Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
02/09/2024, 19:47
240902-yhtwnawbqm 802/09/2024, 19:44
240902-yf71haxbmd 602/09/2024, 16:42
240902-t7z2ravemf 602/09/2024, 04:27
240902-e28pda1gjm 602/09/2024, 04:25
240902-e2agks1fqp 602/09/2024, 04:23
240902-ez6f8ssepa 602/09/2024, 04:20
240902-eydd3asela 624/08/2024, 02:54
240824-dd53xashql 10Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
sticking-out-your-gyatt-for-the-rizzler.mp3
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
sticking-out-your-gyatt-for-the-rizzler.mp3
Resource
win10v2004-20240802-en
General
-
Target
sticking-out-your-gyatt-for-the-rizzler.mp3
-
Size
175KB
-
MD5
27b535b4401ff51e152ef5f6fdaa2b5c
-
SHA1
eec3bba56eae9ff73d527c3638f3515d1c60da9b
-
SHA256
1381fa3fc79389ad8e9c2f4acffda477c4b5c6e45a07fec9de523de30ee9efa8
-
SHA512
9e322aef6c0c41f16fd0e101b89766032240570addba1a3be77b48207bc60c50a9ec3fbe82da9925d8d878ef111b625e629c05ee3dc23e30df10f8c523c8515e
-
SSDEEP
3072:nU/Sk+yOMHjhLbJdTJ/ffFFxEuy1hqFXNQlPgoTzS+GpQE4pCUW4hkFTMRsHeV8L:nUK1yTdLbJrXPxEuy1jFJkpaxBV6
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1194130065-3471212556-1656947724-1000\{5F795314-5C96-4B16-AFA7-34655295383F} wmplayer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1194130065-3471212556-1656947724-1000\{490B6C8C-B724-4D43-889D-9432AB783060} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 2508 msedge.exe 2508 msedge.exe 4192 identity_helper.exe 4192 identity_helper.exe 2588 msedge.exe 2588 msedge.exe 3000 msedge.exe 3000 msedge.exe 5996 msedge.exe 5996 msedge.exe 5996 msedge.exe 5996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4688 wmplayer.exe Token: SeCreatePagefilePrivilege 4688 wmplayer.exe Token: SeShutdownPrivilege 1216 unregmp2.exe Token: SeCreatePagefilePrivilege 1216 unregmp2.exe Token: 33 2720 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2720 AUDIODG.EXE Token: SeShutdownPrivilege 4688 wmplayer.exe Token: SeCreatePagefilePrivilege 4688 wmplayer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4688 wmplayer.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 2808 4688 wmplayer.exe 84 PID 4688 wrote to memory of 2808 4688 wmplayer.exe 84 PID 4688 wrote to memory of 2808 4688 wmplayer.exe 84 PID 2808 wrote to memory of 1216 2808 unregmp2.exe 85 PID 2808 wrote to memory of 1216 2808 unregmp2.exe 85 PID 2508 wrote to memory of 1780 2508 msedge.exe 97 PID 2508 wrote to memory of 1780 2508 msedge.exe 97 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 4132 2508 msedge.exe 98 PID 2508 wrote to memory of 1416 2508 msedge.exe 99 PID 2508 wrote to memory of 1416 2508 msedge.exe 99 PID 2508 wrote to memory of 4136 2508 msedge.exe 100 PID 2508 wrote to memory of 4136 2508 msedge.exe 100 PID 2508 wrote to memory of 4136 2508 msedge.exe 100 PID 2508 wrote to memory of 4136 2508 msedge.exe 100 PID 2508 wrote to memory of 4136 2508 msedge.exe 100 PID 2508 wrote to memory of 4136 2508 msedge.exe 100 PID 2508 wrote to memory of 4136 2508 msedge.exe 100 PID 2508 wrote to memory of 4136 2508 msedge.exe 100 PID 2508 wrote to memory of 4136 2508 msedge.exe 100 PID 2508 wrote to memory of 4136 2508 msedge.exe 100 PID 2508 wrote to memory of 4136 2508 msedge.exe 100 PID 2508 wrote to memory of 4136 2508 msedge.exe 100 PID 2508 wrote to memory of 4136 2508 msedge.exe 100 PID 2508 wrote to memory of 4136 2508 msedge.exe 100 PID 2508 wrote to memory of 4136 2508 msedge.exe 100
