Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
816s -
max time network
823s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 19:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://https91.222.142.186.com
Resource
win10v2004-20240709-en
General
-
Target
http://https91.222.142.186.com
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation AnyDesk.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation AnyDesk.exe -
Executes dropped EXE 3 IoCs
pid Process 4808 AnyDesk.exe 2712 AnyDesk.exe 2444 AnyDesk.exe -
Loads dropped DLL 2 IoCs
pid Process 2444 AnyDesk.exe 2712 AnyDesk.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\U: mstsc.exe File opened (read-only) \??\W: mstsc.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\L: mstsc.exe File opened (read-only) \??\T: mstsc.exe File opened (read-only) \??\B: mstsc.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\V: mstsc.exe File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\N: mstsc.exe File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\Q: mstsc.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\X: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\K: mstsc.exe File opened (read-only) \??\P: mstsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDesk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDesk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDesk.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\TSRedirFlags mstsc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 34 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" mstsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" mstsc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" mstsc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" mstsc.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ mstsc.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 mstsc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" mstsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" mstsc.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg mstsc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" mstsc.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings mstsc.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff mstsc.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 mstsc.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff mstsc.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell mstsc.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags mstsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ mstsc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" mstsc.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 mstsc.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 mstsc.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 mstsc.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff mstsc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" mstsc.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1176886754-713327781-2233697964-1000\{FCE49566-37B0-4F15-A4D5-451A00F17714} msedge.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU mstsc.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff mstsc.