Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2698s -
max time network
2700s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/09/2024, 21:33
Behavioral task
behavioral1
Sample
Playit.gg.exe
Resource
win11-20240802-en
General
-
Target
Playit.gg.exe
-
Size
41KB
-
MD5
e462d14323ba8c46b3c49c6f0a47a28a
-
SHA1
28812e5914ffba4cd87a2394e9fe1ce41b5384be
-
SHA256
3ba9770b83cd3c91ab3a959acb7deefc9bd5af4bc90ae46f3be32412d0de7e7a
-
SHA512
1bb75204a33e91e1375490707e0de44758b558eca260999f8b4f53c8748593752efbfd28fceaaf1b0d92caf7b6e886c4ba10aeffff7fab9524510f3464b9b610
-
SSDEEP
768:hmrJDweBDuOkScrbsN/x6eqCAr43MxfJF5Pa9p+gt6iOwhi3/ibl:h0DwewicrbsN/YVRrNRF49Igt6iOw8ax
Malware Config
Extracted
xworm
5.0
category-rose.gl.at.ply.gg:36607
0vUq2IOz4vEduQhF
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/740-2952-0x000000001C610000-0x000000001C61E000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/740-1-0x0000000000D20000-0x0000000000D30000-memory.dmp family_xworm behavioral1/files/0x000600000002a671-57.dat family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/740-3013-0x000000001D820000-0x000000001D940000-memory.dmp family_stormkitty -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wscript.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2412 powershell.exe 3028 powershell.exe 1832 powershell.exe 1092 powershell.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" Playit.gg.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3192 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Falcon.lnk Playit.gg.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Falcon.lnk Playit.gg.exe -
Executes dropped EXE 52 IoCs
pid Process 4340 Falcon 2884 Falcon 804 Falcon 4104 Falcon 3556 Falcon 5012 Falcon 1960 Falcon 4724 Falcon 2604 Falcon 4384 Falcon 864 WinNuke.98.exe 1776 Falcon 1008 Falcon 2256 MrsMajor3.0.exe 4248 eulascr.exe 1092 Falcon 1152 Falcon 4912 IconDance.exe 2344 Falcon 4916 ColorBug.exe 2808 Falcon 3788 Falcon 2076 CookieClickerHack.exe 2500 Falcon 132 Falcon 3840 Falcon 2604 Hydra.exe 1612 Falcon 2632 Falcon 5612 Falcon 5180 Falcon 4984 Falcon 5736 Falcon 3024 ngrok.exe 4236 Falcon 5828 Falcon 2248 Falcon 6120 Falcon 2420 Falcon 5440 Falcon 5268 Falcon 4424 Falcon 4456 Falcon 4240 Falcon 2372 Falcon 5596 Falcon 3408 Falcon 836 Falcon 3748 Falcon 3236 Falcon 5424 Falcon 2260 Falcon -
Loads dropped DLL 1 IoCs
pid Process 4248 eulascr.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/4248-2048-0x0000000000140000-0x000000000016A000-memory.dmp agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Microsoft\Windows\CurrentVersion\Run\Falcon = "C:\\Users\\Admin\\AppData\\Roaming\\Falcon" Playit.gg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\~~CB = "cb.exe" ColorBug.exe -
Drops desktop.ini file(s) 16 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini Playit.gg.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini Playit.gg.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini Playit.gg.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Playit.gg.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Playit.gg.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Playit.gg.exe File opened for modification C:\Users\Admin\Music\desktop.ini Playit.gg.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-131918955-2378418313-883382443-1000\desktop.ini Playit.gg.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Playit.gg.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini Playit.gg.exe File opened for modification C:\Users\Admin\Links\desktop.ini Playit.gg.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Playit.gg.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini Playit.gg.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Playit.gg.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini Playit.gg.exe File opened for modification C:\Users\Admin\Videos\desktop.ini Playit.gg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 121 drive.google.com 172 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XBackground.bmp" Playit.gg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinNuke.98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IconDance.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ColorBug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hydra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngrok.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 4108 taskkill.exe -
Modifies Control Panel 21 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\Scrollbar = "122 162 20" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\Background = "180 179 156" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\InactiveTitle = "188 143 215" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\WindowText = "5 162 206" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\ButtonFace = "20 129 4" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\WindowFrame = "240 160 172" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\ActiveBorder = "218 92 249" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\InactiveBorder = "195 201 236" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\Hilight = "111 22 216" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\GrayText = "106 95 122" ColorBug.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\MenuText = "89 42 191" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\HilightText = "95 224 90" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\ActiveTitle = "184 212 172" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\Menu = "114 51 30" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\Window = "237 139 77" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\TitleText = "143 209 167" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\AppWorkspace = "239 217 45" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\ButtonShadow = "201 208 80" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\ButtonText = "124 37 61" ColorBug.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Control Panel\Colors\InactiveTitleText = "101 143 33" ColorBug.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133709964101092147" chrome.exe -