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\sticking-out-your-gyatt-for-the-rizzler.mp3"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:2608
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x498 0x4101⤵
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd9b6646f8,0x7ffd9b664708,0x7ffd9b6647182⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3540 /prefetch:82⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3932 /prefetch:82⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:12⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5576 /prefetch:82⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:5756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:5904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6348 /prefetch:12⤵PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6900 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1148 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6804 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6404 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6264 /prefetch:82⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6664 /prefetch:12⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6352 /prefetch:12⤵PID:5588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,15779656320256283730,15781902053213548908,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5660 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1296
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
62KB
MD5c3c0eb5e044497577bec91b5970f6d30
SHA1d833f81cf21f68d43ba64a6c28892945adc317a6
SHA256eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb
SHA51283d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38
-
Filesize
67KB
MD5ed124bdf39bbd5902bd2529a0a4114ea
SHA1b7dd9d364099ccd4e09fd45f4180d38df6590524
SHA25648232550940208c572ebe487aa64ddee26e304ba3e310407e1fc31a5c9deed44
SHA512c4d180292afa484ef9556d15db1d3850416a85ad581f6f4d5eb66654991fa90f414029b4ce13ed142271a585b46b3e53701735ee3e0f45a78b67baa9122ba532
-
Filesize
43KB
MD55d9674d3635de7a420d20b74cfbb9d0b
SHA164c02c84a46e3b867c8450e599ee1aa31d66c66f
SHA25673977e7b735626e4892f193331f679740f64ed9f12291e63b8de70523fcf8b64
SHA512691bd0acafef19aba971f22e877be2071f4b8acb7edd2a18093ec6d5373b4ec76da088ccf6b12ebae5cd3d5b6c3e8a708fa29ee62ec85ce91a6847ea987bde7f
-
Filesize
19KB
MD576a3f1e9a452564e0f8dce6c0ee111e8
SHA111c3d925cbc1a52d53584fd8606f8f713aa59114
SHA256381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c
SHA512a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
84KB
