Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    98s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 20:18

General

  • Target

    https://api.subsource.net/api/downloadSub/nRONwikK1VkQRzD5x7D1ojuhKjqhWfKI7uJx1c0zNMlVH8j5Txg9Wy028ZSqvbjr

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 13 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://api.subsource.net/api/downloadSub/nRONwikK1VkQRzD5x7D1ojuhKjqhWfKI7uJx1c0zNMlVH8j5Txg9Wy028ZSqvbjr
    1⤵
      PID:4528
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --field-trial-handle=4028,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=5044 /prefetch:1
      1⤵
        PID:3488
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --field-trial-handle=4076,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4712 /prefetch:1
        1⤵
          PID:4988
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --field-trial-handle=5352,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=5376 /prefetch:1
          1⤵
            PID:4284
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5508,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=5516 /prefetch:8
            1⤵
              PID:1460
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5536,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=5676 /prefetch:8
              1⤵
                PID:4508
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --field-trial-handle=6336,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6264 /prefetch:8
                1⤵
                  PID:3632
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=3996,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=1272 /prefetch:1
                  1⤵
                    PID:1828
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --lang=en-US --service-sandbox-type=service --field-trial-handle=6600,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6608 /prefetch:8
                    1⤵
                      PID:3468
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --field-trial-handle=6756,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6752 /prefetch:8
                      1⤵
                        PID:3712
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --field-trial-handle=5068,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=5128 /prefetch:1
                        1⤵
                          PID:1688
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=6696,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6612 /prefetch:8
                          1⤵
                            PID:408
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:4624
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --field-trial-handle=7036,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=7008 /prefetch:8
                              1⤵
                                PID:4592
                              • C:\Windows\system32\AUDIODG.EXE
                                C:\Windows\system32\AUDIODG.EXE 0x418 0x150
                                1⤵
                                  PID:1544
                                • C:\Windows\system32\OpenWith.exe
                                  C:\Windows\system32\OpenWith.exe -Embedding
                                  1⤵
                                  • Modifies registry class
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:3736
                                  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                                    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play "C:\Users\Admin\Downloads\plankton-the-movie-2025_english_10025593-[SubSource]\Plankton.The.Movie.2025.360p.LEAKED.AAC.H.264-M4RS.srt"
                                    2⤵
                                    • Enumerates connected drives
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of WriteProcessMemory
                                    PID:672
                                    • C:\Windows\SysWOW64\unregmp2.exe
                                      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of WriteProcessMemory
                                      PID:3768
                                      • C:\Windows\system32\unregmp2.exe
                                        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
                                        4⤵
                                        • Enumerates connected drives
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3024
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 672 -s 2324
                                      3⤵
                                      • Program crash
                                      PID:5980
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
                                  1⤵
                                  • Drops file in Windows directory
                                  PID:5348
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=6156,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=6232 /prefetch:8
                                  1⤵
                                    PID:5860
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 672 -ip 672
                                    1⤵
                                      PID:5960
                                    • C:\Windows\system32\OpenWith.exe
                                      C:\Windows\system32\OpenWith.exe -Embedding
                                      1⤵
                                      • Modifies registry class
                                      • Suspicious behavior: GetForegroundWindowSpam
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:6012
                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\plankton-the-movie-2025_english_10025593-[SubSource]\Plankton.The.Movie.2025.360p.LEAKED.AAC.H.264-M4RS.srt
                                        2⤵
                                        • Modifies Internet Explorer Phishing Filter
                                        • Modifies Internet Explorer settings