Modifies registry class 25 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-131918955-2378418313-883382443-1000\{753CE1D8-DE46-40AE-8DA9-956F3C779B90} msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-131918955-2378418313-883382443-1000\{2BB1449D-9270-41C7-BF50-834FF57F9554} msedge.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \Registry\User\S-1-5-21-131918955-2378418313-883382443-1000_Classes\NotificationData explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5048 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3616 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1092 powershell.exe 1092 powershell.exe 2412 powershell.exe 2412 powershell.exe 3028 powershell.exe 3028 powershell.exe 1832 powershell.exe 1832 powershell.exe 740 Playit.gg.exe 2736 msedge.exe 2736 msedge.exe 1420 msedge.exe 1420 msedge.exe 568 msedge.exe 568 msedge.exe 1112 identity_helper.exe 1112 identity_helper.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe 740 Playit.gg.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 740 Playit.gg.exe 3616 explorer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 35 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 740 Playit.gg.exe Token: SeDebugPrivilege 1092 powershell.exe Token: SeDebugPrivilege 2412 powershell.exe Token: SeDebugPrivilege 3028 powershell.exe Token: SeDebugPrivilege 1832 powershell.exe Token: SeDebugPrivilege 740 Playit.gg.exe Token: SeDebugPrivilege 4340 Falcon Token: SeDebugPrivilege 2884 Falcon Token: SeDebugPrivilege 804 Falcon Token: SeDebugPrivilege 4104 Falcon Token: 33 900 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 900 AUDIODG.EXE Token: SeDebugPrivilege 3556 Falcon Token: SeDebugPrivilege 5012 Falcon Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeShutdownPrivilege 1904 chrome.exe Token: SeCreatePagefilePrivilege 1904 chrome.exe Token: SeDebugPrivilege 1960 Falcon Token: SeDebugPrivilege 4724 Falcon Token: SeDebugPrivilege 2604 Falcon Token: SeDebugPrivilege 4384 Falcon Token: SeDebugPrivilege 1776 Falcon Token: SeDebugPrivilege 1008 Falcon Token: SeDebugPrivilege 4248 eulascr.exe Token: SeDebugPrivilege 1092 Falcon Token: SeDebugPrivilege 1152 Falcon Token: 33 1976 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1976 AUDIODG.EXE Token: SeDebugPrivilege 2344 Falcon Token: SeDebugPrivilege 2808 Falcon Token: SeDebugPrivilege 3788 Falcon Token: SeDebugPrivilege 2500 Falcon Token: SeDebugPrivilege 132 Falcon Token: SeDebugPrivilege 3840 Falcon Token: SeDebugPrivilege 1612 Falcon Token: SeDebugPrivilege 2632 Falcon Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 5612 Falcon Token: SeDebugPrivilege 5180 Falcon Token: SeDebugPrivilege 4984 Falcon Token: SeBackupPrivilege 4820 vssvc.exe Token: SeRestorePrivilege 4820 vssvc.exe Token: SeAuditPrivilege 4820 vssvc.exe Token: SeDebugPrivilege 5736 Falcon Token: SeDebugPrivilege 4108 taskkill.exe Token: SeDebugPrivilege 4236 Falcon Token: SeDebugPrivilege 5828 Falcon Token: SeDebugPrivilege 2248 Falcon Token: SeDebugPrivilege 6120 Falcon Token: SeDebugPrivilege 2420 Falcon Token: SeDebugPrivilege 5440 Falcon Token: SeDebugPrivilege 5268 Falcon Token: SeDebugPrivilege 4424 Falcon Token: SeDebugPrivilege 4456 Falcon Token: SeDebugPrivilege 4240 Falcon -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe 1904 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 740 Playit.gg.exe 340 OpenWith.exe 4664 OpenWith.exe 3616 explorer.exe 3616 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 740 wrote to memory of 1092 740 Playit.gg.exe 82 PID 740 wrote to memory of 1092 740 Playit.gg.exe 82 PID 740 wrote to memory of 2412 740 Playit.gg.exe 84 PID 740 wrote to memory of 2412 740 Playit.gg.exe 84 PID 740 wrote to memory of 3028 740 Playit.gg.exe 86 PID 740 wrote to memory of 3028 740 Playit.gg.exe 86 PID 740 wrote to memory of 1832 740 Playit.gg.exe 88 PID 740 wrote to memory of 1832 740 Playit.gg.exe 88 PID 740 wrote to memory of 5048 740 Playit.gg.exe 90 PID 740 wrote to memory of 5048 740 Playit.gg.exe 90 PID 740 wrote to memory of 1420 740 Playit.gg.exe 94 PID 740 wrote to memory of 1420 740 Playit.gg.exe 94 PID 1420 wrote to memory of 4064 1420 msedge.exe 95 PID 1420 wrote to memory of 4064 1420 msedge.exe 95 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2788 1420 msedge.exe 96 PID 1420 wrote to memory of 2736 1420 msedge.exe 97 PID 1420 wrote to memory of 2736 1420 msedge.exe 97 PID 1420 wrote to memory of 224 1420 msedge.exe 99 PID 1420 wrote to memory of 224 1420 msedge.exe 99 PID 1420 wrote to memory of 224 1420 msedge.exe 99 PID 1420 wrote to memory of 224 1420 msedge.exe 99 PID 1420 wrote to memory of 224 1420 msedge.exe 99 PID 1420 wrote to memory of 224 1420 msedge.exe 99 PID 1420 wrote to memory of 224 1420 msedge.exe 99 PID 1420 wrote to memory of 224 1420 msedge.exe 99 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wscript.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Playit.gg.exe"C:\Users\Admin\AppData\Local\Temp\Playit.gg.exe"1⤵
- Disables RegEdit via registry modification
