Analysis
-
max time kernel
749s -
max time network
745s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2025, 21:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://92k.us
Resource
win10v2004-20241007-en
General
-
Target
http://92k.us
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___0U84W87P_.txt
cerber
http://xpcx6erilkjced3j.onion/18E0-D157-A6A3-0098-BEB8
http://xpcx6erilkjced3j.1n5mod.top/18E0-D157-A6A3-0098-BEB8
http://xpcx6erilkjced3j.19kdeh.top/18E0-D157-A6A3-0098-BEB8
http://xpcx6erilkjced3j.1mpsnr.top/18E0-D157-A6A3-0098-BEB8
http://xpcx6erilkjced3j.18ey8e.top/18E0-D157-A6A3-0098-BEB8
http://xpcx6erilkjced3j.17gcun.top/18E0-D157-A6A3-0098-BEB8
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (1306) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 5820 netsh.exe 6172 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Cerber5.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ Cerber5.exe -
Executes dropped EXE 27 IoCs
pid Process 4748 OperaSetup.exe 1140 OperaSetup.exe 6240 setup.exe 5148 setup.exe 6196 setup.exe 1240 setup.exe 5696 setup.exe 6424 setup.exe 6332 OperaSetup.exe 6640 setup.exe 6680 setup.exe 6880 setup.exe 5240 OperaSetup.exe 4736 setup.exe 1272 setup.exe 1600 OperaSetup.exe 3484 setup.exe 6540 setup.exe 6500 setup.exe 6648 setup.exe 2028 setup.exe 4444 setup.exe 5696 Assistant_116.0.5366.21_Setup.exe_sfx.exe 6880 assistant_installer.exe 6244 assistant_installer.exe 3300 Cerber5.exe 6592 Cerber5.exe -
Loads dropped DLL 21 IoCs
pid Process 6240 setup.exe 6196 setup.exe 1240 setup.exe 5148 setup.exe 5696 setup.exe 6424 setup.exe 6640 setup.exe 6680 setup.exe 6880 setup.exe 4736 setup.exe 1272 setup.exe 3484 setup.exe 6540 setup.exe 6500 setup.exe 6648 setup.exe 2028 setup.exe 4444 setup.exe 6880 assistant_installer.exe 6880 assistant_installer.exe 6244 assistant_installer.exe 6244 assistant_installer.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 448 takeown.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates connected drives 3 TTPs 58 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\w: Cerber5.exe File opened (read-only) \??\a: Cerber5.exe File opened (read-only) \??\l: Cerber5.exe File opened (read-only) \??\m: Cerber5.exe File opened (read-only) \??\t: Cerber5.exe File opened (read-only) \??\z: Cerber5.exe File opened (read-only) \??\j: Cerber5.exe File opened (read-only) \??\l: Cerber5.exe File opened (read-only) \??\D: setup.exe File opened (read-only) \??\D: setup.exe File opened (read-only) \??\u: Cerber5.exe File opened (read-only) \??\w: Cerber5.exe File opened (read-only) \??\n: Cerber5.exe File opened (read-only) \??\r: Cerber5.exe File opened (read-only) \??\F: setup.exe File opened (read-only) \??\p: Cerber5.exe File opened (read-only) \??\s: Cerber5.exe File opened (read-only) \??\z: Cerber5.exe File opened (read-only) \??\F: setup.exe File opened (read-only) \??\o: Cerber5.exe File opened (read-only) \??\a: Cerber5.exe File opened (read-only) \??\m: Cerber5.exe File opened (read-only) \??\v: Cerber5.exe File opened (read-only) \??\D: setup.exe File opened (read-only) \??\F: setup.exe File opened (read-only) \??\j: Cerber5.exe File opened (read-only) \??\s: Cerber5.exe File opened (read-only) \??\u: Cerber5.exe File opened (read-only) \??\y: Cerber5.exe File opened (read-only) \??\b: Cerber5.exe File opened (read-only) \??\F: setup.exe File opened (read-only) \??\e: Cerber5.exe File opened (read-only) \??\o: Cerber5.exe File opened (read-only) \??\D: setup.exe File opened (read-only) \??\F: setup.exe File opened (read-only) \??\i: Cerber5.exe File opened (read-only) \??\r: Cerber5.exe File opened (read-only) \??\k: Cerber5.exe File opened (read-only) \??\p: Cerber5.exe File opened (read-only) \??\D: setup.exe File opened (read-only) \??\i: Cerber5.exe File opened (read-only) \??\n: Cerber5.exe File opened (read-only) \??\x: Cerber5.exe File opened (read-only) \??\g: Cerber5.exe File opened (read-only) \??\h: Cerber5.exe File opened (read-only) \??\k: Cerber5.exe File opened (read-only) \??\e: Cerber5.exe File opened (read-only) \??\g: Cerber5.exe File opened (read-only) \??\h: Cerber5.exe File opened (read-only) \??\D: setup.exe File opened (read-only) \??\x: Cerber5.exe File opened (read-only) \??\b: Cerber5.exe File opened (read-only) \??\q: Cerber5.exe File opened (read-only) \??\q: Cerber5.exe File opened (read-only) \??\y: Cerber5.exe File opened (read-only) \??\v: Cerber5.exe File opened (read-only) \??\F: setup.exe File opened (read-only) \??\t: Cerber5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 663 raw.githubusercontent.com 664 raw.githubusercontent.com -
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
flow ioc 459 https://storage.googleapis.com/script.aniview.com/ssync/62f53b2c7850d0786f227f64/ssync.html -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote Cerber5.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpE6E7.bmp" Cerber5.exe -
Drops file in Program Files directory 22 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\excel Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft sql server Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\excel Cerber5.exe File opened for modification \??\c:\program files (x86)\steam Cerber5.exe File opened for modification \??\c:\program files (x86)\thunderbird Cerber5.exe File opened for modification C:\Program Files\Crashpad\metadata setup.exe File opened for modification \??\c:\program files\ Cerber5.exe File opened for modification \??\c:\program files (x86)\the bat! Cerber5.exe File opened for modification C:\Program Files\Crashpad\settings.dat setup.exe File opened for modification \??\c:\program files (x86)\onenote Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\office Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\word Cerber5.exe File opened for modification \??\c:\program files (x86)\office Cerber5.exe File opened for modification \??\c:\program files (x86)\outlook Cerber5.exe File opened for modification \??\c:\program files (x86)\ Cerber5.exe File opened for modification \??\c:\program files (x86)\word Cerber5.exe File opened for modification \??\c:\program files (x86)\powerpoint Cerber5.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\program files (x86)\bitcoin Cerber5.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents Cerber5.exe File opened for modification \??\c:\windows\ Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! Cerber5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OperaSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OperaSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OperaSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language assistant_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OperaSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Assistant_116.0.5366.21_Setup.exe_sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language assistant_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OperaSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 596 cmd.exe 228 PING.