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 mstsc.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} mstsc.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 mstsc.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 mstsc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" mstsc.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell mstsc.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots mstsc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" mstsc.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 902001.crdownload:SmartScreen msedge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5732 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 668 msedge.exe 668 msedge.exe 3328 msedge.exe 3328 msedge.exe 4568 identity_helper.exe 4568 identity_helper.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 4648 msedge.exe 4648 msedge.exe 312 msedge.exe 312 msedge.exe 2712 AnyDesk.exe 2712 AnyDesk.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 380 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 380 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 45 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 5732 mstsc.exe 5732 mstsc.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 2444 AnyDesk.exe 2444 AnyDesk.exe 2444 AnyDesk.exe -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 2444 AnyDesk.exe 2444 AnyDesk.exe 2444 AnyDesk.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5732 mstsc.exe 5732 mstsc.exe 5732 mstsc.exe 4808 AnyDesk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3328 wrote to memory of 3176 3328 msedge.exe 84 PID 3328 wrote to memory of 3176 3328 msedge.exe 84 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 2696 3328 msedge.exe 85 PID 3328 wrote to memory of 668 3328 msedge.exe 86 PID 3328 wrote to memory of 668 3328 msedge.exe 86 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87 PID 3328 wrote to memory of 2100 3328 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://https91.222.142.186.com1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf1aa46f8,0x7ffcf1aa4708,0x7ffcf1aa47182⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4064 /prefetch:82⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:5820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5540 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:5416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3044 /prefetch:12⤵PID:6056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1672 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6404 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1904 /prefetch:12⤵PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6908 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7228 /prefetch:82⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2188,5157073685402652335,3274663572844214,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:312
-
-
C:\Users\Admin\Downloads\AnyDesk.exe"C:\Users\Admin\Downloads\AnyDesk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:4808 -