MD574e33b4b54f4d1f3da06ab47c5936a13
SHA16e5976d593b6ee3dca3c4dbbb90071b76e1cd85c
SHA256535fc48679c38decd459ad656bdd6914e539754265244d0cc7b1da6bddf3e287
SHA51279218e8ee50484af968480ff9b211815c97c3f3035414e685aa5d15d9b4152682d87b66202339f212bf3b463a074bf7a4431107b50303f28e2eb4b17843991c2
-
Filesize
1.2MB
MD5540af416cc54fd550dcdd8d00b632572
SHA1644a9d1dfcf928c1e4ed007cd50c2f480a8b7528
SHA256e4e53d750c57e4d92ab9de185bb37f5d2cc5c4fcc6a2be97386af78082115cbb
SHA5127692e046e49fcde9c29c7d6ea06ed4f16216ec9fb7ea621d3cc4493364743c03925e74244785588d1a4bfc2bedd32b41e7e66e244990d4076e781d7f4bbb270f
-
Filesize
232KB
MD56cf83526919e2c39b12ad0fabbe14542
SHA19921389f4b958bfa622aa2f8ff6bc893e38e30d5
SHA2566bf5dffc7f23eb0fd6bb5816831b57aab67f73df1ee9f78f9303891c9d424678
SHA5125c0c2b6db46e5bebe9881f407dad6b2a26068807f21d5c02b80ee14e07b415aa1d562632c11b427bbc3b53839027c92e34f3df8a1fcce8d53415eb8ff9620bf3
-
Filesize
20KB
MD5e922f99ffe1e8eb6ff6c80c8c2582339
SHA1a737e6dbe5bd43874b6b49a8ac947b36f406d47c
SHA256fdbbab8f74ff0685ddbae8725bb34b645af31f70da755eee412e6c64d78627eb
SHA512211182d1b99db02f0bb92786d57bc1cc8db182b4d56b5493c26059cdbb651fbf59a4ae0e9c712bf80ab94396e42c0ddd75ac52dc02422668b3525bc7d1625ce4
-
Filesize
47KB
MD52b5dfb1918c67607a49e6f784b48797a
SHA1a8830395cceb8de7687b3b751c6626546f307d47
SHA2565aa5e0d95839092c4545fea0928eeffac76690e8adf533d97b600e97250dac8a
SHA512eaab7c07e1dc33f43aae512b77a2217af2189aede83c97dc73f2be7a17da5b1a242f47c7bd272ab13c9513d837fce6ce0ed0114b27971543370413b2a9c5dcfa
-
Filesize
753KB
MD52a283c0fc03a66ed6276ac8cd23b6c99
SHA179cbe1c0c2f1e3acb5e3d85970207024ba1c757f
SHA2560d044d038870bdf1779be17b1ee25746cc8f39848a22b5960a8bdc591d042da8
SHA5127d4126e07c0dce56ad44a52c21e3d12ebbf74336f51a389d2ed47b798f9a8ba1dd527072cc531f9a4dba1bc57003d865cea4d66cafacf7acc162525687990cc4
-
Filesize
32KB
MD5eeed3865918f5f4f828ba620f28ad872
SHA11a9c62fcb83b3b07e93bb4598e26fec821ca8729
SHA256bd990ace13afd11503454ac99b3795d6d10d71f22f2805feb6566d2469c59a4c
SHA512ada4f8269e3984782b3d5ab29cd5655636f431073266367fe9d602e338a208aa359a72ec3145e3131eaf1ffcd4a5154dcb1e7d9a0aec989416fe0293e13298dc
-
Filesize
32KB
MD5c3a6cdab067beb2f78014e56210ae536
SHA1bd117962b45336e96e576c6243009e602d09ee47
SHA256e605878123ff1aa07ad7665de4fb689d90ac89e2cf51e91428324d213f540ba0
SHA5127fe893fedf95ec495216ace819e096448b544c32634c948a634e4e793b7ebc6d7740d7b739343412eb7af42604c9ba37deeadec016bc3caf286166718358ba14
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD58da45539fa9c3a6dce2c809bd4ae7607
SHA1bad6ad46a35adf447e40cb1ef1173829a1d3b877
SHA2560605ceef551704278278338477434373b2d6a28ad22f6aa8d7d1555ce2346608
SHA5129e581cd71788220ffbe0c65f635830cb6dd25387862d6bbdf593a0c4e31b3a9539219fb7cfbc585fa6ba89a2cbc782751abd19900315668ea1e08bd63eb2e998
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5a8c245acd2f9625f0de5b74bc1b87de1
SHA1f40584abeaabb089cf0bc94ee2bfe3281cc7dc68
SHA256bab20f32ce83f495aa4c36b1172464cd7883222e0b3b307fa266ef63a398cc8c
