Analysis

  • max time kernel
    266s
  • max time network
    268s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-01-2025 04:59

General

  • Target

    http://google.com

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Chimera family
  • Renames multiple (3259) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 27 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 23 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://google.com
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3960
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffd94b946f8,0x7ffd94b94708,0x7ffd94b94718
      2⤵
        PID:4620
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2
        2⤵
          PID:536
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2020
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:8
          2⤵
            PID:2080
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
            2⤵
              PID:2808
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
              2⤵
                PID:4940
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:1
                2⤵
                  PID:1684
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:8
                  2⤵
                    PID:2492
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3620
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2364 /prefetch:1
                    2⤵
                      PID:368
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2092 /prefetch:1
                      2⤵
                        PID:1528
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:1
                        2⤵
                          PID:836
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:1
                          2⤵
                            PID:1236
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:1
                            2⤵
                              PID:1568
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:1
                              2⤵
                                PID:1140
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:1
                                2⤵
                                  PID:2068
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
                                  2⤵
                                    PID:2740
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:1
                                    2⤵
                                      PID:3060
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:1
                                      2⤵
                                        PID:4504
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:1
                                        2⤵
                                          PID:4840
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:1
                                          2⤵
                                            PID:4552
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:1
                                            2⤵
                                              PID:4596
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:2
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2108
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1332 /prefetch:8
                                              2⤵
                                                PID:4160
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:1
                                                2⤵
                                                  PID:3128
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6736 /prefetch:8
                                                  2⤵
                                                    PID:1752
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,6627361881452571153,12906593246976399619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6960 /prefetch:8
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4588
                                                  • C:\Users\Admin\Downloads\HawkEye.exe
                                                    "C:\Users\Admin\Downloads\HawkEye.exe"
                                                    2⤵
                                                    • Chimera
                                                    • Executes dropped EXE
                                                    • Drops desktop.ini file(s)
                                                    • Drops file in Program Files directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3904
                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                      "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Downloads\YOUR_FILES_ARE_ENCRYPTED.HTML"
                                                      3⤵
                                                      • Modifies Internet Explorer settings
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1872
                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1872 CREDAT:17410 /prefetch:2
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies Internet Explorer settings
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:3800
                                                  • C:\Users\Admin\Downloads\HawkEye.exe
                                                    "C:\Users\Admin\Downloads\HawkEye.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1876
                                                  • C:\Users\Admin\Downloads\HawkEye.exe
                                                    "C:\Users\Admin\Downloads\HawkEye.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1872
                                                  • C:\Users\Admin\Downloads\HawkEye.exe
                                                    "C:\Users\Admin\Downloads\HawkEye.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4184
                                                  • C:\Users\Admin\Downloads\HawkEye.exe
                                                    "C:\Users\Admin\Downloads\HawkEye.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3520
                                                  • C:\Users\Admin\Downloads\HawkEye.exe
                                                    "C:\Users\Admin\Downloads\HawkEye.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2784
                                                  • C:\Users\Admin\Downloads\HawkEye.exe
                                                    "C:\Users\Admin\Downloads\HawkEye.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4532
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:2912
                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                    1⤵
                                                      PID:2112

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                                                      Filesize

                                                      4KB

                                                      MD5

                                                      92c67a63284dc49da787e567dbdb348a

                                                      SHA1

                                                      d9dddd47eb637e6c4ec76a0a9f8b69a0cb2af034

                                                      SHA256

                                                      be45c80a225429f132a4b9d8d210a8d8c1faabd987d710f9b695e55aa09001ae

                                                      SHA512

                                                      6a79f36c338d55c6fc0ced4b86227fff07e19d62b1b8af0d4f05cb758d70b57760138a6f113532e2dd6683005cd7d314eba38a4b22a878f0f095cb30b4a2e4e4

                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\HawkEye.exe.log

                                                      Filesize

                                                      20B

                                                      MD5

                                                      b3ac9d09e3a47d5fd00c37e075a70ecb

                                                      SHA1

                                                      ad14e6d0e07b00bd10d77a06d68841b20675680b

                                                      SHA256

                                                      7a23c6e7ccd8811ecdf038d3a89d5c7d68ed37324bae2d4954125d9128fa9432

                                                      SHA512

                                                      09b609ee1061205aa45b3c954efc6c1a03c8fd6b3011ff88cf2c060e19b1d7fd51ee0cb9d02a39310125f3a66aa0146261bdee3d804f472034df711bc942e316

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      8749e21d9d0a17dac32d5aa2027f7a75

