Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    76s
  • max time network
    73s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2024, 15:29

General

  • Target

    https://auto-downloads.com/71478ec9c0d1e9d5c7a1cbc3ad3fbd91435e9e48b3abd103d55e71df24f42bc19834c62ab6ef63ee6d8d06f173b050a0c9e77b07aac9f3a0

Malware Config

Signatures

  • Downloads MZ/PE file
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 50 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://auto-downloads.com/71478ec9c0d1e9d5c7a1cbc3ad3fbd91435e9e48b3abd103d55e71df24f42bc19834c62ab6ef63ee6d8d06f173b050a0c9e77b07aac9f3a0
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8af5e46f8,0x7ff8af5e4708,0x7ff8af5e4718
      2⤵
        PID:424
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:2
        2⤵
          PID:3640
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2488
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:8
          2⤵
            PID:1776
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
            2⤵
              PID:4092
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
              2⤵
                PID:3696
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5224 /prefetch:8
                2⤵
                  PID:3264
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5212 /prefetch:8
                  2⤵
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2516
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:1
                  2⤵
                    PID:2568
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:1
                    2⤵
                      PID:4444
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6724 /prefetch:8
                      2⤵
                        PID:1656
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6724 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3768
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3680 /prefetch:8
                        2⤵
                          PID:1456
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:1
                          2⤵
                            PID:4116
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6896 /prefetch:8
                            2⤵
                              PID:632
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6480 /prefetch:1
                              2⤵
                                PID:4340
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:1
                                2⤵
                                  PID:2604
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4692 /prefetch:8
                                  2⤵
                                    PID:4440
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2252,9408343830097126229,2636070975517565598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6496 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4420
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3736
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3292
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:1148
                                      • C:\Users\Admin\Downloads\EzExtractSetup.exe
                                        "C:\Users\Admin\Downloads\EzExtractSetup.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Drops file in Program Files directory
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2580
                                        • C:\Windows\SysWOW64\regsvr32.exe
                                          C:\Windows\system32\regsvr32.exe /s "C:\Program Files (x86)\EzExtractPro\EzExtractProShell32.dll"
                                          2⤵
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          PID:3580
                                        • C:\Windows\SysWOW64\regsvr32.exe
                                          C:\Windows\system32\regsvr32.exe /s "C:\Program Files (x86)\EzExtractPro\EzExtractProShell.dll"
                                          2⤵
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          PID:2996
                                          • C:\Windows\system32\regsvr32.exe
                                            /s "C:\Program Files (x86)\EzExtractPro\EzExtractProShell.dll"
                                            3⤵
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:3292
                                        • C:\Windows\explorer.exe
                                          "C:\Windows\explorer.exe" "C:\Program Files (x86)\EzExtractPro\EzExtractProApp.exe"
                                          2⤵
                                            PID:5028
                                        • C:\Windows\explorer.exe
                                          C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                          1⤵
                                            PID:4212
                                            • C:\Program Files (x86)\EzExtractPro\EzExtractProApp.exe
                                              "C:\Program Files (x86)\EzExtractPro\EzExtractProApp.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Modifies registry class
                                              • Suspicious behavior: GetForegroundWindowSpam
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2316
                                          • C:\Program Files (x86)\EzExtractPro\EzExtractProApp.exe
                                            "C:\Program Files (x86)\EzExtractPro\EzExtractProApp.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:2716

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Program Files (x86)\EzExtractPro\EzExtractProApp.exe

                                            Filesize

                                            881KB

                                            MD5

                                            3b67b6026237810356f5aefb373d2b15

                                            SHA1

                                            1a4d565f81195adb9c048f8eb7fa7d77018ee3d1

                                            SHA256

                                            554ef8f1d2b201421a53dbbf897fcbea20dbba9d6e8fa881ad0b52be60c11f5e

                                            SHA512

                                            4e4a7445b1580c2076174c336414d5918a3fc0afbb13d56d29bd1fc18ca114affad1ced06fd52624292012dff2b95a76b19f4e3f9940c2d9a333c290a95d4641

