Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    268s
  • max time network
    252s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250314-en
  • resource tags

    arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14/03/2025, 22:32

General

  • Target

    https://download2301.mediafire.com/2mu64mh5sbbg7h-4KbXdHh_VCs-e-7F2q6lA8rVkUCgaYGq8WBmdjZZpwuvuAuYb6adpEko9kZXX7mJv3AJBXWgV-iDtEZU5SY8HpXzWohBW_Zl4G_rXinRL0xnWNaickp17hQtzZympqARp9Uj-Yb7x6kIJf6dSlzcgnaCiSw/401sbyp3tyvb4hf/Armageddon.zip

Malware Config

Signatures

  • Detects Rhadamanthys payload 2 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 4 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2580
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5460
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://download2301.mediafire.com/2mu64mh5sbbg7h-4KbXdHh_VCs-e-7F2q6lA8rVkUCgaYGq8WBmdjZZpwuvuAuYb6adpEko9kZXX7mJv3AJBXWgV-iDtEZU5SY8HpXzWohBW_Zl4G_rXinRL0xnWNaickp17hQtzZympqARp9Uj-Yb7x6kIJf6dSlzcgnaCiSw/401sbyp3tyvb4hf/Armageddon.zip
      1⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x2ac,0x7ffac500f208,0x7ffac500f214,0x7ffac500f220
        2⤵
          PID:4924
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1816,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=2256 /prefetch:11
          2⤵
            PID:5300
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2228,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:2
            2⤵
              PID:5112
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2184,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=2300 /prefetch:13
              2⤵
                PID:5100
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3464,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:1
                2⤵
                  PID:4940
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3472,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:1
                  2⤵
                    PID:4896
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4896,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=4956 /prefetch:14
                    2⤵
                      PID:1492
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4908,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=4972 /prefetch:14
                      2⤵
                        PID:4928
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5452,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=5460 /prefetch:14
                        2⤵
                          PID:2256
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5484,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=5612 /prefetch:1
                          2⤵
                            PID:2448
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5808,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=5860 /prefetch:14
                            2⤵
                              PID:3052
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5832,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=5840 /prefetch:14
                              2⤵
                                PID:3584
                                • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.exe
                                  cookie_exporter.exe --cookie-json=1128
                                  3⤵
                                    PID:1676
                                • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5940,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=5900 /prefetch:14
                                  2⤵
                                    PID:4276
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5940,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=5900 /prefetch:14
                                    2⤵
                                      PID:5732
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4916,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=6720 /prefetch:14
                                      2⤵
                                      • NTFS ADS
                                      PID:1244
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=568,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=6768 /prefetch:14
                                      2⤵
                                        PID:336
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4788,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=5900 /prefetch:14
                                        2⤵
                                          PID:1784
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5916,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=5932 /prefetch:14
                                          2⤵
                                            PID:5824
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4320,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=5156 /prefetch:14
                                            2⤵
                                              PID:2304
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2732,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=3972 /prefetch:14
                                              2⤵
                                                PID:1436
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=1984,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=4204 /prefetch:14
                                                2⤵
                                                  PID:4124
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6856,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=6240 /prefetch:10
                                                  2⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:1652
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3252,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=6640 /prefetch:14
                                                  2⤵
                                                    PID:4476
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6412,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:14
                                                    2⤵
                                                      PID:5460
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4748,i,6894942521616801543,13841273517384651769,262144 --variations-seed-version --mojo-platform-channel-handle=5404 /prefetch:14
                                                      2⤵
                                                        PID:4372
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                      1⤵
                                                        PID:5128
                                                      • C:\Windows\System32\rundll32.exe
                                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                        1⤵
                                                          PID:5552
                                                        • C:\Users\Admin\Downloads\Armageddon\Setup.exe
                                                          "C:\Users\Admin\Downloads\Armageddon\Setup.exe"
                                                          1⤵
                                                          • Suspicious use of SetThreadContext
                                                          PID:2344
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
                                                            2⤵
                                                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:6016
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 6016 -s 384
                                                              3⤵
                                                              • Program crash
                                                              PID:3840
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 6016 -ip 6016
                                                          1⤵
                                                            PID:5756
                                                          • C:\Windows\system32\NOTEPAD.EXE
                                                            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Armageddon\ed619d34b2cf492898bb0210483ed57d.txt
                                                            1⤵
                                                            • Opens file in notepad (likely ransom note)
                                                            PID:5268
                                                          • C:\Windows\system32\NOTEPAD.EXE
                                                            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Armageddon\license.txt
                                                            1⤵
                                                            • Opens file in notepad (likely ransom note)
                                                            PID:1096
                                                          • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                                                            "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                                                            1⤵
                                                            • Modifies registry class
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:4348