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Playit.gg.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Playit.gg.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Falcon'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Falcon'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Falcon" /tr "C:\Users\Admin\AppData\Roaming\Falcon"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff800783cb8,0x7ff800783cc8,0x7ff800783cd83⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:23⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:83⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:13⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:13⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4008 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:13⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:13⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:13⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:13⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5396 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2876 /prefetch:13⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:13⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:13⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:13⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:13⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6192 /prefetch:13⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6604 /prefetch:83⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:13⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7060 /prefetch:13⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7136 /prefetch:13⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6868 /prefetch:13⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:13⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:13⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6300 /prefetch:83⤵
- Modifies registry class
PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1064 /prefetch:13⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:13⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:13⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13231317697133895812,5225420291555672028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:13⤵PID:132
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\Downloads\MadMan.exe"2⤵PID:3904
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\Downloads\MadMan.exe"2⤵PID:2488
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\Downloads\WinNuke.98.exe"2⤵PID:1868
-
C:\Users\Admin\Downloads\WinNuke.98.exe"C:\Users\Admin\Downloads\WinNuke.98.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:864
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\Downloads\MrsMajor3.0.exe"2⤵PID:4164
-
C:\Users\Admin\Downloads\MrsMajor3.0.exe"C:\Users\Admin\Downloads\MrsMajor3.0.exe"3⤵
- Executes dropped EXE
PID:2256 -
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\1F36.tmp\1F37.tmp\1F38.vbs //Nologo4⤵
- UAC bypass
- System policy modification
PID:772 -
C:\Users\Admin\AppData\Local\Temp\1F36.tmp\eulascr.exe"C:\Users\Admin\AppData\Local\Temp\1F36.tmp\eulascr.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\Downloads\IconDance.exe"2⤵PID:5084
-
C:\Users\Admin\Downloads\IconDance.exe"C:\Users\Admin\Downloads\IconDance.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4912
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\Downloads\ColorBug.exe"2⤵PID:5048
-
C:\Users\Admin\Downloads\ColorBug.exe"C:\Users\Admin\Downloads\ColorBug.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
PID:4916
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\Downloads\CookieClickerHack.exe"2⤵PID:4980
-
C:\Users\Admin\Downloads\CookieClickerHack.exe"C:\Users\Admin\Downloads\CookieClickerHack.exe"3⤵
- Executes dropped EXE
PID:2076
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\Downloads\Hydra.exe"2⤵PID:3500
-
C:\Users\Admin\Downloads\Hydra.exe"C:\Users\Admin\Downloads\Hydra.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -c explorer shell:::{3080F90E-D7AD-11D9-BD98-0000947B0257}2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2028 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" shell::: -encodedCommand MwAwADgAMABGADkAMABFAC0ARAA3AEEARAAtADEAMQBEADkALQBCAEQAOQA4AC0AMAAwADAAMAA5ADQANwBCADAAMgA1ADcA -inputFormat xml -outputFormat text3⤵PID:1696
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --disable-3d-apis --disable-gpu --disable-d3d11 "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data"2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0x84,0x114,0x7ff800783cb8,0x7ff800783cc8,0x7ff800783cd83⤵PID:128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --disable-d3d11 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1992 /prefetch:23⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --mojo-platform-channel-handle=2080 /prefetch:33⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --mojo-platform-channel-handle=2692 /prefetch:83⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:13⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --disable-d3d11 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1980 /prefetch:23⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --disable-d3d11 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2492 /prefetch:23⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:13⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:13⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:13⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --mojo-platform-channel-handle=3496 /prefetch:83⤵PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:13⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:13⤵PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --mojo-platform-channel-handle=5468 /prefetch:83⤵PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2284 /prefetch:13⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3648 /prefetch:13⤵PID:340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --mojo-platform-channel-handle=5256 /prefetch:83⤵PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --lang=en-US --service-sandbox-type=video_capture --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --mojo-platform-channel-handle=5304 /prefetch:83⤵
- Modifies registry class
