Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2025, 00:31

General

  • Target

    https://bonzi.link/

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Chimera family
  • Renames multiple (3274) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 27 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://bonzi.link/
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab7dc46f8,0x7ffab7dc4708,0x7ffab7dc4718
      2⤵
        PID:3128
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2
        2⤵
          PID:5036
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:3
          2⤵
          • Downloads MZ/PE file
          • Suspicious behavior: EnumeratesProcesses
          PID:4528
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:8
          2⤵
            PID:456
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
            2⤵
              PID:3976
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
              2⤵
                PID:4548
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:8
                2⤵
                  PID:1184
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3812
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:1
                  2⤵
                    PID:4352
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:1
                    2⤵
                      PID:1136
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:1
                      2⤵
                        PID:3192
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:1
                        2⤵
                          PID:4140
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6376 /prefetch:1
                          2⤵
                            PID:1568
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:1
                            2⤵
                              PID:2840
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:1
                              2⤵
                                PID:2952
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6568 /prefetch:1
                                2⤵
                                  PID:2332
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:1
                                  2⤵
                                    PID:4184
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:1
                                    2⤵
                                      PID:4352
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6188 /prefetch:1
                                      2⤵
                                        PID:4788
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:1
                                        2⤵
                                          PID:3368
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6516 /prefetch:1
                                          2⤵
                                            PID:1112
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:1
                                            2⤵
                                              PID:4720
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6424 /prefetch:8
                                              2⤵
                                                PID:3408
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6688 /prefetch:1
                                                2⤵
                                                  PID:4628
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7056 /prefetch:8
                                                  2⤵
                                                    PID:4056
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6892 /prefetch:8
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5096
                                                  • C:\Users\Admin\Downloads\HawkEye.exe
                                                    "C:\Users\Admin\Downloads\HawkEye.exe"
                                                    2⤵
                                                    • Chimera
                                                    • Executes dropped EXE
                                                    • Drops desktop.ini file(s)
                                                    • Drops file in Program Files directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2272
                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                      "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Downloads\YOUR_FILES_ARE_ENCRYPTED.HTML"
                                                      3⤵
                                                      • Modifies Internet Explorer settings
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:644
                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:644 CREDAT:17410 /prefetch:2
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies Internet Explorer settings
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2672
                                                  • C:\Users\Admin\Downloads\HawkEye.exe
                                                    "C:\Users\Admin\Downloads\HawkEye.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4304
                                                  • C:\Users\Admin\Downloads\HawkEye.exe
                                                    "C:\Users\Admin\Downloads\HawkEye.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1516
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:1
                                                    2⤵
                                                      PID:4568
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2116,10517305514654351955,14759653504340023728,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6724 /prefetch:8
                                                      2⤵
                                                        PID:3472
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:1940
                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                        1⤵
                                                          PID:5044

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                                                          Filesize

                                                          4KB

                                                          MD5

                                                          5f11fcfcbb46c673e0cde5f2ca8a1931

                                                          SHA1

                                                          49a53e21c3fcac196ff7a5d18b80fe6138fce1cf

                                                          SHA256

                                                          cef133da092dfb8a946fe5a39692bc8d5462aa98d1219305c6cff21201cabd50

                                                          SHA512

                                                          1f808fa217cc6c59d55504c4f5f9b130f47f80b4c8cc67559fd6fc976121028600ea1bcf1ffc41c9a2401442802346a2cb28c197da34296a2a6497d056798f87

                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

                                                          Filesize

                                                          4KB

                                                          MD5

                                                          da597791be3b6e732f0bc8b20e38ee62

                                                          SHA1

                                                          1125c45d285c360542027d7554a5c442288974de

                                                          SHA256

                                                          5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

                                                          SHA512

                                                          d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\HawkEye.exe.log

                                                          Filesize

                                                          20B

                                                          MD5

                                                          b3ac9d09e3a47d5fd00c37e075a70ecb

                                                          SHA1

                                                          ad14e6d0e07b00bd10d77a06d68841b20675680b

                                                          SHA256

                                                          7a23c6e7ccd8811ecdf038d3a89d5c7d68ed37324bae2d4954125d9128fa9432

                                                          SHA512

                                                          09b609ee1061205aa45b3c954efc6c1a03c8fd6b3011ff88cf2c060e19b1d7fd51ee0cb9d02a39310125f3a66aa0146261bdee3d804f472034df711bc942e316

