Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

15/03/2024, 15:52

240315-tbbpaacd5t 5

15/03/2024, 15:08

240315-sh6bssbe5v 10

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 15:52

General

  • Target

    https://mega.nz/file/knl0SZjb#rNGJxxlpLfD8fEcm1-Q-j1LLwutjtwz5GhOcuDMcmRE

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 11 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/file/knl0SZjb#rNGJxxlpLfD8fEcm1-Q-j1LLwutjtwz5GhOcuDMcmRE
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c04c46f8,0x7ff9c04c4708,0x7ff9c04c4718
      2⤵
        PID:2600
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:2
        2⤵
          PID:4328
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2940
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2556 /prefetch:8
          2⤵
            PID:4444
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
            2⤵
              PID:4588
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
              2⤵
                PID:3224
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:8
                2⤵
                  PID:3032
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2484
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5380 /prefetch:8
                  2⤵
                    PID:2388
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:1
                    2⤵
                      PID:5272
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:1
                      2⤵
                        PID:5280
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:1
                        2⤵
                          PID:5520
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:1
                          2⤵
                            PID:5528
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5608 /prefetch:8
                            2⤵
                              PID:5740
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:1
                              2⤵
                                PID:5748
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5760
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4780 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3152
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3868
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1692
                                • C:\Windows\system32\AUDIODG.EXE
                                  C:\Windows\system32\AUDIODG.EXE 0x2c8 0x480
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4604
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:6132
                                  • C:\Windows\system32\mspaint.exe
                                    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_صنع_فيروس_الفدية.zip\صنع_فيروس_الفدية\1234.jpg" /ForceBootstrapPaint3D
                                    1⤵
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5936
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
                                    1⤵
                                    • Drops file in System32 directory
                                    PID:5948
                                  • C:\Windows\system32\OpenWith.exe
                                    C:\Windows\system32\OpenWith.exe -Embedding
                                    1⤵
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5512
                                  • C:\Program Files\VideoLAN\VLC\vlc.exe
                                    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Temp1_صنع_فيروس_الفدية.zip\صنع_فيروس_الفدية\كيفية إنشاء فايروس الفدية.mp4"
                                    1⤵
                                    • Suspicious behavior: AddClipboardFormatListener
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    • Suspicious use of SetWindowsHookEx
                                    PID:6028

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    47b2c6613360b818825d076d14c051f7

                                    SHA1

                                    7df7304568313a06540f490bf3305cb89bc03e5c

                                    SHA256

                                    47a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac

                                    SHA512

                                    08d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    e0811105475d528ab174dfdb69f935f3

                                    SHA1

                                    dd9689f0f70a07b4e6fb29607e42d2d5faf1f516

                                    SHA256

                                    c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c

                                    SHA512

                                    8374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    72B

                                    MD5

                                    d08a78f103b5aa2be66693a66e3a922b

                                    SHA1

                                    b87de9d812b03fbe25e4ddd74aff0b81934cb9a2

                                    SHA256

                                    75818fc984450445cbd551d0f992a1ef0cdfdf295adbc3e2f4c082f5b13b4724

                                    SHA512

                                    940786236e4912493b0e2ad72d3b3862f30048e4c1c2daaf9887608501fee42338a42bc45ac9bb08160dcdc5f33859f5d3cbb58c6803dc3ef82a70a7146ce1b8

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    46295cac801e5d4857d09837238a6394

                                    SHA1

                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                    SHA256

                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                    SHA512

                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    188B

                                    MD5

                                    008114e1a1a614b35e8a7515da0f3783

                                    SHA1

                                    3c390d38126c7328a8d7e4a72d5848ac9f96549b

                                    SHA256

                                    7301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18

                                    SHA512

                                    a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    111B

                                    MD5

                                    285252a2f6327d41eab203dc2f402c67

                                    SHA1

                                    acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                    SHA256

                                    5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                    SHA512

                                    11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    55e7457fa4c3b20d2f83747b3a9f0194

                                    SHA1

                                    cb18b32318cb14d64c68440c1ecba3a280dababf

                                    SHA256

                                    1d0e878d561312e68626ca6cffd521057fcf14097984ae3c72edcdea2298dc27

                                    SHA512

                                    9f0f7fcf328d96dd06bb204b75fa8272766ec712bffebc8bec701ec28957399677dfa0cd203e73760fdd05760d6e3a71bfd8fd3ac93825182da41575f9c68354

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    204020b0ec2209886640d8ce55dc227e

                                    SHA1

                                    6c0ce1fc2d2556abcce7e3a6cbce42c5cac30225

                                    SHA256

                                    00e704a1939e69c9eae6e6a80183e592be1b0a41568d41d834f0087a6a26b80c

                                    SHA512

                                    a491a87182c0335421c4738d3da6857ffca296dca7ebda22c32bb090ebb3606ffacf054ca54ae473b1ee34bcbcddf989ba02aa5d0a8951b7e4b88700b4c9eb0d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    cac47dd7d19d369c707f87d95a1d769c