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 6948 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133816219117178473" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings Cerber5.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 setup.exe -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 179652.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 245811.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 533166.crdownload:SmartScreen msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 6468 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 228 PING.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3648 msedge.exe 3648 msedge.exe 3852 identity_helper.exe 3852 identity_helper.exe 7088 msedge.exe 7088 msedge.exe 6888 msedge.exe 6888 msedge.exe 6888 msedge.exe 6888 msedge.exe 5940 msedge.exe 5940 msedge.exe 5868 msedge.exe 5868 msedge.exe 2836 chrome.exe 2836 chrome.exe 7012 chrome.exe 7012 chrome.exe 7012 chrome.exe 7012 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 664 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 5600 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5600 AUDIODG.EXE Token: SeShutdownPrivilege 3300 Cerber5.exe Token: SeCreatePagefilePrivilege 3300 Cerber5.exe Token: SeDebugPrivilege 6948 taskkill.exe Token: SeManageVolumePrivilege 5680 svchost.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe Token: SeShutdownPrivilege 2836 chrome.exe Token: SeCreatePagefilePrivilege 2836 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe 2836 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 6196 setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3648 wrote to memory of 1588 3648 msedge.exe 83 PID 3648 wrote to memory of 1588 3648 msedge.exe 83 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3612 3648 msedge.exe 84 PID 3648 wrote to memory of 3748 3648 msedge.exe 85 PID 3648 wrote to memory of 3748 3648 msedge.exe 85 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86 PID 3648 wrote to memory of 3380 3648 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://92k.us1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8736146f8,0x7ff873614708,0x7ff8736147182⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6336 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6472 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6480 /prefetch:82⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6996 /prefetch:12⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2192 /prefetch:82⤵PID:5508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:12⤵PID:5872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7284 /prefetch:12⤵PID:6000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6892 /prefetch:12⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7264 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7068 /prefetch:12⤵PID:5788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6972 /prefetch:12⤵PID:5144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7276 /prefetch:12⤵PID:6076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2196 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:12⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2064 /prefetch:12⤵PID:5832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6944 /prefetch:12⤵PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7820 /prefetch:12⤵PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8080 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7916 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7928 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8368 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8372 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8376 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8308 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8272 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8056 /prefetch:12⤵PID:5908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9444 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9452 /prefetch:12⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9460 /prefetch:12⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9380 /prefetch:12⤵PID:6312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9392 /prefetch:12⤵PID:6320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9332 /prefetch:12⤵PID:6328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8588 /prefetch:12⤵PID:6464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7800 /prefetch:12⤵PID:6772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=10476 /prefetch:82⤵PID:6876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=10804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:7088
-
-
C:\Users\Admin\Downloads\OperaSetup.exe"C:\Users\Admin\Downloads\OperaSetup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\7zSC8244009\setup.exeC:\Users\Admin\AppData\Local\Temp\7zSC8244009\setup.exe --server-tracking-blob=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3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:6196 -
C:\Users\Admin\AppData\Local\Temp\7zSC8244009\setup.exeC:\Users\Admin\AppData\Local\Temp\7zSC8244009\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=116.0.5366.35 --initial-client-data=0x320,0x324,0x328,0x2fc,0x32c,0x7419cf0c,0x7419cf18,0x7419cf244⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5696
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC8244009\setup.exe"C:\Users\Admin\AppData\Local\Temp\7zSC8244009\setup.exe" --backend --install --import-browser-data=0 --enable-crash-reporting=1 --enable-stats=1 --enable-installer-stats=1 --consent-given=1 --general-interests=1 --general-location=1 --personalized-content=1 --personalized-ads=1 --launchopera=1 --showunbox=0 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=6196 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20250117210719" --session-guid=da70f459-8e59-43a6-97a7-ca0085ae3aeb --server-tracking-blob="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 " --desktopshortcut=1 --wait-for-package --initial-proc-handle=44080000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\7zSC8244009\setup.exeC:\Users\Admin\AppData\Local\Temp\7zSC8244009\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=116.0.5366.35 --initial-client-data=0x32c,0x330,0x334,0x2fc,0x338,0x7203cf0c,0x7203cf18,0x7203cf245⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202501172107191\assistant\Assistant_116.0.5366.21_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202501172107191\assistant\Assistant_116.0.5366.21_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5696
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202501172107191\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202501172107191\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6880 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202501172107191\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202501172107191\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=116.0.5366.21 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x340ac4,0x340ad0,0x340adc5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6244
-
-
-
-
-