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            280B

                                                            MD5

                                                            509e630f2aea0919b6158790ecedff06

                                                            SHA1

                                                            ba9a6adff6f624a938f6ac99ece90fdeadcb47e7

                                                            SHA256

                                                            067308f8a68703d3069336cb4231478addc400f1b5cbb95a5948e87d9dc4f78b

                                                            SHA512

                                                            1cb2680d3b8ddef287547c26f32be407feae3346a8664288de38fe6157fb4aeceb72f780fd21522417298e1639b721b96846d381da34a5eb1f3695e8e6ef7264

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                            Filesize

                                                            2B

                                                            MD5

                                                            99914b932bd37a50b983c5e7c90ae93b

                                                            SHA1

                                                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                            SHA256

                                                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                            SHA512

                                                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                            Filesize

                                                            107KB

                                                            MD5

                                                            40e2018187b61af5be8caf035fb72882

                                                            SHA1

                                                            72a0b7bcb454b6b727bf90da35879b3e9a70621e

                                                            SHA256

                                                            b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5

                                                            SHA512

                                                            a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            a38392b2a684ed8aae448408fcc3dafb

                                                            SHA1

                                                            cdf7ca79f19f70c9810a04ae778999676c0fe8d7

                                                            SHA256

                                                            e5d65eb331e2aeee6d1b0a522ea4bfb434a137a894d000e993cd0ba4fa6a97da

                                                            SHA512

                                                            76592962f8e3f48d91dda1d58ed340b6a30863a7ea88a8957149d739cd058318adc5ca422930d1114e58256ea578bf96feec4874fb4814140b257c37e451c0de

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                            Filesize

                                                            2B

                                                            MD5

                                                            d751713988987e9331980363e24189ce

                                                            SHA1

                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                            SHA256

                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                            SHA512

                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                                            Filesize

                                                            40B

                                                            MD5

                                                            20d4b8fa017a12a108c87f540836e250

                                                            SHA1

                                                            1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                            SHA256

                                                            6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                            SHA512

                                                            507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            16KB

                                                            MD5

                                                            72b527090116528d97a824e567bb49d6

                                                            SHA1

                                                            9b98a5f2dd632004d584d4c0701a40a8fc6b1f67

                                                            SHA256

                                                            e8b4d72635db0e502f8663606ed2d2c6c81751ae836d1049df9ad372e1f52bc1

                                                            SHA512

                                                            61dc6e6f9a812e8ca5c9929dd78f3cd406540bdefc18c284d40360ab843e43be78366f1498e6aecce6f7595c4250b3c2ab12d8c0df91aa104aa1053a7dfbc753

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            16KB

                                                            MD5

                                                            5d69848785190d381c7f08a75ac99935

                                                            SHA1

                                                            8453f4bf2b7af284e02f6af8aedbb1861d6c807a

                                                            SHA256

                                                            3de0b42abdcbbd9bb1a4361f0893380e9bb72bce547ec4c7f332704739e8ec8e

                                                            SHA512

                                                            1964155bae9e3a622cdfff0addf4446de4e5559726bee6e1caabea5567b42f414e30b49e47fe9191716708128a3e62b761d868ab1fb934f3583e669948e4ba48