                                          • C:\Program Files (x86)\EzExtractPro\EzExtractProCoreDll.dll

                                            Filesize

                                            1.9MB

                                            MD5

                                            ede6796697abfd295b96322048642a69

                                            SHA1

                                            d0e7aaa407c4576eee42032bf743e9194a9c21e7

                                            SHA256

                                            6f9b0b8e8d1efbe25b81b0676a5902ec97aac1bfdc84a1a2d1b58659eb44dc5d

                                            SHA512

                                            88daf23e91c542c7348aa5c0fd16d382ef2fa95d7d5f91a4d5e39cf5d5b361eeaf4f33fcb43a71b52e4cea20c2b9dcb2b4e909d7ca3e5ab0c6d569f672dd385f

                                          • C:\Program Files (x86)\EzExtractPro\EzExtractProShell.dll

                                            Filesize

                                            167KB

                                            MD5

                                            968e162057c49c860813e465bfd3c2fa

                                            SHA1

                                            78e5b2e365a3cd7bd3f7fc4dfd9991568ee2ec8d

                                            SHA256

                                            08ccd848487f570175e3c5b8fa70b04ce30e3afb9f43b4105180e2eb079c85c6

                                            SHA512

                                            5c41164239607fd32393742943e588d461b8a1d276d9e8142929aa7a22b6f5a82a723b2fff0389ed84677cb9ea9cbf1d793a66d27c367b8f7b9909a242f94eec

                                          • C:\Program Files (x86)\EzExtractPro\EzExtractProShell32.dll

                                            Filesize

                                            126KB

                                            MD5

                                            24be51bce468016e106b55b19a2cbc80

                                            SHA1

                                            c7e18c81ebe523a1fefd845c9f9e09b881fccd11

                                            SHA256

                                            2d3a1c7e0e6256344648a054bc5526d4804538fef9cc87efab9edb426bf1f4a6

                                            SHA512

                                            697d736f24b8e28db98885ad248048f43d6bf26237dc0e9651d37810d992fb2482cfd23a26d10164a2a30ad326fbbaca9390730ec498972cc91f673b77756859

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\EzExtractProApp.exe.log

                                            Filesize

                                            3KB

                                            MD5

                                            bba6110ef3a0f5527f9b2ab66167af44

                                            SHA1

                                            53fb9ab664a29892c018682e84f656e636f535bd

                                            SHA256

                                            a2c4fb56f61cdb67d29dcf28d7074e7a6d2a2b48fda7345898571ec16a990707

                                            SHA512

                                            db675c64acedbcb3f5088fbe4ed79edce89b0723e49b966c680a2e3dc176d36c0d95ef2e22b0ef3f030f63aeb0be79ef6370fce4d6e038070bb99b8c2adb7a3e

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            ab8ce148cb7d44f709fb1c460d03e1b0

                                            SHA1

                                            44d15744015155f3e74580c93317e12d2cc0f859

                                            SHA256

                                            014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff

                                            SHA512

                                            f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            38f59a47b777f2fc52088e96ffb2baaf

                                            SHA1

                                            267224482588b41a96d813f6d9e9d924867062db

                                            SHA256

                                            13569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b

                                            SHA512

                                            4657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            144B

                                            MD5

                                            55c3e42f558db96c552b20ee5416be83

                                            SHA1

                                            66ea6ce6389c2b01eab0825f90177429cab25096

                                            SHA256

                                            5a5564e27e3f5cc2a5e3561aae04153a7696ef7e37580a69fdce63a1bea2a56d

                                            SHA512

                                            f431a38ad9665bb0125e92e10e3f95e8bc48115cb3059d5c39621f10a12a0b213bc7d364a945c9f47ecbd658a97cf43c6f3e9ed3a870fd42186afcc7713db604

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            46295cac801e5d4857d09837238a6394