C:\Users\Admin\Downloads\OperaSetup.exe"C:\Users\Admin\Downloads\OperaSetup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\7zS47458109\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS47458109\setup.exe --server-tracking-blob=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3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:6240 -
C:\Users\Admin\AppData\Local\Temp\7zS47458109\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS47458109\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=116.0.5366.35 --initial-client-data=0x320,0x324,0x328,0x2d4,0x32c,0x7503cf0c,0x7503cf18,0x7503cf244⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5148
-
-
C:\Users\Admin\AppData\Local\Temp\7zS47458109\.opera\Opera Installer Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\7zS47458109\.opera\Opera Installer Temp\setup.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6424
-
-
-
-
C:\Users\Admin\Downloads\OperaSetup.exe"C:\Users\Admin\Downloads\OperaSetup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6332 -
C:\Users\Admin\AppData\Local\Temp\7zSCB806309\setup.exeC:\Users\Admin\AppData\Local\Temp\7zSCB806309\setup.exe --server-tracking-blob=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3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:6640 -
C:\Users\Admin\AppData\Local\Temp\7zSCB806309\setup.exeC:\Users\Admin\AppData\Local\Temp\7zSCB806309\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=116.0.5366.35 --initial-client-data=0x31c,0x320,0x324,0x2f8,0x328,0x7503cf0c,0x7503cf18,0x7503cf244⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6680
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6880
-
-
-
-
C:\Users\Admin\Downloads\OperaSetup.exe"C:\Users\Admin\Downloads\OperaSetup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5240 -
C:\Users\Admin\AppData\Local\Temp\7zS87462E29\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS87462E29\setup.exe --server-tracking-blob=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3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\7zS87462E29\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS87462E29\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=116.0.5366.35 --initial-client-data=0x31c,0x320,0x324,0x2f8,0x328,0x7203cf0c,0x7203cf18,0x7203cf244⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3484
-
-
-
-
C:\Users\Admin\Downloads\OperaSetup.exe"C:\Users\Admin\Downloads\OperaSetup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\7zS046E3F09\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS046E3F09\setup.exe --server-tracking-blob=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3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:6540 -
C:\Users\Admin\AppData\Local\Temp\7zS046E3F09\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS046E3F09\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=116.0.5366.35 --initial-client-data=0x31c,0x320,0x324,0x2f8,0x328,0x715fcf0c,0x715fcf18,0x715fcf244⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6500
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6648
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=11004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10836 /prefetch:12⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10272 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7120 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=64 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8680 /prefetch:12⤵PID:6416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:7044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7404 /prefetch:82⤵PID:7048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=10792 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=70 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10468 /prefetch:12⤵PID:6836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=11008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5940
-
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3300 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:6172
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5820
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___CSQ9JNHA_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:6408
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___GO7EQWIX_.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:6468
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "C" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:596 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "C"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6948
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:228
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=72 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1816 /prefetch:12⤵PID:6216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=73 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10624 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=74 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6676 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9145630568662477673,15688419961739049573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=75 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1160 /prefetch:12⤵PID:1804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3520
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x49c 0x4701⤵
- Suspicious use of AdjustPrivilegeToken
PID:5600
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6936
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"1⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:6592
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\f49f1653992d48389fdb54a8be1c085b /t 6620 /p 64081⤵PID:1528
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵PID:6620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff8736146f8,0x7ff873614708,0x7ff8736147182⤵PID:6900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault6c2dc1eeh23b5h431chac9ahd0329df5dd6d1⤵PID:5800
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8736146f8,0x7ff873614708,0x7ff8736147182⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,2841179641401972421,15233870683391621538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5868
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5680
-
C:\Windows\System32\DataExchangeHost.exeC:\Windows\System32\DataExchangeHost.exe -Embedding1⤵PID:6940
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:2836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff865d3cc40,0x7ff865d3cc4c,0x7ff865d3cc582⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2072,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2088 /prefetch:32⤵PID:6928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2300,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2480 /prefetch:82⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3256,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:5632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4544,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:7212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4844,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4880 /prefetch:82⤵PID:7424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4880,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4600 /prefetch:82⤵PID:7624
