Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    169s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2025, 20:53

General

  • Target

    sample.html

  • Size

    54KB

  • MD5

    2e9a1ce275ece7eb7d1c83cf238d498c

  • SHA1

    3f2461f8b3232470cb7c8b8b8d5ca175d387b9a1

  • SHA256

    fc4e3a03bb5fcd265ebbc4ccfa5679fc11c0fe7924fa96cf5223893814209c55

  • SHA512

    d760380381fceec52c9c5589700bff8f11a769133a45712797a7767b25438ae57b9b24838ae958f06cc4e7311a67405e25b09743f3fe0d8e3723b468867041b8

  • SSDEEP

    1536:NSFzX6aponJVi0rqs5cgVJCIxXuBFA859F9DvZ7hbqA6v/GmEKOMB/MXiglZwegO:NSFz9iJVi0rqs5cgVJCIxXuBFA859LF3

Malware Config

Signatures

  • Detected potential entity reuse from brand MICROSOFT.
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 20 IoCs
  • Modifies registry class 49 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 53 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff5756cc40,0x7fff5756cc4c,0x7fff5756cc58
      2⤵
        PID:2832
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,6130411511764428498,3534089305211037416,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1924 /prefetch:2
        2⤵
          PID:2836
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,6130411511764428498,3534089305211037416,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:3
          2⤵
            PID:4968
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,6130411511764428498,3534089305211037416,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2568 /prefetch:8
            2⤵
              PID:3108
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,6130411511764428498,3534089305211037416,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:1
              2⤵
                PID:4172
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,6130411511764428498,3534089305211037416,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3308 /prefetch:1
                2⤵
                  PID:1964
              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                1⤵
                  PID:2388
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\SetConnect.html
                  1⤵
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:1268
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0x100,0x128,0x7fff571546f8,0x7fff57154708,0x7fff57154718
                    2⤵
                      PID:4440
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9980433689304711951,5819897738529052004,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
                      2⤵
                        PID:3208
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,9980433689304711951,5819897738529052004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:3
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2308
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,9980433689304711951,5819897738529052004,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:8
                        2⤵
                          PID:2388
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9980433689304711951,5819897738529052004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
                          2⤵
                            PID:1100
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9980433689304711951,5819897738529052004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                            2⤵
                              PID:2260
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2952
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2148
                              • C:\Windows\System32\notepad.exe
                                "C:\Windows\System32\notepad.exe" "C:\Users\Admin\Desktop\ReadLock.ps1"
                                1⤵
                                • Opens file in notepad (likely ransom note)
                                PID:4504
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault4c15e9dch5c8ah4abfh955dhe2789d67ff6a
                                1⤵
                                  PID:1896
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff571546f8,0x7fff57154708,0x7fff57154718
                                    2⤵
                                      PID:3640
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,4179699857751346045,13072238465772968497,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:2
                                      2⤵
                                        PID:4568
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,4179699857751346045,13072238465772968497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:3
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3160
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,4179699857751346045,13072238465772968497,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:8
                                        2⤵
                                          PID:4892
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:224
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:1832
                                          • C:\Windows\system32\wwahost.exe
                                            "C:\Windows\system32\wwahost.exe" -ServerName:App.wwa
                                            1⤵
                                            • Modifies Internet Explorer settings
                                            • Modifies data under HKEY_USERS
                                            • Modifies registry class
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2860
                                          • C:\Windows\system32\LogonUI.exe
                                            "LogonUI.exe" /flags:0x0 /state0:0xa3962055 /state1:0x41c64e6d
                                            1⤵
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of SetWindowsHookEx
                                            PID:5456

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                            Filesize

                                            1KB

                                            MD5

                                            3be70ba185bcfcf0371d38f8827680d7

                                            SHA1

                                            7557b4255864db08a5a79de9ffe69b3ea8915f8f

                                            SHA256

                                            78a00de6844edb171d662b46888af047bcb0b3856c9c020dbc02207c5298a197

                                            SHA512

                                            5ff1c1747ed1345e8d92f83e8985e23662f78617acba84b31cf8791f753c345ed45d173d75cd23f2a0c28a6663f0701117f1f65efd70664651e458cb59a18d79

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                            Filesize

                                            2B

                                            MD5

                                            d751713988987e9331980363e24189ce

                                            SHA1

                                            97d170e1550eee4afc0af065b78cda302a97674c

                                            SHA256

                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                            SHA512