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,17202951173225673605,15095672717489732095,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:13⤵PID:5676
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --disable-3d-apis --disable-gpu --disable-d3d11 "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data"2⤵PID:4448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff800783cb8,0x7ff800783cc8,0x7ff800783cd83⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,2004040832151238572,14583560711692988571,131072 --disable-d3d11 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1932 /prefetch:23⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,2004040832151238572,14583560711692988571,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --mojo-platform-channel-handle=2080 /prefetch:33⤵PID:4240
-
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3192
-
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /im ngrok.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\ngrok.exe"C:\Users\Admin\AppData\Local\Temp\ngrok.exe" config add-authtoken Your_Authtoken2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3464
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:804
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:1200
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D0 0x00000000000004C81⤵
- Suspicious use of AdjustPrivilegeToken
PID:900
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x114,0x118,0x11c,0xf0,0x120,0x7ff80063cc40,0x7ff80063cc4c,0x7ff80063cc582⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,830366739645966515,12364891723062902075,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1400,i,830366739645966515,12364891723062902075,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1976 /prefetch:32⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2212,i,830366739645966515,12364891723062902075,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2072 /prefetch:82⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3092,i,830366739645966515,12364891723062902075,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3340,i,830366739645966515,12364891723062902075,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4424,i,830366739645966515,12364891723062902075,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4400 /prefetch:12⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4780,i,830366739645966515,12364891723062902075,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4828,i,830366739645966515,12364891723062902075,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4752 /prefetch:82⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4364
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\PushConvertTo.vbs"1⤵PID:2692
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D0 0x00000000000004C81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:132
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:340
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4664
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3616
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding1⤵PID:4364
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 572 -p 416 -ip 4161⤵PID:3820
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5612
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5180
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5736
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5828
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6120
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5440
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5268
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
PID:2372
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
PID:5596
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
PID:3408
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
PID:836
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
PID:3748
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
PID:3236
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
PID:5424
-
C:\Users\Admin\AppData\Roaming\FalconC:\Users\Admin\AppData\Roaming\Falcon1⤵
- Executes dropped EXE
PID:2260
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f0b31af8586423ebf063942761d1e945
SHA15887de4510ada66fa9761721bcaaeb41abf1d9b3
SHA2567306b9a8d266bad9e1e1a23fa4ebdf6b69d4fcae689d2d349c9a8d6354b0b346
SHA5123d1846fca872b66307ec272f684b8121f3ca87c3f912e037a945edef5363411e01f438542bd9c96179ec2cbde90dd96575084c417f844b6899431416b3fa3cdd
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD581090d73c2d4e8e5bf3d9ec3374bc0f1
SHA13dd57ea549aad8118169b680b6af3a74bbdfc400
SHA256de5425b5eae2e2018b41d6c8b655462aeeca9094018fe547b27f31ae2866c8fd
SHA512e395e7d5b2794771921d1534ec6a80513eeea6a61e7fcbd8ee6b2a73fec2f50538da7bced7c1ef0f3d85eb0e9c4504e148fd13d30022e24a0da0d9bd7debd909
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5a4efa738253ba220db1d7b84776e11b7
SHA14e7e4b534e53f7ca5ca66e805b0f9eaa66f520da
SHA2561907833ff31968209b1e912c15e82c6057a77a8ca95c575692502b93c214ccb8
SHA512a229e011de6793dc767626c938ce58243354bf5c32101ff97459db7ae66a16d61fba60e27af169b7680c0542e4740828e3a5adc202b06e76e0579c97054e7370
-
Filesize
9KB
MD5976f55067ba23ae4b4913b745cadf19c
SHA122073e17a1ee147909ed9476cf74ded55b772248
SHA2563fe9ddff4e573538f6a8b60c721709238af4fde1d146e6fbc78c1c787ba9602c
SHA5128dfd912e47834ef4d8063f33fa512b78045ac72d3c5449436e6b1e8d1c881fc9d4f198eceb416e8a15de67196ce52270ea5647ba5ccb585faca8b01148f6db48
-
Filesize
15KB
MD5e991e13bdbba5e5fd95513318a42cb6f
SHA1bef6f7c37994c84b059201c4d581657338683e3b
SHA256b7b8371867271fa9b71c60d115a3a95db18a6a15a6e34bd7ae1bbabcb267a99d
SHA512da9e04c2cdc7b7e70c7d48108e924bfb96242aa0a0b8803ab83e41f5d62152a64829dd4ef5b93b9d6e40712209f104369be8febd8e4a5117e6541211e695cb82
-
Filesize
101KB
MD5fdc516229b1c3892e4f90bbc7509e130
SHA193a42eae2a1d46fe266f31f5038f26f7c83e6a0b
SHA256f54f8fe8ec1d51c812926e4e794c1866c74533701464bc066951b0a23f0e18f5