                                    SHA1

                                    da63136e8d72ef624cc243ebb836c82f2c0c0aa3

                                    SHA256

                                    6a9d834c2ee209bdb605edfdfc5936bc142e87c6cbf3079dd4c40565dc022a73

                                    SHA512

                                    97816d59abbc26864ed4a7eb9cf9991cf71cbf48b5fbfc752f89a2943ee9751e301dff93bad52dfdc9ea0215d660e31404d4feaaeeda54c52b69882a803d22ee

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001

                                    Filesize

                                    41B

                                    MD5

                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                    SHA1

                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                    SHA256

                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                    SHA512

                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                    Filesize

                                    72B

                                    MD5

                                    b5332ad1a6d7ba5be0a21589cee979e4

                                    SHA1

                                    bf7e2d761d816d6115421477266fa850bba748ed

                                    SHA256

                                    b849ee0cd6358c4a6adcda5387b9894a4da73a7b8d80423592a9b7499b9238dd

                                    SHA512

                                    e81658a4f339b868fa325fdbba4b51569019ab42a23336629ca20658424d5d8106ae7aca5e6db6380ee04cce92b3eb70b9645c0d0cbe34c45f068e41fb580874

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57aaf5.TMP

                                    Filesize

                                    48B

                                    MD5

                                    17d589a9ed7d648e449508bc90ac7d7d

                                    SHA1

                                    5378dbadc368d3b056e45d8e0e11d9d35698709d

                                    SHA256

                                    aa0be585bdcba12afbf9ade27e400f5883ee98e470d19901c1a20d9ba35498ce

                                    SHA512

                                    2ec2cd2bcc2bce6ead49c8cf51fc3e92335a487d5f258c735908a6055947d5723d298b5349a26ca309a109d6070427f2e1985032b9ebde91bb037793b69e581c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    98eada385287eb5f68f334634fcc2175

                                    SHA1

                                    1f4229b758d6b9bebcf107673a2e217c1c17ccee

                                    SHA256

                                    0009aff74a24c8e4441f8cc31d34296aa524deb477ce8186617c388a412d69d4

                                    SHA512

                                    9d3c9e2962651e19226a7bf71dc71d2f7e07ce5707b0a468ea3c4140cc3c6132aa8cfa3145ef761886e532d1d007d3bbf768cbbf0f1aa3d1d706e3d235a6ab15

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    cc270f48f708c030daf92a27c8e005d0

                                    SHA1

                                    e9633f478336dc48d53d49f69deaa1de27805037

                                    SHA256

                                    4cbfb277518b8fc56be0c4f3ce00a51dad6f5e747bcb6708d6ac9d8e79b419e0

                                    SHA512

                                    ff517b09961beb7d73e61b4ae1b8517c26a222ed035ba0a640d2a329bb16de656038e1506a254f3d5925ce313e05a66342411596a4fad451e2d882cc0c080788

                                  • C:\Users\Admin\Downloads\صنع_فيروس_الفدية.zip

                                    Filesize

                                    10.4MB

                                    MD5

                                    98233f007b65c14ed68014fdd5575f76

                                    SHA1

                                    f40c76dcf6dde9667d81c1c6eac4084debe92c54

                                    SHA256

                                    40b5a24c5a2dd104cdd3eecfd7ee8b2fd4ef6a2a69fd99ce208be5cfa4ba1499

                                    SHA512

                                    7628fcc3913a5923dc670d028f0b5638780093bb09c4c0ec96559903ff4fc3b6cf4b6259b8bf21a98ce5ae40b47343f1820f394303d4e793d8bfa9566b168ab2

                                  • memory/5948-214-0x0000022545F40000-0x0000022545F41000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5948-216-0x0000022545FC0000-0x0000022545FC1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5948-218-0x0000022545FC0000-0x0000022545FC1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5948-219-0x0000022546050000-0x0000022546051000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5948-220-0x0000022546050000-0x0000022546051000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5948-221-0x0000022546060000-0x0000022546061000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5948-222-0x0000022546060000-0x0000022546061000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5948-203-0x000002253D3B0000-0x000002253D3C0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5948-207-0x000002253DC60000-0x000002253DC70000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/6028-260-0x00007FF9A6DC0000-0x00007FF9A7E6B000-memory.dmp

                                    Filesize

                                    16.7MB

                                  • memory/6028-275-0x00007FF9AB920000-0x00007FF9ABA98000-memory.dmp

                                    Filesize

                                    1.5MB

                                  • memory/6028-253-0x00007FF9C0360000-0x00007FF9C0377000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/6028-254-0x00007FF9BFB90000-0x00007FF9BFBA1000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/6028-256-0x00007FF9AC4D0000-0x00007FF9AC4E1000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/6028-257-0x00007FF9AC4B0000-0x00007FF9AC4CD000-memory.dmp

