Analysis

  • max time kernel
    41s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-08-2024 07:43

General

  • Target

    https://drive.google.com/uc?export=download&id=1rmivgmi0PMbGqSROhHYu9dMAxvQZyyCQ

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 61 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 35 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/uc?export=download&id=1rmivgmi0PMbGqSROhHYu9dMAxvQZyyCQ
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdd8f546f8,0x7ffdd8f54708,0x7ffdd8f54718
      2⤵
        PID:5072
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9957112407733902111,173547920600237805,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
        2⤵
          PID:4272
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9957112407733902111,173547920600237805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4856
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,9957112407733902111,173547920600237805,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8
          2⤵
            PID:456
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9957112407733902111,173547920600237805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
            2⤵
              PID:4084
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9957112407733902111,173547920600237805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
              2⤵
                PID:2236
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,9957112407733902111,173547920600237805,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5144 /prefetch:8
                2⤵
                  PID:3204
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9957112407733902111,173547920600237805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1
                  2⤵
                    PID:2368
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,9957112407733902111,173547920600237805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2968
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9957112407733902111,173547920600237805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:8
                    2⤵
                      PID:2140
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9957112407733902111,173547920600237805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4764
                  • C:\Windows\System32\CompPkgSrv.exe
                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                    1⤵
                      PID:4240
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:4764
                      • C:\Windows\system32\OpenWith.exe
                        C:\Windows\system32\OpenWith.exe -Embedding
                        1⤵
                        • Modifies registry class
                        • Suspicious behavior: GetForegroundWindowSpam
                        • Suspicious use of SetWindowsHookEx
                        PID:2332
                        • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play "C:\Users\Admin\Downloads\jfthZiZiBXGymkUPlMjwQyB142.bin"
                          2⤵
                          • Enumerates connected drives
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          PID:3436
                          • C:\Windows\SysWOW64\unregmp2.exe
                            "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1700
                            • C:\Windows\system32\unregmp2.exe
                              "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
                              4⤵
                              • Enumerates connected drives
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4324
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 2252
                            3⤵
                            • Program crash
                            PID:1120
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
                        1⤵
                        • Drops file in Windows directory
                        PID:3200
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3436 -ip 3436
                        1⤵
                          PID:1444
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe"
                          1⤵
                          • Enumerates system info in registry
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:2860
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffdd8b1cc40,0x7ffdd8b1cc4c,0x7ffdd8b1cc58
                            2⤵
                              PID:2660
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1804,i,14438243250513520299,12435655977226686848,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1796 /prefetch:2
                              2⤵
                                PID:2608
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2028,i,14438243250513520299,12435655977226686848,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2024 /prefetch:3
                                2⤵
                                  PID:3116
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,14438243250513520299,12435655977226686848,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2264 /prefetch:8
                                  2⤵
                                    PID:1984
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,14438243250513520299,12435655977226686848,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:1
                                    2⤵
                                      PID:2840
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3376,i,14438243250513520299,12435655977226686848,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:1
                                      2⤵
                                        PID:1900
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3664,i,14438243250513520299,12435655977226686848,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3676 /prefetch:1
                                        2⤵
                                          PID:4984
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4820,i,14438243250513520299,12435655977226686848,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4852 /prefetch:8
                                          2⤵
                                            PID:2692
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4896,i,14438243250513520299,12435655977226686848,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4908 /prefetch:8
                                            2⤵
                                              PID:4976
                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                            1⤵
                                              PID:2324
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                              1⤵
                                                PID:1988

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                Filesize

                                                2B

                                                MD5

                                                d751713988987e9331980363e24189ce

                                                SHA1

                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                SHA256

                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                SHA512

                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                Filesize

                                                356B

                                                MD5

                                                5bced536bea47f94d11c3a5a416d7376

                                                SHA1

                                                3154dd19b7099cf6aee58be41b9af79eeae08c59

                                                SHA256

                                                380ffea93ff711d92b089d6530a8be8387df9d87ee73050baf1386df1428c63b

                                                SHA512

                                                080aa2370868f8a5b0684c0ae4bbd864b2ef32439835f3d4a1fb42077bca5dd6290084d0024ee38944caa56cd5f7dc37f67e50352d2cbdf6a0d93f39e2e97309

