Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe
Resource
win10v2004-20240802-en
General
-
Target
5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe
-
Size
1.9MB
-
MD5
9bae5899c44d66c2466adcf3d2c080a8
-
SHA1
902994c6e3807a8e38cbd56ee55e491568905f97
-
SHA256
5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908
-
SHA512
b0e26c33779584da5cfb47c55dd92386f72dd03bb5d633410175ce32119cb0843a29480a6b1d60c929aa5198c835ae5edfcb0845d573e16c95d216aab8f45c60
-
SSDEEP
49152:X6jGfqif201isvq0wYK4qvWXn/Pp3HIBebFyxsZfCwqX/:3fG01vC0FcWXnXp3IwyV/
Malware Config
Extracted
amadey
4.41
c7817d
http://31.41.244.10
-
install_dir
0e8d0864aa
-
install_file
svoutse.exe
-
strings_key
5481b88a6ef75bcf21333988a4e47048
-
url_paths
/Dem7kTu/index.php
Extracted
stealc
leva
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0c0d8b8e77.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ec37de2697.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0c0d8b8e77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ec37de2697.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ec37de2697.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0c0d8b8e77.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation svoutse.exe -
Executes dropped EXE 7 IoCs
pid Process 3116 svoutse.exe 2036 6494acf963.exe 2324 0c0d8b8e77.exe 3124 ec37de2697.exe 1568 svoutse.exe 5484 svoutse.exe 3200 svoutse.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine 0c0d8b8e77.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine ec37de2697.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine 5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0002000000022aa8-26.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1748 5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe 3116 svoutse.exe 2324 0c0d8b8e77.exe 3124 ec37de2697.exe 1568 svoutse.exe 5484 svoutse.exe 3200 svoutse.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\svoutse.job 5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svoutse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6494acf963.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c0d8b8e77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec37de2697.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1748 5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe 1748 5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe 3116 svoutse.exe 3116 svoutse.exe 2860 msedge.exe 2860 msedge.exe 732 msedge.exe 732 msedge.exe 2324 0c0d8b8e77.exe 2324 0c0d8b8e77.exe 3124 ec37de2697.exe 3124 ec37de2697.exe 5820 identity_helper.exe 5820 identity_helper.exe 1568 svoutse.exe 1568 svoutse.exe 5484 svoutse.exe 5484 svoutse.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 3200 svoutse.exe 3200 svoutse.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2036 6494acf963.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 31 IoCs
pid Process 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1748 5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe 2036 6494acf963.exe 2036 6494acf963.exe 732 msedge.exe 732 msedge.exe 2036 6494acf963.exe 2036 6494acf963.exe 732 msedge.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe 2036 6494acf963.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1748 wrote to memory of 3116 1748 5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe 87 PID 1748 wrote to memory of 3116 1748 5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe 87 PID 1748 wrote to memory of 3116 1748 5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe 87 PID 3116 wrote to memory of 2036 3116 svoutse.exe 89 PID 3116 wrote to memory of 2036 3116 svoutse.exe 89 PID 3116 wrote to memory of 2036 3116 svoutse.exe 89 PID 2036 wrote to memory of 732 2036 6494acf963.exe 90 PID 2036 wrote to memory of 732 2036 6494acf963.exe 90 PID 732 wrote to memory of 1020 732 msedge.exe 91 PID 732 wrote to memory of 1020 732 msedge.exe 91 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 1544 732 msedge.exe 92 PID 732 wrote to memory of 2860 732 msedge.exe 93 PID 732 wrote to memory of 2860 732 msedge.exe 93 PID 732 wrote to memory of 2700 732 msedge.exe 94 PID 732 wrote to memory of 2700 732 msedge.exe 94 PID 732 wrote to memory of 2700 732 msedge.exe 94 PID 732 wrote to memory of 2700 732 msedge.exe 94 PID 732 wrote to memory of 2700 732 msedge.exe 94 PID 732 wrote to memory of 2700 732 msedge.exe 94 PID 732 wrote to memory of 2700 732 msedge.exe 94 PID 732 wrote to memory of 2700 732 msedge.exe 94 PID 732 wrote to memory of 2700 732 msedge.exe 94 PID 732 wrote to memory of 2700 732 msedge.exe 94 PID 732 wrote to memory of 2700 732 msedge.exe 94 PID 732 wrote to memory of 2700 732 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe"C:\Users\Admin\AppData\Local\Temp\5dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\1000015001\6494acf963.exe"C:\Users\Admin\AppData\Local\Temp\1000015001\6494acf963.