                                        • Modifies registry class
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:6104
                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6104 CREDAT:17410 /prefetch:2
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          • Modifies Internet Explorer settings
                                          • Suspicious use of SetWindowsHookEx
                                          PID:4368
                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\plankton-the-movie-2025_english_10025593-[SubSource]\Plankton.The.Movie.2025.360p.LEAKED.AAC.H.264-M4RS.srt
                                          3⤵
                                          • Modifies Internet Explorer settings
                                          PID:5556
                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6104 CREDAT:82948 /prefetch:2
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          • Modifies Internet Explorer settings
                                          • Suspicious use of SetWindowsHookEx
                                          PID:5564
                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\plankton-the-movie-2025_english_10025593-[SubSource]\Plankton.The.Movie.2025.360p.LEAKED.AAC.H.264-M4RS.srt
                                          3⤵
                                          • Modifies Internet Explorer settings
                                          PID:5368
                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6104 CREDAT:17422 /prefetch:2
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          • Modifies Internet Explorer settings
                                          • Suspicious use of SetWindowsHookEx
                                          PID:5188
                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\Plankton.The.Movie.2025.360p.LEAKED.AAC.H.264-M4RS.srt
                                          3⤵
                                          • Modifies Internet Explorer settings
                                          PID:4848
                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6104 CREDAT:82960 /prefetch:2
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          • Modifies Internet Explorer settings
                                          PID:4084
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5876,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=5896 /prefetch:8
                                      1⤵
                                        PID:2944
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window
                                        1⤵
                                        • Enumerates system info in registry
                                        • Modifies data under HKEY_USERS
                                        • Modifies registry class
                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                        • Suspicious use of WriteProcessMemory
                                        PID:2304
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x240,0x244,0x248,0x23c,0x2f0,0x7ffe9823d198,0x7ffe9823d1a4,0x7ffe9823d1b0
                                          2⤵
                                            PID:2068
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2060,i,6807757722632430865,7377080473981024574,262144 --variations-seed-version --mojo-platform-channel-handle=2040 /prefetch:2
                                            2⤵
                                              PID:3084
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=1848,i,6807757722632430865,7377080473981024574,262144 --variations-seed-version --mojo-platform-channel-handle=2268 /prefetch:3
                                              2⤵
                                                PID:1772
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=2472,i,6807757722632430865,7377080473981024574,262144 --variations-seed-version --mojo-platform-channel-handle=2528 /prefetch:8
                                                2⤵
                                                  PID:5068
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4540,i,6807757722632430865,7377080473981024574,262144 --variations-seed-version --mojo-platform-channel-handle=4564 /prefetch:8
                                                  2⤵
                                                    PID:5996
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4540,i,6807757722632430865,7377080473981024574,262144 --variations-seed-version --mojo-platform-channel-handle=4564 /prefetch:8
                                                    2⤵
                                                      PID:2476
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --pdf-upsell-enabled --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4844,i,6807757722632430865,7377080473981024574,262144 --variations-seed-version --mojo-platform-channel-handle=4880 /prefetch:1
                                                      2⤵
                                                        PID:1380
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --field-trial-handle=5172,i,6807757722632430865,7377080473981024574,262144 --variations-seed-version --mojo-platform-channel-handle=5220 /prefetch:8
                                                        2⤵
                                                          PID:5140
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --field-trial-handle=4744,i,6807757722632430865,7377080473981024574,262144 --variations-seed-version --mojo-platform-channel-handle=5368 /prefetch:8
                                                          2⤵
                                                            PID:4276
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\elevation_service.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\elevation_service.exe"
                                                          1⤵
                                                            PID:5920