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            16KB

                                                            MD5

                                                            6aa38559d633a1ae9eedf1348dc2f30f

                                                            SHA1

                                                            8e074f11063507240d66b308d4ae814a2d138e4a

                                                            SHA256

                                                            17ffd9f225f67c0b918da746a7b0a4aa751c43a69dfcd898fcf7a43ce1fc3920

                                                            SHA512

                                                            26e9ed577746645670ed8e91a50804da60526db0a9046f6ab37e0e396374462ad19cea01bfcd176bf49a1ae5b7ef55d3fc5dd2b8d21db7e31eab4c34051be646

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                            Filesize

                                                            37KB

                                                            MD5

                                                            ed6bf5ad8435240a624d6d2e4e49ab6d

                                                            SHA1

                                                            9bec9def0aaed67275957cf52a6589991bd3b81c

                                                            SHA256

                                                            e21ed4a17a239dd90dcc8d4aa2a40499482201ce97893c86453e490ec7033112

                                                            SHA512

                                                            c9e9ca5793290d319322a60c3ce358aa44ecc23ace421fe12600c574781223f5aa0d40918dd61740ebfcbb2b159a8ebc5604e3296905b713e436b8e13723f26a

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                            Filesize

                                                            22KB

                                                            MD5

                                                            327fe32483d15cac5838bf6f8e254060

                                                            SHA1

                                                            f0dfb9c4e4fea9223b42c7ebd0c2b092afba5851

                                                            SHA256

                                                            3d698473418aed4346895907252ca7a104700d2abbd3ee55f4f4a4288d890e12

                                                            SHA512

                                                            7ec41a2bfbc637df205dae49927101a984779b5d57f6fe4ebbf66b93283b957ef2f7360ad8b9b4352532d7dd56c27c1899e7442bfac4366b83fd4b9e33a487d0

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                            Filesize

                                                            464B

                                                            MD5

                                                            38c15215596dcce635ed83228080cb0c

                                                            SHA1

                                                            61b22d668e6573fde1c876f2a2b499132d390b29

                                                            SHA256

                                                            f5f98f8e86d7916de0e31426daa2d48ac0e5d7d1d0af6b4329564924c491a70f

                                                            SHA512

                                                            281b8d2ee0157c4232ce2f3ad06503f6195d24c48855ed4392846cf73f1743125185339bd25eae8bc4b91bfc7b7c273a16c11ebeb760bf443bdba1f1bd76f485

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18340.18330.1\json\wallet\wallet-checkout-eligible-sites.json

                                                            Filesize

                                                            23KB

                                                            MD5

                                                            16d41ebc643fd34addf3704a3be1acdd

                                                            SHA1

                                                            b7fadc8afa56fbf4026b8c176112632c63be58a0

                                                            SHA256

                                                            b962497993e2cd24039474bc84be430f8f6e6ab0f52010e90351dc3ff259336c

                                                            SHA512

                                                            8d58aa30613a2376ccc729278d166a9b3ec87eca95544b9dec1ee9300e7dd987326ea42d05dca3f1cc08186685f2fdaf53c24fd2b756c1ed9f2b46436689dc74

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18340.18330.1\json\wallet\wallet-notification-config.json

                                                            Filesize

                                                            804B

                                                            MD5

                                                            4cdefd9eb040c2755db20aa8ea5ee8f7

                                                            SHA1

                                                            f649fcd1c12c26fb90906c4c2ec0a9127af275f4

                                                            SHA256

                                                            bb26ce6fe9416918e9f92fcc4a6fe8a641eceea54985356637991cf6d768f9fd

                                                            SHA512

                                                            7e23b91eab88c472eec664f7254c5513fc5de78e2e0151b0bcc86c3cd0bf2cb5d8bb0345d27afdd9f8fcb10be96feaa753f09e301fa92b8d76f4300600577209