                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                            Filesize

                                            523B

                                            MD5

                                            9167d5920808cfa47b4c00a69d52d6c3

                                            SHA1

                                            290ad03d00e0d9295b4aabb97fe28fae61000345

                                            SHA256

                                            3a00403372d396679be5062602af6d7e49096f7b7eb9eda8b62f685a1a962453

                                            SHA512

                                            51c4ffad1cf9131758adc66d07301cc7f8ea6d84a56bf73dd05506092eff628623f95da27e2b660e39bb60e6266c6f3f516b5fe528a76a23a085326d07641095

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            35b95f502b1cc10075028547222577b8

                                            SHA1

                                            83c09c63790e73ad781810e541568fd7f50c453f

                                            SHA256

                                            86b3b2b6867a4012743fbd87d76bfdd0c813503f10b2079216f4d8f4c1f92198

                                            SHA512

                                            67220ca2a33f2a159954f587f92a0fc15477d7cf00c798aeb455a4643d97a4e727e0608b307a8e2b7f5e3b8ec94d41e653091c64c093dd2c82b9772205f815a3

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            c8229f9bc7dacf4be928a38cf6c70622

                                            SHA1

                                            fd027e3f97bdb5aa27b26c165b6da229114dd9d1

                                            SHA256

                                            436bcc10bbdef36a5b371c01a0821fafabaadbc5d0f713fc9ffff2069c823181

                                            SHA512

                                            b84ce736e0d87d9d44866f99d95f780bd3f9d134b9e86246f6f5f5fbee15fea775e524336cd9d29eacfd61b61fc783d0ef2618ce53c2bf0105e273863fd9dbac

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            6703e5d062804cf2c6c6ba64717cbebc

                                            SHA1

                                            7c3050b2bb8dcfc5be043e13e3baad35adf856de

                                            SHA256

                                            e75ba991126b6e4fc122cb58f2ebc337d0504e3efe1064b3ac66a72bfb2ae964

                                            SHA512

                                            a905b95de64328073989bc7d165f73cdb9d4c00312ea321922a7bdb606b4003e649c990fea76a71a3bff53b3960b9cbf13ef557fae26ae584c4c00a1e2df5d32

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            3000005d82f7c0892de7abf3fb9085e6

                                            SHA1

                                            039ead00c97a903442ba741c58e55ffcfefeb4f5

                                            SHA256

                                            7495278b17062a943b95cd3c7f5a1e378900d01a6a867882898458a19baebab3

                                            SHA512

                                            9e9d7a47ef07b992b15ac1c3525d7f449c1b33e83ad386add8ba7cb856928add4aa3d860c49ad411c84b4626d2add485b5a210c6b90adeee0745976489a13ef7

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            059710a0816e8298c2bc9fbbc9eb3131

                                            SHA1

                                            efd5b78da9ee452542d93cd87218757138284e89

                                            SHA256

                                            be8f9eab85b4bd0609dc9714ebdbb7c8f7132d7b2899a8dd5721f846e7923b40

                                            SHA512

                                            d3a26a069ffa13588be090d3997c5ee28c16d834be8af9ec5e7ed265306799bbefcd6881e876a3ac090e3dc74be8b7aba1c58215ef993ba88489411a0fa4b1db

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            116KB

                                            MD5

                                            3baeed5350fdadeeeae42fe7525e443d

                                            SHA1

                                            a58d4d549b472eb74a90fb6341a2afa9ea0e0a69

                                            SHA256

                                            511601eadd8140f796a0fd8b3c650c29b701a5a9ca2ad6a8e0ecccf72f6954eb

                                            SHA512

                                            d681e4fbde08e4cfd259a86a62a5dae9effd4a72d77893976c5da9087610c0e643706f607b65315162320f6bbea6745839a522bcc06e685f29e2dc69c170df01

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            116KB

                                            MD5

                                            9e0e5d18ac27fee390a6cc336f743322

                                            SHA1

                                            1b012da1a3ba01b61247f5da28dded04d8ceb7b0

                                            SHA256

                                            681a1d6029ced99940c57c93d387aba957fe48a8a76d412cd685e195111dbc2d

                                            SHA512

                                            8a40c9ff9d9f1b636dfc3c04dd22d79ab2b86af7b9268a2d90a60235f2ed27ce408863912708c0ac12cc9f1ad8a67f85447ad708b7ee36f0a537c0e3df0eb0f4

