Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240704-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
baf9c65740a624a1368c5daf804dbe75
-
SHA1
4d420290abe5a7cb44aa3ee6471e2f914d7f092a
-
SHA256
f03a849ae2d670ff7e468da63c26789b8c738d830a0e49aad3a26ff5bc555805
-
SHA512
5624e7a58773275af48696b0a382863402b61019a22f779d579b50f649aba21f4cd74d21bc6f58c57b10f0ecab03627897046b08282003a3516efc9f46612573
-
SSDEEP
49152:85k1rXyxjjLjmnH6n8wVSg2oHJ0HU5gJA:8ygxjnana8wzBHJ0NJ
Malware Config
Extracted
amadey
4.41
0657d1
http://185.215.113.19
-
install_dir
0d8f5eb8a7
-
install_file
explorti.exe
-
strings_key
6c55a5f34bb433fbd933a168577b1838
-
url_paths
/Vi9leo/index.php
Extracted
stealc
leva
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a681b8205.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dec68f9d73.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a681b8205.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dec68f9d73.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dec68f9d73.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a681b8205.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation explorti.exe -
Executes dropped EXE 6 IoCs
pid Process 4432 explorti.exe 2892 2a681b8205.exe 1472 dec68f9d73.exe 2416 d7461cc221.exe 5864 explorti.exe 6012 explorti.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Wine dec68f9d73.exe Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Wine 2a681b8205.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x001300000001e0aa-64.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 4000 file.exe 4432 explorti.exe 2892 2a681b8205.exe 1472 dec68f9d73.exe 5864 explorti.exe 6012 explorti.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dec68f9d73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7461cc221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a681b8205.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4000 file.exe 4000 file.exe 4432 explorti.exe 4432 explorti.exe 2892 2a681b8205.exe 2892 2a681b8205.exe 1472 dec68f9d73.exe 1472 dec68f9d73.exe 3724 msedge.exe 3724 msedge.exe 2444 msedge.exe 2444 msedge.exe 5320 identity_helper.exe 5320 identity_helper.exe 5864 explorti.exe 5864 explorti.exe 6012 explorti.exe 6012 explorti.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2416 d7461cc221.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 31 IoCs
pid Process 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4000 file.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2444 msedge.exe 2444 msedge.exe 2416 d7461cc221.exe 2444 msedge.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe 2416 d7461cc221.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 4432 4000 file.exe 87 PID 4000 wrote to memory of 4432 4000 file.exe 87 PID 4000 wrote to memory of 4432 4000 file.exe 87 PID 4432 wrote to memory of 2892 4432 explorti.exe 92 PID 4432 wrote to memory of 2892 4432 explorti.exe 92 PID 4432 wrote to memory of 2892 4432 explorti.exe 92 PID 4432 wrote to memory of 1472 4432 explorti.exe 93 PID 4432 wrote to memory of 1472 4432 explorti.exe 93 PID 4432 wrote to memory of 1472 4432 explorti.exe 93 PID 4432 wrote to memory of 2416 4432 explorti.exe 94 PID 4432 wrote to memory of 2416 4432 explorti.exe 94 PID 4432 wrote to memory of 2416 4432 explorti.exe 94 PID 2416 wrote to memory of 2444 2416 d7461cc221.exe 95 PID 2416 wrote to memory of 2444 2416 d7461cc221.exe 95 PID 2444 wrote to memory of 3948 2444 msedge.exe 96 PID 2444 wrote to memory of 3948 2444 msedge.exe 96 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 4732 2444 msedge.exe 98 PID 2444 wrote to memory of 3724 2444 msedge.exe 99 PID 2444 wrote to memory of 3724 2444 msedge.exe 99 PID 2444 wrote to memory of 1972 2444 msedge.exe 100 PID 2444 wrote to memory of 1972 2444 msedge.exe 100 PID 2444 wrote to memory of 1972 2444 msedge.exe 100 PID 2444 wrote to memory of 1972 2444 msedge.exe 100 PID 2444 wrote to memory of 1972 2444 msedge.exe 100 PID 2444 wrote to memory of 1972 2444 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Roaming\1000051000\2a681b8205.exe"C:\Users\Admin\AppData\Roaming\1000051000\2a681b8205.