SHA5123142689e3e1685324f858385eb7ee1f8d694bb2448fe6a36435e4bc260c2975fcf85e9f6003a2ab6426a596faad021f74c87686106020e7923bb17b7f1ba0ca4
-
Filesize
209KB
MD55d2a6be143b292a622d3f12a0068e8ac
SHA10d4845013899ba51ba27357f30a0c1c91b79c826
SHA25619146a4b0c63b5316cae5f9ce7c516311efeae3a24b19ba5cf8eaa30b18de721
SHA512a27898c429c13c6510402c980c2306aefb81dbb781bc5ff86ed072c7cd53d05807ebc02d1d5e480c39cc0d7bde2f71a041ac93b2d51128d31dd6e8503bf330ae
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
152B
MD5f4923e6b0aca1a3b9872543ad948d834
SHA17f620040ac30ca1f1131e5260390dab1928e7f1e
SHA2560ba5f4a634c5bbfe7375639a15d8bf985e09ccffb09a0c6af161a1b72d07021d
SHA51260b5c06f7e3d4bf93cade9077d9f5794e4e6905fd8ee50389eee9fd58f9265c2ce60fedb65386a0020a96f354e5ded0b78e9ae1263ecd39df6064fd61f2d16c0
-
Filesize
152B
MD59f003be8acfdddd924d77364c92589a4
SHA143b97d199e55eb6d75f875f96a0c6a0113422811
SHA256bb6c0fda6845030b8087f9ad9b23c12b81ed4d8557969f41630d8db7fd098182
SHA51248bccb3681ed3a4389e7f5719aa6108a0579dd19ab00925f55180d87b0f6acbe96042c889cdccc944e42361479a0fce85930ddb172cbd0a403d16decd9405ee2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\9f300451-1351-49a1-a202-6dd075d5130b.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
27KB
MD56da5998f8e90d28378c84a2f8b1acf9c
SHA11eb55404a9d4089239d61f07b64d83d16d578bca
SHA25610714240fab1bf95a09c0a6461bd3621783b763b6847bfa8255622d7d13a4fd8
SHA5128a96b06b85ef59794870598ce40cd67fd1d608ddb08ea71fbe47e499dc449461ba0a0125188f16efe33a4e22cb8fac403685ab18748a119379aaaf2327976310
-
Filesize
65KB
MD525529a3ff778f6fef5f32b7ccf85748e
SHA1a1cbdfe80823b6d1fcefc8d0967b5bf9cb621e02
SHA256e1c6ba0a391c340c1aa98c699875f6dc212d6ce414cfac933986b8b1977cf4a0
SHA51246327c5114a5265c2e0eafa78c9cbff54749f87aa7609e604d4c0c995eb0cdf921cb5359b962319b784cb91cc8b78e54cafaae82cde9f2fb0cfb7d56675c1bf2
-
Filesize
31KB
MD57f8a4f124f314e0f1a6d26a2ad2606f9
SHA1b10bfb19db2d40eb4ac17735c385493e7dd04c48
SHA2567bb5dd5ba2a9a34556880c1a064625644803bc44e86914e0185ba6004e917676
SHA512217479bdba2eff0c329faba1f3c90cb287a716d50c1270617231efd40fc554ff9867875582222dbe0120d0f0325730fa4e43ba76683faea1cb8868e10e0f13f5
-
Filesize
27KB
MD56274172282c2cf6b4dd2d20f768bca43
SHA13970c3d1a3417d9aeb6c262a9808112159a10bcb
SHA25649ec8e61c3ebb33c542279c4b98751e685842169c5121d5b16897ed84ff996a2
SHA5121d6dde4d4397d248323f7925c42f6d98ad3b4a2eb95981976fb114e2d54c3ef94fb39c5a50fbfc575985dcfefb2894c2f0d349886e1e04c1ae9a271694a304f2
-
Filesize
29KB
MD5cf776b128a74f76a26e70ddd68b46b61
SHA124c15fb603cd4028483a5efb1aecb5a78b004a97
SHA256346cbe6774bf3bf9f3a5aacf287f859103045b0dcd4a32839b00be9f391259fc
SHA51220751f34d1a3a63e580581d36902928c7780dde70fafa75b87e406965f2dde501b9821cd45c824584d1ece21566eb5fa501d1effdfafff0b2e27ec806bce8f32
-
Filesize
81KB
MD557f53f645516a6febbc10c8237f2214e
SHA1060e090ac609066a317c8587ba8fd9b53d6503dc
SHA2568a083528eb898a77512e4bc7fa84e2c3976c220a59906e461fcfa090b6fccab9
SHA5123dcfda0b559d8275953d30c3a1931d350b16f81e0e0c1c545d2732561aae304cc5fd90e92ad64aceddb595cc5b5eb4723ba037392961107f8b9cb13dd7e29113
-
Filesize
29KB
MD5f09721a2b8b3e47f906a4c91efd81d58
SHA123d095d99d83ec38af52862070e0fb38b0195e97
SHA256c26c6ece208c7920353ad0faa8e1d48cec2d2142ff8d6105d66f3b9e7fe40790
SHA512ae8686f28cf21d4fea6827608a4880dbd7cd59880f98c2a172dd7f99461615be4feb3e3f05a340d862a2cacb7746c5cb68d3402d510da2d5ecfc0e0c1ed84516
-
Filesize
31KB
MD5f41bc7e4f23e0e3abf652452299d29c3
SHA16cdd8bbc9c02f88a58b862d1799737f9fa3a0ddc
SHA256497a6de6b28b5c9a0b6b51387d37f28c026b4dde7a7789c0cfe1599bf79fb9f2
SHA5129a31aafe2cbfd11d76ccb7052c269ff32ce2c8c5c2d2482de1b0e274edd5f2ffee450af4cc9785a41c66f86380258623afb7aa4b456df79e525731605977c170
-
Filesize
100KB
MD5501fc81575b9f1f55ed6b457a93d5129
SHA17dc9e94f8576d350b3f9ad1f6bedca1d30438cc3
SHA256f86b80d09c2c5abb4c06e250069a8779d3bdbadb9a429e15f7cf4cd18d4da14a
SHA51207edf9f781bbb4cf9d5604a9972c10278415227a6e7c8120e8e5df19c06dadb44e200135e65570d8410e52687d4b355b344c87ce743a388caedb52cf1a788c85
-
Filesize
16KB
MD548c80c7c28b5b00a8b4ff94a22b72fe3
SHA1d57303c2ad2fd5cedc5cb20f264a6965a7819cee
SHA2566e9be773031b3234fb9c2d6cf3d9740db1208f4351beca325ec34f76fd38f356
SHA512c7381e462c72900fdbb82b5c365080efa009287273eb5109ef25c8d0a5df33dd07664fd1aed6eb0d132fa6a3cb6a3ff6b784bffeeca9a2313b1e6eb6e32ab658
-
Filesize
29KB
MD5f85e85276ba5f87111add53684ec3fcb
SHA1ecaf9aa3c5dd50eca0b83f1fb9effad801336441
SHA2564b0beec41cb9785652a4a3172a4badbdaa200b5e0b17a7bcc81af25afd9b2432
SHA5121915a2d4218ee2dbb73c490b1acac722a35f7864b7d488a791c96a16889cd86eee965174b59498295b3491a9783facce5660d719133e9c5fb3b96df47dde7a53
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
30KB
MD5ca6e0dcaf6fe11e3b4d4d299ecbab7a6
SHA1a637b13aff3baacc733eb221226c36b71a3d3a7b
SHA256f4a93cf3834c5f3bbbab2ba619425fb1415050a847f5bc12cd6b0bab5e68074e
SHA512fa037f9ac77644d641bb6cd1b18722be3cd7d039738f8770d6a09cf7e5829b1602a772ab643ce8cd683a0d11e62c5ccabbd555fff25f77c39034793510543ed9
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
70KB
MD54308671e9d218f479c8810d2c04ea6c6
SHA1dd3686818bc62f93c6ab0190ed611031f97fdfcf
SHA2565addbdd4fe74ff8afc4ca92f35eb60778af623e4f8b5911323ab58a9beed6a9a
SHA5125936b6465140968acb7ad7f7486c50980081482766002c35d493f0bdd1cc648712eebf30225b6b7e29f6f3123458451d71e62d9328f7e0d9889028bff66e2ad2
-
Filesize
41KB
MD558756d99d2376dcfbede6057dd25a745
SHA176f81b96664cd8863210bb03cc75012eaae96320
SHA256f5d0da7b010b28a7fe2c314724a966c44068a8c8fa7e9a495e1284aa501067fa
SHA512476e35c3da0cf223e773c2d26403c12f8c8d034273cca9e3c4cba9359f8506159c2a5267793c8bd9982b636191ddda62e9119593f5599053894c7027a58acc10
-
Filesize
19KB
MD576a3f1e9a452564e0f8dce6c0ee111e8
SHA111c3d925cbc1a52d53584fd8606f8f713aa59114
SHA256381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c
SHA512a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
88KB
MD5b38fbbd0b5c8e8b4452b33d6f85df7dc
