Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/01/2025, 18:34

250111-w7rfqaykfr 10

11/01/2025, 18:31

250111-w55kkawkav 10

11/01/2025, 18:28

250111-w4bk4ayjhj 9

Analysis

  • max time kernel
    139s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2025, 18:31

Errors

Reason
Machine shutdown

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Ransomware

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Disables RegEdit via registry modification 4 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Control Panel 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 60 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 48 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Ransomware
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96a2446f8,0x7ff96a244708,0x7ff96a244718
      2⤵
        PID:4736
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
        2⤵
          PID:1972
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1204
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:8
          2⤵
            PID:2784
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
            2⤵
              PID:2532
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
              2⤵
                PID:2240
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:8
                2⤵
                  PID:3108
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3364
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:1
                  2⤵
                    PID:2816
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:1
                    2⤵
                      PID:4008
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3952 /prefetch:8
                      2⤵
                        PID:2232
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                        2⤵
                          PID:2184
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6236 /prefetch:8
                          2⤵
                            PID:3288
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6280 /prefetch:1
                            2⤵
                              PID:3188
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6416 /prefetch:1
                              2⤵
                                PID:5064
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:1
                                2⤵
                                  PID:5448
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6328 /prefetch:8
                                  2⤵
                                    PID:5544
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2760 /prefetch:1
                                    2⤵
                                      PID:5628
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3836 /prefetch:8
                                      2⤵
                                        PID:5728
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5908
                                      • C:\Users\Admin\Downloads\Krotten (1).exe
                                        "C:\Users\Admin\Downloads\Krotten (1).exe"
                                        2⤵
                                        • Disables RegEdit via registry modification
                                        • Executes dropped EXE
                                        • Adds Run key to start application
                                        • Modifies WinLogon
                                        • Drops file in Windows directory
                                        • System Location Discovery: System Language Discovery
                                        • Modifies Control Panel
                                        • Modifies Internet Explorer settings
                                        • Modifies Internet Explorer start page
                                        • Modifies registry class
                                        • Suspicious use of AdjustPrivilegeToken
                                        • System policy modification
                                        PID:6040
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:1
                                        2⤵
                                          PID:4008
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:1
                                          2⤵
                                            PID:5604
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1776 /prefetch:1
                                            2⤵
                                              PID:2640
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5912 /prefetch:8
                                              2⤵
                                                PID:5368
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6340 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4416
                                              • C:\Users\Admin\Downloads\RedEye.exe
                                                "C:\Users\Admin\Downloads\RedEye.exe"
                                                2⤵
                                                • Modifies Windows Defender Real-time Protection settings
                                                • UAC bypass
                                                • Disables RegEdit via registry modification
                                                • Event Triggered Execution: Image File Execution Options Injection
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Adds Run key to start application
                                                • Checks whether UAC is enabled
                                                • Drops autorun.inf file
                                                • Sets desktop wallpaper using registry
                                                • Drops file in Windows directory
                                                • NTFS ADS
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • System policy modification
                                                PID:6012
                                                • C:\Windows\SYSTEM32\vssadmin.exe
                                                  vssadmin delete shadows /all /quiet
                                                  3⤵
                                                  • Interacts with shadow copies
                                                  PID:6044
                                                • C:\Windows\SYSTEM32\vssadmin.exe
                                                  vssadmin delete shadows /all /quiet
                                                  3⤵
                                                  • Interacts with shadow copies
                                                  PID:1028
                                                • C:\Windows\SYSTEM32\vssadmin.exe
                                                  vssadmin delete shadows /all /quiet
                                                  3⤵
                                                  • Interacts with shadow copies
                                                  PID:4424
                                                • C:\Windows\SYSTEM32\NetSh.exe
                                                  NetSh Advfirewall set allprofiles state off
                                                  3⤵
                                                  • Modifies Windows Firewall
                                                  • Event Triggered Execution: Netsh Helper DLL
                                                  PID:1328
                                                • C:\Windows\System32\shutdown.exe
                                                  "C:\Windows\System32\shutdown.exe" -r -t 00 -f
                                                  3⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:4996
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15657088740398646061,13531326627154813867,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6704 /prefetch:2
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4160
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:2212
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:2320
                                                • C:\Windows\system32\vssvc.exe
                                                  C:\Windows\system32\vssvc.exe
                                                  1⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1412
                                                • C:\Windows\system32\LogonUI.exe
                                                  "LogonUI.exe" /flags:0x4 /state0:0xa38e5055 /state1:0x41c64e6d
                                                  1⤵
                                                  • Modifies data under HKEY_USERS
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1404