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Users\Admin\AppData\Roaming\1000052000\dec68f9d73.exe"C:\Users\Admin\AppData\Roaming\1000052000\dec68f9d73.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\1000053001\d7461cc221.exe"C:\Users\Admin\AppData\Local\Temp\1000053001\d7461cc221.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password4⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff998e246f8,0x7ff998e24708,0x7ff998e247185⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:25⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:85⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:15⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:15⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:15⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:15⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4312 /prefetch:15⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4324 /prefetch:15⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:15⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:15⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:15⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:15⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:15⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:15⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:15⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:15⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:15⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:15⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:15⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:15⤵PID:5360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:15⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:15⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6736 /prefetch:15⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6984 /prefetch:15⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7116 /prefetch:15⤵PID:5648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7236 /prefetch:15⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6912 /prefetch:15⤵PID:5664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6984 /prefetch:15⤵PID:5948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7088 /prefetch:15⤵PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:15⤵PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7532 /prefetch:15⤵PID:5872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7016 /prefetch:15⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7980 /prefetch:15⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7720 /prefetch:85⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7720 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3200 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5864
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD534aba16c742e553873903e1754413622
SHA127362a8e18fb86b14d7b048a7cdf18eec3eecbbe
SHA2565b9c19c7f70da7d2c3c707ff24966ea41ab596dad2d3b3e142e82820ae6b40c1
SHA51279581a62e335dc495e20eb2d4e9914e50b896b170a664559a30649c1c999de0c71716cb5f6b7f00779207afe0b3aff11ecf775efacd40f419ae23ee22246a222
-
Filesize
152B
MD5c6251717d90b3b9e0a599c2607587d13
SHA1c4b17de168cc8c0555ab848eb6b849a3f866a914
SHA256bc44387734cfb937a295878f780fcc275a64ea28ba6854ad700e7110aded22ac
SHA512fc348408cdecc0b0148d7b3e98ad310ca9c5373c06218c126ed41cbcf9bd491e4389786a1bc6da890fdc49b233f9b32c40396bc354aad15c243ccd773577f475
-
Filesize
152B
MD56ee804d3bb76ce235d742a83343c3a38
SHA103bd07739b20e2c832e309dc7892f191b0661683
SHA2566ef4c29ada3aebd98e9a44e10a1693a7e477ac21589090a2544c768555ee988e
SHA512effca350fa8a0c90cf7d7cebdb1b3d1795c8d6a98a592987f8d6d6560f590df5ae9b19d08841170e9953e9ed10eaf3c37590c3559cfe138957d8a254b516d775
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\85e56727-4055-4edb-b7fd-079d71a73f04.tmp
Filesize4KB
MD5476b9d3b4a01c29bafedf3aad6ca8091
SHA14733da66446ea8e85ed590f5069cc9ddafe3f5fd