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password4⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d28546f8,0x7ff9d2854708,0x7ff9d28547185⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:25⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:85⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:15⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:15⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:15⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:15⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:15⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:15⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4540 /prefetch:15⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:15⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:15⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:15⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:15⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:15⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:15⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:15⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:15⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:15⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:15⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:15⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:15⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:15⤵PID:5600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:15⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6968 /prefetch:15⤵PID:5824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7184 /prefetch:15⤵PID:5896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7316 /prefetch:15⤵PID:5936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:15⤵PID:5944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7552 /prefetch:15⤵PID:5984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:15⤵PID:5992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7384 /prefetch:15⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7964 /prefetch:15⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:15⤵PID:5460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8296 /prefetch:15⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7760 /prefetch:85⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7760 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:5820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10725473359078230105,4523701392542276641,131072 --disable-features=TranslateUI --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1316 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
-
-
C:\Users\Admin\AppData\Roaming\1000017000\0c0d8b8e77.exe"C:\Users\Admin\AppData\Roaming\1000017000\0c0d8b8e77.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Users\Admin\AppData\Roaming\1000019000\ec37de2697.exe"C:\Users\Admin\AppData\Roaming\1000019000\ec37de2697.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5528
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe d6eafe9773f38af54e912837faf4c41c pMBgKik370ilTxF3ozd2pA.0.1.0.0.01⤵PID:5824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:5936
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1568
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5484
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD552ea404fbd0a508da7826a9a17f1f4f7
SHA17e948d5944bdbd166cfa277dcd5976b834a15007
SHA256ce8182fdc1269f990ee3592c26a3586b9e805cb44da049128b8ae127fdc58c29
SHA51274e28d256ff569bd4c2e91625953b141cf876138ba2ee68113bf91760de4dccf4e5c0baedd1a8b7e22775c05341089b8329da01beed53ccd745d875a59ad2ffc
-
Filesize
152B
MD5bd9bcf151ddc277ca735f8b51af49699
SHA1815b4205455926cee2b98eb07fc129f8a5d233fe
SHA2569f9157f6870f1f6c09839aff8a8ed5b41d79aa2d5a734017038c2412c6d557e0
SHA5125422527d98f8ac7e87f382218f48bdfdf73679d8dd444fe943c194c9540581e0044d26e856b55106ac107c902fdf7292aefdcfee86ce3002cbe63ce13c8e03d0
