA256

                                                            22feb7fa9f2ca820e2b0c4ad3534cfff05edb029886ebbed6e71ba2b545b13cd

                                                            SHA512

                                                            f0e3e171913edfa9e044e4065847effed2c1e852a7a7682a77be3de13acd78a4e2be3301e1bbecdcceaab3c47feb61adab08d2d9b3b8f57b925605616d40f27c

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            0a476c6718d1a3863d0ab02d2e837164

                                                            SHA1

                                                            c208f261c5dc476cf544fb67d80e44eee154a016

                                                            SHA256

                                                            b05288ed1eddcc1b7cd57fcec54bf5af78805fda2fcfac03b5d9134f3e26d1d9

                                                            SHA512

                                                            3c55dbe8ee94f7bf416fba69691009743bd6eac5aa6aa391c292538f1477592349238aee81820afbfd612ec4a04ecac7b7123ced3841935a9d5a30b4bd2c8a6f

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            fd087d838c76fa807b2ac4d6812d8fb7

                                                            SHA1

                                                            e5b16d504dd27e27039a6acfc2e7a5df2a6b3423

                                                            SHA256

                                                            1eefe3267140f7b6e3fdb091ca1403637b33325c54b457ac2b40eb2fdea9a684

                                                            SHA512

                                                            a89ca3b7693cd7037c28002aa16c024669d49a9aeb6b56e8dfb83980555c6663b37b63f8aaf1ff857853a3538795a81cfb4297857da7b709e3f22fb183898a11

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            ec99190249c7f6fe6b67c50ae7b0178b

                                                            SHA1

                                                            30396ed75c68595303349e1ab52233c4379afbc5

                                                            SHA256

                                                            5e089aa3e076b6a6492bfdaaa80a4940366232cc2eed5035dd3937a96ab56597

                                                            SHA512

                                                            007d2bd02e0028acff91f1bab5d00f717c447fcb4b7525d0a774c892a6d37cea3c36f3d0356a0b4d89b451c3d5454716ff1bed71fc0b542436b27c7cccf7089b

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            f6e11395ea4f51ae27b0d4c2c3478a05

                                                            SHA1

                                                            613325cda20a8c9250c79acdd8117a7b07dba31f

                                                            SHA256

                                                            aae71fe7b7bc8a41e25c2c3e13b93ff80080bcd7e383f9f3a93fbaa3a98d0a45

                                                            SHA512

                                                            1a5efc8117b7a4d53bcb8c639d293bc55ec6f55108ffae654491911108caf338325ae2b9a2bd6372e73074758558204a41481a44b6a9cb5699ccfdbf4f4f0e73

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            424d0b6924316cdaeb37bbb7a42e9082

                                                            SHA1

                                                            9eeeeadad7662ee3062571582d8fe47b21ad4a0c

                                                            SHA256

                                                            c487fc2bfef4c7f807bcd77aa83db5f9c2dbbfa60e5e03ccba048bb23f67e16b

                                                            SHA512

                                                            0c52ae905726c4369ae08bdf8973e559f96a9880f4446e5864d8050bae9b737201fa927280d2003dee82cc24a47ac96bf0db03a7b16bf8c96240b68b710399eb

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe590db2.TMP

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            47c226e15abe6f97d4bcb03fc1a79d82

                                                            SHA1

                                                            acfc0f1b288643e6a8c886df6b3f3a66d47bd236

                                                            SHA256

                                                            e225bc5a73acbec2a9e0efc63cd2ab59a4d9f4f27da5249b6e04c0855eedd0af

                                                            SHA512

                                                            0986ef5661f9d3798df66129336b9ad5e836ab6ead373e52a14743c1cdc69b215115408ae928148712e323318413909097f02daaf1a1aaf5b4f33e0596194980

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                            Filesize

                                                            16B

                                                            MD5

                                                            6752a1d65b201c13b62ea44016eb221f

                                                            SHA1

                                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                            SHA256

                                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                            SHA512

                                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            be2d568661f42d588087e5d9108ce73d