SHA1386ba241790252df01a6a028b3238de2f995a559
SHA256b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd
SHA512546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16
-
Filesize
1.2MB
MD5d289aa4328ab379b71189b397e83d827
SHA14b9298365d3517c569ba654dcc19af6d575a9ea0
SHA2565e7a2eb3b2e0d43a3bb4dbe8c3be7a4042dd7fd83ec3b2f3f63009ce325eebb1
SHA512919d479379c40db12f29cb354e7bd9d04f164fd242d3f28cd9811e92bc0c0b766a6d2177c3a54953c7fa07af580e86fd00c81cec1db64d29141388d73b023c65
-
Filesize
18KB
MD592bf7fe4a6cefef87f95d9d84fb048f4
SHA13d01fbe7f29ee23831f49ea83f94d45bb0f311be
SHA256e1eba6735fc5b9376ce90211ab299e7549b6b0feb58e8e8e174e90fac10cd451
SHA512c7ef70f31ebf4c567f8a1e805038a7f9a02bc2a4a6a2cdc576318ba70e136ed60333d60651c22916e633a454683c246976246c86850fe8714bc723d8d5e607ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD58f8994abb84a5b7fbc9861aeea5c2600
SHA13f46956dfdc6a9f16939ab6053112e1f47ac7b75
SHA256c62aa7a6a9c9406d9f1b5b774ee1400bd69e37faada10db68baef0a5c20672c0
SHA512de24f9a0dfed103e7d781e2d484e95cb199b27945211d326e737ebcc3ae0b8460b85580047d8315205b02ac6cc3218b88282366b3bceb231f2ef848746d5089f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Code Cache\js\index-dir\the-real-index~RFe6ed7d2.TMP
Filesize4KB
MD5563dbe91e29124d108037ff7e1c78cbb
SHA1792ceb4dc88d515e1e6213030c5c1b05e82b52bb
SHA256a1b14493370728979074df203ed2fc877a6aecfa67f8a9e214147b0132b3a57f
SHA5124c805647dac7846e4742972c12861a360d2f17b29fde94271d2f47bb2e5167ab7fcd994c11c34e0375063ac70a7a4b4e3fe0460eeb3cdd1f9173392f3c651c19
-
Filesize
6KB
MD5146c87a8e7e59604e469218fd9b811da
SHA12c73d542530de2fc53fb58d17c7aa1b47e55b85d
SHA256ed74d4e0cbd3dc2809900f8a620c5cce8d79ad233a483247cfdfcde925be131d
SHA512fbe43f76df15744bf9afbb76b3ea05c5b254c4cedc2791cbe4f4394d7a1c24efec97e3d6f0ae36c7747383f01f5e61bbd4e42e9cfe263cffc422aab5ae34f703
-
Filesize
9KB
MD5137887e2a091df0155569c1788a196fc
SHA11f1d073a7a8279b7fdc8f8d01cc5c3a116cd9b6e
SHA25630e9e2f39aa42a38ec1f662d7bace70692f2e02bd50b104fc99a2d64266f34a9
SHA5126155249127208ac6da8eb40d26db6cbc69f925879f9f4ed28ca1a60e103739ddd99577283e07c5cde4ff3e512a6ed948310bea99e00b06fd6e2c36b546c96a55
-
Filesize
9KB
MD59a1b8d77a20702df0d789315ee6d8ce5
SHA1858d61d93cde00076967f5f072af6445228dfe1b
SHA2566c3dcb5762203abfa8e23173d31b5df1536d16072d652a246974282b07f2f60c
SHA5120df7184051adaef3eaa8419134d41583e1ccc9643e1fbf8a983273c23507625e96bec589aa1fa493f4ed63056e9afa9d68870b55feebeeabea68847471152685
-
Filesize
9KB
MD562ec8d5856e6f8afbbdf42e06071e52f
SHA1ebf8a72580e063fcddba3ca6f9083d80920406d7
SHA2565cf482fecda7ca2640d2061e6e8e1b80a7bac14f3baa3c882ec21bb8a72dad9d
SHA512befb63c9d085239e294f074c5435c60245a24fd603e8212fa27bae95a0a9d2f8be12fd50b4919d8c37dc651e8a7fd9d70d94a18a84a85c651c3afc1ca91777d8
-
Filesize
9KB
MD5f11c4bc0016d8abcc5acab79eef80440
SHA11761bf002148eacc5ef6e66c309f8e444e9bd8cb
SHA256d388e278110a19271f1735355fec0df798556770e156bf28049c88b078944156
SHA5126d8b06b60cc672f8cec0738dbf8de9f0bfdcee5bef0e23527dfeb1196d7510352d9dd677122ace3897b7c88611d845a92c4f68723c25be175993f55c52ed0bdc
-
Filesize
3KB
MD539c7f7eaff6e7faf4e7ad708b7d286a7
SHA19fa191fbe4294bd3a2f21618396b29fa6cfb7ca5
SHA256d4ea0bc05214b42b78a7b8b15f730db79b110cf0088ca2ed2af591d468e25743
SHA512e4f1c1c19a6c8259e8cccd2fb19603b538659ddf5ee3b8bde7b165aa1343b2f1fb387f990621dc6cf16e63e7152563a4fae965b17fae7da76e932569579acf86
-
Filesize
3KB
MD5499cce6fb77d48ff2a868676263f540e
SHA130ac868fac48164a0f07294d490c779005b84b0c
SHA256681c8e0c5ca9e88230c3a1a54424bc923167defe20d8d43db80636f515a034a6
SHA51278189c62ec2ef06f9e08b7ec87dee0185e61b017790d91c7ece8122152298509bc1378e7a30d19e65cd83662383e27c62ca96ac0a3a25205a96f6e881129daa9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
20KB
MD57e86d5c1bf2ff36b15bfbd8fcf748b16
SHA159a1515ddff8caec85c4f27ffb17b69a42ec6226
SHA25682f03e141e82546b261c1a24cd9ae3cfd4b19a7b4f343a296428deeda88cf856
SHA512943fdf966d2ca4bfb35e01431e7bae1611e86d4bbf9c27524ba4502a9a93b8c0bb39e7760a8ee76993c4099da1ff49febe0b48468f134d4121f22a0ffb41bf2f
-
Filesize
26KB
MD58235f98068f731038d8520df4727c625
SHA16ef1e3ca36d59de490e593ec195b632e8e09565d
SHA25698280dcf81e7ed7a29b2d383c12027481bf771aa6358012ee5ffcc8b3af21e38
SHA512d75d4b688898ee9c9ee07f7be6e9dafd0154518ac54042270666969dd15dbc3b7c8cf92997c510f42f20a5ad8270d5324dd8f2ef91666a9d6d0450d60bacfd83
-
Filesize
17KB
MD5bb83b2d026e333e641463cd0b96609a2
SHA1ce56a2c53eae00253f0995ce74ee6298797f5026
SHA256a4e7e8902dc55d3d73c42b4a75fc714b648ea88907cac6188854418938901b77
SHA512b82168bbabd92a017787e25e4d900efbb72037de59634a0a4f69af5998b383d5a7effd108d504db0f54e7389d475550a951d61b16fe93649c6828eb0fc2de974
-
Filesize
10KB
MD5e9aa87dc45677f4767002db236fc7b55
SHA1a745fe338fea2b05fbd045dc806e6080951d46ae
SHA256f25110e19f43aeaa838b81c64d0785a98f6c83f13740cd0cea49b357ebaffb1b
SHA5127e55e5c4d9c4ffafddc03ae2396adfd8aadfd7c5138528714276d2c6eecdc97ac51e4469c24c5c47d981fcb3561d90ba21819b41c7b841f57b3e8fc3f8e41dbc
-
Filesize
152B
MD59f081a02d8bbd5d800828ed8c769f5d9
SHA1978d807096b7e7a4962a001b7bba6b2e77ce419a
SHA256a7645e1b16115e9afec86efa139d35d5fecc6c5c7c59174c9901b4213b1fae0e
SHA5127f3045f276f5bd8d3c65a23592419c3b98f1311c214c8e54a4dfe09122a08afb08ab7967b49bd413bc748ce6363658640bc87958d5e0a78974680a8f9beadf44
-
Filesize
152B
MD53e681bda746d695b173a54033103efa8
SHA1ae07be487e65914bb068174b99660fb8deb11a1d
SHA256fee5f7377e5ca213c1d8d7827b788723d0dd2538e7ce3f35581fc613fde834c2
SHA5120f4381c769d4ae18ff3ac93fd97e8d879043b8ec825611db27f08bd44c08babc1710672c3f93435a61e40db1ccbf5b74c6363aaaf5f4a7fc95a6a7786d1aced8
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD55760756d54a5c9a902d44c145ec18f60
SHA1f203f64ad36e2300fa38d2f44bd444322dfd3dfd
SHA256548c810cf41d49be55767ec88a9adc9ea625daeac630c4be5ab161ee2a234b9a
SHA5126d2bb17e26011f0ba5a20cb3aeb36e42ff72c3895471dd9dfd7fc80dffcece31cab6994bcf6e764131c6092af3bbe302abdd58df441ef1cdfe5476b6f19ddc96