C:\Users\Admin\Downloads\AnyDesk.exe"C:\Users\Admin\Downloads\AnyDesk.exe" --local-service3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Users\Admin\Downloads\AnyDesk.exe"C:\Users\Admin\Downloads\AnyDesk.exe" --local-control3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2444
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2448
-
C:\Windows\system32\mstsc.exe"C:\Windows\system32\mstsc.exe"1⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5732
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x40c 0x33c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5f20abb3af38d0e5ef45030236002cfa5
SHA1ffcc601cf2533774201d0e3f803ff496a26bd1a4
SHA2567c7c3e1a7caf6c28c2f62a65c9bacdf620c17b73e4a5425253f7c36a4a65c7fd
SHA5125872dbdb152de12bc8a8432e914766fffb86cc4af335c9f84f26671a5721cfb7448578818e41f4d11374a331d9ec681f65c98d7a30bcd844b55f621fea7c9e15
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5cefe5fa7e088d65d028a9a428b4611c6
SHA144abd30314b2e795648e6b1d18bcd151154ffd36
SHA256322b0c1cc3d325d97abb082d89655c7b134d33040832632e1368851005202ff0
SHA5124610895bf1870b7f5740269d34aa19fd5e8c4cc82f0f9accc0fe83ef03305ea9cd63d0e5c1fbc34ce3b9de210a86efe61deb10b5108a6e09f849b2eeffb71e8e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5b14387b35fd76e24e0065459acd4da49
SHA1254051a08176e611c2ccdb33b2689fcf77579d4a
SHA256527c6683b973adcdd8c0a9e744ad9f197c32aefc1c4cef66e38efb2b40dddcf1
SHA512cf6296f3bc8c542d10087d3039991312e863fb1b0e08b3c7fa7762357818584f2acc7fd96786ef801cabc8a9b5e721a3d3ee5f2af61c7f6697e396325dc61a3c
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
4KB
MD5f6595f7547e64a72061377d7fb69e71a
SHA1987c1ec960a5ca51736fa6afe39ba8ee993199cc
SHA256453242b393f0351311f0340d41295f5f130976740418f20695399e0c51a05b05
SHA51217fe6193a48d4ba1d60b6f215de6c9edcbfa5385508b46e73299109c8ce342441452aa670634be1020b5ed337677f281c814d6f1dd3fbb9e9b6118e3ea8d9e46
-
Filesize
6KB
MD54c96d7da389ba9245f6393e3aa74f825
SHA1f26ed4291df42a93e65c2b0d410415ba6fecadc6
SHA2562eff1563d7a0f3148679623b7b6eb0fc0043a4bd7f7492bc89c0dba8ab29ac51
SHA5126348f3a0c410c99067f41d4e833b179771dab0fe593e7762883c9ee676427124b00f8f9a3f0a9698c038e52799639eeece59eaa88aa15e5acf39ba77de74ba00
-
Filesize
5KB
MD58e553541e2cbbefa35068fa5f43aafef
SHA14e1041894df43f16792d868f265a64f0015cf384
SHA256fa541b73e82e44e77b677bcf984d467d2316310839767b8232b72e7491ae4a60
SHA5122be59cbbe17ffb68657b5e35735ca09a0395a29e5cf648f8d2eeff8631a29009bae857b063f1d2516507bb0c37cdfc8f43930d8b237433a6d1ece7d445643501
-
Filesize
9KB
MD5589f4cc6cae6a21cf4396f24b116c8af
SHA175a3d7620ce33e822ef9e63488f263e212d8051c
SHA256f0a7b40288678042ef6fe4d726d55452fbf37fb37878f134db9764b10fcb7e12
SHA512b26c917d43dcc719d2a437e9755c7bf44a41e73cbda8f050781698bf325ae028ee98b66794c1ae0ad20adc35b8c1f6cf464cf378d3ff3983ada5e8d89d30b624
-
Filesize
7KB
MD5f5d4f0b7f841bcea8df1b7bb3f6c8387
SHA16fbf0dc8196c8b07a5fbe62e0187365de6afa870
SHA256437985ea0b9d5e314f83c8306b04b6ad46d777f4e43aebb044dbcb6de4b1c570
SHA512d8e56bcebe4fc6e37f9dc1de09efda60eca32b52bafaa03352dee0a6b540a3303bab7b3af690dbd372042d26e3dbbc5aaf58f0a3f142f45e6a34286b9e9a07a6
-
Filesize
6KB
MD5ec821b3cb84e6d5aa3df7bc7e5e8d743
SHA1b84e2b8e6c238397b51718668a303d662a53f7f9
SHA256075e7f142e3e81ac2c0fef8851b4fce3f63150ef506db378beee3274e8df30aa