SHA5121f4535d699a2fbd80c940f1bd77410e4942e0ac00708b530c67664d2fea95c81391a280036bf897920c21df0b042c33570194a9ff663ec06599a1dce7f6debd9
-
Filesize
873B
MD5f804da016ac2b7d8e0ff3f733e144ab1
SHA115fb4f57dae429a45c5227c814da94cfec83346b
SHA256f06625e84faf0fa5d1a3b0576684ac2d9f69793317f0dffa26edf65a67daf9d7
SHA512230c2eab2ca4831c749741b785e46d86c270ebc5cffd2eec60ff305f27cd2830b5ae8293449508669186412eb0521048c2be381419a8435e94f50a61e7d6d734
-
Filesize
4KB
MD5f56640235dfc2b419e0cfeb78bc1f297
SHA177e0c43237f28b6ceb9117f9c2c083d22eb39967
SHA25691acce32f34128198af3331207f01a8b27cd344e710f058f6e91f26b1291db38
SHA5126e81599949f0e5443210046bc2b4d28443b4ca0eb14e2af676352394e63b1bf608de3abf1752ed05d46727e7bbdb03d90a546daccb873abe750d2fbd60949890
-
Filesize
8KB
MD5709b61dc51ecc51cd7ea87a8e7f95965
SHA1b40e33c1f87648467b4727a928600c43bf5b37a8
SHA2569c3a52bc0c10ca19802b4db43d8999feee65e304600da9750a6a2b32b9694b04
SHA512748a55650624cf7693be6e6bdbbefe997d70fbb2534a4c31727d9c1dfbbc710959018627deb25cb6bf4bffa4974d4b0771551677d1db0440bf51b543f0b191c9
-
Filesize
5KB
MD53b739c3ab787376293b1439d02638da3
SHA12f3a70ce582d6497566a0ac126cee73ff9fabd74
SHA256014fb2c31e06be721863294bcd7eac4813255d648536cbbbab76227042afb1e9
SHA5127619d4612fb909e745ec223d07d12a0480c4a577b0a4c643356ed6d6431afb37fb2c5f9149219b0e7b0020b90add9bcd143ef412ea61c3793f8db67bcc69ebc9
-
Filesize
6KB
MD512762a68c44bdb150bf782a48c18ace8
SHA1bf0f0b7f66561f19d356f4113ed0c7e2265a2093
SHA256692ac4adffed44026d6f0a0ee8acc1070bdbe5070502565bff60feaf2880f54f
SHA512230e15699ef999285d9e5d8bfa2fcca41420b3ecc08e6586f720900f28b27fa0c685f9168b12674e47a1a4bef37379fad06c5afadc046eaa457d0a882239c78b
-
Filesize
6KB
MD50f893810f22c43c3b5f8a6111b74c86a
SHA1a63293804d9178716bed5a983c43049c17e4be8e
SHA25610bb1afc5a5dd14b3dfbcf7165787eaf1abacf1314f7ff452acdcf0777fe79da
SHA5120e79d8a5e8da993a9441e5f192f70ec8278954fd0b63b3bed1ccd2d57e2aeab4e98e80d9fdb4ebc3ad9d19faf9171037a1ec4849af310289694aedfcfdc4af67
-
Filesize
7KB
MD5f7f7affd6260b1723b8cac35a8a581cb
SHA128ec96be38a27966800290e2f4e11a38a8397bad
SHA256f69d6b30061088dc00363e3712fee5844ccc29e3edbe28834aa8517037532617
SHA512d0b065583898e5e3ba77bf2259c3ca65700a96843a0b475882846a9cacff786fb321f7e76d7c9e3177a2aa83f88fca47d1f8a6fa8eaf132d03f5f48d5368405b
-
Filesize
7KB
MD50a7e0f8cdff6b0332ee2187cc38d2017
SHA155528034ed2ec222e02993063af7f4a8a7c358b3
SHA256694b051bc8f835888eb053d4ba12db23104d258765fd7cf1a295e03bcd1d8337
SHA51209f13f8823780e595cb105b728f59ff8b91e341eec261ef540516353edf6576be06e984d528193e8df7913ac412467c7e0794823ba4e92a113b3c121015b13fa
-
Filesize
6KB
MD5ac3babbcf5d56a7bb598e7628ba49562
SHA13e2e29763a5df6f5a2531d57bd3e919251c51bce
SHA25636f33c574e4e2e5c4074e8e96dc27e558c82f4cde9ac488eae2a8056688e75c7
SHA51269b277665dceb3985318d56da0ea0206cd846097104af276b7c39386e171750bcde92c44961b5e9d09d59f96510cda93213df54f771e333988374133917b74a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\9385e80f-0e80-417c-ab3b-4acc4606c377\index-dir\the-real-index
Filesize2KB
MD5dde67d07a08c2155ab6f127bed09b923