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Program Files directory
PID:7680 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x7ff75c694698,0x7ff75c6946a4,0x7ff75c6946b03⤵
- Drops file in Program Files directory
PID:7696
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4972,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4780 /prefetch:82⤵PID:7796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4556,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4820 /prefetch:82⤵PID:7848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4432,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:7888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5312,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:7292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5064,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5156 /prefetch:22⤵PID:7284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4772,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:7940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5436,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5504,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:5616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5096,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4428 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=4940,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5084,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5412,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3460 /prefetch:82⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5820,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:7012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=4520,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=5996,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:8176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=5020,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=5088,i,10836574332569729437,15633226268471480554,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:7440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:7516
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:700
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:7380
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System322⤵
- Modifies file permissions
PID:448
-
-
C:\Windows\system32\cacls.execacls C:\Windows\System322⤵PID:3268
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Peripheral Device Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD59bd93d0726013b03eba418a85379cd5e
SHA145e508e345800c887dc0cfcca80812d793c6b354
SHA256190a91e6d0c527e56d0253fc574fc618e1aa81b5aa5108952fd47bceabc50a2a
SHA51225321291899d69bab2ee136d54b38a4cc0448d9e697284b75dd5d7be53d71990a01c37c17b23a9431508948f49b92f3213e186b793cb3f1ff944f80c95418f35
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
Filesize
24KB
MD587c2b09a983584b04a63f3ff44064d64
SHA18796d5ef1ad1196309ef582cecef3ab95db27043
SHA256d4a4a801c412a8324a19f21511a7880815b373628e66016bc1785a5a85e0afb0
SHA512df1f0d6f5f53306887b0b16364651bda9cdc28b8ea74b2d46b2530c6772a724422b33bbdcd7c33d724d2fd4a973e1e9dbc4b654c9c53981386c341620c337067
-
Filesize
72KB
MD512ec32578358877c92e6d069c908c847
SHA1e30c0cf26c31e6b2704d97f49a8288847bebd0f7
SHA2569cba0015bd7bf0068e37a8ecbb14e39b5677936657ef8b675619b1427f98d08a
SHA5125fbaa12108fe3fa52d706e8c564caabe0db509026998eb2770b9b66a6610fc3c7dca1fa5b08fff71d429e4b608ef03454ea33ed26668c9894f2766f2991049e5
-
Filesize
408KB
MD5748cd15f3bae7ecf58f7418b3ec525f1
SHA179f3cae5339e313154757b2b168cd26f770fb042
SHA2560f1772294df28eefd5fe8a8f6563aa9801fc3de07c5613a740d8026ee561c181
SHA5124c12246cd1ebbdc5ce6dc1c312710c8407b18845b0d3ce2aaab56b00ecd658cae0df279291379df7bd3007a474f3d85185a978989666a90c113ef1a86855a84d
-
Filesize
109KB
MD50747e8720d72dbaf549ce01e1e13be75
SHA1b7e09287df1f6e556cc0a7aba2c92a0c66c38ccf
SHA2565a232483f8f020ec4e5bd92b98a3de68149f695d400b5daa37125e6a7ef7fd52
SHA512d6d045b64b86d9d19adc42b1ae2d2ad561e1ce698e709c2c76873638fdb508d2c1fa8cc40659ee88e771ab3cf26af78fdd079ff04ffd0b0d26ba84f96e381545
-
Filesize
41KB
MD53bc2b6052ff1b9feff010ae9d919c002
SHA1dd7da7b896641e71dca655640357522f8112c078
SHA256483a3494759a05772019e091d3d8e5dc429d098c30007d430639926c3ffa16e5
SHA5120b1632b73fd87e8e634922b730f83b7950e9a39697a46a3429f0bebb3f1ebd14c815a4651ee8f663a437d00ecbeb6ddaa47b2fcad719777edf1b1de8a7cad0f1
-
Filesize
2KB
MD53b954bcf142d75af1e5e5d36aacfdf7a
SHA11bf5b8b10a0fca3471b856871c5e6e947af38a3b
SHA256749e6dadbc68e46d3b7ebc9038f21c3f052c2bbd106aa6d3ed69a5c5e8a747dd
SHA512330bcf89ffba8ca0aadfce38992d06e1c1ea3b15485ec365209939fbf8d2d86c1b252f28341feeeb367d87325dbb70d82eb66e0c2ff90c343e46cca070846a50
-
Filesize
1KB
MD529aac8a040529b6ad1e5b90b16f088c1
SHA16d85eb6f33bf6cb79718b3c9a990d39d27f6b68f
SHA2563fc9078b8f3205a18165f884dddf0a00d9d5568f5fe8a4854dd61a2e35e130ae
SHA512061b87c6a0f27801628a876a6509ab25720cacdc3ba895c4a8adfdc6130bc6217c0ae2be26e049ad2e0180e5131e85b7c4a42cecd273e0af5cb8b50b2009c08e
-
Filesize
216B
MD5178a0ea382a07d5fdb5a565f7b42dfbb
SHA1af7c5051f36b597295ca7767504dc05bdc8174f2
SHA2568d9b4cfb0ed36717f2d84c3daaa6b43dab963b9c28f4ea5da6f875d39294fb10
SHA512515fb40f5c928abb45ab03fda0dee6c5741df17283fe60638430ac11f16f23ff4c72ce332119ed45a635a2149dafdbb9710846279db577f7ab028ab99a432b66
-
Filesize
768B
MD5b501a17a87a0ed011fa755e5f446c3ea
SHA13e1db4d04f5e4805fd055e30e16e30dd5fd6cb5e
SHA256aa044908596b40f78effffc35e1434e012d835f9034001b4cb02cbab888102ed
SHA512d28fa15016369f9918dbc5f2f84c8bc36d7f686cb97d2b5fec6adea4bb361089204fef4aa87731aea6a7ae2eccec1e4230ab693fc6101df888d27d5eba9bd4f7
-
Filesize
1KB
MD51e9081e345d6e9f96de5a7dedbf9c027
SHA1b03aef55e39b986656b3c68bad6748e5e86c51b9
SHA25671252c546ec2c70dc84fba15ef9c536080ec8848f39087423837d7ea46cff135
SHA5122273a95bec90b6452a3c0eb08b5ea59dbfff53514e4678d628a292098d06e0dac6e5b9d27dee9d7e8b18ec0af39e9146a6a68d027ad774a03cd9f861fa709431
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
7KB
MD5ddd1b54fe707abeed078ef80ec89af56
SHA10da32c350fe9e1e3364e2f56b9b0350951408e63
SHA256a4ae7a13e3193779822a08573620cc0a4c617538f24e7cd47f9c425632006a07
SHA512e140b713f48d7886f31a2c111c0f55aa3fcbd739d76723405097fb5037081b48a25ab80ea343b54d09da5fc996cafcafd12b3251a92d254320c9c48d20745bd9
-
Filesize
11KB
MD5dd52555742d8d2633385a9cc2ea74133
SHA1ea3a174c109e46177bb3911c6e9bb8f5a8f01bae
SHA256680c457f89862a3f51d75740da4b937f4ae40b8680b4f079908d6b5872b51ca4
SHA512418a47eba39a1a01f634de1f6c3134564ed2f137ee47db4f708b8898a8305f671733bb1d7640e724b7c98f2f148ec7950c28a9d4e612b64c66a0f2953ac564ce
-
Filesize
3KB
MD5bf43db3011474e0e596bb61159fae692
SHA12d732db20277411d94fd8116f4c44a0882c60b51
SHA2568f8592e90592db001e70332eca2bed167929874f78872901e234107d1b769862
SHA512cf4e954c1a95f326b6c4070c9608cb915489991a0026f2fe41bbed8092833ef8611da0720336f0c2c42896827bfa21191274d4d1d25369c4fdeb0b7945c3e2f1
-
Filesize
6KB
MD5b81348fa8d4580223b6a52d383230874
SHA1ec96ce776eec572e12184565195f92707d827593
SHA2563f7571e0f42a21f7a598a9fd40412c8d350ffe93aae154d5596f8a178cd616bd
SHA5124df3d07a283f4e9b3a09da734dd566f57c40b5f4a4169fc6408b3ae4e9b5af444d0a2b48c94e59807c4c0e3c961d993c3e464a423ee917f6d414e40b8a029e4e