SHA512c0257fda8ccb62e936649904d806714bfff929e0e1d26c0fa90b1ce3cca6272a975958b865a718e4906662e2cd060a1ebf9be92be1eaa6f8bbefb06eabc2d57b
-
Filesize
6KB
MD5a0deb2717bbe1525cab1db186b5b2844
SHA1bf128031068436eba6bcb347a1651ac6184e1764
SHA256261f3d38375fecd8e4199173a85a3b674ee91f2c64f2157b0c98cdafe50bb43e
SHA5125d798653aa488a91884efd0b0bc401953916866dbe1a3c11d42a6978253b9cafc6d04f93b9f5d344bde7ade721a252127d0bc2a2b5a262ad76b80d0eccb7ccab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\ae689a2144e9e24bc49282f4757ca91c0bf7f5f1\index.txt
Filesize86B
MD548ecd93529ef321fa3d3b3a94d1c51b9
SHA1c51d2483cc8ab7ba364f1f3d0f1ec954557973de
SHA25647f1a55da880e2245e2caffc50fdc1f0ec7e425fa350f1c8fc1455ce9a09d45b
SHA512ed8b0ce69e851eb76566d86545d5002fac2398c81dd9c7c3a603dbe64bd7175730861b3235d1c44e1d04843954b3ebd2fb03fa185800c98b45f155779fe3d888
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\ae689a2144e9e24bc49282f4757ca91c0bf7f5f1\index.txt
Filesize79B
MD5a95ea86d6938519fba04b4f359548855
SHA1f3d02f5fbcaac7d97bb76551e05636603e41b0a1
SHA2563d389d7d7a774f3b4915800078842a603dd9d3a6ca3e05334d2cae422583263a
SHA5129c4b0737cd29f6559246d38732de61032f55b0b20e2308b0041858a0404de4f9a7a00f78d21f315289fb20be96c8ea3f4bd33610d11be9db84e2e0d4d03d40a6
-
Filesize
3KB
MD5aa90c8733ff9bbba1e171db8b43daf4b
SHA15ef083d41de120b92c8dc88c51ac3ce7d36584bb
SHA256cc9fdcefa8a775a132af71f8ea9bbb777ef29ab881d025110404693c13c43f28
SHA512629410ef94349fe70cc57d487b4fcc423d64898b0374dbffc73c8a1f20fead134ac6c01f04a32fe5380dbd6df1cbb159d88f29eb2974ae641a2172c68d845fc1
-
Filesize
3KB
MD55ba8ad18c8e5f91ba56bebd44e5ce065
SHA1d8b186ecb3d5a620bd59860da4b7a285079ef164
SHA256e68f6bd7dc746fb392c97d930be09294111de175ca3d2e0d0cf9f0033504d22b
SHA5127a9d81de5e0ac3a2001026c4a7ba950f130eac2933642b91bc0c92acfc2c941fe67f5ab13f4eb550dd3f8f7d3b29a32f627e34ba03c87ed6234b0ef605dc2c15
-
Filesize
538B
MD52f7fe45eaf823806bb3541c3f4319317
SHA10406a28956c85e163bfd0a99fe1643978a7abd85
SHA2564763ace5dc431700448a3e5a6683663f5eea48747036a2b8c91037ff3ce96788
SHA512626b6bb63ee28bf86b005155e447c0bca1e72771ba3d35ff97a05960ceea44a4734cdde48f9e9385c360b55e6e62e7bbc67098dfb0aa6158ccb4f98d3cd3c8b1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d174783df4bee9d5963fafd9fbe60c4e
SHA1c83d88ea3e21f6ead2144ec9fc2053bc9c2dd97e
SHA256bd87ec5d39e6eba66df81e3b9cff4787b6c634d1abdeb98fa466966b4079b627
SHA51269076d3fd0dead42883a83fb15a083af89a9e9f43890df1dc127c52eb7a7e7912bd41366097971c0ce8472c2f80e0b0685798b64944b1eca0c1460f6ea820ff1
-
Filesize
11KB
MD5eae73a296f39dc11bf9f9e35f6772c83
SHA17f0e5b54d91dcfc800a34e498c2c22062dc818bc
SHA256d436aefa97bb5c936070e72cce187f912b917c4bf82d9e8fe065fbf7ecbe032d
SHA512f8fe784dd7e425f8075e5182cc2a2e23fdcf48a37a3fa2429473862c0d7acf77214c058b70c01976e1a0ac2f17722ef4c5bf445f1889c137deb8b66415d3c3c6
-
Filesize
12KB
MD5f8c6a8233263508c08feb8fb2bac91b6
SHA1654ea5ed5396f7472d293383dfc1e0f1099fd999
SHA256aca6b432f55e81326b4c6b700c34d4acbef2af7960782e042f828d32e67ae0b1
SHA512c1618262ba8fe8594979493b8c91219ba687b22628f86ff30f36ae0cbca2b7c42487928f71b288846e3ed89fdd5a5dcca86452a5375e97c1e6b03c825bfbf7aa
-
Filesize
12KB
MD5cf752c434744389e1ccc2b41edad91cc