                                    Filesize

                                    116KB

                                  • memory/6028-258-0x00007FF9ABF80000-0x00007FF9ABF91000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/6028-255-0x00007FF9AC4F0000-0x00007FF9AC507000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/6028-259-0x00007FF9ABD80000-0x00007FF9ABF80000-memory.dmp

                                    Filesize

                                    2.0MB

                                  • memory/6028-252-0x00007FF9C3B80000-0x00007FF9C3B98000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/6028-250-0x00007FF9AC510000-0x00007FF9AC544000-memory.dmp

                                    Filesize

                                    208KB

                                  • memory/6028-261-0x00007FF9ABD40000-0x00007FF9ABD7F000-memory.dmp

                                    Filesize

                                    252KB

                                  • memory/6028-262-0x00007FF9ABD10000-0x00007FF9ABD31000-memory.dmp

                                    Filesize

                                    132KB

                                  • memory/6028-263-0x0000021CBEAB0000-0x0000021CBEAC8000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/6028-264-0x0000021CBEAD0000-0x0000021CBEAE1000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/6028-265-0x0000021CBEAF0000-0x0000021CBEB01000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/6028-267-0x00007FF9ABC70000-0x00007FF9ABC8B000-memory.dmp

                                    Filesize

                                    108KB

                                  • memory/6028-268-0x00007FF9ABC50000-0x00007FF9ABC61000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/6028-271-0x00007FF9ABB90000-0x00007FF9ABBF7000-memory.dmp

                                    Filesize

                                    412KB

                                  • memory/6028-270-0x00007FF9ABC00000-0x00007FF9ABC30000-memory.dmp

                                    Filesize

                                    192KB

                                  • memory/6028-272-0x00007FF9ABB20000-0x00007FF9ABB8F000-memory.dmp

                                    Filesize

                                    444KB

                                  • memory/6028-274-0x00007FF9ABAA0000-0x00007FF9ABAF6000-memory.dmp

                                    Filesize

                                    344KB

                                  • memory/6028-273-0x00007FF9ABB00000-0x00007FF9ABB11000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/6028-269-0x00007FF9ABC30000-0x00007FF9ABC48000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/6028-266-0x0000021CBEB10000-0x0000021CBEB21000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/6028-251-0x00007FF9ABFA0000-0x00007FF9AC254000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/6028-276-0x00007FF9AB900000-0x00007FF9AB917000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/6028-277-0x00007FF9AB790000-0x00007FF9AB900000-memory.dmp

                                    Filesize

                                    1.4MB

                                  • memory/6028-278-0x00007FF9AB770000-0x00007FF9AB782000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/6028-279-0x00007FF9AB720000-0x00007FF9AB762000-memory.dmp

                                    Filesize

                                    264KB

                                  • memory/6028-280-0x00007FF9AB6D0000-0x00007FF9AB71C000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/6028-281-0x00007FF9AB560000-0x00007FF9AB6CB000-memory.dmp

                                    Filesize

                                    1.4MB

                                  • memory/6028-282-0x00007FF9AB500000-0x00007FF9AB557000-memory.dmp

                                    Filesize

                                    348KB

                                  • memory/6028-283-0x00007FF9AB2B0000-0x00007FF9AB4FB000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/6028-284-0x00007FF9A2320000-0x00007FF9A3AD0000-memory.dmp

                                    Filesize

                                    23.7MB

                                  • memory/6028-289-0x00007FF9AB170000-0x00007FF9AB235000-memory.dmp

                                    Filesize

                                    788KB

                                  • memory/6028-290-0x00007FF9AB0F0000-0x00007FF9AB165000-memory.dmp

                                    Filesize

                                    468KB

                                  • memory/6028-291-0x00007FF9AB080000-0x00007FF9AB0E2000-memory.dmp

                                    Filesize

                                    392KB

                                  • memory/6028-288-0x00007FF9AB240000-0x00007FF9AB256000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/6028-292-0x00007FF9AB010000-0x00007FF9AB07D000-memory.dmp

                                    Filesize

                                    436KB

                                  • memory/6028-293-0x00007FF9AAFF0000-0x00007FF9AB003000-memory.dmp

                                    Filesize

                                    76KB

                                  • memory/6028-295-0x00007FF9AAF80000-0x00007FF9AAFD0000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/6028-294-0x00007FF9AAFD0000-0x00007FF9AAFE4000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/6028-297-0x00007FF9AAD40000-0x00007FF9AAF5D000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/6028-296-0x00007FF9AAF60000-0x00007FF9AAF75000-memory.dmp

                                    Filesize

                                    84KB

                                  • memory/6028-287-0x00007FF9AB260000-0x00007FF9AB271000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/6028-285-0x00007FF9C0350000-0x00007FF9C0360000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/6028-286-0x00007FF9AB280000-0x00007FF9AB2AF000-memory.dmp

                                    Filesize

                                    188KB

                                  • memory/6028-249-0x00007FF7BF0A0000-0x00007FF7BF198000-memory.dmp

                                    Filesize

                                    992KB