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  d7cb450b1315c63b1d5d89d98ba22da5

                                                  SHA1

                                                  694005cd9e1a4c54e0b83d0598a8a0c089df1556

                                                  SHA256

                                                  38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                                                  SHA512

                                                  df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  37f660dd4b6ddf23bc37f5c823d1c33a

                                                  SHA1

                                                  1c35538aa307a3e09d15519df6ace99674ae428b

                                                  SHA256

                                                  4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                                  SHA512

                                                  807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  fef0da08ff690202a4006252ad6bc10e

                                                  SHA1

                                                  43d49ff50e0a038c19d0e59fef688b5544905d98

                                                  SHA256

                                                  4908dde51cc85e8fb7d66087d055fcaa34ee6e5109b3eaf81f3e3c27ae17027c

                                                  SHA512

                                                  6095582d9abd5d9cc592a8b098bb0925ce98b85ca436814af4ae0b8b41a5afc76c237453ba1ce68f24c6b11601ab3e118e41a28f50e855bf99c9aa3703206c07

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                  Filesize

                                                  579B

                                                  MD5

                                                  2ebbd61422b78463e73114c90d111185

                                                  SHA1

                                                  96a2a4824b034c487ccfcc08f3d7defa75601565

                                                  SHA256

                                                  164f96175f640e1c88954414f0d6bd4b866e8bc4004221585211df95aaeacaab

                                                  SHA512

                                                  a707e87fa44ddc0f804778e849698b4b9b1a110342a9eb8abcc1a9178019d6424077d6293940adf1b3db80872e42fb70347fb927e7a6cadb2490381fb2f1b926

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  c44ad08b51de2c9ecac4640cae3dafb2

                                                  SHA1

                                                  79d725b829571a8861ffef1c23827733899ab2d5

                                                  SHA256

                                                  2cba6d38d5af3718a3d196251d1e6f46e710868a5448c9eae9d33c723118bf61

                                                  SHA512

                                                  fcc5b2815398c3327cb83ac062dcfdb30140db7b75cc44157627ac60b2d3c1d79f8e538465c8647f1ca3abb13572b91f7c772ece9b71e25ad5d5cca107002517

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  24f2dc90b0b9e1c7127672070b762cd2

                                                  SHA1

                                                  6c3fb51c558c81f3d0d3218cb46deefb0869853f

                                                  SHA256

                                                  9e2e9a385602798964762042f433197f0de9381b4a18dedc8a061c40816e413c

                                                  SHA512

                                                  696a0029b9c8aa46667768d6244bf510dc8b9772bd7f1c9505c03f7b036235cb7042788eb9a9d679b568d6dd1ab953218c7b5ebb9280af540c234f532d28b0d2

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  67aa1d21f8f79667f61876f80ed4f29b

                                                  SHA1

                                                  44c29e1b79ff63b51fc5936fc717dc3e2978b0d5

                                                  SHA256

                                                  c5dcba844fc9353bff47e46d7b634fbc7cc8b58c5bd49af5ee0cb903d87677b9

                                                  SHA512

                                                  78c7ffce1ea4a41b79f17045503c7e19294c8bc6c5f0dcd7b2cbe991bd357ad3fececf7e6e9e49b48b2d0831a33c0bac34498a678759e7a6c51cad15f032c576

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  80a5d15d93321f68e306e6d6aed36d49

                                                  SHA1

                                                  cb759da9e97b5d837b77017ddcd04fe5f8814604

                                                  SHA256

                                                  c86b0e0dbac3a3dbd6dff170cf7d6358750ecc1e8c1ac70e3c07c8bbbdfd0f82

                                                  SHA512

                                                  f29df295c67834a0eccc74aa4f328b2ea539c023bcb117585056e051b621ca5850ecd7654e3760f20ff31de47ea997451f524cbd10abe14d7632df2eb4072838

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  d0e638ee704befb1136c937fe28bf3df