                                                      SHA1

                                                      a5d555f8b035c7938a4a864e89218c0402ab7cde

                                                      SHA256

                                                      915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304

                                                      SHA512

                                                      c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      34d2c4f40f47672ecdf6f66fea242f4a

                                                      SHA1

                                                      4bcad62542aeb44cae38a907d8b5a8604115ada2

                                                      SHA256

                                                      b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33

                                                      SHA512

                                                      50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\85f0ad54-ad9b-47eb-b76a-f089cf93026d.tmp

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      a6f62fca0c7626cd0d0d8fbbb712c55e

                                                      SHA1

                                                      c617aef66cf9d9fa716f1e00b8b1d4761481cf53

                                                      SHA256

                                                      bb995e2b851ece5df02335c45d68ad2a31ec2327574493df15e8171ea5929ce2

                                                      SHA512

                                                      a0ba46c23307b3f052d2cf522636a6497925b8e31ac4911f50b203458937f30a73e00d00a5c92a2836b8193bd094361e103e8614c40fc4e52f74026d6f162de9

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\896f848e-38f6-4117-b662-93f4771ebb47.tmp

                                                      Filesize

                                                      814B

                                                      MD5

                                                      98ac45f370fdbc9f77e2c32f1ca41bdf

                                                      SHA1

                                                      af54d729bac6bd96936aa0b9ad513374650ac099

                                                      SHA256

                                                      04042bcaf1af7fbde02790ae40f590d3804454ccd5bd2a5079fa2f94a50e6186

                                                      SHA512

                                                      021cc1f528e8df31229b2cf281c62c48a341c9636d86df30d0f9f889999450f71bd4b68b1f7d60385a962c5d0068abf5c44fb4dd16998e93f4a4f01ad39a1621

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\97fd50a0-25c8-4f2d-a34e-7494c63718de.tmp

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      d8c499fd8d6441a9011565e4a40a6c23

                                                      SHA1

                                                      e3b065128247bc051e936491f11332794a185658

                                                      SHA256

                                                      2217cb67cba5b4c31c872eb29f8d3dc5fa2961feca8583af247a06218a13567e

                                                      SHA512

                                                      27ff06cd6dd86ee36525a38f91c1e647cc16b6f26bb0f04f005af13047521a283c41dce8aaa4f65273a0ee2ef0283b7ab1756eb9fe08e2daf1e64221833eab22

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                                      Filesize

                                                      215KB

                                                      MD5

                                                      d79b35ccf8e6af6714eb612714349097

                                                      SHA1

                                                      eb3ccc9ed29830df42f3fd129951cb8b791aaf98

                                                      SHA256

                                                      c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365

                                                      SHA512

                                                      f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000016

                                                      Filesize

                                                      18KB

                                                      MD5

                                                      7d54dd3fa3c51a1609e97e814ed449a0

                                                      SHA1

                                                      860bdd97dcd771d4ce96662a85c9328f95b17639

                                                      SHA256

                                                      7a258cd27f674e03eafc4f11af7076fb327d0202ce7a0a0e95a01fb33c989247

                                                      SHA512

                                                      17791e03584e77f2a6a03a7e3951bdc3220cd4c723a1f3be5d9b8196c5746a342a85226fcd0dd60031d3c3001c6bdfee0dcc21d7921ea2912225054d7f75c896

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      144B

                                                      MD5

                                                      cebe26773da379c34aa485c61aa0e321

                                                      SHA1

                                                      8d36b3cec0331a0989dc7782ee248cc17a2ecced

                                                      SHA256

                                                      26c427d713e1f8cfd3e3c672c7cdde4c16245464ba4c38fc1b13b956f889935b

                                                      SHA512

                                                      ab0c2ef3f0c7cfafe4a1fa3a4e2fd9a74892e980bd220f2d1e2a2f93397505773206516e556fb0facb8f2e1c59d448c5c8d00b6698ca96a38d0f36cc46f05aa9

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      144B

                                                      MD5

                                                      bef5624386062719b9b7bb2edcc2080d

                                                      SHA1

                                                      3005b111ae97482a7a1c92c2d6f35db01996c457

                                                      SHA256

                                                      32e82a2c9110716a2a5d8f8af6665d664d1a3a8ef41fcf58f11cf30ff277f829

                                                      SHA512

                                                      af088e88a6c04cf8b9043e167e9cc7697f4b024523296e63280422a027451df541db3ac4c981654fd7f9adf6affb4bcd316168bc42f0ff7a770c4cc1cae53aa7