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                            Filesize

                                                            2B

                                                            MD5

                                                            99914b932bd37a50b983c5e7c90ae93b

                                                            SHA1

                                                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                            SHA256

                                                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                            SHA512

                                                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                            Filesize

                                                            2B

                                                            MD5

                                                            d751713988987e9331980363e24189ce

                                                            SHA1

                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                            SHA256

                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                            SHA512

                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            70KB

                                                            MD5

                                                            9c42e4c5708fff1c0bbcb7b24dc0e7fd

                                                            SHA1

                                                            f2d3a3daaa98618739329f84e1426cb76d7f36c2

                                                            SHA256

                                                            738e282c98b9a06057795607b2731bc135b58d1a6579076e0270a9b7f1c45ff9

                                                            SHA512

                                                            53f5366964a52449f0511a1b70fe0447b6d9816e0c904f7effa673a1e4f66658484924b28d0e9b8ac430fab808cdc5dee1bebf796b8fbf871714047efea958ad

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                            Filesize

                                                            768KB

                                                            MD5

                                                            d0636a01c6d9ac315d6156d82965fc22

                                                            SHA1

                                                            c32cee45cf84184c74e4cd0cbb94a8ad543d65e8

                                                            SHA256

                                                            bef1af9059e8ecc13f7728cc00ece5ff26fc317d0d865d32371c3b01f8fb461c

                                                            SHA512

                                                            0e4f5edd6978118d60e4e65740bf73f4d48626b09c2016d30a120a5cfa315bbcdfc7fd87184354bfd9f88294526b09539bf1674a538c20a9ed6f736b9fd5fa30

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                            Filesize

                                                            1024KB

                                                            MD5

                                                            0b6fa87bbc11deaebcf5abd12b413751

                                                            SHA1

                                                            56ac9a9cdcd683d1ed94b7e534d749293a5638cc

                                                            SHA256

                                                            79527858d4647f2ceba4ad7a1f8eb885377992d2daa814380f37b91d70972b20

                                                            SHA512

                                                            e4e3313cacd1383c135312c6b60fb82fa6862519d7cfa99a3e6c79828e2c85e58810dc3ef199700f0f656739e3042dd0a0687cc7b764be56b8171a4441df95d1

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

                                                            Filesize

                                                            498B

                                                            MD5

                                                            90be2701c8112bebc6bd58a7de19846e

                                                            SHA1

                                                            a95be407036982392e2e684fb9ff6602ecad6f1e

                                                            SHA256

                                                            644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

                                                            SHA512

                                                            d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            5433eab10c6b5c6d55b7cbd302426a39

                                                            SHA1

                                                            c5b1604b3350dab290d081eecd5389a895c58de5

                                                            SHA256

                                                            23dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131

                                                            SHA512

                                                            207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            7050d5ae8acfbe560fa11073fef8185d

                                                            SHA1

                                                            5bc38e77ff06785fe0aec5a345c4ccd15752560e

                                                            SHA256

                                                            cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                                                            SHA512

                                                            a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                                                          • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            b573952f413bb03da5cb86bc99893291

                                                            SHA1

                                                            46c205318a2c710dfe8d4e901e198c4d31d6709a

                                                            SHA256

                                                            cee4578d4b4da40af23547b718eb38faa4ec32caec22fc10730e79b672eb7ee6

                                                            SHA512

                                                            b36a2e1ce7b5488fd247ec5ce90434af7c529b8fca9194c6edcf95371a3af40bf5c62fa60bb8ce1785779cf6b993942b63c921e9dc76915168fa709ef1fcb500

                                                          • C:\Users\Admin\Downloads\Plankton.The.Movie.2025.360p.LEAKED.AAC.H.264-M4RS.srt

                                                            Filesize

                                                            70KB

                                                            MD5

                                                            8c11b92917f3dbb0d6bef19763f6778c

                                                            SHA1

                                                            4a90a044e62083b26bb41406f55833af27c0fa21

                                                            SHA256

                                                            923c812dbb11c407418b5006e8ca42eef7a229e4f4f7c3e43546457fb4a16f7e

                                                            SHA512

                                                            9a742bef06b01e752a095fb89ce30265d54d5eaa40a696bb8bb34a20969bca94e3974717e1555a20c4a0b67f59da0c37b2fef3a87b2f0bdf28d6d7cb767d2cd9

                                                          • memory/672-34-0x0000000005640000-0x0000000005650000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/672-41-0x0000000005870000-0x0000000005880000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/672-42-0x0000000005870000-0x0000000005880000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/672-36-0x0000000005870000-0x0000000005880000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/672-37-0x0000000005870000-0x0000000005880000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/672-39-0x0000000005870000-0x0000000005880000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/672-40-0x0000000005870000-0x0000000005880000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/672-38-0x0000000005870000-0x0000000005880000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/672-35-0x0000000005870000-0x0000000005880000-memory.dmp

                                                            Filesize

                                                            64KB