Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 20:02

General

  • Target

    https://pixeldrain.com/u/Cs4GowQJ

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 10 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 31 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pixeldrain.com/u/Cs4GowQJ
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:632
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9ef746f8,0x7ffd9ef74708,0x7ffd9ef74718
      2⤵
        PID:3452
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
        2⤵
          PID:912
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3076
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:8
          2⤵
            PID:1136
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
            2⤵
              PID:3004
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:1
              2⤵
                PID:4068
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:8
                2⤵
                  PID:4668
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1452
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:1
                  2⤵
                    PID:3844
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:1
                    2⤵
                      PID:4916
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:1
                      2⤵
                        PID:3312
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5716 /prefetch:8
                        2⤵
                          PID:1776
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6232 /prefetch:8
                          2⤵
                            PID:1664
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:1
                            2⤵
                              PID:4268
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6416 /prefetch:1
                              2⤵
                                PID:2820
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1296 /prefetch:1
                                2⤵
                                  PID:5844
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5704
                                • C:\Users\Admin\Downloads\Update_Build_13650101.exe
                                  "C:\Users\Admin\Downloads\Update_Build_13650101.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:6084
                                  • C:\Users\Admin\AppData\Local\Temp\is-M3O3E.tmp\Update_Build_13650101.tmp
                                    "C:\Users\Admin\AppData\Local\Temp\is-M3O3E.tmp\Update_Build_13650101.tmp" /SL5="$170176,247592532,679424,C:\Users\Admin\Downloads\Update_Build_13650101.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    • Modifies registry class
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5972
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,17137203890773461674,5470827864423396117,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1572
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1424
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:2424
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault9875db47hfe73h43c6hb9fehfb66c1096304
                                    1⤵
                                      PID:5496
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffd9ef746f8,0x7ffd9ef74708,0x7ffd9ef74718
                                        2⤵
                                          PID:5592
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,279365755474166781,6210187128129634043,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:2
                                          2⤵
                                            PID:5892
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,279365755474166781,6210187128129634043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:3
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5900
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:6060
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:6100
                                            • C:\Windows\system32\wwahost.exe
                                              "C:\Windows\system32\wwahost.exe" -ServerName:App.wwa
                                              1⤵
                                              • Modifies Internet Explorer settings
                                              • Modifies data under HKEY_USERS
                                              • Modifies registry class
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of SetWindowsHookEx
                                              PID:5808

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              5d67230b13e26928c7428ab64f32e827

                                              SHA1

                                              fd9b1607bd12cb40675fe838e8b223aa0453f2ac

                                              SHA256

                                              ea4644ec6201c3e2f9c59fa9657ba9ca283c899e5a0e24f82c2808860f344423

                                              SHA512

                                              c315a36ada2de16a78cab34deb450df4270b4f13e44b76afc4aae3f44c796ba6edc8be5264f1fa0eb338586a10b2229545a47610f3cbb19d9f78bda3064ba15a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              8749e21d9d0a17dac32d5aa2027f7a75

                                              SHA1

                                              a5d555f8b035c7938a4a864e89218c0402ab7cde

                                              SHA256

                                              915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304

                                              SHA512

                                              c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              34d2c4f40f47672ecdf6f66fea242f4a

                                              SHA1

                                              4bcad62542aeb44cae38a907d8b5a8604115ada2

                                              SHA256

                                              b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33

                                              SHA512

                                              50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              72B

                                              MD5

                                              8b35a9e8d56c9301bbc623d123a626a2

                                              SHA1

                                              7ac8a8152e44194cee068a90fb399bc140a40474

                                              SHA256

                                              085e2aba728c0ccd516bb9b6406615c7ddd25ea3c9c93d093940d8f2e18c1c94

                                              SHA512

                                              5e092461da272ee5909ab45e3550ab7f446b59b6222c40f7f0ea6ca9fbb2b8e7a53e432ad6b639af34ea7bd6f1162cc602301b949ece2376b27fdde75f6e50e9

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              182B

                                              MD5

                                              391ea8cc5f7e3a2adfed6b5159e2c4ef

                                              SHA1

                                              b2f84b76391e84b02aee3e5a34589e22ea1ef51a

                                              SHA256

                                              fd73e76f60661e3cd79eeb0e538d8ad1f7abcf30db50e331ff6277c1fcd4403b

                                              SHA512

                                              ca11a4649261583ae0ec810546281ab423cbd0d3249b7a90e1cdb9747008f438e81fac1e4603303ca39dccfff4a90bf7e5d3b5055e8d2e664f63ca8ff6439571