                                            SHA1

                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                            SHA256

                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                            SHA512

                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                            Filesize

                                            1KB

                                            MD5

                                            9ba9283b369b1119872aef79f5d355a0

                                            SHA1

                                            1c361b3c1ec4f841256c95f9dc2591732af75775

                                            SHA256

                                            3d089413fda18c50ce6464aa2a29db8a84a2d461154822c0fdb29f270285d10e

                                            SHA512

                                            14ddaa9af1c716775c5d785b7a6d5a73bc42a2232899fc9fb06537fe5de68e66a05f56ea222e6dba5c67e5eec2f58c9ea9a08271bd34dda09fe419a7b1e7aa7b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            72f5ac31d778cd3ce5863ddec98764d2

                                            SHA1

                                            f3d35b41a8ce7b448151dad8297ba6f6e7940b26

                                            SHA256

                                            f86bb724ca8bb9fff633fafce4f8144787c92e8628b5c3e7d76da123ad13b665

                                            SHA512

                                            ec491c4d317a9fe6266a7e51f4ba4133f664f068d7cf224949fb0f503bd9ee0a3a06d03b8e6931bc3ce2c4dfcc54f4b6263dcdd7b42899c48695edc93fccf52e

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            ed3a8d9c99040289868e123c1e3776c1

                                            SHA1

                                            97aebb5fedf52db8576a08b94a94dcda6ceebe3d

                                            SHA256

                                            204efa9b94d30d40aa6d3df3a08ef3f5e4a013302453866ee362c57e59f55362

                                            SHA512

                                            6933512bf202d05407aab34f0b1c89a507ea68f8516be922a0084a676f1517d16ecb33f84b326d6509ab5763932aaef8c745a92c6db69448b1e126d38ae26210

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            7KB

                                            MD5

                                            2d6031c4953d7757ade2b824fecb9349

                                            SHA1

                                            1ee4985f60cccd47149ec3f8c9385d9b5a05429f

                                            SHA256

                                            a1d95b13ca3724aaab859f6d3f8ef7806bdbc7c612b3b9d7bd8d3822a3c21b6b

                                            SHA512

                                            d120189ccad9e897f95dcee5c70d106433da6598f32e84cff4334865ab8d0bb122b2f2eaee6fb52af97b6b64b3e3cfde32f92711beda91c0b4eaa0dffd3f25ed

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            6752a1d65b201c13b62ea44016eb221f

                                            SHA1

                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                            SHA256

                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                            SHA512

                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            e39fdf0f31c37c5c7349911682b15e57

                                            SHA1

                                            c17c5e9f3815b32e42b6f453d5ae211e67bd0d3e

                                            SHA256

                                            7fcfc980b5d7284292c918947db3398f1294287f76e9faca67c170a0f6b79d21

                                            SHA512

                                            6f088fe9c080f132c763562c2bef0b6be67946510945485b626727723631cb6cc85fcc46197bb574e97a7bb450176bdb6e91467d5f45f201d707dd6e4e93f401

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            6f70c96f8f7ff8880e17d96d1da86f00

                                            SHA1

                                            e036c8a182c45784948021c70dd397e07802319c

                                            SHA256

                                            8d2e33827c8bd8f7b764791dd3e015744cdf778f9da3c912ea56a81908943ce5

                                            SHA512

                                            c2b17746c517e7b2d2f688ed536398814dfa0b61a7ab51f25b09acbaecb883492606f95987aaa8737ae2b8965e09601f52c033f28f77c9888c9bdf300cdca6e7