SHA1071fb2d31ffe5884a17ddd9d558ccaaf59d4d5fe
SHA256a47e6f6520608ddd0db0c8b1c3704739d083dda36a1824b89d937adfa102cef9
SHA512e379f3341b3b218f8a30aa1333537a88ce74bed15059427ed0e72edbc19d49b892a1ccbf3c81e78c6bad2130761723c3ab40d8826410dc91fa9063eb953edb29
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\9385e80f-0e80-417c-ab3b-4acc4606c377\index-dir\the-real-index
Filesize2KB
MD5fd64d280864907be8769f6499aaba1be
SHA1e9ffb7caabe06d2d1915e6cbc0dea36a1e3b45d2
SHA2566e7859d4f0ec3e2cbd660cfc7de19dda5425dfbe0b7f53dec1c0795669b9fca6
SHA5120bf97041c5fb1f98ba015aa70e595cb59f79ebff1f409e4cab801aa471b11333befcd6807a724beda00ed81fd3602297021ccf4804a29c1b83ed7d5d94638206
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\9385e80f-0e80-417c-ab3b-4acc4606c377\index-dir\the-real-index~RFe58d983.TMP
Filesize48B
MD508a8deda7d96cb96e52c64911c571ebd
SHA19cea8bdc2a355cf1a7970f630444f7e7ea7f0c74
SHA256646b759f757a317f27fc230b5b5b73aca9155a221e92553c80e2b451293176d3
SHA512aaff0ffea46f317f52b5e41989326e841c5bab39dd7ec3284fbfe8b5ea45995226cd60977784c97be2bb1ae12a4392fb063e72569ee8be721cde62a9cba446ca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\99d123bd-c3bb-494d-80b2-5bd501a1d68c\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\b83ee2b4-e21b-4ae8-8c22-8e51b16b3ab2\08af28b669e0c966_0
Filesize2KB
MD57d09f0544f9d33fe902a9f7881f75cb2
SHA1b5fd0b292bce0f2992a9b5ee93937c0898d084c4
SHA2562eb56c367b83785f4c54d64cb0991fabba6da777720d8d9117c4f095b3628b3b
SHA512a3aa4b4dc51e044d239e60f80188ba6dcfd09a0a6a6534f076e32858a5e8d7a032f8a5780a9382218ce2a1179add6ec6e38dbd091167b83904fd9c61b5458104
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\b83ee2b4-e21b-4ae8-8c22-8e51b16b3ab2\index-dir\the-real-index
Filesize624B
MD5642e1e5d9a5cf236b42e32b15bfd9460
SHA171a979156d174a0319cfb024cd11e37f7f20b08b
SHA25643e3a2205ac6c2d881d48104d0ff8174069108178348155dad3b172a29708262
SHA5127a2fd38b6430bcf8c43662a6ccf5b32daa38e14f22854a2ed963461d4c5cbaa6843ae176b441ecf475e22cae706fd96506db250b445570df1019c55c7065214e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\b83ee2b4-e21b-4ae8-8c22-8e51b16b3ab2\index-dir\the-real-index~RFe5935fa.TMP
Filesize48B
MD52c8f4465ac21c9c384dc49b08c87c013
SHA18a3bd5de90993b58a8b9f8e10d932e171a8feb27
SHA256d8650bd9de328bfa192e1373d8122c746a4d69b7d547850ea10a3e342f9925ad
SHA512470caf82eb4462d871b7863e8fb94b6cff172e09c853e02dab064c28ea6e59889a9eebfabcbcf6dec7aeade3c78df72196071d45b4fa1c265ef86212205e34c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize153B
MD54da47c2d4bb13ef46d2c6cc619cfa40d
SHA153d4fe2e83163f36d4d71de722403686d5b46ba8
SHA25625769551b10b534426d6fbaa0a279913c521d1f8b7d182ba47de9a575bd543a8
SHA512b729f4d81d04304971eebfdd29addd6a7ca56e217bc2119e5b2eb81cf9a872b5dd0fa99a5cffb4ad3717e999fe76afad1be538db3fdb762bf9885554c43e795e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD535513b9c58c9764019948ce3e25388e9
SHA1a89662231b56c84eb8207453c7012dd545fa0afa
SHA256689eee2fe8f472d73b025fc6031d1adf6e2aceb0594683c8293e647b29ff69f6