SHA13d20ee41e03141e2866574e31d08138c8cf85e3a
SHA2563e6fc33dbcc6555c7275f25916c1fa8a313cf8587158c3c48304f4d4a1090e81
SHA5122278a41a34327d5a06b8923713b6b7855c110af0f8a4478ce3e870a0b4fc16a4a9c4e57b03131689a3c23760a80f1575d65fda099033edfa444259b3cd38469f
-
Filesize
12KB
MD58124630ba0cbeb004faaf8bd409d5ddf
SHA16dadcb48fd44c4dfeb0b85c6a35f94b5c6f765ca
SHA25662d81c55e404f759206ec4249cc93854dd9a2a0e946686f31ecb26aaed54ba59
SHA5124081d34c4697415906190d0020d6e5174ef3507f47285e7db7228af471431a5cd79fccafed8a50bd40c43b5bce82caeedcce339bda568490743e3516d9a55ef6
-
Filesize
385KB
MD51ce7d5a1566c8c449d0f6772a8c27900
SHA160854185f6338e1bfc7497fd41aa44c5c00d8f85
SHA25673170761d6776c0debacfbbc61b6988cb8270a20174bf5c049768a264bb8ffaf
SHA5127e3411be8614170ae91db1626c452997dc6db663d79130872a124af982ee1d457cefba00abd7f5269adce3052403be31238aecc3934c7379d224cb792d519753
-
Filesize
9KB
MD59039916f5e17b6a9419409e72a4f5814
SHA182f4be8eed6ea8206c02fbe764baa4cb6b91b523
SHA2562d18e77234eb9f7a1b05bc0a5f585426dd40df173fc793213c9a48802ec0c321
SHA5128126aa3a33e8a0e9313c2d8ab1766d5327abcc2d8451ad185ff7d62ba37fcfab9659c2ec831f3a1cc5650966f141634aae0c7f7a535dfd48915955490f38829e
-
Filesize
10KB
MD53f5e333c2e50194b47afea5887c3f525
SHA1f2617d17cd30f55ce32c7d50aa7f5f0eb2964772
SHA25629aa8f036fa7482853dc8fbad1ba87a123efa81fafe4d2a23cb247c73019eb90
SHA51205f0692b247a1eac083bc2fe554b6546d207a9dc82de0af1cc2c02ccb8774b9ee0e0ba8c63b3469a5b7cc786e66bfd144724f4e8317e8a006f39d25336ad5f03
-
Filesize
2KB
MD547c4d0184290cd9a6898d72842e9355f
SHA1c5748f0ad07564459c5c7e6264f13fda1c189b9c
SHA256c16e9ccf729845727f9df472c8c822af72e13d095316a35f8d5a5f3d38226313
SHA5127820444e22725a511a5450cbeeb9a0648da91e71aaa785a7901f7f1d5e71fbdcad07f4f1a2d321cd92ed6112fdda91c6f634fd663ae62ef0c0fa5e40da11f66c
-
Filesize
2KB
MD5a17812c5576ac44976a15a2d91702a09
SHA1395315f6ff59d4a5570a07bbff0123d8e3c10715
SHA256c9664f61fccf0a6b96f5310fb88d9e72fa2f9faed74a08a9ee37444f1a371d7f
SHA5124dbaf3d24c5a6b4327589a15e30eb02df56fa2048613b466f6d4b3d3c40bca148fe59c6d60a6ad00ff84896456e593102193e703a4915de8a73e784398fea6ff
-
Filesize
312B
MD50c04ad1083dc5c7c45e3ee2cd344ae38
SHA1f1cf190f8ca93000e56d49732e9e827e2554c46f
SHA2566452273c017db7cbe0ffc5b109bbf3f8d3282fb91bfa3c5eabc4fb8f1fc98cb0
SHA5126c414b39bbc1f1f08446c6c6da6f6e1ceb9303bbf183ae279c872d91641ea8d67ec5e5c4e0824da3837eca73ec29fe70e92b72c09458c8ce50fa6f08791d1492
-
Filesize
468B
MD552a4d71bd049918cd25e4f6ef6869328
SHA100a9692611dee812eca2e193ff5287a89f18910b
SHA256c87e6c3f6ca45a6f2e08638d675376732eb3a51bd7c7e3be19bf4b881d584b8f
SHA51249abb91946e28b702b4263eb3946f5de8aea19bd6b3ef0bfc88b5c866be1bcf507e0d96cc16da2624788bfb3161a1b80f12d4653308bdfbe37449026e61b375a
-
Filesize
468B
MD580dee4c9f69be8b21ab626edafcd24b5
SHA152fbabd15cf1c93d82b038f49c2541facd14d1fb
SHA2569f1b6e620416ae137335484e18ab12acd26ad1f59714fbdcc27eaf80a4f79b5b
SHA5127563371c0aae66a3b3532c84106cc223725d655bf9197a4d11f149b230643d28ad0fe597270a15d5c89eee1016d40092df079fed4d4a5ae6dcd6c2d5600132f1
-
Filesize
765B
MD5f553dda2cb30d0a9ca8c9a1ee1111fee
SHA1d5e2e685a763d701bfc5e72fe0bde80f8f75969b
SHA2568258193a9d50c6c5ac88b595eeded19274fffe9ed2108c39175be2964d985d0c