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD54b498bfeb8e26267ac7cd8630e496bf4
SHA101fc9d11239679d5ab64252e2f4f0a92b2400352
SHA2560720c184c9d0d436d57fe96609a76501829b388839c91b9306df73723c866522
SHA512d4b47a1ffca377d38b511c1f72f1d6ad59f3250feefb413b2ad7318d7cdc40d5d54709cc04189a3a5d79c533ef41d9940d27ab3af935aacd4c69b4f98b5a79b3
-
Filesize
6KB
MD5a0a6ba9db44dd3ab7ca112c1991c871c
SHA1b410643dfcd7ef9a76b0c1c61ce8dcbe635b869f
SHA25617c6f045400fad32c1b64f1130ad0ab68f6cfbf029b7226c40edd75e2dd2ee40
SHA51207d0a403ca776b5272f3fcbb335a35c62d3c8df90b57c5d297d0f5313a1a4e0ac13eaef50dceaf11f71b2fea84a381efa448c42f6ed2ce73109dbfd9f9aeb281
-
Filesize
5KB
MD50ca2a29feea2e8cbe5b4915f099c9faf
SHA1fa2cc1076dd557aafa809f26a588626ac2a0e355
SHA2568ab4508623d8f1a456fca60ff20c625fd7bfc2e8f8ae8c6760ac78f3906117dc
SHA512e4523697e819d8aa3e6c96757af2ac5707260ac827db937b9f194e95aa3c3bd1f988af58fd18c5b682e14caa9c26291bb624d34e0bb7e40f559b29089b9345a5
-
Filesize
5KB
MD555cac2eecb3b3de80eeb68dd215ff51e
SHA175ac3ecc464b99420e9b3cb91ee89552f4b36f2d
SHA256781f21bd4724c9191a0826e1a731582b16ea764e970eb4b5db16172efc52db14
SHA51285399470c59d45329abf7c4d9d9224456270139b2f60201ab45deb2064dfea10da5e2d91aeb1daa82d57228d7ea281af581d6cb9f133872bb777fdaab8aa53bc
-
Filesize
8KB
MD50a031696aadc3e90fef15ff298501d48
SHA1f646f95dabe63ceaae52589a8131f59dfd009a0a
SHA256c65cd804acf609453a1b575a09678cf6d06e1595c744f29c9eaf3b0b1d9b3f6e
SHA5121faaf72862e3eea7a7bab52e729a96537d7f7ed9b61933a26006c503dd62c817707fa20534193a0f091c05215e9d6a14a4be40413534eb8f05945d46b6538e01
-
Filesize
6KB
MD56fef0e6c12220f73407e39a5af071b8f
SHA178580394eeb271f7e6901777c35eb7cb16b9cd34
SHA256fdb32ef2a64072918a13864da91b34cad66d061735507bcf1ca0062636004e2d
SHA51236e35908869a44990289f87de67e48cba65e468531249ac931518a5942e65ad70b345f287c5eec43f367e4946d209f4b738080a20a21ed5d0be6a00934822a5e
-
Filesize
7KB
MD59a2a0ea9343e12755848be291c700b12
SHA1f1516933dcc5494bdf33a42f59548ed2e13d7737
SHA256bc78a2396ff29fc20d7766eeda8cb1239649014d5b3f7d87bb908ec2b9154608
SHA512069f9c8ad7fd820849e3a47b8348d48bee9a7e3b55325c2d64df09feda58a19689368202b1f21cc498664c866c6b79a7c8bf8967cbf551d9b2ed82ce38ddc098
-
Filesize
6KB
MD5140af62319bc52bd1079eb9d02c0891b
SHA106cac6fc97379a25631210d7858d8c9fb2097c79
SHA25613ba11803ac168d8ee63bbf1883beeeabd3b32b3789d5a46728f63636338e817
SHA512329bf8f23fed36928140fdb61e13576acf45fa58289b95dbc297bfc277a2f92c58aea2dbe727a267bb742ca1940be786243f8df9dc93b47b958df2fed8a88efe
-
Filesize
5KB
MD50c0750f523a555a4cd6168cb7fd21b79
SHA1cc8cb45f7ba7d044f85c13a99d1e7a3cd2e4fe4f
SHA2562be0499f1b49d0066a1e6a2d2c0ee058e99a8a80e764edd6d28bfab2502d0937
SHA5127a1b6c40c80a9870259441c8d0dd7152f9690ae692345b41f48428d58875542bbaa3727ab8c706c7a5d2da6808f2614acb42659ea424cdfb3cadde46bc1c3256
-
Filesize
9KB
MD57ad8bd20ffdbd88df9c11e7beecf463b
SHA133acf9174113612124a1c8fcf8ae7f2bccc85c82
SHA256275383e4afc2bb45168504c73c96e4288b7762754292343a4765136fe15a0803
SHA512d5281e1f49b201eabca8074ed25ab190733fe9fd88b290c45ce3a2c0c97a1bc8e01bd03167c98ffd9a36c7a86fb36d711d5f74ddc33d2dc883a9e08c6bf02ee3
-
Filesize
8KB
MD5bb51be1496908a3c6ffba88dd91f5d75
SHA120514218352770120276a5e7bbb4a63e3035fb6b
SHA2567073a75657ec4ffb11507cbab0a8cab2ec98b52524da9d42517a124d8c27a9a8
SHA512d9c201ee04cde238bad9a78f9296b22448baec513d920f4e98bcdb62cd550cbc63bfaa62178431735f94f46a69421a0487c1b61cac2fc4fe58dc654c607eef5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5b3bf45aa5c1d133b8133d4c6f210fb65
SHA166b0c6241bb7dcb6573ad99b105e9d96d56581b4
SHA256ba64a23919894bdeb65b03013e692002da903f2c72142ce488d53159ce1be9a0
SHA512afc1f10569724242cb6bf018a8790f589545479d3c0655b4bf8cfbc1f4554a8b4bc10ef8afab1220dca64b27ca24d58b441f0adcc7a21c7e029460efc5912766
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5b72ea.TMP
Filesize48B
MD59afd8e8249d65d57a6782b0424c766e0
SHA1927c4e88255fbfcec13313245b9e6937f5721260
SHA2568d9aa1f52bfe530a4405931ed794bd748892dbe525a078df9bd856ddb61aad01
SHA5129ef2092fc42e5b788c7dded42d2a4ecafdeb17f71f6131c1ae1b55d8f61cfbd084213f2d3585406517298bb21038c388b8b093cd259806222dd1373101d258df
-
Filesize
1KB
MD50780f7f6e8a72b9f411a8c0b12bf08e8
SHA197879ae3cc8329a1dde96176afb1270fc6fe3a9c
SHA2560398be2aefa874ade800a059f7a2d82e691f1a961b05de156a2ebe4694b5487f
SHA512c7553d8c14d71d8b9aeab841f2be38712affe06a4e95d238b2a09de68dcc33afd35941a7575fffe1a0fcc56a2fed6e70305c15135d9b2043e61971b1378b8bb6
-
Filesize
1KB
MD5b3deb857aca69b99aa39a1a90a32691b
SHA151f56cd15822086a5bd09991022dddfc9054554f
SHA256a2cb19bab97d68542a956dd298c9a8e5e5f44ce9123900aecf381c79dcb21728
SHA512f570da3b82f95d9cb9d4020d2471aa3eb72748f4aebb53b8b7abeddc1346f30c0995335abda393f855f1c521f962c120ec97e804ab52ded47abfc656e920f4e8
-
Filesize
2KB
MD5d8a5cf265608070b907b0975d29a13d1
SHA128c3f8f6ea2e59f8f95bbf7b2a2d231f4b55235a
SHA256fbbefbd15847f2baeb423976450f1dc621e242d4421c819677ec66caeebde8e7
SHA512381e3ba8cf998af8a5d85bac96451775768be5d56799be419cc66e690730e18b0cc4514f9552c7d5fede3d22de099489ccdc8fb446bb3bbcaaed143b317cfef6
-
Filesize
2KB
MD5478b248f98876428debab6775f4ca644
SHA16cae0767792338c265132a4a650cd0771bad75b0
SHA2563671344797ff6d48789ffaf9e2a71a39aec4768f0902b3001d8669c27d5278e0
SHA512bdd12d6dbaaab0de019fd6fb3ca240707a3d5b0d470fa2547be854a9d25dba2675cb57f78b3b5f45446e0389ecbdf50fd84f34b086009e017cd7f939e07686f1
-
Filesize
2KB
MD59254846a6993568b66dea4e02c4e925b
SHA1c13c6e73589710a89c80d765a7e88e32a0e4e445
SHA2563abe67fe6bc4864c233f4251e00abd9acf96517b5dc8a51d396c8a945c3905f2
SHA5123150f4d895f0894374176b82cef7d6de9a35570ed1ec65b25f58a4453b2eb5cbabe53c3d599a6f8ef0871b70c678f14de717258848ee1a4fd167592a7fb8954f
-
Filesize
3KB
MD5820f0f2dd36e9f608d04c29c93fee374
SHA1437e0ebc65750ae61e3abc31ce94b9ed456090d1
SHA256b2036d583f73a3a49081a6984bff110ebb047fc6716d20aa01fe43fdd0bfedef
SHA5129d6b185133194345287f57ea2ae111db3044c160f57fb61cec091253db02b52e94b5fadb64aefc3480d3577b2ab8f2ac5ac5698d3050670bbc17b17c9c9b2349
-
Filesize
3KB
MD5a7028bfc722d5a93d38d4f6e707d134e