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          25f87986bcd72dd045d9b8618fb48592

                                                          SHA1

                                                          c2d9b4ec955b8840027ff6fd6c1f636578fef7b5

                                                          SHA256

                                                          d8b542281740c12609279f2549f85d3c94e6e49a3a2a4b9698c93cca2dce486c

                                                          SHA512

                                                          0c8a0d1a3b0d4b30773b8519a3d6e63d92973733da818ca9838599a9639e18df18ce31ebf56f46f6bbb7d89d10c726f4d73781e154d115a6068a3be7dd12b314

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          94bd9c36e88be77b106069e32ac8d934

                                                          SHA1

                                                          32bd157b84cde4eaf93360112d707056fc5b0b86

                                                          SHA256

                                                          8f49a43a08e2984636b172a777d5b3880e6e82ad25b427fef3f05b7b4f5c5b27

                                                          SHA512

                                                          7d4933fae6a279cc330fde4ae9425f66478c166684a30cec9c5c3f295289cf83cbdf604b8958f6db64b0a4b1566db102fbcbdcdb6eca008d86d9a9c8b252ff16

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3e171806-bd5c-4c9e-be26-c4369701ad9c.tmp

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          50a487ce0315e02c02371ed0faf6dc18

                                                          SHA1

                                                          90f075ec5c6ecf69d511259d4d85a68c1dc7aaaf

                                                          SHA256

                                                          37339dc7e46f167bdf40b3b3aff7cc71ebe414705fd27036750b431f32dd30f6

                                                          SHA512

                                                          fe6d230b06955bd328a93dc681e59b003b7d348897fee89f784aa4a74440e98a4f4a5f89ae799f869a7170cdd0aacb87e2f4cbec0f89f24b6e871649c7e04c48

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000f

                                                          Filesize

                                                          66KB

                                                          MD5

                                                          8aca43d81fbcf0101c7e53ff877b02db

                                                          SHA1

                                                          1bb8d51755ef67dd2e5302f87585b0ef3abc261b

                                                          SHA256

                                                          c2bec5b217c0428bebcd6337b94dbbf943718f0608bf47edd29ff6bdaadf454d

                                                          SHA512

                                                          1a0d67dd5725f9864556ef6e26b3f21c3cd74d6b2e2b6577f416df617251d41351881da5e7e5b9d6fb042a5f506383c825cfca20f5526ba0f56bc7ba0719853d

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000013

                                                          Filesize

                                                          21KB

                                                          MD5

                                                          c03d2382e103733e129cd1bc6ea3e72f

                                                          SHA1

                                                          0c75d41585f89a6b7bf129da1d75fc20f8d44b49

                                                          SHA256

                                                          a8a5e813f2e3b08e7aaa2bfbf04005314144c5fc89f93ef5af0f5c26d9dd8138

                                                          SHA512

                                                          f27214c369fc7fe63c4de77116e999e03ab8b0f3d5aae7c215b43accdde567718ddf5f7bb25cb17ea3652640bf6237b9e729380e63f871406cea376d2af42285

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                          Filesize

                                                          3KB

                                                          MD5

                                                          1aad1005f41422c3c9ec72a0590e54aa

                                                          SHA1

                                                          d92d3caf24943735925d0580ae86ab69844640f6

                                                          SHA256

                                                          025e150d70c930cba2d2bf578435663fff86f21b64a7826199f332b35e177fb8

                                                          SHA512

                                                          aea285753574777d6473521f3f8af4a350ee54642f009242d77cde4bb24af36056e43c1b01e10888138bb6af975f31ca05f902c915d071ab6cbd767aa532f609

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                          Filesize

                                                          3KB

                                                          MD5

                                                          6d8e88e51ac5097f8744a6e4ca846ba5

                                                          SHA1

                                                          953398015c55293c5913665287d02dc9cb7a09a0

                                                          SHA256

                                                          126d22e287a0ec0335a046b761a704b1830e6e11ebbcf5e8067b4e26c973ce24

                                                          SHA512

                                                          48ef02ae1fa7330199819101e30c114295d791b2e305bcc563ada0ebc64bce14f9145e413baa3fddfc5d5c957e8a561548acf23be92b919c5883dc03b452f8a2