SHA51201bc2e816c3c0a972d012d63296be35942c2dd090e4c9d770542da357c329a73516ab5b0ce14334f87b4712a178d144229bc8a1914cf10fa037838a9b36d8f27
-
Filesize
831B
MD57e51e001172d31d102ab790e77f9e78d
SHA14198b3f1dee7dc5268a7d40a95319cf8c2997aac
SHA2565a411fdb466af49411c78becb2d4b7d6b75d67a9c890afc9cbb8c3e097a874a5
SHA5125d9b93a6319f148e1bffec553746a147fd53a107024b51db2d1482472d063278702e60f86147057408c119be1ac9d7a174a44c79bf89971738a0a8810ded4255
-
Filesize
1KB
MD5e164545eb119975ffc74a3af622421d3
SHA1d6bfe27ee0d65f19c9112e4dbace4db39089e3ef
SHA2564bd9e3bbd7afb557da9ba554074b09bf8f8425832fe1528438199b7f8d78d630
SHA512573dde62ce55fbb8e9162fe98f164dfa7078dfb43bc063cc428b71cd6edec19a777691110959ed35b0dc419ed4f30ed72af7382c84138c56efb42c4b284a40e9
-
Filesize
1KB
MD5ef1fe64b3b4af42749e948407370b7aa
SHA1bec686485c556d06af01caed45c76a44796c47e0
SHA256aeaac2dfcf68787fbb0ab89f9c1e965b86fd08088dfeef87ffbaea8d4fe672ad
SHA5125a80533d8895831326d00a92a2bb6b1836d133554caacca49e48d7a16076097a7876f8a2258185aff13db3758b0a297e71b4f3f1ed550261d0eeaecc7b00c05b
-
Filesize
1KB
MD5621e8c266e595d8e6e186d1af4a53009
SHA1bd16eff1fdd3b777f7c707e97d4cf32a2963f099
SHA25679afc78afb0bee307805630df9dbfc9b61af9d8df2cbe89e1d17b8233ae527c2
SHA5128ce5e06a39e9c108178cb6e3f1e48d2f00f3e61bf534369d56c34c2b6bc24d3422ae7cae988a2e8bab314a1e0a462aecc2ab53dd9274cfa2a6449e63a6206ec9
-
Filesize
2KB
MD5dc5b74d74438e2ede391f4c3452e07a2
SHA10abc2b30e51e5b7d7e449b15435ace2c59e6df01
SHA25609203222e8758c01e849fcfaafa295fc396da784f8e98051cc2aa4172244960a
SHA5124be03026d215d58a302905d0062ccd8d3cd495806d6c63dfcf3a9d75cc803399b44146a79765819727c28d87ad1936004e945daaebc2b5960861fa67cd846e5f
-
Filesize
3KB
MD5f03a6eb385c2f3b245b9898263d3eda8
SHA1d81eb5c0dea0211f3a97ef40aede2e3298f116b3
SHA256bae1d63efa631eb8b367eb16f21257480ad11f25e507b891f2cd135c6c23ecc9
SHA512b93beb9ede0800519b63cd70bab73f28a95fc7cb51cb3d8893c468bf75e19e57f29f830469f7be137a58f51fa4000788649532319ace61eba808a2c14602bed3
-
Filesize
3KB
MD5a71aaefd3ec988da20d591e427ad91f9
SHA1ffa5639bf7941a5bfa128586d259e60e7487f52d
SHA256bab47882e240aba3c47c977b4a78a476123b97f38bb470b6c1a6db44afaa7bee
SHA5127444134178e8b630ad11c5265124fcd81bb2c77aa50a11128ba5822eb80913acd0adf9836645ec37df807b72b80e9e481f7e98744867fa983c14780c544a2a16
-
Filesize
7KB
MD54789b80f83f5445d0b69bf17f2f2e044
SHA1e6d0d1e812de67c9d48323c06181aeed868cb513
SHA25690592673a0c95ecca97acb2c086a511873cd990de79584ea947f0860a979ab06
SHA5126a34da4cbf95ca9c205c331aec7d213a42f8cbe1eb2f8ad87675f24d63ca534f8cc2b326b32e064c0280bf4fe3d28dd06480176a5c220abd5fad948fc732b775
-
Filesize
6KB
MD5b6616bbffa35ba5061c455fa6f241e38
SHA118cf59072a2632500580e5f17aa5191a71b0b45b
SHA25680a87935d49d07b51442df7d33fa7719865ece9362dca5bd6f51cd3d26d4d938
SHA512d366b460cdcf01ddb182e522cef3bec2b7a5d1c6828de840523236b81812151ae6ff68b72e72506f7d73543dfd64678637e5d3d9f5194158b946e831ff2ffeca
-
Filesize
5.1MB
MD5c8246dc58903007ccf749a8ad70f5587
SHA10b8b0ec823c7ca36bf821b75e2b92d16868da05e
SHA256347e7d26f98de9ac2e998739d695028fa761c3f035dbe5890731e30e53a955b3
SHA51202f5ee6fa5365498ea537f931bab82e3d95178cb8ca42a108030649283290520c27490557a2b642649533b935503ad240acedab005bcbf3dd7691f5671caf975