SHA2561b40cd0c0a0b354890e6723d957d50fa3d684d145e76777dd7d99bfd0b5ce3a6
SHA51242d5977785d1bcc8975bb1b91704af5794a3ac5e2a61445830ac8918ef60d3d4bc1fb4095454a1550da2be62754b8176331749b9ba7882ee09ea0e0ad0c88aaa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Storage\leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD5e3ab29ff9632828bea79bf617ce69312
SHA1c53ad9447968320bef8df513bc9aa2c5ba817ad7
SHA2568c349839666717a0b857eba46ab58598e14807778be310b239fbc7f51358072b
SHA51293aa976c77561b3c2b319a1f933f235d05875b9c7fdd9a6caeae8348a2ed7a940e7b7436afb7b33c49a2f30c80b2eb93daa82013ce1ff247fdb2bbabe499fa23
-
Filesize
4KB
MD5aa9c3cc00f1c08f9f4929e46356d357c
SHA1c68fd6390aeae8ae2ba5d01a5d84a9ebaa3621d8
SHA256ff28ce465d7e073e116907d4719af474f969b61a3af3fb368a1c7468e25eff72
SHA51238fd1a25a0bffcefe9ac4f8e3e013e87edb08dfa2c3d8b920e707b32e661614d18662cbefe952a89cad2f74d3e651a3da8c4a2b465532469655ad7aa99fb6490
-
Filesize
4KB
MD5ee74f7c8686354dacb8ca6e6008e5a8e
SHA183a9c78a088a562a04e5923621998d43255855c3
SHA256340ff9adb2dac4e54dbfc26cdf90e6906e263be5a7c853c0b90af5ebad3db539
SHA512492c91a65b5eb858957a332891c377577acee4917d2bf43d4f2f9ffbd69a129a8c5f8672e17629a2145e864499e9b3f5615be28004c022f28805f60a49ab6b04
-
Filesize
24KB
MD5d5656bab68cdffe0552e09002de71bb8
SHA17e0b4494fcb982efaec44abc8ab6edc6cabf53c7
SHA256dcf95864fe70a474f25efe5b2c6d178a04b4ce5c43dfe207bd6f00fa6be92657
SHA512f6df99d3c1418e7f65d09a56e073947bdb26b5ec9b669e76d6a43adde731f8b87fcf7619b69b1c0657b27310c9ee495414033f26d4395bb6f608df76a5fd9e50
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences~RFe57d7f1.TMP
Filesize24KB
MD50f3a69a40789de7fb9929d4bf7bddc1d
SHA111099c462a7bfff1cf35c73ca3def1df7e3c84c5
SHA2566fb9b1619283fa5893f81785aab3d4344943e6444002c55630ca23358acaee22
SHA5127900ff743537c4fac709dc2ee63963112091e5709b00c487ee8f7e147b6aadaf17c38c4cbce392d1e0215509b32617ee730d1f99ec901f33b32b7f1894a0db36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Site Characteristics Database\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_0
Filesize8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
Filesize264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_2
Filesize8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3
Filesize8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\data_reduction_proxy_leveldb\CURRENT
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\c706294b-cc9e-4dc8-a3c3-ce3a916bc9e6.tmp
Filesize9KB
MD5ee04e974c683894a185f16b45738609c
SHA1b9684c05f19899ec16dcd3c1a0cc4f66aeda6953
SHA256b464c20175ba987096120b849e680d6e050b74188cd0fab65d2108ba34bfc486
SHA512dd03c984286478b4b37eac223d6bac8d00d7111508e8675fdafdccd049b2d55fbafe38ae8b797b92a2385fad3223d02e1e656ded0121f2419d3a079b260a3f30
-
Filesize
1.9MB
MD5baf9c65740a624a1368c5daf804dbe75
SHA14d420290abe5a7cb44aa3ee6471e2f914d7f092a
SHA256f03a849ae2d670ff7e468da63c26789b8c738d830a0e49aad3a26ff5bc555805
SHA5125624e7a58773275af48696b0a382863402b61019a22f779d579b50f649aba21f4cd74d21bc6f58c57b10f0ecab03627897046b08282003a3516efc9f46612573
-
Filesize
896KB
MD5815d0325b08029dc535dc4c7c9daeaf7
SHA15f0d5f6624954c274bbce5edd211b28696897400
SHA25680c206cdeb203530a85f6700016155be6e1380d913c589bad66ca7a7ff209b4f
SHA512cb754b8f9d907be570ed3a5d218184970872c015b88e8ba78ae5425198fcf8ea6e8d01a4ecfbd8b3dbc1ac3eccfcc692297579cb5c9b67a560059038f62c8d0f
-
Filesize
1.7MB
MD5c318d3326ce1921ff20be775cbc99782
SHA194bb85d34e0fccf26fd58cfadfabe90606ec00f4
SHA2563ab3541c8960a2f4ccc60e0e8efc339d0f99d9cb96b0ea46a5e0440b020347d9
SHA51235556fabf9cd5c229fb2975a9075dd25b1ff913d152689a5e955b6214691779b6e8f58d53750bd9abb1ffddedc5b238a6284628c1b3a2286f59ef727aade7919
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FONJQPHHRK1X9RK9RGN8.temp
Filesize3KB
MD5137749bdbab7929103ff5a7756ab49c7
SHA1fa195b20f60474d988110ff8965f108fd38996f7
SHA2567e81deec5038fa143c458f01d654589fb4f150b5969e4d1b5d895488b4dda3e0
SHA512b1673d24e9d12df70406e72c91ee53a22935684b07e36e8c2614f78da46eace02fdf934ef4b0927af8a4d635f876bc7394aaf7c41e22caa990f1c32b84c256af