SHA16a94771305aaefb15997ebfc8964213145c33918
SHA256523e6aa9afd0559fe7104dfec4c6c09f7424fb4e47514374af3a3c0c85894415
SHA51249623e91a0f79e16da7f14692d21e987d66cfe3d1eeb5a2778a3209b0df8d1da1caff084eda44ecdc17ebdd50bb5bc3640fd2615fd9c1a1c6ba776f1a0c889f9
-
Filesize
1KB
MD5df88053e8801dc03f7e97af093215025
SHA1cc646b2984bbe1a3c15ea7d7b5c500b53f85ea3f
SHA256ab9ed8d87d174bdb726a63d6d4b8ead3f0e48fa775fa154cffaede0082da61f4
SHA512fdcbdbd708069f26121732d99beb92ae69020c9357215f0602dba6325096337a8aa42edde7651b0fd384429444b2f632c269266463ea1e5c93c4dc3d649583bd
-
Filesize
537B
MD5e7f170ecc52aee8e42dead3b48e5a9dd
SHA1fabefe9f4ca907d496757e81cc76b17fc9225c42
SHA2569a93f6e1a5379698f39d8e86391e43a8a16503d8fd52db2a608bb10d5dc6859f
SHA5129576f13c41a3c8207b9dfeb84658d27f174296b687d807bb4f914eda067b36ca901735049c2862f8e6137c85746b9625761129734aa57e8d96869c8cd8696092
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD54f45f10a62ce46e0b42e2ea0c2c1da01
SHA17a5c26731d3e9de25938f9f4c234b6836f681c96
SHA25693d1917e61c6f3e7d686b3aad301ca3bc21f6b15ff474f3f86b8b445555c1ab5
SHA5125e7b586a22f090b24e6ae0ea935868b9777a17d4110bec0ea20d82eeb9575a40bb6bcbdd739ad39d21e5fdae0269580f71e5ab08f5da744b5c7e94a8fc28c2e1
-
Filesize
11KB
MD5f237a079b26bb5f6b8f5cde15d9c1a69
SHA194fc03ea47066e3da4ecef314f5a3835a433275d
SHA256d71ffaa5dc1b47dc81cf26f7678b7f9ba2404914f4573c3e686ec0743f26fbac
SHA5123538e30819b5fdaa60eb91a76bcff1b616e38baf2cb8b3ab456b0df3d55dc1bf4559848efdefcefdf89a366afa50628823a9df136bc521acb4e4bf8e6ab8dcc5
-
Filesize
944B
MD52e8eb51096d6f6781456fef7df731d97
SHA1ec2aaf851a618fb43c3d040a13a71997c25bda43
SHA25696bfd9dd5883329927fe8c08b8956355a1a6ceb30ceeb5d4252b346df32bc864
SHA5120a73dc9a49f92d9dd556c2ca2e36761890b3538f355ee1f013e7cf648d8c4d065f28046cd4a167db3dea304d1fbcbcea68d11ce6e12a3f20f8b6c018a60422d2
-
Filesize
944B
MD5051a74485331f9d9f5014e58ec71566c
SHA14ed0256a84f2e95609a0b4d5c249bca624db8fe4
SHA2563f67e4ba795fd89d33e9a1fe7547e297a82ae50b8f25eedc2b33a27866b28888
SHA5121f15fd8ca727b198495ef826002c1cbcc63e98eecb2e92abff48354ae668e6c3aaf9bd3005664967ae75637bacee7e730ce36142483d08ae6a068d9ae3e0e17d
-
Filesize
944B
MD580b42fe4c6cf64624e6c31e5d7f2d3b3
SHA11f93e7dd83b86cb900810b7e3e43797868bf7d93
SHA256ee20a5b38a6674366efda276dbbf0b43eb54efd282acfc1033042f6b53a80d4d
SHA51283c1c744c15a8b427a1d3af677ec3bfd0353875a60fe886c41570981e17467ebbb59619b960ca8c5c3ab1430946b0633ea200b7e7d84ab6dca88b60c50055573
-
Filesize
75KB
MD542b2c266e49a3acd346b91e3b0e638c0
SHA12bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1
SHA256adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29
SHA512770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
24.8MB
MD5eec7a3bdd53e5c42f3a7c8dd4a2d2a15
SHA1f34fe4ec3762c2981b942339cc646eed57fb22db
SHA256c4c1e472823a12e2ee127a64d6ee3de9b31d02bc972baeb8800e6d918dce16a1
SHA5123b30f16a29f8a35dec9371090152f97368b2c1022d31e0f26cddc4f67cdd59c03ec9953987e109192750076f5db0be098ca33c9e82fe27a5523e6614e8cc7234
-
Filesize
112KB
MD5646737cc039a586883dded52fe17fecc
SHA1227685920e7817742dfa597013b2d02536982657
SHA25645bb73ca028fe2946e68a4216447a919a1d3ba0bbae283e23bf190bc48782bda
SHA5127626fd4ca83bad25d1aed916f7790336ce3a706eb2ae8f0a11e2741a260f8fd33b84993f5a8c6d90f701c3765da5320f24ec5305066414d89215484553adb04a
-
Filesize
41KB
MD5e462d14323ba8c46b3c49c6f0a47a28a
SHA128812e5914ffba4cd87a2394e9fe1ce41b5384be
SHA2563ba9770b83cd3c91ab3a959acb7deefc9bd5af4bc90ae46f3be32412d0de7e7a
SHA5121bb75204a33e91e1375490707e0de44758b558eca260999f8b4f53c8748593752efbfd28fceaaf1b0d92caf7b6e886c4ba10aeffff7fab9524510f3464b9b610
-
Filesize
641B
MD5a2371478216eb4993d748395e65e4963
SHA1b1bbd17ea8ded22084a693725881e98496d2e94a
SHA256511cb123c98aa6a71f2a04c52bd6d03f26644a6a68b3788d82a1da98c3371510
SHA512446444b1a8c08e108ec8fc8c55de6170ec62413a8d9d00d1db04bd3a2a84b36a506152775bf6c99ea647e3392666cfa1d2a1fbc17824d4e4b2865f3ac86d693c
-
Filesize
163KB
MD5cf704afd44dac23528396d01a26598ad
SHA1c872ab853633d67aa39bca81f2aa5bcdf0833653
SHA256f5aab0cc237ad93d81b42be22276d7c93092b3039be915b0359b84d263635dbd
SHA51283cfeaea9e4a8e13d9dfd7084f8e2d48f550d704ccc7ebec375139ab426faf9608bc01fc2de45f3a19c2b3b408f867af22a3017c5fa5276a4402ff534332df0f
-
Filesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790
-
Filesize
402B
MD5ecf88f261853fe08d58e2e903220da14
SHA1f72807a9e081906654ae196605e681d5938a2e6c
SHA256cafec240d998e4b6e92ad1329cd417e8e9cbd73157488889fd93a542de4a4844
SHA51282c1c3dd163fbf7111c7ef5043b009dafc320c0c5e088dec16c835352c5ffb7d03c5829f65a9ff1dc357bae97e8d2f9c3fc1e531fe193e84811fb8c62888a36b
-
Filesize
2KB
MD5a56d479405b23976f162f3a4a74e48aa
SHA1f4f433b3f56315e1d469148bdfd835469526262f
SHA25617d81134a5957fb758b9d69a90b033477a991c8b0f107d9864dc790ca37e6a23
SHA512f5594cde50ca5235f7759c9350d4054d7a61b5e61a197dffc04eb8cdef368572e99d212dd406ad296484b5f0f880bdc5ec9e155781101d15083c1564738a900a
-
Filesize
381KB
MD535a27d088cd5be278629fae37d464182
SHA1d5a291fadead1f2a0cf35082012fe6f4bf22a3ab
SHA2564a75f2db1dbd3c1218bb9994b7e1c690c4edd4e0c1a675de8d2a127611173e69
SHA512eb0be3026321864bd5bcf53b88dc951711d8c0b4bcbd46800b90ca5116a56dba22452530e29f3ccbbcc43d943bdefc8ed8ca2d31ba2e7e5f0e594f74adba4ab5
-
Filesize
32KB
MD5eb9324121994e5e41f1738b5af8944b1
SHA1aa63c521b64602fa9c3a73dadd412fdaf181b690
SHA2562f1f93ede80502d153e301baf9b7f68e7c7a9344cfa90cfae396aac17e81ce5a
SHA5127f7a702ddec8d94cb2177b4736d94ec53e575be3dd2d610410cb3154ba9ad2936c98e0e72ed7ab5ebbcbe0329be0d9b20a3bcd84670a6d1c8d7e0a9a3056edd2
-
C:\Users\Admin\NTUSER.DAT{2fa72cf3-34ca-11ed-acae-cbf1edc82a99}.TMContainer00000000000000000001.regtrans-ms.ENC
Filesize16B
MD5f89c8f537430dee871a879153af44a14
SHA1e07d419d5db30ad5d5fa8148a87e31220f51875f
SHA256fa356ec724df03c364901b3037aacc7c65b7e0159619676ff5b05181d51f46d2
SHA512fed2a4ef36907a77942e1b161495018de7a227204694f6ae02fe674f7ecd12435ff84340053700b465eeec1c8857ec6aad542186fcd12b134a00ac380a0b26cf