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                8KB

                                                MD5

                                                6c531d672c522dccfce0731e445d01ab

                                                SHA1

                                                c9d4e1fc707dccbf863144d648d0ca683b0b00ba

                                                SHA256

                                                8159bede4dc5976c553927ec39eb663de979ffbe52bb9116499b15fa21272bfa

                                                SHA512

                                                30fd22a2f8628f7f0a58e5893f1812c35b49d0e613495f35f206f740accebb2710769d6a9d57511f1a5ba4d77c275e01a896d13b62cde3532b356483eac17cd6

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                Filesize

                                                15KB

                                                MD5

                                                0e93e00568a15c24b80cff15676471ba

                                                SHA1

                                                1f049b6604e1fd77e704dd71debb02d7254b1ae3

                                                SHA256

                                                7e9e88061322620648f06866b08f0a747ff54fa827c8418b4613d23a03afe125

                                                SHA512

                                                50b7cfd2140ac4295e8712a470cc9910618f0b64b812567b1872348f72586a2e3560cba6e83087df688a273b105a13a8d24dc1c11df9785f8562fc302b7ba513

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                Filesize

                                                193KB

                                                MD5

                                                a0d59d26b0174667491a8f217bcb5264

                                                SHA1

                                                a6dc6f006d73c329e1120f1a08d7370bc2fb28dc

                                                SHA256

                                                2717d848d5accb3ad405f63dee740c4556c85794e45442c671b73f707afc72d8

                                                SHA512

                                                0df10cfcf98fe0218f5b24d19b2c2e168a5314046ae75d82a8d1e6871c8be2319fdb13f63a2903a69cf78fba45ff9625a8b2b3aace432b4242a6cd52267e4fda

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                9b008261dda31857d68792b46af6dd6d

                                                SHA1

                                                e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3

                                                SHA256

                                                9ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da

                                                SHA512

                                                78853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                0446fcdd21b016db1f468971fb82a488

                                                SHA1

                                                726b91562bb75f80981f381e3c69d7d832c87c9d

                                                SHA256

                                                62c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222

                                                SHA512

                                                1df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                Filesize

                                                512B

                                                MD5

                                                889b7ef99dade7674feb5e29b6460cfd

                                                SHA1

                                                976590279faa84456486a6c3f72caa6334126574

                                                SHA256

                                                4be9bad6e23599b12ecd4cce000b1910f5b4a6a15b4603457682607536fe386e

                                                SHA512

                                                5fb5775f66631d1f4fab763e2d91f0c52570e384c4e877e3906fcb1223e4929807a175ab750ff6f7c0de92c02e2a5ccc90a179b133792084395b3d9eb487dd26

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                6e43d10ecf6fb3ee4334161b71b5ee4f

                                                SHA1

                                                dead792c994ce16ccdbb71757d6e703d2fc54319

                                                SHA256

                                                17c070e12b2db61d3c1ecd9e1858384925a85ec77271d5ebcc99ef4eb49d9e51

                                                SHA512

                                                085a911e84b21221ae678c4cb795c51d4591e9ba9dd987e01bbc8e91cb50d29dac719d0b9489b39b4d4efc0d3013f70d061ad59d499d4414d696faa1107040ad

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                cfece17da17f5f4a36ed5ba4d34947f0

                                                SHA1

                                                e79fd4493d9191fad40a5a8eb8d9f3925c1d9bdc

                                                SHA256

                                                3b41a7e51a6904876fbb34004ba79b734f5ae3000459219dfa48457cbb602def

                                                SHA512

                                                83df44e55297819437a2a72fd006574d5984d206a5b3398c9da3667ebe9d165920e168414e926d66c1bb55394b8a66656b88cb5298a683459e13c4b18dd98dd3

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                005ccf9d1730aac38cbd88e9441ea0c3

                                                SHA1

                                                1911198734c785aa4062e55b00aadec5c7545df0

                                                SHA256

                                                01c283c63ae5deb4220f930a05777c994cc44e402fd1349207ad429925276a17

                                                SHA512

                                                57e6d244850d99e5beb03682640e012f3fb97b5d14c294dc5b26c9dacace6b309658f0f0cdcaf3924f0caf2745e8a0160f14526bd55897b84b1340817a23f0b8

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                46295cac801e5d4857d09837238a6394

                                                SHA1

                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                SHA256

                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                SHA512

                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                206702161f94c5cd39fadd03f4014d98

                                                SHA1

                                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                SHA256

                                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                SHA512

                                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                fc593cc92d40885128246ebedea7e8e2