-
Filesize
7KB
MD56fc37272dc7218096a111b51149a2ab8
SHA1a1bbab75652a5cc93a53cad3b2b0f835ec20867f
SHA25655d6fd292aa2c1a75578510db2d4905f7a043ccdc20b5130774f975d57b41237
SHA512c79c5c65148f23e568d65b00f84cda7919a2db3fdd65c6eb7c5cf39681aa7175f48ce2b73092556290af9a2c060d865a8b339121fb109496910f262c4c8ac568
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD582ccaebed81a0ef101238e0fc0cda03b
SHA18bb3115d0e0a6f8a829ce9210048e234e6a0b08b
SHA256045377071794858f10636e399a0276089203e68b9d721be2d36f745b6bffc58f
SHA5126a79595d6d704b3e8ef01991a9d32fa963ec30d2dff492710fb6873885a46717d07d9c2207cd039d79ec9998ac0bf3ef315de0bcba8212cabdfbb1ad17fad162
-
Filesize
524B
MD5e63c95d801298ba5d8b4939bf04cf5b9
SHA158c47a36b1596d140db17ac7fec649e11d86d5a7
SHA25662b73fdb85034537cbe8a1618b236d31ffb4d2494a2b6013d7530b460ec56591
SHA512ec6a560364a33e67213192285984dd8ea7ef6bafd494eed6095e93f03038fade09f6857b03dfbb217951d38bbb140e76464eb333ab38fd2a918e74b92f149b0e
-
Filesize
356B
MD59f907c6b225270cb16296cd30e77b0ce
SHA1ee1b7f80e1032d1c3cfccf800b11993219cb59b1
SHA256b3fb5302b66c9b0192230027092eefe1f3ac96bc5f20a9263464a69eb3ea79b7
SHA512ff30d11acbfea41e10e4268fd39ae33155d6654b8052445fb311d00b0076b1ec52d58ab331d5baa27061d901456c7971b005d4f7e5888c8b99f55753e522c286
-
Filesize
1KB
MD58396bdf31d135d8fdd0e9729d1def70d
SHA103ae8e969f93e58e8beaae0b43d3b4b1910d0433
SHA256d67a1a5647b6cfa125ca0a991190729b98b12d7776e7a4d8d8fc02252e5b8f76
SHA512eeadc4b2c146730fd21ff09ad1f8dab134d0f340b50fa75d7db477f191869d5494edf5058cc7e976a24d681ece1c58af01079221cca1a04797d887f8deaf489d
-
Filesize
1KB
MD5b6db22a827e5bb442d6d76d7e480a3c7
SHA1f8997d13f0b4b4ffc758e6575f653424dd7462df
SHA256814fa19562a2af07702403e7dcf872b280c1d4fa5a4ad81eb645d5979134896e
SHA512a2fd7cdab3c616be125fec4f3fb29beb16e508250b7d237bf5cdd87c0f7f1309eaab4ca8c0cbf6964988ad16345c8af61d4c5176ecc1de17664448dd09b5796d
-
Filesize
1KB
MD5430efa90b93454bc825904b5fafc3e2f
SHA19b8872c8e71cba5c7088e26d22f56acd9d9f2a71
SHA2562ac56a63bd23ba989708246c376ccad89c04951ecdfbd80d519e6c3e811e38cf
SHA5125d8640b65cbc6abbbff5614f4df402a7de498b6c00fb19afca6b27e1f0895f7fa98fdbfd91b800e99f322552f5f4bedcf75997f7fe438340d88754d988b896e3
-
Filesize
1KB
MD5246ce71e16385b3343103bdb504b0bed
SHA1b4a882ae11466dc79d7e5c9ea7d29dbc2dfae88c
SHA256232d08ebbadf46eca86adab682a9d246c73161b14e713d1c074d4babc034b4d0
SHA5127e0f994dd0e78c79f8776a10429a8668a025b2fdc48be42050c8c07437bd1acdabc97cb97c9af78d51c4b8967783bc72a2be54abc4c25a58d8172ef14715b8b2
-
Filesize
356B
MD5dcaa9c425fffbbfa0dc8842f0e0cf42d
SHA103aca131e19f9ddfaff37bb73d6c319c57c87248
SHA25663471711dcb9157e94a5edfd8de87f743b58317f3acfda17dfa27fc6b951d5ec
SHA51299fdc1de42c8840115ef662ba9e5144f2ef4899d2e7d9f3d0293d3e7fb390b93a1cae6d5cb453b2313dfcc1f6c0052d7e43c95718e5e74dd23ed19ab11134344
-
Filesize
524B
MD5c88db7fa02ba4261b171f5a473cb6387
SHA13bbe99ad984e450597a3e736048af5b1eaa18498
SHA2564b9e9e64b2529de8e66a1049028531fcf47cd1ef0b10a8711fcdf3c1a43f7711
SHA512439305347095bbd5e2799093575dc73d80c609ab431f658263fa009f369df1315f705782bcfb94dd5585f8deb2ba4be80091ba7578512a23dfda2ab3f9217e8b
-
Filesize
524B
MD51dffa6e44c3478a4283306cca4c75c05
SHA1f3e837224ffc81a42db7abd394ec018465d8f25b
SHA25688f82f18eb32646298f16fe24e50124fe0cbacae6f96b43c4c42fd106837b7cc
SHA51299bb12be38e68716a6ba88e6280ca084e8d0a7228527920630655e06f8ed52bbabc053a3b177691cc56dced6dfd32eb33d4b883d48bddcc372c5c696306fda19
-
Filesize
356B
MD55d786251eed97cf8947df38e2f1e15db
SHA170dcccfe2fe630228b722d0dde7365ca79cc62cb
SHA2564ab9b146f39767f272e5fb7269ace90584ea17497aaf9416762a15b21e3df44e
SHA512bf6400697760264b1302860f55c6fd64f70e3913c8f00e098bfd96d60aa743e2a0278625273f7a57f7df8c93def1f292a057962f3f1686ec6d2c041a7520e84f
-
Filesize
1KB
MD56a0c0cc64dff057ad19178dd95daeba6
SHA1aa42bf9530b1de6fe9c349ca03c1bbd4cd34c47b
SHA2564182e8f1675def6b58d48b869c9e117efbb5a293c144acaf533bb124919e750b
SHA512a7630f2412fdd187e729b0e4866c7b725ce61c9b6114d6210b1506aad0e5ee5e1e6587d66eee806b78f27ef51573657a4abef5ffc6c75a471e710c10ff81618a
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
12KB
MD589c4611ca83fb8757f0fb10f05a58b1a
SHA1b4411ac70d2f2eb5918484743031a9ceeda1342e
SHA256f526cc9e0d11286b2c70afde63b62ba0a73cba46fb2a88389075cdfaf04abf5c
SHA512628c3dd767697c297c7959172098ee06d945400caa1e7b32c9a6dd04ffaa1749ea78efea7fe013d49a05b5bf4561d3d94ccba9573ed5545a20d6d865fa482281
-
Filesize
9KB
MD5114bf13e312e258d829c2dcda0dfe940
SHA10d4576f8ee677d37104f029003e966d1760ddb24
SHA256ecc01a090b4f3d72a25cd39b87f2fdf8e975d8f80ede3dcdc2a765609de41e60
SHA512571d5fc0fe1594c3cd11aafbe6a21166c77d1d2c32ae70b7c6da865b7eed4d27b64cf2d10776e2288e1deddaceb4b99cbe82ff5db04708ffec2bf09ab92f0981
-
Filesize
13KB
MD59a92839a07c81fd1955710f496006aa0
SHA1e663e2db879e364b02dd3f1b130caa5fb798b431
SHA256a78d88a766510d826ebec10d7ac4611428e3cb13634537002a5894db935e6065
SHA51213c45c90c809edee12154197db97f7e350fc72e5d69c473ce12e12932f86ee562b7833c1ca6789f2e69f31bfac19f008ca731adde8a88d18be773cd14514a02a
-
Filesize
12KB
MD53143a02b28461ccd52b18681901f8cae
SHA189f7f400ee1616815a5dda772f9f76397838d4aa
SHA25606a1ceb4eb33a91ebbc98f9059901684ece117a3740ce808aae260c80025c664
SHA512cb1580b21cf8aea2cc0c57eb9e3b8c581ff01278a24413479c67ae6325f55de8b00fd3c0f81039359ac870caba4f3b2b523fe0c0b38071f39a37741d929516bf
-
Filesize
12KB
MD5e689f09a4da625c7ccaebe085efba08c
SHA1cd2f7b746e0df66a1da2eb5222e1483d2ed63052
SHA256f89a5251fbeac4e9ea4b1a742553e146b52cfa667d1b6c85fbe281be63ce27bf
SHA512438e4357d386df258fdd7de899f2c4c55fd485c6eae89b84ed21f8bd134f00fa767dc345d5b3135aad7954dd632ec5b826a466cef25a01ffac5bb2d74940d784
-
Filesize
9KB
MD5dab9537cc922f02bd2d07e3d673d8328
SHA1fbed4473ef6bb2d0805a7eece7cf958182bbd2d5
SHA25688a4ab7b37f633ea07ef964fa0da57e05c4c871c5023d6cdc64a4add2cac8864
SHA5121511160cda02631482246d951af713e33d66556754c462d0d453f984b8cad3d4824af650013d5e5ee2e1d25fb71541246ad7bb00e5a571fc57fbc884389b92e5
-
Filesize
12KB
MD543d58d89a4acdea0f4a6f1c28ea1c9ec
SHA17e05c47f6503965ecfed1e2821af3d565d1aa807
SHA2561582225eb3c66c6d82b97f6b0e637e32c3444a88504afd0f2fd95947f53b5228
SHA51281408a23b84eb901307fd221c9dfa0614b1b062cc035b80cd980bd556a5d2b1c26a97f95b599846806168950240dc36dda3b3d37fdd0974fb0200c77a898853a
-
Filesize
9KB
MD5db0394d064931e8cff51e879f07e4869
SHA1b07a006f9f65f4d75ace69e505f90185fb348113
SHA2566d61ba55f7b86ab5e2b9cbd93ef51d8e5e9cce8939a57b4f707fcf5705caa58a
SHA51221cde1a9a65ab6f54d09c940e3bd15b24af2b58a556e1bc05df9c4963f1fd48933af8f44c4af8d2bc07b34c4c35d436756a750f4c61c14511029a9f7014d2fe5
-
Filesize
12KB
MD58733f93b87333e4756276ed8a20853b2
SHA19ecf5f375fecd9d0e76a1917c67b3d7a9b5be802
SHA2562d40e139071206928ab6445d4f8c8bef4ef27d03f4692b25a491eb401d23c5d3
SHA512a5d98461bbd14acb4c2cf432e5b37dc7c541fd7afd815381f933538c8d339e23b4e79d093ab3930331f034d555bc59458b812cfd9c3964509384dc5079b537fd
-
Filesize
12KB
MD5e165d380d9ae592979bdec85018f7644
SHA18323dcefdfccea9f50e1773ace2c0423cdbdf541
SHA25651512e6d6caf25a7b0d2e1b9a70a44f6a833e335035836fa34f013100c5d9dff
SHA51249204aeae6c14636f72971377806c3a2fe0b91ce8adda47d3bbc40c790ffdb57968a594e817bfb5636a49376ca1a76b1a87503d38ef18b7b503b72aa7995c548
-
Filesize
9KB
MD5510b3113b7b54b723d31a7a3ee5ceed3