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              111B

                                              MD5

                                              807419ca9a4734feaf8d8563a003b048

                                              SHA1

                                              a723c7d60a65886ffa068711f1e900ccc85922a6

                                              SHA256

                                              aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                              SHA512

                                              f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              f6726c670d49026b3d5bb34700f692ad

                                              SHA1

                                              932ad81d92f686c3280174fc015ab8983fa9e675

                                              SHA256

                                              818972db2ca5da4accd4e6f6bbff922e08d242e83ba12877a4bb33b59977c9e5

                                              SHA512

                                              40be665191652dbbb6960220d8fb76e237bb920462cab26b3ae72c603339a3a74c3f95e5022056bf88f62a9034177dac62bc21df53f02c8e26bb5562cbf56410

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              a555dfa5d522518edd9696ec9b205343

                                              SHA1

                                              015757b1888c2ef7e9495b5f67d3ebafb790ffc4

                                              SHA256

                                              6934b7ecd4ee1aa6db307eb52de17a053f369303444a28d6fec44143302faa26

                                              SHA512

                                              b3f3aea89b04c9f1301536f092aae0fb9e611350eb4eaf65831c8c51900719396c2495cd5781a1933446d9753cb7fb31a3683ba151f596386081b8ea304d091c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              206702161f94c5cd39fadd03f4014d98

                                              SHA1

                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                              SHA256

                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                              SHA512

                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              46295cac801e5d4857d09837238a6394

                                              SHA1

                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                              SHA256

                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                              SHA512

                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              413dc2d253433f6e592c31fa57bc6f4e

                                              SHA1

                                              eefcbf6d39228ad0a9e0db5c6f4458e35405a2c2

                                              SHA256

                                              aecfd105dfe7c388e369262ba8f6a5cca6f86c5fd098414f568bb9361bf5dc70

                                              SHA512

                                              687d432863853e7e94d4180bfcbeed4e74a8725ffb8f3a9715eabb36f549a2996a5348b8750ae7bed21f0dda1fc5a9c516d853305e7cf4573b6e6058310c0e5f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              79209e4fd43940767f53dbe9c58b0fd8

                                              SHA1

                                              ad15af8640f136a38edcb5130c1bcc9da4feb475

                                              SHA256

                                              69e2d16667b881ab36ae09436a09a84651a77f3c4e6e34ac7624dd6c410559f7

                                              SHA512

                                              4eae62daf64b014f61f43860dbee450e3dca27836500862f25f937731e0e8fdcbbb6a9468bb47c2afe6cfbc4afac146feb41c1b8265678e88583e70e21774dbc

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              1a85e4d6801c552a102dc3ec713c234f

                                              SHA1

                                              b2b499c49f6fe3570d760a220e72a07a60170a68

                                              SHA256

                                              2bf4b60db8fc29d1cca83566c526d862e0946644de50cd2316b1688388e0ddec

                                              SHA512

                                              a34c71198343411414296badecece2c74b527a055ecabae8983663d1c45c3506de03c105b995fc72de0ce61ea36103266a24ec094d53f37a12a5e34fc8584eb5

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              7f336f69a33dfd3d809a050af14d63b4

                                              SHA1

                                              186228db645ff096bcc96e9e66a9da81b79180bc

                                              SHA256

                                              2c05ce83e93f2fef4d338e8bf1b9a7fc70aa02f8d63ca1d36bebec4ee5b9c90b

                                              SHA512

                                              e7745911ebe365d8e460e77099ccd56764b4acdb6da5a571eab3c3b78eadb91d0dce10fa1498514a137872e108aa44d160877ed0129e4c8bf059738edd0cb9f3

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              1f4722cb1cc877d0f78e901f3a5dad23

                                              SHA1

                                              49d26b1bd20a4bf62a1a262f59d769f4ddee7fe7

                                              SHA256

                                              592c7dffca7a27620b70e0386c48bd41a4b12cbb169e14ba9ac29d8b827ba578

                                              SHA512

                                              0fd92869488f8149145144a0fc512be4fe8f947d95b40c2738915471751f10e7695d73306449f1cecc67e83905b2893a13a9f9982759a428df7b609664b83fed

