Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 15:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/knl0SZjb#rNGJxxlpLfD8fEcm1-Q-j1LLwutjtwz5GhOcuDMcmRE
Resource
win10v2004-20240226-en
General
-
Target
https://mega.nz/file/knl0SZjb#rNGJxxlpLfD8fEcm1-Q-j1LLwutjtwz5GhOcuDMcmRE
Malware Config
Signatures
-
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings mspaint.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 6028 vlc.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 4712 msedge.exe 4712 msedge.exe 2484 identity_helper.exe 2484 identity_helper.exe 5760 msedge.exe 5760 msedge.exe 5936 mspaint.exe 5936 mspaint.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5512 OpenWith.exe 6028 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 4604 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4604 AUDIODG.EXE Token: 33 6028 vlc.exe Token: SeIncBasePriorityPrivilege 6028 vlc.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5936 mspaint.exe 5512 OpenWith.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe 6028 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4712 wrote to memory of 2600 4712 msedge.exe 84 PID 4712 wrote to memory of 2600 4712 msedge.exe 84 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 4328 4712 msedge.exe 89 PID 4712 wrote to memory of 2940 4712 msedge.exe 90 PID 4712 wrote to memory of 2940 4712 msedge.exe 90 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91 PID 4712 wrote to memory of 4444 4712 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/file/knl0SZjb#rNGJxxlpLfD8fEcm1-Q-j1LLwutjtwz5GhOcuDMcmRE1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c04c46f8,0x7ff9c04c4708,0x7ff9c04c47182⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2556 /prefetch:82⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:5528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4622179242202781207,5656178483678255878,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1692
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2c8 0x4801⤵
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6132
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_صنع_فيروس_الفدية.zip\صنع_فيروس_الفدية\1234.jpg" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5936
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:5948
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5512
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Temp1_صنع_فيروس_الفدية.zip\صنع_فيروس_الفدية\كيفية إنشاء فايروس الفدية.mp4"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5d08a78f103b5aa2be66693a66e3a922b
SHA1b87de9d812b03fbe25e4ddd74aff0b81934cb9a2
SHA25675818fc984450445cbd551d0f992a1ef0cdfdf295adbc3e2f4c082f5b13b4724
SHA512940786236e4912493b0e2ad72d3b3862f30048e4c1c2daaf9887608501fee42338a42bc45ac9bb08160dcdc5f33859f5d3cbb58c6803dc3ef82a70a7146ce1b8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
188B
MD5008114e1a1a614b35e8a7515da0f3783
SHA13c390d38126c7328a8d7e4a72d5848ac9f96549b
SHA2567301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18
SHA512a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD555e7457fa4c3b20d2f83747b3a9f0194
SHA1cb18b32318cb14d64c68440c1ecba3a280dababf
SHA2561d0e878d561312e68626ca6cffd521057fcf14097984ae3c72edcdea2298dc27
SHA5129f0f7fcf328d96dd06bb204b75fa8272766ec712bffebc8bec701ec28957399677dfa0cd203e73760fdd05760d6e3a71bfd8fd3ac93825182da41575f9c68354
-
Filesize
6KB
MD5204020b0ec2209886640d8ce55dc227e
SHA16c0ce1fc2d2556abcce7e3a6cbce42c5cac30225
SHA25600e704a1939e69c9eae6e6a80183e592be1b0a41568d41d834f0087a6a26b80c
SHA512a491a87182c0335421c4738d3da6857ffca296dca7ebda22c32bb090ebb3606ffacf054ca54ae473b1ee34bcbcddf989ba02aa5d0a8951b7e4b88700b4c9eb0d
-
Filesize
6KB
MD5cac47dd7d19d369c707f87d95a1d769c
SHA1da63136e8d72ef624cc243ebb836c82f2c0c0aa3
SHA2566a9d834c2ee209bdb605edfdfc5936bc142e87c6cbf3079dd4c40565dc022a73
SHA51297816d59abbc26864ed4a7eb9cf9991cf71cbf48b5fbfc752f89a2943ee9751e301dff93bad52dfdc9ea0215d660e31404d4feaaeeda54c52b69882a803d22ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5b5332ad1a6d7ba5be0a21589cee979e4
SHA1bf7e2d761d816d6115421477266fa850bba748ed
SHA256b849ee0cd6358c4a6adcda5387b9894a4da73a7b8d80423592a9b7499b9238dd
SHA512e81658a4f339b868fa325fdbba4b51569019ab42a23336629ca20658424d5d8106ae7aca5e6db6380ee04cce92b3eb70b9645c0d0cbe34c45f068e41fb580874
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57aaf5.TMP
Filesize48B
MD517d589a9ed7d648e449508bc90ac7d7d
SHA15378dbadc368d3b056e45d8e0e11d9d35698709d
SHA256aa0be585bdcba12afbf9ade27e400f5883ee98e470d19901c1a20d9ba35498ce
SHA5122ec2cd2bcc2bce6ead49c8cf51fc3e92335a487d5f258c735908a6055947d5723d298b5349a26ca309a109d6070427f2e1985032b9ebde91bb037793b69e581c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD598eada385287eb5f68f334634fcc2175
SHA11f4229b758d6b9bebcf107673a2e217c1c17ccee
SHA2560009aff74a24c8e4441f8cc31d34296aa524deb477ce8186617c388a412d69d4
SHA5129d3c9e2962651e19226a7bf71dc71d2f7e07ce5707b0a468ea3c4140cc3c6132aa8cfa3145ef761886e532d1d007d3bbf768cbbf0f1aa3d1d706e3d235a6ab15
-
Filesize
11KB
MD5cc270f48f708c030daf92a27c8e005d0
SHA1e9633f478336dc48d53d49f69deaa1de27805037
SHA2564cbfb277518b8fc56be0c4f3ce00a51dad6f5e747bcb6708d6ac9d8e79b419e0
SHA512ff517b09961beb7d73e61b4ae1b8517c26a222ed035ba0a640d2a329bb16de656038e1506a254f3d5925ce313e05a66342411596a4fad451e2d882cc0c080788
-
Filesize
10.4MB
MD598233f007b65c14ed68014fdd5575f76
SHA1f40c76dcf6dde9667d81c1c6eac4084debe92c54
SHA25640b5a24c5a2dd104cdd3eecfd7ee8b2fd4ef6a2a69fd99ce208be5cfa4ba1499
SHA5127628fcc3913a5923dc670d028f0b5638780093bb09c4c0ec96559903ff4fc3b6cf4b6259b8bf21a98ce5ae40b47343f1820f394303d4e793d8bfa9566b168ab2