SHA126b6d51210f5f6eca9e47bd4c49c38fbb3e6e448
SHA256b2661798172b872ce2616f375beb66cf35223852820ad120691f0a7312a18de0
SHA512921bfa21f928a715d84584ec235ed7f51e860f1843328136f785dc2832ea2e3935852704203f1acc96c27daced3cf5051910e1e4d2e9fbe84089ab8fb84ad102
-
Filesize
15KB
MD50c2dc1104588c74043d2f322df0f05b4
SHA1b136421805ede6e5449bbd177e3074c8ecb7e202
SHA2560d22750e4dbd9023cfa1e27ec66f22a7a1a000a0aa51fd77cef74f7188a13511
SHA5125bde16207e324f1d5819c42f8ec3fede1aca87a3494662c54cb8eb6e835cadfd5429048719d0bb479c0786a7832efc08c42ecbca83564562d04523cb6598378f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5a4d020e37957bf8a988784a8e784d4bb
SHA154887611f5146a8680861c680517cb23daee5eb7
SHA256fc0e1f45d37baa55a3d3f8d983a397b51301476b462babf838113e18aa61b489
SHA512015467770ca9daf46371b643631e784add93d50736d956754ee9d17609af2ed6b38b732c951f7ea8772622fd0c2c3f6c1b71cede0aac70a2ad6b8f889f5d6468
-
Filesize
76B
MD5a7a2f6dbe4e14a9267f786d0d5e06097
SHA15513aebb0bda58551acacbfc338d903316851a7b
SHA256dd9045ea2f3beaf0282320db70fdf395854071bf212ad747e8765837ec390cbc
SHA512aa5d81e7ee3a646afec55aee5435dc84fe06d84d3e7e1c45c934f258292c0c4dc2f2853a13d2f2b37a98fe2f1dcc7639eacf51b09e7dcccb2e29c2cbd3ba1835
-
Filesize
140B
MD5eedc9ff50221650cbad9bc8be038ea13
SHA12186bccfc1407d1e58addf6198ed2c7bcf0e528d
SHA256f7d2294c84f4191c363c8a4ac3fce8341a6fed30716b64d738c37d7a189729a0
SHA5128b7b17dd3cbde2b6fe30c3e4b67882cc8bf886c991f5f26c1d0cee98dc2e54c318234a9672f63123d80c35bb5a9ac11e16e2bd1d4d880f0613474c54e6e4929e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe5f0160.TMP
Filesize140B
MD5eb8e40d067ff57439bc0088861a835ad
SHA166fd10ed426b2a5edc7d9f7d1f07e8d2c35d3f5b
SHA25681578284cce757533931f2af22c954171898bee0ff03f4657efabfae18dbee38
SHA512784e09851dcb5124cbbebe632b4e98e1ad9b1a46119947121b6cba961eae7c2f40895e3529f989e0d88ac3321db51eb916cd6b89e963cdfa791119ba59dc422e
-
Filesize
230KB
MD5cf23eadde2413f9a80a0c83cda8e879e
SHA18f1dd38d276261aceff1f153d5e08ff1af4c37b9
SHA2563628446988b02f3eb56b348d71965f4cc2a6dfba603d0dd2afcafd5e93df63b8
SHA512e7b8961ba6312371d9b75303d3667c83d4ed6bc4ac1cbced719d99e9b9c017cf031b2a2c48512174274f9dd23dcf4fe94d0a3ec47b87f9ea0120ec4dd885991f
-
Filesize
230KB
MD5162b7ecf8fb1d3ee83143e419f65b8f4
SHA18dae6700684ae65a2e568cd9f7ddcecec3d40060
SHA256022d73b893d96b5791f5ed71ee716a014de8e0a70f21069aad1377bc1645c04f
SHA5128bbe3109b7e3d6ba51ad5699a2c2ee6049d452b361a9c041913e3754403a86ab7a4322c3a4ad6769c63b6bf7b3b8b65bc906518a1a9eeb2bcb0eb3dd8415e34e
-
Filesize
230KB
MD5fdc3484c3d422270afddc581e472cc3a
SHA14c92bb4de391ae5eb4cc12a0630bc8c13895fa1e
SHA256c02b8f24d6558d18449fecdc662a71a2dd0d4d877034da5c17e0d5664f39f2ff
SHA512a559fb7e4f7e62ec5d5bbc34091ba87265004a8bedd55a1a060b19821448541aa6fc1ffab704f3d3f6aa97a437ab6438453a7d947a1184808fbd3c23171478a4
-
Filesize
230KB
MD59df6e0140967c52a487e200b81d25ca2
SHA142b35f4c67926ddc38d15a22df3fa2523fc2d81c
SHA25687e9093fd0c959e8c6e3ffddbe7a83b071e8890fdff1a1a3709484b2ffc8dae5
SHA512e5beee32e27cc10d90ea5d4e5176d5a7d6ddfdb46e72f6b396a450526c12aca19fc26128913ebf3d606c5188dfa56017f464087773bc947fa9682a9fd1fcc66f
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5977e6545fd8d72aab30df3fa828baf21
SHA1c8b5ec6a1ee5c179ffc11288d4dd1b88b9990f29
SHA256d9c8314c69a953188db25bbec832684a8998d552136ad8c2acc6fc4b8a3cb90e
SHA512036673a3de3a3ba68fb608e41cb799cba5837665c97f87c1b89a2e637c2328ac37e9d327a8e14beae72a362faf1c72d93400f24dbe03fe15db4578ee4f43d5c2
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
1024KB
MD548394faff062b171f59fe31cd75394b7
SHA19f3d2ae91286de3301e2aadc03da9f85a99ad1f7
SHA256be7f89624af045b08cf8129f069d303198ddb92a4dfe2b30b63886f900c2b4d5
SHA5125642aceda80ef19a6926c9a84dec63efe86f7b13878f7a83457a2fd63660fa9e03f4a15bd6a33a19e60f8973846e7d885b386e746af9df6aae1519c122399d70
-
Filesize
48KB
MD5dd0fa63d7a6164ee38a2d8c56734dae5
SHA1e64d22f6fd29c7a77466659eae1478e0fa65ce91
SHA25610ae3cbea6525955edc9ac5d8b90ec4f50990edc15cf52d132b67a23fe0eb8a6
SHA512262d6846bbdb5286cb80a78b2dbac31bc10bff30fdc5ff7c2bd2bcc7748a4fca98b20dc30ba5960f31307163b82857544021ccb9233257885289d17707f8b9ec
-
Filesize
366KB
MD5e6940bda64389c1fa2ae8e1727abe131
SHA11568647e5acd7835321d847024df3ffdf629e547
SHA256eef5dd06cf622fb43ea42872bc616d956de98a3335861af84d35dbaf2ab32699
SHA51291c07e84e5188336464ae9939bfc974d26b0c55d19542527bdcd3e9cac56d8c07655dc921acaa487ed993977a22a0f128dc3c6111273273ff1f637b20bb56fb6
-
Filesize
67KB
MD569df804d05f8b29a88278b7d582dd279
SHA1d9560905612cf656d5dd0e741172fb4cd9c60688
SHA256b885987a52236f56ce7a5ca18b18533e64f62ab64eb14050ede93c93b5bd5608
SHA5120ef49eeeeb463da832f7d5b11f6418baa65963de62c00e71d847183e0035be03e63c097103d30329582fe806d246e3c0e3ecab8b2498799abbb21d8b7febdc0e
-
Filesize
63KB
MD5226541550a51911c375216f718493f65
SHA1f6e608468401f9384cabdef45ca19e2afacc84bd
SHA256caecff4179910ce0ff470f9fa9eb4349e8fb717fa1432cf19987450a4e1ef4a5
SHA5122947b309f15e0e321beb9506861883fde8391c6f6140178c7e6ee7750d6418266360c335477cae0b067a6a6d86935ec5f7acdfdacc9edffa8b04ec71be210516
-
Filesize
19KB
MD51bd4ae71ef8e69ad4b5ffd8dc7d2dcb5
SHA16dd8803e59949c985d6a9df2f26c833041a5178c
SHA256af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725
SHA512b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863
-
Filesize
37KB
MD574faf1accb8f72522c7ca3343281a074
SHA17b1ba33a155848525e34976d60cad0d89724450a
SHA256e131d0db51a5089562fc2eba2bff098f76faa70a93376747e16ead3e7b1d98d4
SHA51203a4dd9584d92d07b0a5cd0f505c54e1deeff39c3f8b20a5d5df743fdc0d46dd9b61c5bfeeab1aaf1cbfb72530896e0a32c981fe289500c4840f01e46f06f8ec
-
Filesize
26KB
MD55dea626a3a08cc0f2676427e427eb467
SHA1ad21ac31d0bbdee76eb909484277421630ea2dbd
SHA256b19581c0e86b74b904a2b3a418040957a12e9b5ae6a8de07787d8bb0e4324ed6
SHA512118016178abe2c714636232edc1e289a37442cc12914b5e067396803aa321ceaec3bcfd4684def47a95274bb0efd72ca6b2d7bc27bb93467984b84bc57931fcc
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
66KB
MD506702fdff4205590c1caa29b580e9620
SHA1966017a8f488ddc3707f7d2c22a6c7eb51f58f29
SHA2567586590346cdb9520dc3cf7131e5662b3c4407d2624ec22dd0e1c1eb9725ce36
SHA5127c39333eb130eba6c9f57c50b8b6fbebf90c3cd49bbd7a967c6d31f7b997ea085770b84caf4ae2d984898a445535a20777c671e382e2da01e21e1c40248d322d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD5756efecdca49393d14bc827d6015b315
SHA1ac1794698992adcc94175e768a0c15858ad7fe48
SHA256d646a39d53f08b31983b3a870829036ec1f144f96743f647009b1d1aed7004d4
SHA512a8e8a9c9bc988b94138a10587ddafd9533aa1609599350c0216e5b49f1f4c97bb93fdcb82137d84a0d7e367d66ebe2301e97f87791aefbd28591c89566017441
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD56aea58aa710b41c13798a372762d86cc
SHA16c90dc49a3d08049779f36c39737919b23091b13
SHA25678b9a946184939744b5ab063d9587370ddb6138677f1068058f8695a4fcdca5e
SHA5121e88a5ee0414dfa6d6e9139edf121ef669a15f7beda85cc0f2f4df3415a9a1d3cea8033e7d606a7f270c27909c1e7d1e44ca2ba1dcb855a475e3ef5a2e77cb7a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5668330e16e8edc3b0a306f796e327a9b
SHA1a4f3a6fce5f7e354ab2e728d64820bb586b4503c
SHA2568afbfea51d3a371d677341d24be2420c51745a931b2ba6aa4780bf8bce199762
SHA5120ff6f966038bebbc57d01a4b400d61a551c897dedb045c3fce0649406a715a0d0042740f0a8f17f0f51376b159ae8c51ef941b304e46ed18f8c277cccc724032