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18340.18330.1\json\wallet\wallet-stable.json

                                                            Filesize

                                                            81KB

                                                            MD5

                                                            2e7d07dadfdac9adcabe5600fe21e3be

                                                            SHA1

                                                            d4601f65c6aa995132f4fce7b3854add5e7996a7

                                                            SHA256

                                                            56090563e8867339f38c025eafb152ffe40b9cfa53f2560c6f8d455511a2346a

                                                            SHA512

                                                            5cd1c818253e75cc02fccec46aeb34aeff95ea202aa48d4de527f4558c00e69e4cfd74d5cacfcf1bcd705fe6ff5287a74612ee69b5cc75f9428acfbdb4010593

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18340.18330.1\json\wallet\wallet-tokenization-config.json

                                                            Filesize

                                                            34KB

                                                            MD5

                                                            ae3bd0f89f8a8cdeb1ea6eea1636cbdd

                                                            SHA1

                                                            1801bc211e260ba8f8099727ea820ecf636c684a

                                                            SHA256

                                                            0088d5ebd8360ad66bd7bcc80b9754939775d4118cb7605fc1f514c707f0e20d

                                                            SHA512

                                                            69aff97091813d9d400bb332426c36e6b133a4b571b521e8fb6ad1a2b8124a3c5da8f3a9c52b8840152cf7adbd2ac653102aa2210632aa64b129cf7704d5b4fa

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            47KB

                                                            MD5

                                                            c03b1f494aff0d1da23938d84f1b442c

                                                            SHA1

                                                            c294c52c1f35db259aecff210ef3aeb0db13539c

                                                            SHA256

                                                            9468ff72238180b007afe7feeedda1a9ff309b3c0b8ce74376f4c6a2a0dece3c

                                                            SHA512

                                                            64e6fc6a8c73dee0ca98f115d436c914b2d88992e92f5528a9203ca53fb4d9c5d11037ad97a94117b2e3b82e7d02f487c2a23c49d4a1eb5a92130ee581655d89

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            41KB

                                                            MD5

                                                            efb3bc126e0854e708a1662b082da26c

                                                            SHA1

                                                            8fae3daf6caafb73a23b61489768b7d7e99a0b18

                                                            SHA256

                                                            df11e6ffd13006f876717d1b6ad54f92f7b9c21fbb82c05a1d29b3b88e33dbc2

                                                            SHA512

                                                            aa1dc2d637e61ec8ad5f2107b6c2cc23101aba44382b8479b8f422163909916e65f5725654c63e2408ecfc59b34249dd5595e01f05d9496adc1bc3942ae3c73c

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            41KB

                                                            MD5

                                                            20891dbc389b03aa70df6508761df9f8

                                                            SHA1

                                                            ce507f83a99ebc565964983d53e47021ef136e11

                                                            SHA256

                                                            21273f59b1c692179d977b5fa5eb1b5c9841ccbd41b9aee5507cb29087c71833

                                                            SHA512

                                                            0377cd3da4c31f3f9655f63249b215788df6b2f0132cc5a0c437c922166dce72d740f35a7266b9fd2bc203cf5bc2fc94fb0ee175c58ca2dc389456427df9707c

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            41KB

                                                            MD5

                                                            6eb7e1672f971013f99eb8c1e0da4370

                                                            SHA1

                                                            7d065b050f8c584755a8a5f8f69202a91b86f188

                                                            SHA256

                                                            6ec8dd1214f11570dfb9fe35ffb48900b490b78fc4c4a2f3cec020cc67cd4cb0

                                                            SHA512

                                                            82fe0be3fe7f5897c1e379bfa20bb5ce4ce1011db836f4f9ef20741d8dd2bf1cdc650d0f7a6d64eb62d949aa69fa63136521fddbbe77a273cb9a4a96e9f78694

                                                          • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                                            Filesize