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      67dba0c546f899f2f4ab801596018ecc

                                                      SHA1

                                                      4f81c260f23aabba4f6affa46f30e3dd86fb4285

                                                      SHA256

                                                      3c164bc900687e3d513787dc4d3d8e4e34cf53c37a4ea72e9eb10008dbbee4f8

                                                      SHA512

                                                      d7b6fb08bc4969be2a4ce7697629592086ca1ba13704794a4e4231461bcd604906bab424ebab28514ea5e8bbf5447c809cd7ecbc4e5e4db5d154713f94401257

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      0031b5f70bd36333303401d68ac54e35

                                                      SHA1

                                                      0a4fa097e2d92f13cce3faa57fa3c552522c9fb9

                                                      SHA256

                                                      cd48ad208ba24f5d44a8a9b8803b235011a5ceedd8800d2b32465c07a635f6bc

                                                      SHA512

                                                      030ce2cf298f501e38cdd3c00efc883209a7159b72ac348ac5ab43644d02a9870914c19801423af7856f0bea6f610c8e184c951559b308eef319679febfd3941

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      f359603ccdd0f94e061b32e9c52c7d1a

                                                      SHA1

                                                      a6a0d7ea89f455ccd6094710a36fdd8e99a8cf5a

                                                      SHA256

                                                      50972f71c3ec3824c5210da2e015de7f5e30daa38e57b1a892114108a693396c

                                                      SHA512

                                                      5c9f7c049f8a23b205f0fa3f32bb0d7cd8c551078e401d8e8cd3807891f4247fa62dcdab3afdc0cc8737d47ff358b749b245d720533dd4fa394fb12ca5e8d5d4

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      50e03fe5809879a77df6a1ad1c685387

                                                      SHA1

                                                      eae982b31ed47c12508e5f96da7edd376ceb58cc

                                                      SHA256

                                                      2e8a2f4aa60269229ef64e76baaae51775f713637cd42f74009ca4e4e93f989a

                                                      SHA512

                                                      125ab0bb5058e56453b8d3bb4487a64a8534c551f970a9fe57f98b27729140582300edf52b660f0e38d1174d496a04d626b53e5f0ac7c4366337ccbaaedd2078

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      07727abff622c57d195f85c38437200b

                                                      SHA1

                                                      ada3b626421d30756142ed148048a47bef9e8338

                                                      SHA256

                                                      206f3ee97d59095eec7e984e7bd2e11a6e9f0d81f2a8324405667c527e538e3e

                                                      SHA512

                                                      c89c5e3f62d5bbbdb421c9ca9b3a7a970ab9cff7b9130e9980e3855680e768b4cf126c42ea5e884793f0e2847c26f7650bd7c237f9cface828f41e3d15702956

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      fc6625b48b79947f51cda40fc78c089f

                                                      SHA1

                                                      81dd718728bbff0043185b078d160d6484b33dae

                                                      SHA256

                                                      e8a7d803665fed85f5b25c2e07784367b1f62a9f1862c728d048c0dd7491b43b

                                                      SHA512

                                                      36a12225ef0d5a35fef07c2fc616abf1c1db960d29131d455b38323a27d8536673e0a43c8edf442454237a11c7d1789a659d945ffe8824c22e493a852e4c2c48

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      7d2e7b18eb8d1fcee83f9134d38fc401

                                                      SHA1

                                                      f3b9dd589c350c929393002872738e803a8e5e64

                                                      SHA256

                                                      326a02445307a9f15ff4796add8b3c0139af3d9480c08c56e1be8bf37e55d167

                                                      SHA512

                                                      8e6998dfd31f91217e023ccc69eb9659899217506424530d2f9a5a0910a086790724dbae265f1984da6a1cbadc4fd05223b223c678e8c1ba81cf1405eaf52d5e

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      2cf0bcd757838d05fbd18398b9434e43

                                                      SHA1

                                                      dc27d6a95026e358e73def6f4795b1a018d771ff

                                                      SHA256

                                                      e34f1779e298da5d913642fb05c6e206791ca92121419c5b11b26f85f93ebc88

                                                      SHA512

                                                      7a36e8955eda2b1ce9d642ff82c2a235f71c03fb3399ec38ca80561cd63fc4fae31c493602f34a1f6a4d2fc0169886f5672129597330870405b18fa3d2998319

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      8cdf0054158410e6c7e8849a0d12b9ff