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5a83f6140d84ab3e74475fc67579f6b8d
SHA14d0f73e92de5da4f5bf6ddc862622d9eae6653e9
SHA256f45e0fde1a0ec3f8367889487ae5d47ae599cf93ca948203b6a05e359589905b
SHA512357b1d25cd3d4226ecc049414e0b781fd41a73f0819503a09085f1252951f00e3ac708a48f5d88e23622d7f265c7613c1afa01d8459ac76691d0cfd4af0be014
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD55fdbe157dc7ecfd0ec393c8f44d61e9b
SHA100d16872ccf17ccdd70702010157237de5d1b79d
SHA256ac2ea8fa61089facfbd1d6573a5c006db2d692ab9386885bda92fbb9c572744c
SHA512a5823ef906049fe6d6c2c15fc395e054fef8c39b087a7fc584727659817b9c132ce92312b465e9ec7b01e63144d27488e09ce18ffe14c7b98143b2e2057775b8
-
Filesize
4KB
MD5d3d04a110a17dca641e7a3e60e5b7707
SHA1b6f851f5b7cc3c66b0689aeb3664dc1f99124709
SHA2560516b976e91ff232f39e0d47605b8a4a604eac4584f3193b2ae5f1c97b2f5d33
SHA5121c3cd1bde4069ebc7c094a4ffca4e941335ffa61055f4b5f32bebf35a8ebf2c61ceecd0374de629c41fc0716d628d363afd60dd4c5ed0cad724bce442ec6a88b
-
Filesize
16KB
MD51e2c1debf8b9a33a7d1932330f07f308
SHA1d1b2ef65d65b2546e2819fda0a46cc7f5a2a1e61
SHA256b0760970f54d15c5e34c728bfa534a947840404decdecb0e64cff086b6d2f4c7
SHA5129572e2fcdfd8f3a38f98e540493bc0dc23d89ab884ea1964a8c441034b7567214a2b5bac92eed0cfdab56e91a5c0d25b558c1c0c9d5f210d0b7767a66231e54f
-
Filesize
14KB
MD52471b140961532dd23d707dd52c806e9
SHA1cd3e3b5ff5df1111fda096f624ba2c0142a682fb
SHA256e68d4c80671dc8b49858fcd0c5c0b51f46d6b88ad0833a85d4d3264cc2a42b1e
SHA51252ade9eb76f2fd4e386afa154a1f828fe87d2146f5541df4eb317a751fe533a40598ea0107474888a9b95967b4f4726e1a233e9f735e28ff69d5ba0199e5769c
-
Filesize
15KB
MD522b8e62ddab1a8bce4b3b3a306f55132
SHA1402e4a1fcf9950867df6b4ee1037003f5d38c0a5
SHA25699210ab1379b024de7bcc1d3740dab2e5f6021b777f171c87504f0cf6eb93c14
SHA512fe18e354199e1b921e9083c43fd1cf3973ce75955225dfec2b72d7dd8a7a4c60755260f16dca4d599cdb0fd84214aa9c7e96a8a243fdf8d8d6802a588ef1b052
-
Filesize
5KB
MD5541150d81d4861bdeb8ba437f36b0ae4
SHA10de63092ceae30a37baee29942042e1cce1af58a
SHA25608b29ffbf9dce8d19d5b1308c6d3edbee9d4a4e6a3e078d6de7fcb55adbcbc4c
SHA5126c100d19745ccbe666a91b480f121a49da87ad6585bda95eece64e6510878ccc8a8eb2dfc4fcd01efbe8da3e3f74765a1051a79233ed3d3be39f039c0be85e9a
-
Filesize
6KB
MD5c14a1d3386c7a139ca3178b39ace15f6
SHA1ee15ed11392fa5a71a2d9b1d4e934942d060b7ab
SHA2568b4e08182edeaec945c08b88eed9bf996be7d7b884ab9bce64449c388b08adf3
SHA512db1f44e59b39429ca82caf94711dbf25b49e77ee2c41bcd24acc87dea6afa485a066ebf30efcd6e15c89a6aa63f3c3a967b3dd115a1dc3e4389b0a57388a4f40
-
Filesize
16KB
MD5a0537a4b14d2abbafc3ac03466ea528e
SHA19a794dbd55343fa2aba88fa708e8bfdf1dd3ba19
SHA256c5462ab1432b7c64e77486f96d01410837096cfc7469be960529803310cccc45
SHA512aa9cdb111799f6245f43061aa3043b38a20deb6b22c1ccb41401984c5b57205ca2eaee23fb532762278f41444380ac784475924db58be272e493225cb7b310cc
-
Filesize
8KB
MD562c19820c039851d660ca71099f990fd
SHA12f8f52197b2014e2975f4288c9621c6db8f28409
SHA2566fceb2baaeae8368dc074206ce09122c3f16af4bef9d6fa8caf868a0d0c8c5b2
SHA5125818d39ee36645b4c45a63bc5944a0713e536d8c25331468618cf8d44d0cc78d79d65a8eb476a67f02bb54827db9d6c6b10674d7c602c2c8b4ba308c0717c800
-
Filesize
7KB
MD535023ce358847fa543d867605fffc2cd
SHA12361474e7839b80047cef1f5533633bca9ab05ea
SHA256af913eb6104e721667ba530a36391bec3d30dc8e61dec3294d1a07ff70a3ca55
SHA51269620fdf682c858878207c0bb234b52e054659f5a8234467c2518653a9ceb90348a3f1a8f6375d4d29f10698e196c90141a05aa35794542276b1cc78ed7ab490
-
Filesize
8KB
MD5315aa76f7694a66dec835f658917bcf5
SHA1fd66644a252a2063b752ba4f95cf35c460b80154
SHA256374c1fa3a57cf46392deedb75a092dabd1e80b9a6185eeafead6201852fc4cdb
SHA5123fc12b911205f0f1e2ec234c93cef60fa3a376a8636fc51217078657f89c8f4046872d577708f8ced91a2c9709bd085ee84270ab80d37d87620f396acb559af1
-
Filesize
17KB
MD58af8521df4bd5118289d17ff9b7002d2
SHA154cd612214d373d47a44ee3be3e2b0caf0d89175
SHA256370a020b765a91cfe8b4622af6af3d754cec59331d2e890858a761890fd6e035
SHA51202fdd0bc3a583a0e2da162228c2a58f00cee20a502737f9ca220b8febd996879d34ac9adc69b09a65f8fafb4a0aa6117c85869a67fe1edf7f3a18392792040c8
-
Filesize
16KB
MD55891995dcb693047553d3db75245cf6c
SHA10a60a644321fb2346f3320a3f2eb8ce50f57d381
SHA2563e51faedd281110d62c6ec82c41a634ffcbbb3c5d8991eaa1eb72938265f0970
SHA512811ecf1154cf4f27efeaad92c2219411d5c403c05e85bac5a2f94db924dbdb6120690503c00b27617fa8410d83c38d0d93957675804b1fcb73539c526eb4c84f
-
Filesize
17KB
MD591358b56a70522c292c575de6aefb2e4
SHA107503c0da8712a8d43f45b12530d123e96ed6c46
SHA2562b8304665dcdccb48f330db4cabda1cd153b4da9b83cab69eb583345e2a9ac50
SHA51255eadde1730c9a09ff3cc55bdb853b15356647647178922569389d40721b130e8c647d7e380d17845e8af00f08f0f4ad61a759b2a88580b9f12aa1ac0e20f50c
-
Filesize
6KB
MD51148b6ed82428a3813127598c5dd276d
SHA1cc7464e8e01eaacb45a89283dcdd24b0719fb137
SHA256366e8ac60df0843b28afc29578993d2a0dfa9d23f374aafe5bca5397313e172d
SHA5123c67d3c479005a4abc4a8a7ba60bff5ee4617ac43af2f4927694aa63e6172faf3a8e7c4d265f94cd2c2362e687c6fea0343e87c6c67d7cc6859cb4565a2ef0c7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD53a1ff959a9042d37a00edfe4c54d5ca1
SHA16e47fa635f8a871bcde1f7fbeaa0d9267cd45b8f
SHA256c2b324e10b5741c7818239ef9edc0003400bd9fb691503d08d954e143022f399
SHA5122efa08252a4841ab06659dd95f9f73aa6dc9a03bc437bd6302b18b9d8b92a1ffed32b5226090de91c75067b1e63d903a339db2a67f1da61263076e3d111f16aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5935cb60fa1b6b557181a97183b1338ed
SHA14a53a65956c4a16014db23c94e48793b4d69a507
SHA256f529934f8ac368ba8a633930b0a553ecc86c0c613cc2c6bb0dbc35fbc4cebe97
SHA512e42cef7fac0cbdd3a27921979241ac3e82310e7d5c70c24c36b10a607988aae1c471ca2c03e12078ed7f35746d02ccc2210d70e16aadd06e22e96b8906583362
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe586925.TMP
Filesize48B
MD50c55bb5dd2c9f4515a34a99e6cdb9226
SHA107874d2c592b105b6c6ac2b51c65f3b822b82518
SHA256d9c8dd0db650bbb1d5f954b37260968f86867eba0b1ec75705f79a7898e39228
SHA5120ee8b878aa8c2efd246d2357338039766f120d8896e8af79b989dfde28d94f48ebffddc70fc53c3ef41dea023112db75ca449047b4e6cea7a11942c8801af51a
-
Filesize
5KB
MD5c8a7afd5a725fd02d5db4f2c6ec15015
SHA1941e851c8bc70a1ce1f706c5d0bd849603273cfc
SHA2564cd51d71465f36a2b42cf4ca88648c9aeef61599a1a6f3bac75c8547e38aef7a
SHA512fe5763345ffe0b1415e11bebbdbbcf5e7d41a54674e3ec6687e449200da40d25eb60b06e6b7644ad69e2996b1d4320fd10ad880d124ba3ca66eea1fb08bf3afd
-
Filesize
5KB
MD567f6419fc5d75861f2099d11c908fed3
SHA113f1b43d7badfacd776cdfe9b8274c68285b9981
SHA2563425d6eb96e3f553bedaa9fe3205e5a660fa0e8e7fa4c07af5082cc94de3015a
SHA5120d812ad54d1b4a741735bd350c630d1e565c8d2df8566449f055f5bb624524eb67e746c99b1970016140691b5ed3643d72a854460f2aaf166de0169ccd0ae917
-
Filesize
5KB
MD52b2797c27f2fa45d4fdd3bec408302ec
SHA1a1429f4b04ee4a42342c395d94c99a280cc6909e
SHA2569b0fcc151b527cce61dff4ca137766cc45e9fbfcbb4b78ad0eec9185bd4d76f2
SHA51219b11d58c45412b2e985a487846e7b88355838b3b5d074483134064d38ca7824a7a2c9a976ff9d1848dddd14729b776c40bb9d7f739633745e158c6812fd1ff9
-
Filesize
1KB
MD5db6cdc3fe35970e4098b833a07b090c7
SHA19a22350b7a4078820fabe5ebccf5ef75ac75b145
SHA256689ace49a0660b75a5fc534aeeced4cba622fb4c8b1b56e7e6eaa0b59d7d48bf
SHA512ee3040e1b31d5c9c68aa5479ce022d1481963ba0ede9c7ed635c831b3d53014948e01db611140ac6a5d66e49c03b17d8ce438005996b0ddc35d97b3d33a7df85