SHA512171f9d26796753eeda34e13cbad10f95a7f671b865766191c539a05c78bbc7ee06fa49878c6a98a13e3a5d7cfc6c2cecb24979045ca574d0503cb4942116543f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD516ecab3cd01d8eec5ceb32ced52a3439
SHA172157a3f89365abe56ba66772f769331752d1e18
SHA2560f48ef292e47ef7298c8a6b0357409b24241eabef8702d1c616ebbcd60b8a28f
SHA5120d54c6736e2511e3a4129291f4622ead431f9a14e6ae227e4eea1e804f09826cfbcc6f963bce603a8a8ee1e766c250825f551efdfa8d208b24cce3d4be21c43e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize148B
MD5749dc174e0910a97f286ff8fc6d68406
SHA151a0adb8e47a6f24ba736c1c3c604949e4fc3272
SHA25674ff75f645036c95c3510107b05d813fa778512bbaf8870fb62601158984ba2c
SHA5129b905d81010a93d16d37ed7d49152beb883ca3aabb811471d74e80aa09f7ddea7a6ff917f6183c093b7f7e664eb1a7e23c48d7538e1cdff8bdf1a5b7e0295eea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize157B
MD51f22f5191d845234d8bb61c301fc168e
SHA15331db1889d6109afccf6975d6b03bc931038551
SHA25658f540ac9cea1096f491114097be0c8f0aaa59928607354f55925bf3125ade84
SHA512556aaa53044fd328a0d7bfdc7aab932d391a6ecd83a5a0bce7971ebc6712cb18585df794bb924f01a928c1a45e8cafa7d2dff718059dbc1c94a50c3defc3edf5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5c7c1843c51e5ef467bae8033ea997211
SHA1b72bb13802bc3e5ae1399961f9b8f8ae56d887db
SHA2561f70b0e5521acc04549a0ee732e5ff9a0073b67313c1212d21fb7c07213beb00
SHA512ec704cb7fdd747360814f223c69e8f6ce48beca6b1817638da9e0d42f6ac04962a4fa9f3e3e70c7600bcc9a7a441024cb10809b064f4d7d1ddb193b6a22c1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize84B
MD5b11bab2b14d4009d5a58a7954f1af812
SHA18c2c57d80bd07cbb64c193f94b2120326622b47a
SHA256256f3c7e80a0111b577409927ec214bbc2470ac16f415b2b8a2b6befcd8d89b6
SHA51231cb79f7f0ea3405293b0b67aa2821e9aba61b9b6767a7597051d2fef7e4c88aef387cb4accbfcbb0835e9cc5805dc26046faa250926830b121216e5220910d9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD533659ea2903a3f68cc9f92ccde0f1726
SHA1ab2c449ec34de635945c883f62484df8bee94bd1
SHA25625adb738ac8a6e246247113b7a4ed2630ac1616b9ad14474af35e4b74e0129ce
SHA5123678add5042e5c4084fdfcc2844c071ba2ad1f57478f7e4a7b89becc3bd94d044b3f8b130c8423507161801b053a5e543e135f7e433e40be352a7b047f29df3d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe592c94.TMP
Filesize48B
MD5989ea5884de3f457290be916e1d80db7
SHA18fd594c937c4431673b0636f265ebda9a853a0a3
SHA256735691b80f63a8747f0e94314f853e5c044184af139d27d660fade79550ad277
SHA512bde0366326189e238a01e85f839db9cfa02e2f1d97499fda0eebb15e96c5f62ab6bc1aafe968aced481d733984bd82c0ebd285ae75bb544b35f455e360699ef0
-
Filesize
1KB
MD5cdebac772333dca5b21751c3b2487edc
SHA1be1ad2fe25d0d54ebd53af93d63bcf0f068be436
SHA2565b83f6ab9df3b83196285466a5b04960cc7428e875531a997981a1ed654a2d04
SHA512ef69cded3f1a9b44664f9fc69243f8a94916a9c8389aeb53659d0f14979c6b6280b497a95d826bd8a4d66fdca696462c1c5303f470e91bb22b797a04f29ddbf2
-
Filesize
2KB
MD562c6ee88541e923286830ea372e60cf8
SHA1c4123387ac5735a7b20e508157124849ede68003
SHA256f09b309f19d20553df7c4ff7ed15c46be5e7946ec6207aab3e27ce80d307732e