                                          • C:\Users\Admin\AppData\Local\Temp\nseEE2.tmp\INetC.dll

                                            Filesize

                                            25KB

                                            MD5

                                            40d7eca32b2f4d29db98715dd45bfac5

                                            SHA1

                                            124df3f617f562e46095776454e1c0c7bb791cc7

                                            SHA256

                                            85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9

                                            SHA512

                                            5fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d

                                          • C:\Users\Admin\AppData\Local\Temp\nseEE2.tmp\NsisPlugin.dll

                                            Filesize

                                            280KB

                                            MD5

                                            1d0e98e6817a35237509731e1398b47a

                                            SHA1

                                            2690a72941f1641495a1cf51ebf5399987a74e5c

                                            SHA256

                                            23abc9395b36419700f31b507f13a189ec2eeb70c7e1a1fe9406c2b9e0728298

                                            SHA512

                                            5cf919baa11e3cdc3518a351e206a5dc84bb1beaf933194d27fb0a96edbc6b90a58106c45a357e8c7af9de815b4e74cf5e42a22bc91b5fac02bb386a6638d0ce

                                          • C:\Users\Admin\AppData\Local\Temp\nseEE2.tmp\System.dll

                                            Filesize

                                            12KB

                                            MD5

                                            cff85c549d536f651d4fb8387f1976f2

                                            SHA1

                                            d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

                                            SHA256

                                            8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

                                            SHA512

                                            531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

                                          • C:\Users\Admin\AppData\Local\Temp\nseEE2.tmp\modern-wizard.bmp

                                            Filesize

                                            25KB

                                            MD5

                                            cbe40fd2b1ec96daedc65da172d90022

                                            SHA1

                                            366c216220aa4329dff6c485fd0e9b0f4f0a7944

                                            SHA256

                                            3ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2

                                            SHA512

                                            62990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63

                                          • C:\Users\Admin\AppData\Local\Temp\nseEE2.tmp\nsDialogs.dll

                                            Filesize

                                            9KB

                                            MD5

                                            6c3f8c94d0727894d706940a8a980543

                                            SHA1

                                            0d1bcad901be377f38d579aafc0c41c0ef8dcefd

                                            SHA256

                                            56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2

                                            SHA512

                                            2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355

                                          • C:\Users\Admin\AppData\Roaming\EzExtractProApp\EzExtractProAppConfig.json

                                            Filesize

                                            254B

                                            MD5

                                            9ccc10c5b64000d751fc039db637b91d

                                            SHA1

                                            5b258a1511433f9e2ce42f480f07c42ff86f5996

                                            SHA256

                                            a6f4a1aa3d61b7af4a1691d2d5dfb468ecf980cd065dfc44a987ab7c2bc480b4

                                            SHA512

                                            b242a4af4a49da6734c462adf46261ebd56fbfebb67dc309053e5a3f4846de90d6a9648aa57a98931400eb65436e5cf1e4f2f3bb08ebe708c9f6909f0b31d87f

                                          • C:\Users\Admin\Downloads\Unconfirmed 743841.crdownload

                                            Filesize

                                            4.4MB

                                            MD5

                                            7399ebe1e1b9c99f3cb4a2521d424384

                                            SHA1

                                            7a560782421feb72b1e84f162cf0abd0809fda28

                                            SHA256

                                            4704846c5605552a2573aeb62f176630fd2ba5498457420c3fb36a27cae6800f

                                            SHA512

                                            80b6b5b2a93656211073560e3eb93063edec44d54a4346b64cab5898162936d3109e7d213d73a93e50ce3a20d163ce6f8eb27e3f31e72bae6c684e528413981d

                                          • memory/2316-328-0x00000000009A0000-0x0000000000A7E000-memory.dmp

                                            Filesize

                                            888KB

                                          • memory/2316-334-0x000000001C0E0000-0x000000001C0EE000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/2316-333-0x000000001C110000-0x000000001C148000-memory.dmp

                                            Filesize

                                            224KB

                                          • memory/2316-346-0x0000000023AD0000-0x0000000023AE2000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/2316-347-0x00000000247F0000-0x000000002482C000-memory.dmp

                                            Filesize

                                            240KB

                                          • memory/2316-332-0x00000000208A0000-0x00000000208A8000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/2316-329-0x000000001B750000-0x000000001B896000-memory.dmp

                                            Filesize

                                            1.3MB