-
Filesize
4KB
MD5102a34fb3cac3f6de143b4ee0539c7ed
SHA1fc5b2e339888790d9e4538fc4e75285795a36049
SHA256f68e198d8e0ec886328306548e8b9ed4d6da3347711e0d243cf437c147d6cb12
SHA5120aa592390498496e62450fbc30e17efce1c5abe9c9876f7bbe167ba28115d196315d3126cb8ad352bb10e6835fd7f3114b78368645ad93df55c38a1b7820cb48
-
Filesize
5KB
MD50c949674850e4e37257fb4c742b799a6
SHA156edb14a0781837c86b7f66d843f62506a47b30f
SHA256cb8c19323db3ce32f45e2230f209eb4ac6f1955b7bf12069ab6fa0e72f7a5464
SHA512ef56cd2e2a6f4805ea33ec56e975fab8a75a7ad2590ca7818aa8c9ba63c49acc3f61b140424063f51e251285e0d94bfaca761e30856fe9d19feba3ffd61d7372
-
Filesize
5KB
MD562a5e1b7c3f3fd711e7e7585afc76701
SHA114690fffa84e44687bb496708a69637370c61b4b
SHA256f7d9cc17c1fed128d266a42f1bdd846b0fd20cd3e4b0020df017e2d5d468210f
SHA512b6dcf23b568b36924418115de144dc07da899fef7e071c5e28c35a13882ab37df4e69ed87e92daf76c483d389116f4d53bffc9da982a317f5d2315a30e09180e
-
Filesize
1KB
MD58de01ce872bc4a12be8e4719e8a6da5b
SHA114b6b87c64c946ea2a9cb4e7b9789e42b76135d2
SHA256dfa870425865af7c65cff19f7236a684d94b7ac8e5ed353d63207376cbfc5828
SHA512a3470994083cac48260fb1ebf5c9843dd4c6d61c59a4590c6a27dab2ccdfb15afe644d7304d3d329b100bfd183ca190572ddc5c51f53892aa5826a3f69566b7d
-
Filesize
2KB
MD5e0e5405f78a48b0be6744e9eada18a22
SHA184cad4408e19078a75892a10c7bcc25033a84514
SHA2566c88c5aa35185f36349cbc7013b78c1934fc66b6e42f35f1cf41730d896be96c
SHA512d78443557fa871069aab89cd702927e519be0b8e6c4264d395353b95fcc9c9cbcc592dd31e3449adf876483b44adc18c236a409fc987bde22605469ec840618b
-
Filesize
4KB
MD532fd25d6dc9d1cc11751e32cd8dbe802
SHA1111601216fbd215de50001092fe808e9ff20628c
SHA256fb20bf41cd636446dcecd0b0ee083522a9505b38b58e41a1f6898ccc0afabfa8
SHA5123505951dfd8d8770a9a5e0b238ff8c1c6648f610771825ff7e1c636c8520786cc4bf6c8bf984bf38fac4d28d4d31ce203842bb7f46e75c52e0b42445658e7ba3
-
Filesize
4KB
MD5ce59db33f283a4f306c22efd1c105197
SHA1bfcfb9dae40b82446e4abf73f9041deea9900266
SHA256d70ea97f04180e12efc2d1b4d32d0b7547fe6b3d678317b87346e86a83591d57
SHA5125005f9f320e408ddb11f00f47e10d458b552cb6dce29eb412abc89a4602eef5aef2ab37577991f6c1ee2093b780a47434a29ced0411091a6c3aee352f482d188
-
Filesize
5KB
MD57c25f890ab5b97641750dd2cb855e6bf
SHA1465cb3186577be0a3b35e6e7997c040580d0a223
SHA2563d869dd311cf8384515e7a4145cc66afafabc7b342583d229913f923d36bb660
SHA5127af858c41a121afa5a90e0c544724784568d0a802d60936adfe10631d4092f3e1b38cd850cdc672f8d5bcea6eaff50501c5cad644ba19a0e2ecfb293d2d512fd
-
Filesize
5KB
MD55c136d5c40384897e8e818e73dc55230
SHA167e36d4ff253066302edd125d07fe8edb55ef3a0
SHA256fa3117be53afdd6b6322b10fae78596cfefc9c1a91af27429459df92fc824d88
SHA5124b31482587b59a8ad9a334f4d3f71850032ddde6b14af0a6b8e9652e69805f66c6138a1b380cecd69474d196463d2d916f29df915bbe51a5e2575653f2dcbc87
-
Filesize
874B
MD5467d492729b31dd8a51cac79fcdd5239
SHA1b55eda3da886a03ef505ffedd19a1ab897b09181
SHA25651354cc58e4620101157a037d62b1fa7cdb61ac971d51e67815bd1130bd92daf
SHA512bbe2687e8cda2aff694311a041a87a84f0e4e04e80c93444d5982e951a17d55e09beb07d4b103e258138ec109156b39e1b39c2247df1e6b355106660b425d90f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5fd0059deaf3f22b1a0b1ea5951ce4001
SHA120ce21a65036253f7f18a6b62efe3675f9e62373
SHA256de969172158d8e9b551778e34019d4d1d84a1f96802db5939c505724125f651c
SHA51251dacad295b05c91910320e677c2de94fe783193298143cc9cd9d8a79ebbf9dff790a796397202f02b1a2b7e7b3b93141c7ed9becbcf861bce805d0af1c5fe1c
-
Filesize
11KB
MD578d0d8e1794730164702f1bacf3f14a9
SHA16cb8f19d744468ab59f717e6bdd090c4acec694f
SHA2568150ed45bc50a53316ec0af420cbfeed0d9b510a79330c3a378b195567e18254
SHA512acb416a8bca4ed38c4335a81d2dec5875d0f5c169aa4dda476a7e75c965346a20f1a3e910bdb9b3666a17c890d4f66be22a28ec10c74740805dc811fb5cbe1a2
-
Filesize
11KB
MD5c88b264d5aba8f6326ee10b5e6fb0506
SHA130fbcce95c90fa58ff69d2be65db509f088a056c
SHA2560835974bf0883008f3a830e3aa6f03d5369cd13a8f6a884731a28b32566e2239
SHA512b8801c390dfeba3ce76bdccb7932c2a3ff7a03f9b585ba35b2d6a0f20fdfb7f765f58fbe6eeb3346b55ddbdbdc96c75301a888fa718812e288e5bf4fd8ca0eed
-
Filesize
11KB
MD51adabfe4258cb23ff658544d621900a5
SHA1eb43c8b7a8d06885a9674d941d73bafa80c78e14
SHA256046467435d177db752d557cb2ad7b8c099894432f8ffba4531292c60f06b5f65
SHA5128f2447c6eab42618245dc17b187138ddfe567b6d009dfe1f8be2b72908d94957d41437fba6b436840c5caf423f029d2c52e02ade4fe6810afeb798116e3b8d80
-
Filesize
11KB
MD5d0e64cdfd5b64d0ec7080d3dd3af813d
SHA195498aed8881e5117747738f73e4bbeefc6ecabd
SHA2568a28a4a0040fcdcb00fe92fab80aa244a7dcc3161b63384842de9fde75ea1d17
SHA5125d4885e919de4448867e50bb8715e7a6897f8215a2872bc51515c115e6eb5e4569b32b748ea5dcacb64001935320a0f5b3be0d843178dce355e6457bc599e31e
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202501172107191\additional_file0.tmp
Filesize2.4MB
MD5f197f4d2d50205236436fbbcf02e79b7
SHA1e83fad0c2b93d023c78aed539709bebbeaf1c2f0
SHA256caa17367382012f5bd23d519323470abdca96fc6e9ef2a89608bb92dd1c314c5
SHA512fe332b56a021d029e443ef84b804f808fb469377e07527d875ce6ea018ade84ffe7de128f43094fcd8c6abcacfbae9ab886d3813afbc18edc637aaba49068e7e
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
5.5MB
MD587f7ed90616d28b28a59f29b18a1f51c
SHA1630db6efa8215bd982884edd6b24d623d4d23209
SHA25655a20ef1ca035dd9be08c04ae88dde7b1ce4be664d3dcb63fb1b3b0d43b4fc6f
SHA5120fdcee568ae27185f02cf2f70ce3f69ff25db238fe157e80004b8f8eeed8f0a7dcb19d35476f54619939b8bf29abad2acc7336f727006979d447c793808281cf
-
Filesize
5.0MB
MD56f809bbbe1275e1e71427ff63165fcff
SHA1c2a1726e038fbf7c583b0bb5faac91829dac7ba8
SHA25651d12738523cabf3b96b9bed29ff882a36233a59c97a01e691552c547f0d733e
SHA512dad32cfc4d04540c00d5f184c2c1d9b96b391acf563818490426f5e6051722a81a8f35e73142d79599c2c557fc78de5680481c1b47749bcda99148cbd273c2a0
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
1KB
MD5b85d9d725db7c46dd1b1a50f98677078
SHA1eaa08bf473387eb0ef1585c5de7bcaec6f68c30f
SHA256ca7d3cfbb6ef6a5f4d420d92a334a4187d18d0b1f0b08f4c101fb89026daf171
SHA512a6b8b953f03b3d2a6c1c936393c6b08bdae06be82ac7b0f52188438903acf6f16c1305b47039a7bc779e87e232bfecac7dc1c01d0a60c0fbea8357ef5a9b20f9
-
Filesize
76KB
MD5931e58eaa3f7c10e1bf49f4724c32ba1
SHA18ed0a9bbbd6176ab0a87ba8ea7c6f0a0ee9b5832
SHA256ae81cf7d6ebb7d2d9721e56076cb447effc548c7b12b55d49c1028595475cca1
SHA5126f6fc42188703b2382d418474a01261b1caf9eb999fddbdd54111081bf961b052a976381be468f4a75a4ed256a3278b4b964963c6521e6aef6d7e0318cd60733
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
40B
MD5285225ac0a37cd3d029833074fdac652
SHA1e57976374b7d3e545564b897df71a2e753a9c980
SHA256f736f0047b3a691170ddb6da983b61eca79d6c57bacfe06f40bf2075f6dec3ca
SHA5120a8e1147f2c84b4fdd5b01f1d8c8b724db4f461304ab32ef3630a98eeb5ad86cc620f102384b9c844771a569711e260f6fff644dc2cdac3e0513eb6a8492c2f7
-
Filesize
2.1MB
MD5bdf09c1c656b8aba33fc4d4c62d718aa
SHA1a9c3b156fc5170d5b1178ea1442974859dfc2e82
SHA256f7d4879415e0f6a134c821f242921c34a3e823a53cc0cd9c969af9fc20c97a98
SHA51258ac3d752a1bbfa6fb8c4d75569923e83686ffc9925655d0632e201761f8e452939a1570524e509c0bc1bd273478f54afe6412b3a847aa78630149dd2c7661c4
-
Filesize
313KB
MD5fe1bc60a95b2c2d77cd5d232296a7fa4
SHA1c07dfdea8da2da5bad036e7c2f5d37582e1cf684
SHA256b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d
SHA512266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89