                                                            23KB

                                                            MD5

                                                            e4502e12eddb65147ccb0c39021d5c54

                                                            SHA1

                                                            e0c340c26168e569ed1b09955e386922b9c76fc0

                                                            SHA256

                                                            ca1d08100dade9a95b1f93a37ac07587d9dca6866a8cb87436aadd5d29c86d6c

                                                            SHA512

                                                            9619f8745eaa0f18f6372258d3e7e068c0347fb1effa578bff7d173d6ee49507610316036c712834f8e336a01e95ba8d6ba8270ae1a439481877cc37b51405fd

                                                          • C:\Users\Admin\Downloads\Armageddon.zip

                                                            Filesize

                                                            8.8MB

                                                            MD5

                                                            a2ca64d2ea68f4dd93ac5452e97e4e5d

                                                            SHA1

                                                            7d6532e6180ad2742174d8db259c2194638d1052

                                                            SHA256

                                                            661993a2088cbb591ec2334b42d0e4af138b4a9a95cdbfcec5495c8e7e6e4348

                                                            SHA512

                                                            056e7f691bb765116febe8fc3982fda700ecdb0ecb7112ed57b7088b088c57522a13c9647bd917da292f6224750d2b6f2a84f4fe3c18f8f4bb85cb6c9ce1551a

                                                          • C:\Users\Admin\Downloads\Armageddon.zip:Zone.Identifier

                                                            Filesize

                                                            26B

                                                            MD5

                                                            fbccf14d504b7b2dbcb5a5bda75bd93b

                                                            SHA1

                                                            d59fc84cdd5217c6cf74785703655f78da6b582b

                                                            SHA256

                                                            eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                            SHA512

                                                            aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                          • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2660_1249197969\auto_open_controller.js

                                                            Filesize

                                                            1.5MB

                                                            MD5

                                                            37237cdd64794745b70286112adbe5ac

                                                            SHA1

                                                            ae43bb55418e091b64f5f612c3317bd105c46aae

                                                            SHA256

                                                            2c69fd6f4fac16c22d4ff9178453ea9d9162fd08d6393151d66ae3d2c7841591

                                                            SHA512

                                                            2126fb80632000867c53cb91ac85925d650e00a0e43cc173a68a1e247e5d6bcdd9b6d4428f59bd89a8a7842031bd44496e1289d4ab6209913fd968fc699a11f1

                                                          • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2660_1249197969\manifest.json

                                                            Filesize

                                                            145B

                                                            MD5

                                                            0df2306638bd60162686e9c4bafbd505

                                                            SHA1

                                                            ef9e16bf867f7950d5a30172e1d34d38686b0e72

                                                            SHA256

                                                            fd7b554588c5e72506a0bfed89bc298911a5649b9f5168ad7c1804d1c75de42e

                                                            SHA512

                                                            73fca229097631104cf352061d62455b6c5520bf59777520165719d2368b0e77f3ce66f52873fec53ac60e35274bf397ba321bc62610f0b7b172a7c5c4975174

                                                          • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2660_1682918753\manifest.json

                                                            Filesize

                                                            1003B

                                                            MD5

                                                            578c9dbc62724b9d481ec9484a347b37

                                                            SHA1

                                                            a6f5a3884fd37b7f04f93147f9498c11ed5c2c2d

                                                            SHA256

                                                            005a2386e5da2e6a5975f1180fe9b325da57c61c0b4f1b853b8bcf66ec98f0a0

                                                            SHA512

                                                            2060eb35fb0015926915f603c8e1742b448a21c5a794f9ec2bebd04e170184c60a31cee0682f4fd48b65cff6ade70befd77ba0446cc42d6fe1de68d93b8ea640

                                                          • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2660_1949678967\Notification\notification_fast.bundle.js.LICENSE.txt

