Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

07/03/2025, 11:40

250307-ns449szp17 10

07/03/2025, 11:36

250307-nqnphazpx9 8

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2025, 11:40

General

  • Target

    test.js

  • Size

    32B

  • MD5

    c1d823b1ffe895f3649866762ab72a9c

  • SHA1

    3364ff687f85ac9abf338334a2824de6e1b6adf2

  • SHA256

    11cd2cbf2f7c8b3a02402aed347152e817bcaeb219485956f70fe419e34d751b

  • SHA512

    ec2d3dcc3a29ead8c445e2627b35ebb99fefa49946a25c5431604be3524713ab1c254b237ea59495722b29455d504b7b8ec1c7f80b8106a95c478c178e4bf557

Malware Config

Signatures

  • CryptoLocker

    Ransomware family with multiple variants.

  • Cryptolocker family
  • Downloads MZ/PE file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: LoadsDriver 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\test.js
    1⤵
      PID:2628
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
      1⤵
      • Enumerates system info in registry
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4704
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6ee446f8,0x7ffd6ee44708,0x7ffd6ee44718
        2⤵
          PID:3508
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:2
          2⤵
            PID:924
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:3
            2⤵
            • Downloads MZ/PE file
            • Suspicious behavior: EnumeratesProcesses
            PID:4724
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:8
            2⤵
              PID:3988
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
              2⤵
                PID:3492
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
                2⤵
                  PID:2556
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:1
                  2⤵
                    PID:724
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:1
                    2⤵
                      PID:4732
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3572 /prefetch:8
                      2⤵
                        PID:4924
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3572 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1776
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:1
                        2⤵
                          PID:2740
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:1
                          2⤵
                            PID:3328
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:1
                            2⤵
                              PID:4248
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:1
                              2⤵
                                PID:3444
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:1
                                2⤵
                                  PID:2576
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:1
                                  2⤵
                                    PID:1824
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:1
                                    2⤵
                                      PID:4312
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:1
                                      2⤵
                                        PID:5516
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:1
                                        2⤵
                                          PID:5524
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1964 /prefetch:8
                                          2⤵
                                            PID:5180
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:1
                                            2⤵
                                              PID:3516
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6384 /prefetch:8
                                              2⤵
                                                PID:5872
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:6128
                                              • C:\Users\Admin\Downloads\CryptoLocker.exe
                                                "C:\Users\Admin\Downloads\CryptoLocker.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • NTFS ADS
                                                PID:5484
                                                • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
                                                  "C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Downloads\CryptoLocker.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Adds Run key to start application
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4204
                                                  • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
                                                    "C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000021C
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2024
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6764 /prefetch:1
                                                2⤵
                                                  PID:5364
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,532135915135828988,6794763319162573625,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3076 /prefetch:2
                                                  2⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5796
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:4976
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:4276

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    ab283f88362e9716dd5c324319272528

                                                    SHA1

                                                    84cebc7951a84d497b2c1017095c2c572e3648c4

                                                    SHA256

                                                    61e4aa4614e645255c6db977ea7da1c7997f9676d8b8c3aaab616710d9186ab2

                                                    SHA512

                                                    66dff3b6c654c91b05f92b7661985391f29763cf757cc4b869bce5d1047af9fb29bbe37c4097ddcfa021331c16dd7e96321d7c5236729be29f74853818ec1484

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    fffde59525dd5af902ac449748484b15

                                                    SHA1

                                                    243968c68b819f03d15b48fc92029bf11e21bedc

                                                    SHA256

                                                    26bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762

                                                    SHA512

                                                    f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    70413ce44ef31ef13b0d7ac8e65948bf

                                                    SHA1

                                                    63b08e51819a9b60231a1e9395abd38050e92a40

                                                    SHA256

                                                    9b9dcc6fff7eb8b24b6fe45c29c184b4c6e61bcd5e3d88eb734dff7a3b06168f

                                                    SHA512

                                                    a6b8368fcaeef82cbd0efdad5389a4caa8f7500f775f88d1335126f468cb63ef2bb1c8203dabcc5e6c4f7e2dc36f39b9cc152a65a8c625bbb7a403567b8544b3