                                                  SHA1

                                                  8f536a7e1d80c6a4b050afded855071d60e4ea6c

                                                  SHA256

                                                  b1ae5ae45049c8baf57fa9129a24a9ab3e0a8229b4f2b13d47567223d87749a9

                                                  SHA512

                                                  c544b937ac066ce5a76dff95eee36c0128ce10827ceeba5ae3930628cf942ba4a318b818a12dadd84fcca8fc44976cae9f11f8b2d8801d064de12d65a2617d1a

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  46dab6362a88a3d81e1a92211a0a5552

                                                  SHA1

                                                  2dc610e36321793db9502e5c7608dee72cca9120

                                                  SHA256

                                                  b0fd32cc98f0b6c9b81b29fd808de546dc9ff13fcfe3d4cb208ced8bab2434d9

                                                  SHA512

                                                  46dae97986ed96843e3ed53e4cca4497d4ee7c1b565480efaa93fe2fb7f8f7fb1af977a199241ab4c8ee1c1b4107a179a44971bf20da891c47fe435a0faf6e8c

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  698e8a744c07632d70e05bd115fc9209

                                                  SHA1

                                                  df45923f1369c8d4fac59f95168160f7795b9dc2

                                                  SHA256

                                                  95cad0c9063aeda405a98a4f457fab48431bdce5ccac40c6326cd5b306b34283

                                                  SHA512

                                                  3644bee03f739b667f2a4c6adf23e6e53e795e9aa9c80b429be6ed9451d7ad99e62423e5852ccb2c8cca9ac2470cfba89c859f846afb7352c943ed2a9e501c51

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  c756d27e5a11c2d6e316d84b164be645

                                                  SHA1

                                                  85da6d07f9b79e7ad5886d5e4f46e0de264fa2e9

                                                  SHA256

                                                  38cd2f97223c67abcf80cac5e4cfddccce827a58d19b9f1481f7f83cad9f01f2

                                                  SHA512

                                                  364549b614fea6a5cc2a847277a642652b71b3e145d8b4cba3736d8d01969cc889976fc4a002d971114bad52e17d5787790ccc315b1efa59b74c33388d57f982

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  e6c4e063d2f2351199aef560a86b83a7

                                                  SHA1

                                                  b0410c2f2b0204264167ec543d9ca33a8c2a895c

                                                  SHA256

                                                  5ab235378e21f1f66d0791af9f08433129f1999ef03589dc3042da100b62d14a

                                                  SHA512

                                                  e4ec66b26cf2126b62bc57a3eacb62d365c1c370f4a9448422eeaa717e0691f081de742f33131e0781d27d9ecf47abf097525745845152915785b3e1c9f9feae

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  9bfbfc25ba415371ca6d1f4047ffd16c

                                                  SHA1

                                                  21239de8adda09c5702e8e100536614549269ec8

                                                  SHA256

                                                  769230105abe7e2d6be14215a296ec9a6354e2328a44415c526363653d0da8e1

                                                  SHA512

                                                  9524b9bafe51f9ee6e8297759bc16faceb5e598d6e25c13068b66ecccfc52007fb79225dea439b82bd458f381797864eb052a34e5431f13c326ca80d6e86e939

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe581122.TMP

                                                  Filesize

                                                  874B

                                                  MD5

                                                  0930a1b7b2cc25626010c72479e10886

                                                  SHA1

                                                  4b78d68ad801d9bd7dfde215d2f8fe1201158b5b

                                                  SHA256

                                                  c54f201160e9e42d2b3a8a344fb640dceabf5c9361b966d503008806046f99a0

                                                  SHA512

                                                  b419b73e7d9652b61606578890ae38d428a819a9fd65b0a51b5c035fd737efb5e6183b10e418a79d51f5227d52f16194b5849b81d0af625a6fe3c57fddc24d3e

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\blob_storage\2d454655-df28-42d4-a29c-8cb267bc6a3b\2

                                                  Filesize

                                                  5.6MB

                                                  MD5

                                                  c8a6b397e68f56121ab7a7283cff32a5

                                                  SHA1

                                                  1054cdfa756d71fa0cbda9ce2f33b57f95784411

                                                  SHA256

                                                  842dfc539f820bb03420efd4edb9e845676bc7edf55945bcf4dc0cb6e8e5af5b

                                                  SHA512

                                                  0ca98bbdef05f97b47c4b03cb8dc8954fa27c4407dbd6a81cf9b618ac19dcd05abc8098be3d6e582046298ec0f04da79eb0dbac67bbc7cf3cbc94244674f7a8b