                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\LocalState\_sessionState.json

                                              Filesize

                                              136B

                                              MD5

                                              9c1e824ef8695a1abc67f5d0a95778c0

                                              SHA1

                                              ec43ba5ce45d92453320bd6d14d96a866ed4c0e9

                                              SHA256

                                              0e9674b55a602a97e8ed235ec72e98e5d816ac014684d179a1fc0b9959345d97

                                              SHA512

                                              55e92e224e5d357e4c1dfcd34ee8b7e1d160f8edfce2f3bd156a240f4cc8c73b3329497d8199fabf2a81d8d04be5f49687224b498c57cb115231b47c81d65d15

                                            • C:\Users\Admin\AppData\Local\Temp\is-E439F.tmp\Checker.ini

                                              Filesize

                                              13KB

                                              MD5

                                              1c4e723b38b1a3feaeabe273c917ef2b

                                              SHA1

                                              f03dfafa30e8cb602bde23a914f96d1073710e6b

                                              SHA256

                                              456f4ef0b24ffbb4f27eca2b78e88b9694e14b4bce662e14e99524d27f9057aa

                                              SHA512

                                              aaca89ba4e1b5f4f8a8c183acbe3e6514b0300c7e6717cdb1fd09b1083852ec3189081c48800a651b95d070de89596e81149f80149f717adf6b61379a47a840e

                                            • C:\Users\Admin\AppData\Local\Temp\is-E439F.tmp\Concave.cjstyles

                                              Filesize

                                              717KB

                                              MD5

                                              93abcfe15695631fee78cc357496423d

                                              SHA1

                                              038aab81be9fa1cdbce802c1019474a81bb65ac5

                                              SHA256

                                              a6579e129aade465ba9ea23e6d6374a59379af6875d450ad48eefad426c63c8d

                                              SHA512

                                              5c26434c72271586cffb7f460c0b045b242e1534cfe18108764761e6cfe5e1cdb648fc6f3f46b41f38262601b984ed74efb1edbb3c46367b4cd43c59579e5262

                                            • C:\Users\Admin\AppData\Local\Temp\is-E439F.tmp\English.ini

                                              Filesize

                                              20KB

                                              MD5

                                              4fb66af3052a25731d1f9c96bd17a654

                                              SHA1

                                              d6c4fcdb1e5bd644365c52445a91075d4278b81a

                                              SHA256

                                              c15e8ce6fe9cbf5ff30d3002619a55774f8c6198678cf6da26c6768f2a56b6fa

                                              SHA512

                                              4e0ad7aece3b227d658bcaf401195803e5acfbed8e44ae2bc810ff862aacc264fc231585a5833ad587c17c30ea76ba9defed4c6108755462643bccaa28d94832

                                            • C:\Users\Admin\AppData\Local\Temp\is-E439F.tmp\crc32c.dll

                                              Filesize

                                              30KB

                                              MD5

                                              bfca8a245fc3a7fe7a3561aaf687cbba

                                              SHA1

                                              1b4dd6544baf59632198f6c00e48f741325abcff

                                              SHA256

                                              f82e3de7d8d9a400e9d54348909a9ffa64a609d1644161ee40f7ae53c79215ff

                                              SHA512

                                              90c924813a59015475717ce7b0271d503a3e3f365f25a62765e16d612c220b29ab7d665575be206758878f4927a420bf186acfc0cad1472ed4c9a12a44fd835c

                                            • C:\Users\Admin\AppData\Local\Temp\is-E439F.tmp\innocallback.dll

                                              Filesize

                                              63KB

                                              MD5

                                              1c55ae5ef9980e3b1028447da6105c75

                                              SHA1

                                              f85218e10e6aa23b2f5a3ed512895b437e41b45c

                                              SHA256

                                              6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

                                              SHA512

                                              1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

                                            • C:\Users\Admin\AppData\Local\Temp\is-E439F.tmp\isproc.dll

                                              Filesize

                                              16KB

                                              MD5

                                              4bafb0739c5fcd96be991f2a3cc9ac2f

                                              SHA1

                                              9372b03e4515660f732bf6338c4d7e183a78d2ee

                                              SHA256

                                              7f74f1c445bf5e9456aae6fae695a8ca60e1d0eb5a2f44ac2cf0239a71f1a8a1

                                              SHA512

                                              095946b16020d52beb25b4037775af8bbf6a7f15b56e260a1bf90af5ccadc11cbcb78c80540f087597a2df6bf5d6b2c8358249aed121ef68e96a302a9fb2ec55