                                                            Filesize

                                                            551B

                                                            MD5

                                                            7bf61e84e614585030a26b0b148f4d79

                                                            SHA1

                                                            c4ffbc5c6aa599e578d3f5524a59a99228eea400

                                                            SHA256

                                                            38ed54eb53300fdb6e997c39c9fc83a224a1fd9fa06a0b6d200aa12ea278c179

                                                            SHA512

                                                            ca5f2d3a4f200371927c265b9fb91b8bcd0fbad711559f796f77b695b9038638f763a040024ed185e67be3a7b58fab22a6f8114e73fdbd1cccdda6ef94ff88f3

                                                          • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2660_1949678967\Tokenized-Card\tokenized-card.bundle.js.LICENSE.txt

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            8595bdd96ab7d24cc60eb749ce1b8b82

                                                            SHA1

                                                            3b612cc3d05e372c5ac91124f3756bbf099b378d

                                                            SHA256

                                                            363f376ab7893c808866a830fafbcd96ae6be93ec7a85fabf52246273cf56831

                                                            SHA512

                                                            555c0c384b6fcfc2311b47c0b07f8e34243de528cf1891e74546b6f4cda338d75c2e2392827372dc39e668ed4c2fd1a02112d8136d2364f9cab9ee4fa1bd87f5

                                                          • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2660_1949678967\json\i18n-tokenized-card\fr-CA\strings.json

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            cd247582beb274ca64f720aa588ffbc0

                                                            SHA1

                                                            4aaeef0905e67b490d4a9508ed5d4a406263ed9c

                                                            SHA256

                                                            c67b555372582b07df86a6ce3329a854e349ba9525d7be0672517bab0ac14db5

                                                            SHA512

                                                            bf8fa4bd7c84038fae9eddb483ae4a31d847d5d47b408b3ea84d46d564f15dfc2bae6256eac4a852dd1c4ad8e58bc542e3df30396be05f30ed07e489ebe52895

                                                          • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2660_1949678967\manifest.json

                                                            Filesize

                                                            121B

                                                            MD5

                                                            fde1edabd926edaf85bd8dcfd6d26f0d

                                                            SHA1

                                                            380c447a4df3871885c99d926edd1e689f247b99

                                                            SHA256

                                                            3bab6a96aa24d25d5f838199dff00837be00480f92a559d30a24f67334e02a2a

                                                            SHA512

                                                            acc5b7ee98a6652a74477d2a9b295ecdacfd0182b75931653d373fdb15c52d1d869bbe3a41e4a79db36ed91ed55c39c47526268b56b123e9b7f19479bbe8dc13

                                                          • memory/2344-200-0x00007FFAA3EF0000-0x00007FFAA4A22000-memory.dmp

                                                            Filesize

                                                            11.2MB

                                                          • memory/5460-207-0x0000000000F80000-0x0000000000F8A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/5460-212-0x0000000076960000-0x0000000076BB2000-memory.dmp

                                                            Filesize

                                                            2.3MB

                                                          • memory/5460-210-0x00007FFAD8920000-0x00007FFAD8B29000-memory.dmp

                                                            Filesize

                                                            2.0MB

                                                          • memory/5460-209-0x0000000001800000-0x0000000001C00000-memory.dmp

                                                            Filesize

                                                            4.0MB

                                                          • memory/6016-204-0x00007FFAD8920000-0x00007FFAD8B29000-memory.dmp

                                                            Filesize

                                                            2.0MB

                                                          • memory/6016-206-0x0000000076960000-0x0000000076BB2000-memory.dmp

                                                            Filesize

                                                            2.3MB

                                                          • memory/6016-203-0x0000000001020000-0x0000000001420000-memory.dmp

                                                            Filesize

                                                            4.0MB

                                                          • memory/6016-202-0x0000000001020000-0x0000000001420000-memory.dmp

                                                            Filesize

                                                            4.0MB

                                                          • memory/6016-201-0x0000000000400000-0x0000000000481000-memory.dmp

                                                            Filesize

                                                            516KB

                                                          • memory/6016-199-0x0000000000400000-0x0000000000481000-memory.dmp

                                                            Filesize

                                                            516KB