Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
01/12/2024, 15:26
241201-svbb7ayrek 1001/12/2024, 15:25
241201-stmntsvkhy 401/12/2024, 15:20
241201-sqsexayqeq 1001/12/2024, 15:19
241201-sp74zayqdr 3Analysis
-
max time kernel
146s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2024, 15:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I
Resource
win10v2004-20241007-en
General
-
Target
https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I
Malware Config
Extracted
discordrat
-
discord_token
MTMxMjc5OTI3NDI3NDEyNzkyMg.GOuWiR.FNWWDzhiZI-BJlCUAsWOf3Q5avMNCiFtgUWBSQ
-
server_id
1307914676973076521
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2072 msedge.exe 2072 msedge.exe 2316 msedge.exe 2316 msedge.exe 3096 identity_helper.exe 3096 identity_helper.exe 1760 msedge.exe 1760 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2968 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2968 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2184 2316 msedge.exe 82 PID 2316 wrote to memory of 2184 2316 msedge.exe 82 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 3428 2316 msedge.exe 83 PID 2316 wrote to memory of 2072 2316 msedge.exe 84 PID 2316 wrote to memory of 2072 2316 msedge.exe 84 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85 PID 2316 wrote to memory of 432 2316 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4fe646f8,0x7ffd4fe64708,0x7ffd4fe647182⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2552 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5972 /prefetch:82⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3876 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6713938530113833594,2733126750227107636,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3364
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4e0 0x3981⤵
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:696
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\release - Copy\adssadsad.txt1⤵PID:4620
-
C:\Users\Admin\Downloads\release - Copy\builder.exe"C:\Users\Admin\Downloads\release - Copy\builder.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3388
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\release - Copy\adssadsad.txt1⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD53014dc9ec4c18a64ee864f6fd2bf2e6f
SHA1eb6816f51fe22129d819f562e5dc21f6ecc30ef6
SHA256b0b13e30a7b77a92a13217ca9609f0faabdd2d0ce13d4c267d36fe32a9346358
SHA5127711427935e02e44337f954bf57c3fe559b230a8a732c7ff3332423f1ba12526ddf7ac0b02bbdd2fc9e5897e725eab75aa5cede9a9e908369485546f4d384afd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD56ecda6ece4bd0335eee49a96285d83be
SHA1927a0e653c7cae48d2fb4d1a39d762a546ebabc8
SHA25684f9311937f9b5b9308c92a3c9986707bcdc6c8fb851b49d4b0410c91ef9a548
SHA5125e6448828eb5b5ed514af799e083acf8ba1f8f6e5e5bbcda84de34b0d798f793f1dfb98dd001f972edf6c825e612ae6367f3015fff83e47c23d7debf0dd0d4df
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
547B
MD51c0944d757b40908c32fc7641f57eebb
SHA11b69fe60205daf8df9f98056d75d31fa99e04615
SHA25677712b1a102c55c8d42e6f0c94f9b9865ae2656360d3e2df122d9c339d2e498c
SHA512526b1d82b1cbaa8bde044786d5d173db739c92f41a933e58983af63b4f3a7e3ce6dad3f3d8a90b2675e2f474ce21672c3094fa73648ae8028ec3760bbf8b8a1d
-
Filesize
188B
MD5008114e1a1a614b35e8a7515da0f3783
SHA13c390d38126c7328a8d7e4a72d5848ac9f96549b
SHA2567301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18
SHA512a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b
-
Filesize
7KB
MD504bd0045813e87eba154e15038ef3c49
SHA1b06bcdbb33ef583fc52741f9a2ce8d3a8b32c514
SHA256c8f3b916586b09bd7e6068bd725aaa6a552de2366facb3488353d8311a6cbcf9