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    940B

                                                    MD5

                                                    0a0bfaf44026efa4d47e90728fb02b38

                                                    SHA1

                                                    f2c4c893790777269ce44776b49f1ac408ae0249

                                                    SHA256

                                                    5ffb41bf89095b99087b11105d804275fecdc02ca1cc13ff0b756f13a5394689

                                                    SHA512

                                                    d11aff1f1d40063469bcc0a5720137f9c596a9943a1cac6747c3dc08f10b52775f7d213076b5ae37fd07384914f8c4bd7f735b765a72fb0fdbfddad0a114cc14

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    7KB

                                                    MD5

                                                    64c8bdab6abd9a75468b312cf22e4802

                                                    SHA1

                                                    f6b257a83228fbd80f6a9ec33ba4625a4076cc5b

                                                    SHA256

                                                    59e271747839c6485efd94a9224db4d41b57a4c2898fe88003b1cd6e707332b2

                                                    SHA512

                                                    f8dd3ca7d418ebe93fbb8c9641d8f3d516930db55685904e54158f15499837068ce68d333798343c48302cc4186a029c844e230a6c0b575c5ff43b95d6e8372f

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    1e833f50a2a61591b558f2fb305a3f26

                                                    SHA1

                                                    5159aaca019905c6191ac1cec028657dc48eabfd

                                                    SHA256

                                                    1bee9744137ad28dd5d2f6b7fb8ea8449a17e8c08ec66d6b48256447b9abe3f5

                                                    SHA512

                                                    c85da6ef2c8b150b0c7cbe26193fb39b83fdc9da51bbd02ae8e6e1136c65cb0dc85f78bfc1cc4b78f3a8072d6bdd3db209611155452802c626fa204c2e2479a2

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    0bb523f23cc491dd3124dbc26551e68a

                                                    SHA1

                                                    59eca1b7fa0780cc458d13fce3ff560d47462551

                                                    SHA256

                                                    89ae87a87203cc06c7d870abe623847cd7a93c28eab4bb55f5543927a850c3b4

                                                    SHA512

                                                    01dec8e166484c5917dc56670229dc50346dcf43b74e9c529ce3c24d27ecc5476a351b3d712cae3573741d721a4ca31ce9620145ecf73d90f530d76764069aef

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    e5df699c8c1d12bf6a04089ec61f5c1b

                                                    SHA1

                                                    cc519bf970f6fd272d629ff3cfd70e79765802cd

                                                    SHA256

                                                    ce9aab10335b192d8557602116399f47b4bde530eea0684b795a4c55327eb69f

                                                    SHA512

                                                    11564e8bf8bd95420f96c4fd0b4c4b191138a6fb14cf574efab44dc49127d0c6fab22528ea5a5d4b8114a2aa7e5b5a57496f7f4b8dbee11d4f21133f02298cd7

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    1b970c3b6f93c4ab225d0ce95fd3415d

                                                    SHA1

                                                    589af3bf3c864f585bb36a9aa83748017f9ebe55

                                                    SHA256

                                                    9ce92a0d75f8e89aee52412cbdf09824df04c7c294fc3c416f8d15fa844b04a4

                                                    SHA512

                                                    193104e48517ea9fed65dca53d56eaf222ce7dc808c38907bef5f963b6228a1f2146e9695cc8bc3ec7d8c21e0cc316c7c02f748b699a758f9c8cb6b5e82580b6

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    82708d677948aa644cd272cdfbfeccd4

                                                    SHA1

                                                    722248c800edaa47bfb1384148152dddc9a204c3

                                                    SHA256

                                                    9e5afe2be8e511c71ead3f692ce8fcbbe3945419259070877ce7b06d5e150eac

                                                    SHA512

                                                    7b7189dae87088063c0e1295d5883102ad7f1abf13e086ae9944cd2a45c7e1aa04986a2ee0bcc5dcdb636cbd0c9bdf7ab5a0352a571e99f399986e37ceb6a9d9

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    f603dc19cba64ef58eb68538d2dd84c8