                                                      SHA1

                                                      74b58bfae69f016eb7dab7143904898dbeff0c35

                                                      SHA256

                                                      78bb42242f8be186135d7cbc774be8d2d2d6dee95cbcb3699de408d20319c10a

                                                      SHA512

                                                      7a191bb33f2c960446d4e456ba6319bd4a839b9bbbbf4fd3bdd96b9c31d85b8c9790f3bada6719032df08b5d67211329941ab80b2865b8aa1c688651c6cccf0d

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      47129762cd3719d13195cbdf1a30b8f9

                                                      SHA1

                                                      79efb492ea146d04f157e70a87e0f957d09bb712

                                                      SHA256

                                                      188ab48704ee5dfc3ea2ead17d39c285c40cee2745f0d0f0511200e0b1853bc6

                                                      SHA512

                                                      28b58218237e867f286a32be3e7f07e022c8603a52cc5b61ede5410d4013519de0f25392a5961d84697594dcb69dbb9c06d3fa097d77ffeddf5aa026b499e609

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      5224d7cbbfb243ec9803b6f8c800da62

                                                      SHA1

                                                      fe385d59d31efdce964c3ebfdd0eb04cb81220a4

                                                      SHA256

                                                      4d922f661c14f29ddb72a5c0244e2faa451a7aad1bbd0a4fa035c95ea917eb23

                                                      SHA512

                                                      7f65caa6d519f880138d0c281c6992699bf2d9fe330f739cc1d4eb01865c496574c43a0fcd4fb5ec34fbda8bacc996e7a5714af3f026f32113a9e205f6dd6867

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      d776d1d48641c2a67bf4045edcfadeb5

                                                      SHA1

                                                      930dbefae04e3c6a9b7a0fd3e5132422fa6c5c9e

                                                      SHA256

                                                      13ff0a76c9f8f2042f1408540826a7fe5e7acdc92ded12f0ebb1df2dba76ca43

                                                      SHA512

                                                      fe71c15b370c25934a122743133692d4e18fb919c8ac720a56db86dc23052757e29fdf5ddb61601ac84d0c9027efc0a7665613321a716784cccf9dbfba2abbb1

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe598aa2.TMP

                                                      Filesize

                                                      536B

                                                      MD5

                                                      688d59542de10a7e5d132f641c15f1a0

                                                      SHA1

                                                      e1cb9590ef4c19c6340b770e75911508fea9f978

                                                      SHA256

                                                      4ed074fdf765e3cf62e3fe6a027e6b427a97d37c17369b7bbd230de54f8245eb

                                                      SHA512

                                                      398a1335b9d59b8c2de98417bec1fc518aa995c7ec73259cbfcbd2e4ce9fb293b3234f927a814cde5527a8a3706042d0b771f308da634409374c4b4af76d9f81

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                      Filesize

                                                      16B

                                                      MD5

                                                      6752a1d65b201c13b62ea44016eb221f

                                                      SHA1

                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                      SHA256

                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                      SHA512

                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      28e9320f7c1c89f44fcd6bd47fd8c7fd

                                                      SHA1

                                                      38990104e522b890a309e9cdb600ebc58d5541c9

                                                      SHA256

                                                      b294400a64e04246e7594b7b6973f68a6d6dc2a2eb677a4df353a0803c9ce353

                                                      SHA512

                                                      ec957a621d31e079a0734452794683b427fefaf3c6c4e8c1f80f812594f72b76565bdfe948dc87fd7ec2c7ca2ad6cd874a9803f674fc41d4fa50e2ec9212c8a8

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      c78009f648410333067b865af1d3bbe4

                                                      SHA1

                                                      11dae6a81c5830db06b55a0744a80cc506ec057a

                                                      SHA256

                                                      03b7f6d6870b3c5b9659b6b4510ad3eb26d47affcd27abe37f2683e16fdc9656

                                                      SHA512

                                                      beff51f8a177d5dc5154a6bb8ee59613f29c9821061881a3c1fc5797f151307021f206fc52b02ef12a0b48d96be16d4c0833c99d475322aa1b926a1eff8ebf35

                                                    • C:\Users\Admin\Downloads\Unconfirmed 548962.crdownload

                                                      Filesize

                                                      232KB

                                                      MD5

                                                      60fabd1a2509b59831876d5e2aa71a6b

                                                      SHA1

                                                      8b91f3c4f721cb04cc4974fc91056f397ae78faa

                                                      SHA256

                                                      1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

                                                      SHA512

                                                      3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

                                                    • memory/3904-618-0x0000000010000000-0x0000000010010000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/3904-622-0x0000000005670000-0x000000000568A000-memory.dmp

                                                      Filesize

                                                      104KB