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          8KB

                                                          MD5

                                                          7340fc1e71930166e0b1831f77c4379c

                                                          SHA1

                                                          dce47301f907a98b5c9eeffba51ab31316df03a2

                                                          SHA256

                                                          427e4d2d7894ea111907cc2d5f94a41d43ce31acee738ccab2e2e024e0475cc0

                                                          SHA512

                                                          0f3339e4618c5af588298b9d78c4ff196d2e4f75337fe0b40c475d5152a752b4e72ad2b94968d0611863836d49cf8cab3414d23c49db32e2984f9d1740e0b559

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          7KB

                                                          MD5

                                                          79488f45492b6eb661b4abecbf3d78c3

                                                          SHA1

                                                          75b1f9e830c324fec37143f3115f4a73259337a4

                                                          SHA256

                                                          1a9ed0fad567f81cbad9ae31df2e05aa40635a2099f1958ecc81d6b6c42529d8

                                                          SHA512

                                                          f43a9162e45fc1fa71e3950fd2ab8218ef0dc9b4fc60fab58e8a7d84c6b3df7c781fbd1e9c36fa10ae066c4d747a1a6d1de40e1a411a4af8f1306efa1c111ab5

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          7KB

                                                          MD5

                                                          0fdad93e90fa57b224c65c117759632a

                                                          SHA1

                                                          571ae3c7b06dd07cb2c9517f72dbf8451a365169

                                                          SHA256

                                                          480b983776568c978e0d54b1ad25fda0502010b5c58d7b95dac04f00e68b3cdc

                                                          SHA512

                                                          29d3c5cb7c47412c9763d2257563c5e9500ccf12221c5752afab221338adbcdb46e69bbb4cc1d67052cfa8ae839bcdf594b7f7c714a5d2a5339d3f260e7f3116

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          841a4a8a5fed36a8d4606523019ceabc

                                                          SHA1

                                                          239550539e3c5c21b21ba4f0a54168480df26df8

                                                          SHA256

                                                          ecc4d7dc4f5c342f366c7c4185b9a76cdcbd88828c8be8c4637f9a5231e62cf0

                                                          SHA512

                                                          ee8161ed5e8a1444f5dd416485f830e49458dff602ab5fdcb13a9aa9f238a29e1ea1c94b04df1998777bc093437496d73e8f0246d8e3a5d88bbe5cc05f79f4e7

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          51b3b1de59c4116c165a37d6770ef4d4

                                                          SHA1

                                                          83f0b8137c28bcd6d75de8d3469760f1809de90b

                                                          SHA256

                                                          d6d3368b711bc75fa7467dbcb15305c6640d7530492b0a4546cbaa330c6cfbd6

                                                          SHA512

                                                          9d4e03fcccb3da7e9ef79d3711020a0a080ad8e9685fb4c8d474cdaa306075866466662b8ab4f0aa332ca353446fe5388e1bb2054aaeeebfffb86973223ef2aa

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          23124109cd6b92c889c300a65815dd1d

                                                          SHA1

                                                          b96cdfc730641d2ce79105524b535b92cadc5ce9

                                                          SHA256

                                                          5b47b4488584397dc17e940a261e40e57d555e214d603378240d177e17ab80ba

                                                          SHA512

                                                          c87e61db28081a92a4f7bcd59732e9abb9561a8149075b7900f566e174e4d8baab4ec5855caa405997bc080b7844f33815053aa6f9cacd8fde2dfd364da1cea8

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          e42053e3f7bd352e55e3d84ddafe2902

                                                          SHA1

                                                          589a4cdc2ca7fd292f55a4a07bcc748ce28073b7

                                                          SHA256

                                                          bbbd1dae7104404f4a9343bf710f9a9c424d00989252667408847fdb21373cd5

                                                          SHA512

                                                          63e3d7d1015b1d68542a7f55a34595312059689c279f86b115c9845a678d60f571dbac2bf4a8f4143131a5a36eeb5fae7132aad04dc393438902c8e90c93ad66