                                                SHA1

                                                5f8ea9cd5e5741106ef3b7a734d0585d1721f5e6

                                                SHA256

                                                62e8159f3a4a1a6ef1e073701da59976379c76eaaa02b1194e0c06075fb55f03

                                                SHA512

                                                fa6db1cf99a7805401f311830b9611c4766c4aa87a5e5ababd9b6d96255bb4f27bf5ab863bc29135d825c5be342788b28fce3e7b45d8bbfcae6278ee37f76aeb

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                c2f2d846d487b823a712b811f589204f

                                                SHA1

                                                82ada946fcef6e6a2f2229c363c20b400e2cce85

                                                SHA256

                                                04ac0cc7b2c5815733a128c183c4ec9c1750b067d851f19fbd4fa8214ef7b7a2

                                                SHA512

                                                ecd97f6fc3287a56874ac20302215fc99eeb60cca47b7f80a7c3582f8ec5ecb4395f5be6d69d0f72727145c947c86bed676096628e97ed71002faeba7517d1b3

                                              • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                Filesize

                                                1024KB

                                                MD5

                                                cf0ccd63dae4ceb9fc805813b4aceceb

                                                SHA1

                                                5b682127eea6979ffa4455e495f26b27dd3f29bf

                                                SHA256

                                                eecce5b2b18f9fe616211e5f8f6128e0fc33570ce82c42e4adc2af88c701a1b2

                                                SHA512

                                                d2e93db1ee500eb1e73a2e4da78e60446c3c8f58091d815f472acb2fb3e6246f9da9adf70629c67d6f1673b86e87bb6c3eaf432cbe5e037462a606c72503296c

                                              • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                Filesize

                                                896KB

                                                MD5

                                                3ff65d6b32d89eaab149ce0961f04575

                                                SHA1

                                                a56d841a4e4db565f3b754b2eb0f90c3123d0a84

                                                SHA256

                                                3802030a82e39d44753e6faf42fb9af3170eb78d32302ebdf4af89c2a9665733

                                                SHA512

                                                1cd563715a2bcea322caa16d1e31e1a7fd9be9673bf0d7f2b291fc5efb33eb0c7d2f330ea77230c75ac13c00954957fb3b8dfaf7cc36335401a0a5c290a86b37

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

                                                Filesize

                                                498B

                                                MD5

                                                90be2701c8112bebc6bd58a7de19846e

                                                SHA1

                                                a95be407036982392e2e684fb9ff6602ecad6f1e

                                                SHA256

                                                644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

                                                SHA512

                                                d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

                                                Filesize

                                                9KB

                                                MD5

                                                5433eab10c6b5c6d55b7cbd302426a39

                                                SHA1

                                                c5b1604b3350dab290d081eecd5389a895c58de5

                                                SHA256

                                                23dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131

                                                SHA512

                                                207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

                                                Filesize

                                                9KB

                                                MD5

                                                7050d5ae8acfbe560fa11073fef8185d

                                                SHA1

                                                5bc38e77ff06785fe0aec5a345c4ccd15752560e

                                                SHA256

                                                cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                                                SHA512

                                                a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                                              • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

                                                Filesize

                                                1KB

                                                MD5

                                                10281f39dbd1dc880717bbeb06b97575

                                                SHA1

                                                c0f192a6c247438b6f3072257c320daf9d06312b

                                                SHA256

                                                72a1d79a26a8e5f5acc0e66814b87e04baf953fef1c8ab6880cd3b45bc246f4a

                                                SHA512

                                                e114bef2b95e77f53157e6d67188e535b2b0617e8c6a75da0c0a2f0d2b7050816e9b4434d06734aba7ca916eeffc74e45a784243967db5f466ff3f2465ed99b6

                                              • C:\Users\Admin\Downloads\jfthZiZiBXGymkUPlMjwQyB142.bin

                                                Filesize

                                                483KB

                                                MD5

                                                32ec75aad05f8fa21f92bcc063084910

                                                SHA1

                                                a96b251fdc4886620d5e4d733d749a197c5fb205

                                                SHA256

                                                a0c4c7efa072699fe462bd8712c8177f03b0a466eeb3df8092beefa399fc2d51

                                                SHA512

                                                2e7f1745c939255dca40c26e24988f9d23ac51a1cb55ecf3045faec9e5f7fd131b86b59056fc19db66b7d6317bfb8d9f570c3c0d0da6b52a6bc2745ea69db707