SHA512707532c438c244ffc5be6eca2ef551d8d94731315604dac60ca868fcc3347b3051e1ef762fd8d44bffdf3f209fa2fb2cfd615a5fe1873c32b80d8dc4e4e6250f
-
Filesize
1KB
MD573ce6e451a2f35b091e9c72d604b66a2
SHA11d4f959f43b8220f83fd9b4c9489dcd070caccec
SHA256f4a90210ad7395895d628a1e8c6e7a6bac7efec796b07779d0eafb507c9ea766
SHA51247668bb7f6cc678b6ff30df3e3e4d07379356536af10e492152db0ddcc021f402cd58a453a2e359589f19d80e1d0fea8b26f11d35fddbd3bf3b9929aaffc8ed2
-
Filesize
1KB
MD5ff5f4ca036f1f2cc9810b7fb678f6df4
SHA1005c51d313908a115948a3e100b793ac5402412b
SHA2561c5106d1df547cbbc265347aa3d2eded85e5b6c5c8f69e706a5187063296087f
SHA512de6b5ff58b8c2da8725b1bb99350525e61eb2ac3e577fc0755b28c50de3372a4a4fa459e3e647fa6c1482cd1d626142b6189a469006e810c7365dc48e4f022b3
-
Filesize
1KB
MD5406143a62b2828635800f1dd34bb6fe6
SHA1f7f4a1face251c28fdfe58e27cf9a2f269c0eacf
SHA256eca11a83cadf0b43cc6c11c893ea1e1a7500c4ab9e96e3d44caca862f8350b3f
SHA512e300542db5aaec964fc55ca3b773f198c834bd8d355aa83e747c113bab511e7cad18b230cd46a54844099366e9dce71d1deb28a187993059145e8e11514a6964
-
Filesize
1KB
MD54710930196590e27f5ad38d1b547eea7
SHA1ccfdcbfef57c8ff791f75080fb1475c11d9af37a
SHA256e2720d5480d2982db34adc82aba329f77550ef0c08b387ee4d9b5a841bef5f6b
SHA512cc5aeb11fdddeae17074d05beac127e256ab04ff05d6ec120d7e04dc7a35ab8de941566a4d08a51dd9e0140c4fd4a84c5c58a7543c6560d02d202d0c03314998
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b92fb8fdc9b0a3a20d916d1b1d71a2e3
SHA1858161f778466fda8ac3afa96ec263a136f6a6a0
SHA2561d8c08d7fdb03a3c9fc3a6070a0aaac246f448b370e2c94131cf4f1ee8bfb896
SHA5124d65e71633cf970d53afe0f4c4b7bafd2c09781f8d3f670b97c5e4ce0ffcb8e819c514a48b1ec61b05474b38a740fcee3b0a23d5b270cdee14a9232fd55308ec
-
Filesize
12KB
MD5afc1fe266051fd62fb4547601bb647fc
SHA15d8b111359eddb4feed46fca4a8143ae3127b337
SHA2560bb9184f2f347374982b726affdeceb8ea55cbbdbb9829d3bdab28655d1e791c
SHA51249c188356100a0b83d0be591c30bcbff7975542807dc581cd1e81707e5539bd134a3444340f3f689592e7cccc554bc465fa3002e1fea51a6446f755a60d3d97f
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
1024KB
MD5f3f71aa3b29a1e5d278e674c5f5c4225
SHA1995b0c144e1d9cbae0068f6325317de41186ed87
SHA256e756ca23c1328568b2668dbbb54b264c9c046e56f2e83342fba1fe899d717a2c
SHA5128f5c33ceecb868ac59f8b42674481c667d819bc85ff8c1a4d0eee2ada84bb59db1f986b75888db0345702890174af14afb792bf7d2103521dba3af4ba036c12c
-
Filesize
68KB
MD576d9fc126f260b18548d593d7c2685bf
SHA128b2abb2db7f27f2e57fe18fb39438272e099145
SHA25636957251171714ac19c53b8b495bbaaa1a731f0ac9597e8e38e39d5e69855d15
SHA512672d8a46b5f287f3ecebbc4e319a1ac012bdc9b48af9cdf444242274200d5b4439e66a2694d85eac5e91a18367beb7133f9a6d274f23f37660b0674546b690ea
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD560b282ba60973e4d20dc94979360aec0
SHA1b3d0e6748df28e7470fd159aa0f50e4178e1ab36
SHA256d9d873cfe5f1ad98afbceffd3bd05bd96e227f52be0d804025d926e1af4eceff
SHA5129ff2cb3a7f43a9977122e7a355af784dae2b80984165cf01344384578c49b22f2e0240c53d38ba983130cd1d0d78dca6e065c1f6eda4844016c7558e64a33ab9