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            116KB

                                            MD5

                                            ad1841febe8d1ff050588716d8741b82

                                            SHA1

                                            947b96c1e5596b564fdd276ed0e882e84112d917

                                            SHA256

                                            ffae1ad0349476b6a3199ce6003e157786904495a609436af15c1ecc6d1c8fc3

                                            SHA512

                                            01f26efcefcf8269aa818f5ccdea41244a8993de2a90fa9a9afa67ea38e67657b707f348cfc9883bb0ae56f0c897dd3eaf770839b922ba223aaace53b671f69a

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            2837e0bd2b004f75deebed637c864625

                                            SHA1

                                            a49203a88ec8430534c0a755cd36da738901e29a

                                            SHA256

                                            cc51a9d0bd08b5e00772f522e5f265e3876b0b5c1e1844c3abc94adb5c1c7f48

                                            SHA512

                                            9ef72852b2d8fba24e89233866b261937ddf5ba630350fbf5db6ed658be337c8f68eefdb00caa4ecd6bd6d1e0b2e68dce718978d7b658b5860fc620bf75ea691

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            f426165d1e5f7df1b7a3758c306cd4ae

                                            SHA1

                                            59ef728fbbb5c4197600f61daec48556fec651c1

                                            SHA256

                                            b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841

                                            SHA512

                                            8d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            6960857d16aadfa79d36df8ebbf0e423

                                            SHA1

                                            e1db43bd478274366621a8c6497e270d46c6ed4f

                                            SHA256

                                            f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32

                                            SHA512

                                            6deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                            Filesize

                                            124KB

                                            MD5

                                            a513f1f33cf97b00aea9eccc5272855e

                                            SHA1

                                            88984ce43128f7a5a7feffc1a63ff99a9ffe0f3e

                                            SHA256

                                            c440b4a4b65a366773e51706672153c6f9625beadf0784d093229ea67ae9b04d

                                            SHA512

                                            e663f2ddee9121cca8b3acd6692bd104146e66967ad44e0219e545b3c53ffbca694faaab2b2292db6f5ae23f0795b39c8824dfbc56f44aca918b7696439b2009

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                            Filesize

                                            61B

                                            MD5

                                            4df4574bfbb7e0b0bc56c2c9b12b6c47

                                            SHA1

                                            81efcbd3e3da8221444a21f45305af6fa4b71907

                                            SHA256

                                            e1b77550222c2451772c958e44026abe518a2c8766862f331765788ddd196377

                                            SHA512

                                            78b14f60f2d80400fe50360cf303a961685396b7697775d078825a29b717081442d357c2039ad0984d4b622976b0314ede8f478cde320daec118da546cb0682a

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            01750f1eb71e5a9b1848f0fbdcc1a96c

                                            SHA1

                                            43f645aa6d4c11d8e3e1c18b5408a4ec1d95dca2

                                            SHA256

                                            36bb44161acde73953bdfcccd6410a185612dfee8c2561f834933f01ff15f318

                                            SHA512

                                            4d652b37130a3954201ee698585a498f4ce52809539b07594ce1665c230ef64fa357f2e08023dc5a96367761e07eb4f634a79e542d3e99347378810bbc0c7d27

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            d66eef1a2db3c2df9511fc68cf446faa

                                            SHA1

                                            389293aa3ffc24dc0c83f97197ea43df20ff7e12

                                            SHA256

                                            b63d663d0d35135930582778fd39bf1e5dec1f8e3e6c47a2f994890127e746ab

                                            SHA512

                                            40cb9313228baae33f7ab9231dd6ebc896ac08dab12c3920814c05d9875b527fa479430156a5f00ff0130e4a50ca1f998506869148c37aaebc2abb9205b5db32

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG

                                            Filesize

                                            347B

                                            MD5

                                            e73a7ee7aff443e1687a991124c7872a

                                            SHA1

                                            8fdc083e5692bca4463120ff450b018c131aaf1b

                                            SHA256

                                            27ac8f1995099a390e187b4360d60936149e29da8879a04b327262d00aeb4cb2

                                            SHA512

                                            f9ffd1daac521005cff1b1e4d32f23fafa481547d68238ecb774c1b03acf49dd24b4dd5bc90b6d1461a4160799ce792d15ddb78ab607867dc019d9230986b8c1