-
Filesize
152B
MD582ad23432de7531c31e8d8efdf962bcc
SHA1ca1fa4429d80e203c5c2b4afed7876475a610a61
SHA256b6fc0456339b063d191e3f3b190cce0fc13c10d8cc7d6b9805477cc888747cfe
SHA512b5497552d29f9befcef872eba54dbe8e35a7c03c7ff36ce3c6f384095bf9f1ea03b59c6b50a112b7cdedb6fa128a60b905ee154fb428347e244c5f646cadfddb
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\3e98828a-480d-4ec0-85e1-0a365ebc22a9.tmp
Filesize4KB
MD57a729a638d663486dd44b0e6fe84cb29
SHA1fae782f6fc3c3d520d9706577ebe1d1d6fd00221
SHA256edf7c0fc7f9667cbe39293c4d10377c207821b4296d04eacfef0184adcb9d0bb
SHA512b3f57fc24a9db60599ef74dc300228afe1a0c6ac9c811a56631272f5811af0225190fca63e03d9801690a3c914aed817c757f1b8c84c0224131c95fd5e016888
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Storage\leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD590a2aa884af8b0b98d29533a22c06d51
SHA18867fa449e5d36a50369c28a1887a9089cb06f8f
SHA256d54994fd5f20762f598c3cd05c66cbb6e2cf1a80863e5e4c237686635005634d
SHA5123eeaab59d59e7a568c028bdfb2d7bf4844442b267687237af66b2f3a9594bfb92e5c5197bf76bfe7ba6c052c156a9b14c17788e30d77404754cf57473c907873
-
Filesize
4KB
MD549e74c480917a71c714150b0ecb1a128
SHA121f0e0653dde841b5bf3a65d168f28b3018dd22b
SHA2562854fe314d007aae2f14248c6c494f6ed2d848e0a90fe3b49e44773191482643
SHA51220e2c1bfcc276f42c0efaa9631348e5898bbf3d4d564560606fb5e121c45ca5059f2878987de70c30d49291590f78362a71e45eb09ed0e6a6f7a14e013685f82
-
Filesize
4KB
MD5190604c673ee841838de322f4e8573ed
SHA19a0e2d693fddd7b64c00515123a5768465a78907
SHA2569950b7bae25ec0115296136a37b305c8f2b0dec881bc0cf6ea03492cf4a5d00f
SHA5126f5840aa84158de12ab237a4a13f072339e84d238fe0c25d07cff5dd6da85585fbd08aa2e921c21ac617ac604ac75399d5f4a2d4ec10056d674533a0b22548d4
-
Filesize
24KB
MD5bc8408e4064f132b2fec64f4f6d9d608
SHA10ac17ee751e9dd7aeaf4eb5cab07e5c8fed1347b
SHA256e82451ce722e2164023034a19ea9180f1e96df95d48b4e304db4331d7935ec4c
SHA5122b627469910688c544ead811c02ef832e26065295f0396fe94b5ae7990ce4f6679c5f3081a76333d35811dc1f4a8c08cd28cc4d1b3ff94dd2873d9948dcc435a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences~RFe57a884.TMP
Filesize24KB
MD52c2ac8dbf2fc710b679d90d872959ea5
SHA179d472735e6c6176372b91d553af4d7788df9b78
SHA256e4eb4565a304acf95355952ea87feb6e6e7cb36e2811530b14a45760f8231d9f
SHA512169452c61593b0f322601fbc0b43b92477e6115886ee7d1b8e3b7e7590f1bb1a9de323df62897204ac398f3a31e03a09bf4395cf9fdf95324e75d321b3eedd35
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_0
Filesize8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
Filesize264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_2
Filesize8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3
Filesize8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\data_reduction_proxy_leveldb\CURRENT
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\e9142c2c-17e4-4c0d-8953-9f333f2e2811.tmp
Filesize9KB
MD5144ac58f1950cb6c48e0572f6d8afe8a
SHA1aa71c9c8752fe43b710a7a967579028113828a9e
SHA256477fbdd565e7a2830cfb0ee6de1bd364328cc7df1346dd39bad0359fcb355494
SHA51259f602497d06dd0fffac5c39734f48ff69acf06654f66f356688a1f84e0649656a99ed68cd36e22c347ca90c9495f059b884c45cdadd8f75d302335090a7adc6
-
Filesize
1.9MB
MD59bae5899c44d66c2466adcf3d2c080a8
SHA1902994c6e3807a8e38cbd56ee55e491568905f97
SHA2565dac0bb26a5a94bab13e7f3d8c254acb93ac6f09109812c1d7893b50912ce908
SHA512b0e26c33779584da5cfb47c55dd92386f72dd03bb5d633410175ce32119cb0843a29480a6b1d60c929aa5198c835ae5edfcb0845d573e16c95d216aab8f45c60
-
Filesize
896KB
MD5cd9163260f1a058d21b379f9f4ebf3d1
SHA1b18c887583216ef1ebf7061a2cf909ffa618089f
SHA256c83dc38f80cd4412b4314327a36c2f02bdf4c901425203438fe0f69aab360b10
SHA512f89d4c236c0f538da12ee1a703d4a25959a9f7cd7fcc726774d6c309b7ff32eec2ca8fa50ed560b6101cd5a978682e94bf1b3b3391575c5c43503406804e756f
-
Filesize
1.7MB
MD578bdea9e949a906de71a9e7e392949e8
SHA11817e5f65fddb23cd1c2f3e6ad45844045b3e72c
SHA2569c6971462e3db561147b9a7291e611b275c9053af1c1aa83abe5327ab197739f
SHA512b95e9329f446cabd287632e8d5ec4fcdefb61b0fa4b027b279c256285a0044d85566ce7dcf9b7b37b3151f7fdf4d9c184993919ec7ea9294d98ef3f5165fb03e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD54a82ab77064ae8ebe9043fe565bd1cbe
SHA148ffbad904eaf3cddbe182d34a88c347cb48d0d7
SHA25685288c09b68df5e436366e40d1f917ec8071b6a5d18520587165e628b0054d1c
SHA51263678749ab11f70940d38a164366d2f3af2b832dea80002059c4043a422de056e765258c67bde0491e490045c28438f1fb5ba1193f1f0357aa1cf901c210bd96