                                                    SHA1

                                                    aeeaf7cc02db2a9a55db0f74a4d3d5329fa44070

                                                    SHA256

                                                    3a392573a54cd9ab71849240780eeccd1b33074b393ccf8c67af8f77a6face42

                                                    SHA512

                                                    28f3377406c13cb633d2bed850eaa15873889a066a09ddd9b938a45302508599c8d484e672005bbe1ad66a114b859c5222f40eb480947c83ea1620c021e7a1ce

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    e0d772416369bdeaf2d4c7b71f6ffba9

                                                    SHA1

                                                    695848f4108d9e33b542c40cee14f41971a383f7

                                                    SHA256

                                                    b4630e46f62a48025e8293cf9cd2e5824b9c71c0652f0e933352d488c8f99b5b

                                                    SHA512

                                                    bcf6602d8c9d9674b720356972c54fd8e76329da7c3b92b4ecfd68ccfc70fc7cd2466b1fa2e69e1832d40975d70c846901e4a2ccb499197d950c6c018d052b9d

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    c46cc580871937f7856ebb8847b1f1f9

                                                    SHA1

                                                    17ec1e882c8c8a7d79ff8a5d922239232fea2a11

                                                    SHA256

                                                    2fb74b77d748601244c92ae4ac801ee2b0d755511c4fac0853198001f87b1972

                                                    SHA512

                                                    f111e65d9cd5512ed29a7db9b6683441cfc1cd4965de94897c9fc28f46783a2580a38538c5b39927956de56080ad7c2691854a8bb57933565a1a8cd4b129c7a0

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe581a98.TMP

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    8f026b41802144f63fc2048b7b8f0baa

                                                    SHA1

                                                    020b204bcf608793b8d68cbb1f276da11b03bec8

                                                    SHA256

                                                    a9ad74680ecc3872c08b728e9d5ffbc72739c47cd92c7ae1e9421a582f72db8e

                                                    SHA512

                                                    5f761c2c010911da0627d54682ca0d28abf10977414b57173cda455d337b0d8925080a75d6d9828d0d24bec128399b4fca30e1eb64a2c75ceb301d677648b689

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    6752a1d65b201c13b62ea44016eb221f

                                                    SHA1

                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                    SHA256

                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                    SHA512

                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    12KB

                                                    MD5

                                                    a814aad7517888665757ab6827b6538c

                                                    SHA1

                                                    4aa460b36752a671221df6dec87b17e236eb70ff

                                                    SHA256

                                                    cf741dd42b4fd23662b384b2771d7f2c99e86b897a8c966618fdaa678474b667

                                                    SHA512

                                                    cfdc2dcdc60566f539e8ccf1e373d47d91cf7ffcf8cd1818f78bb3c7bfea1f2ff4bce90e5017165c0e5beb18055c904ff25b20cd1ea84c2971b025759540f682

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    f93b49ef172915fb030ee8155b042f84

                                                    SHA1

                                                    c2e4a5d59f2cb32eef8db6fc654b60ccdc99ef19

                                                    SHA256

                                                    05b6a6a2cbec330575fe22c44ea1a8d8b1ddf785e1a5f08e1016e6a4bf260200

                                                    SHA512

                                                    373966fba782c48cd4eaf57e0caf8d4bc1705c3aa51a913cd69629148d1463bc3c9f702ff699edc2d267a048841db3925e3eaa8c727f57f45ea0c696e96a7358

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    12KB

                                                    MD5

                                                    50da9d990bcd10d8673f28b09f499a8e

                                                    SHA1

                                                    636ac78aeca8ec8276438dd2c3785364e9e7b6aa

                                                    SHA256

                                                    02a543c5b2cc82a33531f9f34f46e28e9f92d2e5e8f5c5bf743e3c04b24613c2

                                                    SHA512

                                                    f348c01e9719162f714808dd31abc46afca4fb57c2015d3f5a68cb1524f393805c5613aac08457fbbf16bc715ac58ff92294efc9e84093bc75f1d9cc6bbaf88e

                                                  • C:\Users\Admin\Downloads\Unconfirmed 83997.crdownload

                                                    Filesize

                                                    338KB

                                                    MD5

                                                    04fb36199787f2e3e2135611a38321eb

                                                    SHA1

                                                    65559245709fe98052eb284577f1fd61c01ad20d

                                                    SHA256

                                                    d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9

                                                    SHA512

                                                    533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444