                                            • C:\Users\Admin\AppData\Local\Temp\is-E439F.tmp\isskinu.dll

                                              Filesize

                                              385KB

                                              MD5

                                              7d9087c4e2f9ab2db78a46ab52a7f360

                                              SHA1

                                              15624c6e5ae4b2689a6975a8faf9f0efbd940b7d

                                              SHA256

                                              ff1374abd93690f5e6e591bae23b49aacc8bbe8b7b05b539ec8aee755070a0e3

                                              SHA512

                                              70375fe15072531de481a0ff95473fa152178d2fd5f0610712cd4fd63ed9da9a40c669442021c23937465ee1e81c39e38332444f10463b5a4fda2048ec4f1d5a

                                            • C:\Users\Admin\AppData\Local\Temp\is-E439F.tmp\wintb.dll

                                              Filesize

                                              16KB

                                              MD5

                                              9436df49e08c83bad8ddc906478c2041

                                              SHA1

                                              a4fa6bdd2fe146fda2e78fdbab355797f53b7dce

                                              SHA256

                                              1910537aa95684142250ca0c7426a0b5f082e39f6fbdbdba649aecb179541435

                                              SHA512

                                              f9dc6602ab46d709efdaf937dcb8ae517caeb2bb1f06488c937be794fd9ea87f907101ae5c7f394c7656a6059dc18472f4a6747dcc8cc6a1e4f0518f920cc9bf

                                            • C:\Users\Admin\AppData\Local\Temp\is-M3O3E.tmp\Update_Build_13650101.tmp

                                              Filesize

                                              1.7MB

                                              MD5

                                              92e675208ce80dfcba6371b63354f6b1

                                              SHA1

                                              24c0d5baf7022f0cb89a5db980b809badbc37514

                                              SHA256

                                              cc45f5e5a00a99fc57fb8312125b23658025d0ccc039d5013ab39c202ab0a8e6

                                              SHA512

                                              10ac3f7c807ea60c829f28f1d5b5dda2760cdeb83e1c34bdc35ec0f55dc4d08c27f9c248e842609cdeac3490aed0cb78c962957471d42fa3d1dbcb2dfd2f685b

                                            • memory/5808-347-0x0000017C23160000-0x0000017C23180000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/5972-498-0x0000000076290000-0x000000007633F000-memory.dmp

                                              Filesize

                                              700KB

                                            • memory/5972-529-0x0000000075C00000-0x0000000075CDC000-memory.dmp

                                              Filesize

                                              880KB

                                            • memory/5972-483-0x0000000077650000-0x00000000776CA000-memory.dmp

                                              Filesize

                                              488KB

                                            • memory/5972-482-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-481-0x0000000077650000-0x00000000776CA000-memory.dmp

                                              Filesize

                                              488KB

                                            • memory/5972-480-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-491-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-496-0x0000000077540000-0x0000000077623000-memory.dmp

                                              Filesize

                                              908KB

                                            • memory/5972-495-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-494-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-493-0x0000000075AE0000-0x0000000075B05000-memory.dmp

                                              Filesize

                                              148KB

                                            • memory/5972-492-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-490-0x00000000748E0000-0x0000000074910000-memory.dmp

                                              Filesize

                                              192KB

                                            • memory/5972-489-0x0000000075AE0000-0x0000000075B05000-memory.dmp

                                              Filesize

                                              148KB

                                            • memory/5972-487-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-488-0x0000000077650000-0x00000000776CA000-memory.dmp

                                              Filesize

                                              488KB

                                            • memory/5972-486-0x0000000075AE0000-0x0000000075B05000-memory.dmp

                                              Filesize

                                              148KB

                                            • memory/5972-485-0x0000000077650000-0x00000000776CA000-memory.dmp

                                              Filesize

                                              488KB

                                            • memory/5972-497-0x0000000076B80000-0x0000000077133000-memory.dmp

                                              Filesize

                                              5.7MB

                                            • memory/5972-499-0x0000000075540000-0x0000000075750000-memory.dmp

                                              Filesize

                                              2.1MB

                                            • memory/5972-523-0x0000000076B80000-0x0000000077133000-memory.dmp

                                              Filesize

                                              5.7MB

                                            • memory/5972-540-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-479-0x0000000077650000-0x00000000776CA000-memory.dmp