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG

                                            Filesize

                                            326B

                                            MD5

                                            18b46558df855267b34f20d56733f6a7

                                            SHA1

                                            ac63d35c2083432897251e3162ad5e0a7cd7bcf9

                                            SHA256

                                            a3a7277162f3e2bdf6ac338f7c8792fdd8d1aa3607a18480a296b38b78a1b46a

                                            SHA512

                                            c32d6e634eaa0b733213779491c421cae605a3237a32730f16d8785c85ec456ebadaa56c4ce7ad01639f1dde72a4d55dc7b2cc6dab7677b4b37b6c37618cacfe

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links

                                            Filesize

                                            128KB

                                            MD5

                                            65ac232c3b7a923208852eb7fd28e3b0

                                            SHA1

                                            7d9b3ee3f1c49fe75bfe407a9c0442da767fd49d

                                            SHA256

                                            da302db6f6a3d142ef836c252836168fd2d888666777bbe64440cfe1e1474974

                                            SHA512

                                            70a00c029a913a29f3da488fe27d2274395cdc0c90b4c137f4ab9dbd2127ff1df4d19bab636758aa91eff5fc3958695c954372fc39b1c729455ff98cd3281afc

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d662673d-4e68-4a76-aba2-1a9bdeb259be.tmp

                                            Filesize

                                            1B

                                            MD5

                                            5058f1af8388633f609cadb75a75dc9d

                                            SHA1

                                            3a52ce780950d4d969792a2559cd519d7ee8c727

                                            SHA256

                                            cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                            SHA512

                                            0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last Version

                                            Filesize

                                            11B

                                            MD5

                                            838a7b32aefb618130392bc7d006aa2e

                                            SHA1

                                            5159e0f18c9e68f0e75e2239875aa994847b8290

                                            SHA256

                                            ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                                            SHA512

                                            9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            e92e048e2e1b9562e97a0377316e7e1c

                                            SHA1

                                            d428c3e8b22e47f6c50bb85dbc55e2c59328a546

                                            SHA256

                                            5032c8d83531cfe4ddad5dc4e73ba5bfaae8f32b5280c008912dc1e824a45375

                                            SHA512

                                            e666c75db1317520db7019227bba7045d5445ecf09154278fcf4d3cbb94707a77daef8dac3a662e82c1e08f575eb51544046d17012eacc4fce968247e0795b23

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            f50f89a0a91564d0b8a211f8921aa7de

                                            SHA1

                                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                                            SHA256

                                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                            SHA512

                                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\edge_shutdown_ms.txt

                                            Filesize

                                            3B

                                            MD5

                                            b06693c054ccd37bb7067a436661c037

                                            SHA1

                                            33c5cc300fe1b8df62dd834784d8880676e3a4e8

                                            SHA256

                                            da12c5db28b539062419677743772a6638f4829fb5f1a07f20c5f42404221166

                                            SHA512

                                            6521974eaeb449a4ec948ee2997a837675b96ab10b5a1dbf76473f8548351632657ef076f620bd95a2381da56a7bde2b1ab685a3642a0ae223c7c815305922b8

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\2H7BS5H2\account.live[1].xml

                                            Filesize

                                            13B

                                            MD5

                                            c1ddea3ef6bbef3e7060a1a9ad89e4c5

                                            SHA1

                                            35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

                                            SHA256

                                            b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

                                            SHA512

                                            6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

                                          • memory/2860-659-0x00000279726C0000-0x00000279727C0000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2860-604-0x00000279617B0000-0x00000279617D0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/2860-629-0x00000279723C0000-0x00000279724C0000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2860-614-0x0000027972190000-0x0000027972290000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2860-573-0x000002795EDB0000-0x000002795EEB0000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2860-691-0x0000027972C10000-0x0000027972D10000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2860-616-0x0000027972190000-0x0000027972290000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2860-653-0x0000027972570000-0x0000027972670000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2860-771-0x00000279732D0000-0x00000279733D0000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2860-781-0x0000027974260000-0x0000027974360000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2860-510-0x000002795ECB0000-0x000002795ECD0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/2860-967-0x0000027973410000-0x0000027973510000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2860-1125-0x0000027972A10000-0x0000027972B10000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2860-1515-0x0000027973660000-0x0000027973680000-memory.dmp

                                            Filesize

                                            128KB