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                  Filesize

                                                  16B

                                                  MD5

                                                  6752a1d65b201c13b62ea44016eb221f

                                                  SHA1

                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                  SHA256

                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                  SHA512

                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  25f81e6a4d570feb0b41fe7229c6d6f1

                                                  SHA1

                                                  7b9245cdeffaab366c1b69ecdf2d375eca8fb6ec

                                                  SHA256

                                                  b54764b9ce3d9072ed2b65627d3bbad0e6b1485ab1b45f96d3ecfceb8a144eed

                                                  SHA512

                                                  00e55e744d9302b3f5fc37337cf2d2733d93d22a0003782bf0eded9893e5dd1e6834299ae52cdf381141e3c04bd83f5f8bc33904a206c04b69bfc7a6eec2b5c5

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  369fa936fc126d346dd29c9d035c26c7

                                                  SHA1

                                                  95ba296e4e12cdd537088bf96f4ec5be0a5a2d7f

                                                  SHA256

                                                  3711c98e9f614614e0ef0488200f2cf17d3686dd84e661206eefee146151ac4c

                                                  SHA512

                                                  7d10282b6af551511e587800866392f237cca2c0d942c07354ee50ed5e1acb2bd6f76f0bf5afeee72f796355f9cd1637ac80bef80a8c20cd8611a09333d1126b

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  1487e976fee11781d2096b048a0e3378

                                                  SHA1

                                                  34d22d84de1f18751d29be953bbd9ef7bd61bfb4

                                                  SHA256

                                                  a79b789995f4d1b07c31ac4e49e250167e26cf24b22b9ccc768c0c4b0801f47c

                                                  SHA512

                                                  9ca80f58c775a27d99a21705ff68faa5d5edd30b0f22a43f752c72c0585c9a083c5444f5b3ade4c0f5f524b05e22efee34e6c6e7414587a9d0ad02ab8f22ecb8

                                                • C:\Users\Admin\Downloads\Unconfirmed 247763.crdownload

                                                  Filesize

                                                  10.6MB

                                                  MD5

                                                  e9e5596b42f209cc058b55edc2737a80

                                                  SHA1

                                                  f30232697b3f54e58af08421da697262c99ec48b

                                                  SHA256

                                                  9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305

                                                  SHA512

                                                  e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7

                                                • C:\Users\Admin\Downloads\Unconfirmed 29347.crdownload

                                                  Filesize

                                                  53KB

                                                  MD5

                                                  87ccd6f4ec0e6b706d65550f90b0e3c7

                                                  SHA1

                                                  213e6624bff6064c016b9cdc15d5365823c01f5f

                                                  SHA256

                                                  e79f164ccc75a5d5c032b4c5a96d6ad7604faffb28afe77bc29b9173fa3543e4

                                                  SHA512

                                                  a72403d462e2e2e181dbdabfcc02889f001387943571391befed491aaecba830b0869bdd4d82bca137bd4061bbbfb692871b1b4622c4a7d9f16792c60999c990

                                                • C:\Users\Admin\Downloads\Unconfirmed 621755.crdownload

                                                  Filesize

                                                  414KB

                                                  MD5

                                                  c850f942ccf6e45230169cc4bd9eb5c8

                                                  SHA1

                                                  51c647e2b150e781bd1910cac4061a2cee1daf89

                                                  SHA256

                                                  86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f

                                                  SHA512

                                                  2b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9

                                                • C:\windows.exe:SmartScreen

                                                  Filesize

                                                  7B

                                                  MD5

                                                  4047530ecbc0170039e76fe1657bdb01

                                                  SHA1

                                                  32db7d5e662ebccdd1d71de285f907e3a1c68ac5

                                                  SHA256

                                                  82254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750

                                                  SHA512

                                                  8f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e

                                                • memory/6012-410-0x000002B8C15A0000-0x000002B8C203C000-memory.dmp

                                                  Filesize

                                                  10.6MB

                                                • memory/6012-416-0x000002B8DC780000-0x000002B8DD796000-memory.dmp

                                                  Filesize

                                                  16.1MB

                                                • memory/6012-417-0x000002B8C23E0000-0x000002B8C23E6000-memory.dmp

                                                  Filesize

                                                  24KB