                                                            SHA1

                                                            c3b96b5f9735cb1da96c90ca294650ad370573c9

                                                            SHA256

                                                            dd6866277437ebfd39429fde43b80c3c874ef14bbfebc8fb6e284ce7c6d4ff7b

                                                            SHA512

                                                            97b0329a5e5dc53cb04c744b96aa2b9041f071b1538085e9a802eef16bc912a8a42551d5e51efb9fd221b317d78ee52b34b5912a9c29afa8947c4111f46901e3

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            69238f55bf6fd47e246e7ced0edd7271

                                                            SHA1

                                                            f27a6d4309afcf310550ecad378d983116201850

                                                            SHA256

                                                            6c201b33cd0b20cd3659f1ccfa1ed6cdd11b20f96d31874cafe8d8c9cba932c4

                                                            SHA512

                                                            9331b399bee230903d34c22c8d88a81baf224de76fdf18f92b8a82f12d67c833bca2b48529d8c79233766e4746d078b416599bd599cb910dd8641e31ed35d203

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            8972dd41eb3ae46b6fb3edfa72ca933d

                                                            SHA1

                                                            60f8288933759dc1936d16a18b79c5f78d5268a9

                                                            SHA256

                                                            b1b4dad74b21df93ba6b63a58fc1713d116ec4b310f12a2d647fbe24c6ce3840

                                                            SHA512

                                                            bd157510f58ace6a8af48e3dec0589c0af1a7f1202f1dce47976aeb7c28027b5db3bb9838418bdc26610dd409ff260ae0d741bc8501d2d150a6efbdaeee73e45

                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            10f5514ce2cd4e47bd4313e8ad2ac76b

                                                            SHA1

                                                            a3ad2ab5c5fb23c46bab00ed3707fde3a1295e6b

                                                            SHA256

                                                            45c651d6ba9c2d136aa7da6e43571ccbae964ac1ba1c6f7b61d1f9af3f2c2048

                                                            SHA512

                                                            3e31004afaa1deebca38411b3301d90ab4e32bb80a22b6ad88888edf7403a9ac3466482605619bb347fcee12be5a9dbf5151704c0196ba43804515fe70dc6dad

                                                          • C:\Users\Admin\Downloads\ReworkedLOLMenu-main.rar:Zone.Identifier

                                                            Filesize

                                                            26B

                                                            MD5

                                                            fbccf14d504b7b2dbcb5a5bda75bd93b

                                                            SHA1

                                                            d59fc84cdd5217c6cf74785703655f78da6b582b

                                                            SHA256

                                                            eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                            SHA512

                                                            aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                          • C:\Users\Admin\Downloads\Unconfirmed 830100.crdownload

                                                            Filesize

                                                            19.6MB

                                                            MD5

                                                            a4b9e231e030ca2642415ab378435720

                                                            SHA1

                                                            c942f7c004ce0e16b7ef780ce529df228c0b7952

                                                            SHA256

                                                            bf0e572d3dfce18ddc493116850a982cbad1261b992a20aaf7ad55ac0c1e9e2f

                                                            SHA512

                                                            8679b410855a7cfd3adbf8f3d4ad19c346f3eadafe53570ed71251f27f150bd4750d7e8b52855f0613f58e0f58a53c7231d6a2a6b94f5eb3008de755fa7a4938

                                                          • C:\Users\Admin\Downloads\Unconfirmed 839436.crdownload

                                                            Filesize

                                                            1.5MB

                                                            MD5

                                                            f1320bd826092e99fcec85cc96a29791

                                                            SHA1

                                                            c0fa3b83cf9f9ec5e584fbca4a0afa9a9faa13ed

                                                            SHA256

                                                            ad12cec3a3957ff73a689e0d65a05b6328c80fd76336a1b1a6285335f8dab1ba

                                                            SHA512

                                                            c6ba7770de0302dd90b04393a47dd7d80a0de26fab0bc11e147bf356e3e54ec69ba78e3df05f4f8718ba08ccaefbd6ea0409857973af3b6b57d271762685823a