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          135b8fa070a81b4c0ff207a742f456b3

                                                          SHA1

                                                          b5697f99abc5fbda92d3bd704b9f27c88ad48456

                                                          SHA256

                                                          e19d1691ce12bc73f762c6bd9ccbe179c969f82ae72ad843fa76ff525788bfb1

                                                          SHA512

                                                          e3c82c4e6fc5a8d9f8fe02214af0348e0261ee3a054468ced901de4dbaafc5f0c828a322e641723226f88094cae654f6aa1a0e8ac46cc96579f3c3acca596421

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe588690.TMP

                                                          Filesize

                                                          204B

                                                          MD5

                                                          a5b5ad755e96f99d42fe0765ca3c68eb

                                                          SHA1

                                                          fb7fe40d549f411130c7c9c531079affdd72aee0

                                                          SHA256

                                                          275667e168dfdd688b55dba8f0c02a0b7f01ec26efb4af06f885024dd35dece4

                                                          SHA512

                                                          f77ed998eb85b892b7d1ababdc9fc2025c00369ed3252674fb560d77b7bbe8f25eeaf8c4bc65cba478d45b328cc037e9bb18196f842e8898ced5fb71e5032540

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                          Filesize

                                                          16B

                                                          MD5

                                                          46295cac801e5d4857d09837238a6394

                                                          SHA1

                                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                          SHA256

                                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                          SHA512

                                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                          Filesize

                                                          16B

                                                          MD5

                                                          206702161f94c5cd39fadd03f4014d98

                                                          SHA1

                                                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                          SHA256

                                                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                          SHA512

                                                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          500cbca19ade9ba651414f433d87001e

                                                          SHA1

                                                          c4c51b4048ef8551acd30f18f65e63d54101a322

                                                          SHA256

                                                          e7a2efe90c4bca3c1a3d4c17d4d03ad39c5cb9957202a2354acbc31018dca7e5

                                                          SHA512

                                                          d1ab7bdc608ef26fcd9ef3b7a0018111481756fcd8b9f3d3bfb5b7df1eb30d328a08fea50bedee391ae6b4382aa36744633be74f0ddaacaa445613de904fcbf1

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          2b72f1513e35ac626bf2e3fa94a62a22

                                                          SHA1

                                                          e448f1eb06f5a9403ac7bf302e9f2d30385512b7

                                                          SHA256

                                                          b760616a8066f4b99ea5651b20d586bba1d55be93f515bc6a3a8e901c9468bd9

                                                          SHA512

                                                          d1e8926fbfab9c9cf66d233678f6bb38f93ad7eaf7c205794fcd656e0320408dbb660ebc821a497f1cb34a32bb5942c272405d28f4ea5b94ee5ae78b3911e1fa

                                                        • C:\Users\Admin\Downloads\Unconfirmed 413882.crdownload

                                                          Filesize

                                                          232KB

                                                          MD5

                                                          60fabd1a2509b59831876d5e2aa71a6b

                                                          SHA1

                                                          8b91f3c4f721cb04cc4974fc91056f397ae78faa

                                                          SHA256

                                                          1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

                                                          SHA512

                                                          3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

                                                        • C:\Users\Admin\Downloads\Unconfirmed 7044.crdownload

                                                          Filesize

                                                          28KB

                                                          MD5

                                                          8e9d7feb3b955e6def8365fd83007080

                                                          SHA1

                                                          df7522e270506b1a2c874700a9beeb9d3d233e23

                                                          SHA256

                                                          94d2b1da2c4ce7db94ee9603bc2f81386032687e7c664aff6460ba0f5dac0022

                                                          SHA512

                                                          4157a5628dc7f47489be2c30dbf2b14458a813eb66e942bba881615c101df25001c09afb9a54f88831fa4c1858f42d897f8f55fbf6b4c1a82d2509bd52ba1536

                                                        • memory/2272-524-0x0000000010000000-0x0000000010010000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/2272-528-0x00000000050B0000-0x00000000050CA000-memory.dmp

                                                          Filesize

                                                          104KB