                                              Filesize

                                              488KB

                                            • memory/5972-539-0x0000000075540000-0x0000000075750000-memory.dmp

                                              Filesize

                                              2.1MB

                                            • memory/5972-537-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-535-0x0000000074850000-0x0000000074876000-memory.dmp

                                              Filesize

                                              152KB

                                            • memory/5972-534-0x00000000754C0000-0x0000000075534000-memory.dmp

                                              Filesize

                                              464KB

                                            • memory/5972-533-0x0000000075540000-0x0000000075750000-memory.dmp

                                              Filesize

                                              2.1MB

                                            • memory/5972-532-0x0000000076290000-0x000000007633F000-memory.dmp

                                              Filesize

                                              700KB

                                            • memory/5972-528-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-530-0x0000000077540000-0x0000000077623000-memory.dmp

                                              Filesize

                                              908KB

                                            • memory/5972-484-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-500-0x00000000746F0000-0x0000000074812000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/5972-525-0x0000000075540000-0x0000000075750000-memory.dmp

                                              Filesize

                                              2.1MB

                                            • memory/5972-524-0x0000000076290000-0x000000007633F000-memory.dmp

                                              Filesize

                                              700KB

                                            • memory/5972-521-0x00000000746F0000-0x0000000074812000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/5972-520-0x00000000754C0000-0x0000000075534000-memory.dmp

                                              Filesize

                                              464KB

                                            • memory/5972-519-0x0000000075AE0000-0x0000000075B05000-memory.dmp

                                              Filesize

                                              148KB

                                            • memory/5972-518-0x0000000075540000-0x0000000075750000-memory.dmp

                                              Filesize

                                              2.1MB

                                            • memory/5972-515-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-513-0x00000000754C0000-0x0000000075534000-memory.dmp

                                              Filesize

                                              464KB

                                            • memory/5972-509-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-508-0x00000000746F0000-0x0000000074812000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/5972-507-0x00000000754C0000-0x0000000075534000-memory.dmp

                                              Filesize

                                              464KB

                                            • memory/5972-506-0x0000000075540000-0x0000000075750000-memory.dmp

                                              Filesize

                                              2.1MB

                                            • memory/5972-505-0x0000000076290000-0x000000007633F000-memory.dmp

                                              Filesize

                                              700KB

                                            • memory/5972-531-0x0000000076B80000-0x0000000077133000-memory.dmp

                                              Filesize

                                              5.7MB

                                            • memory/5972-503-0x0000000077540000-0x0000000077623000-memory.dmp

                                              Filesize

                                              908KB

                                            • memory/5972-502-0x0000000075C00000-0x0000000075CDC000-memory.dmp

                                              Filesize

                                              880KB

                                            • memory/5972-536-0x00000000746F0000-0x0000000074812000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/5972-527-0x00000000746F0000-0x0000000074812000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/5972-526-0x00000000754C0000-0x0000000075534000-memory.dmp

                                              Filesize

                                              464KB

                                            • memory/5972-522-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-517-0x0000000076290000-0x000000007633F000-memory.dmp

                                              Filesize

                                              700KB

                                            • memory/5972-514-0x00000000746F0000-0x0000000074812000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/5972-512-0x0000000075540000-0x0000000075750000-memory.dmp

                                              Filesize

                                              2.1MB

                                            • memory/5972-511-0x0000000076290000-0x000000007633F000-memory.dmp

                                              Filesize

                                              700KB

                                            • memory/5972-504-0x0000000076B80000-0x0000000077133000-memory.dmp

                                              Filesize

                                              5.7MB

                                            • memory/5972-501-0x0000000010000000-0x0000000010061000-memory.dmp

                                              Filesize

                                              388KB

                                            • memory/5972-464-0x0000000007600000-0x0000000007611000-memory.dmp

                                              Filesize

                                              68KB

                                            • memory/5972-457-0x00000000074E0000-0x00000000074F5000-memory.dmp

                                              Filesize

                                              84KB

                                            • memory/6084-438-0x0000000000400000-0x00000000004B0000-memory.dmp

                                              Filesize

                                              704KB