SHA512b459ebcf05b4a4bfa8153bb06e9921ba9f77e8a1e9d09ada43a017a539fdb27977b2f2d1c8dbf00379bf574049377e892f94a67601c7e4a68ff9d270d05f4785
-
Filesize
6KB
MD5997264e4fc9827be307a6773b5f74fd2
SHA1597cfada0a9ae45efd185ae3dadcb7eb2571be7b
SHA25619902a3856d52c012158b55c60f64f70544cd6fba179b16df2e0ecf86d82dfb6
SHA512a21327ae7e9f82f2ab42acb11b10bf2300d9237331e1154b4325fc95563592bb66599294343a4f3f2cb9066d19d87c696779029cda88de0ed124f0ceb2132371
-
Filesize
5KB
MD51a8df7314d13a4a15f1d21b660305064
SHA12db363267ab438989f72d03f93216cd17185ebaa
SHA256593a6646a632934346790182f1ed477ad4c10470a3646e0274ba1cf0aed7b739
SHA512c14b0d5d7645e41dd74b96853fe68ddc7ca0d33c73f3d41c7fb05f1f163841f4a2baf8f45f3958e397d9af0752bcc2c5089c28e27ea3d904fd336e5249a15285
-
Filesize
6KB
MD500862627a116fd9f677860789b3e1277
SHA1085f24d8577708129f3e14c607b96236a544ef44
SHA256ae15c27672f87bc7a4a46fdd50ea4bf9019a1f620938634e768c3c73e6dda9ab
SHA51252194193c445bcea69e4aafee377351184d104f9baf5a0d0c94af5cd50854cb75c4643b432411d8b7f37de8cb9da0af88641b1fa15022fe2505b73470a57c29e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD518b7c70e0175ac36ae7d6b5109d1b390
SHA1bbecf93de88516189e2909464a431d62fd0648b0
SHA25651ab534bf6db301bce0210b52857282916a7ad8a9fc27cf048fdfe8b5e5accf9
SHA51217932ad18410ae4d59ff8ad80e01ebd66263a6fc438d81dd1b9d8816412acf4a5fd43fc33980fa78b285a6d96dc194a9312925739aa2722db8d77e605d71b74a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe582527.TMP
Filesize48B
MD5d23d75c328ad00d25724f14056bf0ed1
SHA1df78d3d53af92717dba14fc9f2d8a8ae5d465a59
SHA25624887c26d487d8dec74491ff57d84f554de26f1486724e4e4430be5734f1e3a9
SHA512de9ac8958cc30eb4163b42f66f8ccb2733072999d5ab5e8b2aa67bab469f76921b3f4f180dabbf3ba37b38db259f51506ef3a838d0081655f721836545f9cf67
-
Filesize
537B
MD544c43d0b4540ce55bf795bcaff83d4ae
SHA15fae1571b15de9e63cf2f7fe05bf3bf2ce9f069b
SHA256d080c2715d21614946d3ba5fafd77cc5e5feba5080a032168f03f6a0a4a6d7a0
SHA51223a5deecc7c66b6461b09f159f0763b914aae38e1b6d28496e5a16845a127965f1d151dcac316d15f9f9541330f362b0d2a93005366623aa30afd03cf861847e
-
Filesize
203B
MD57ca187e894a056439ebb6794be33275c
SHA13d1bcad17ddb0d7d1f44bf803c52e9f4312f614e
SHA2561a8e33ddc45e9a3ed9bb9605d0ad2fa9b41e1244fb8b73f49479f2c87776736b
SHA51243af34c193a4c968a4d3aaeb424c299094ebe37d4b908bd1213331a08f7320491cdacade4467cc3a8b1b01f41044043ca45fe84133a6d5461817b25c3c69c278
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD505c4c800890fedbcc13601c799a62f24
SHA1cba79968b59682a3727abc98b66c05610c7c28a7
SHA25657ca079afd9ad73cedfe1549ddb427b3013c630e3ae40ab271e5da287b7f87a2
SHA512f42ab14afff2366a5f37bc7ae9a550a637148a2af940fba7fa5ac6f0e1104b90b07c242225eb8ab0391b10a22373d26cb916550defbf94ebf39fff4957257496
-
Filesize
10KB
MD574d3cb0e12f481d3b0eccee4add5f1d6
SHA1c4dd2554098a7f500d6daa46edfa56d045465c5c
SHA256722e5522db377bb6dfad67212d3db3b0fac020ac697523f8e244c7a5aa3f76ba
SHA512cbfd03bbf555720bc3913fc943e6329e26b949fad89ea93efd0fd8d460a4eb594e9ff07f0a0408d77d5b1c5a6353413c5bd02bf11861fa8bb7193d0eec5004a5
-
Filesize
473KB
MD5bcd68b7e0afd9a4145c97c77b7e27e95
SHA1a129a5e722d84fb264de89f4079a3898bcc0c5db
SHA2565a6e90c8a58dc280b1dde688e2c2a342774027ecae6d7176d101c12227be2c7d
SHA51254566b84fabdce9c92ad8352b7d213bf9c9545fbeb9c93e949c1b6af3992db2b0816fb0f1294d9098a02b09feab1f541dba0dade59eda67bf1cf71f64a4d6f32
-
Filesize
78KB
MD5e8ff8d278de10cc2f7255b156ae2d252
SHA1c91554ef849852360499b82579ca0c41c9dfde21
SHA25608d4d8a882d74fa4d9525a5c78351bb3eba95f1c7d78f75c2f5d606715059e90
SHA512c9eb226331c00b915c5ff5b2b407aa6f31536b671bff1cf11aa512d3cd4a60d0c9db14e5e4aee554e74259fcd755e9d835a960838d679e389943be0f20f65952