Analysis
-
max time kernel
164s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 22:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1331019630176636969/1331020592236728501/nicolrrss.m4a?ex=67901906&is=678ec786&hm=3c144849fe35b3eef0fef5803f2294cc61143461f462b2c0299d52c04a2f2740&
Resource
win10v2004-20241007-en
General
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-493223053-2004649691-1575712786-1000\{72135E3A-2AB7-451A-A844-EBD76956EFDB} wmplayer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1108 vlc.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3064 msedge.exe 3064 msedge.exe 1316 msedge.exe 1316 msedge.exe 1524 identity_helper.exe 1524 identity_helper.exe 1900 msedge.exe 1900 msedge.exe 6076 msedge.exe 6076 msedge.exe 6076 msedge.exe 6076 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1108 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 24 IoCs
pid Process 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: 33 2172 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2172 AUDIODG.EXE Token: 33 1108 vlc.exe Token: SeIncBasePriorityPrivilege 1108 vlc.exe Token: SeTcbPrivilege 2336 svchost.exe Token: SeRestorePrivilege 2336 svchost.exe Token: SeShutdownPrivilege 1788 wmplayer.exe Token: SeCreatePagefilePrivilege 1788 wmplayer.exe Token: SeShutdownPrivilege 4024 unregmp2.exe Token: SeCreatePagefilePrivilege 4024 unregmp2.exe Token: SeShutdownPrivilege 1788 wmplayer.exe Token: SeCreatePagefilePrivilege 1788 wmplayer.exe Token: SeShutdownPrivilege 1788 wmplayer.exe Token: SeCreatePagefilePrivilege 1788 wmplayer.exe Token: SeShutdownPrivilege 1788 wmplayer.exe Token: SeCreatePagefilePrivilege 1788 wmplayer.exe Token: SeShutdownPrivilege 1788 wmplayer.exe Token: SeCreatePagefilePrivilege 1788 wmplayer.exe Token: SeShutdownPrivilege 1788 wmplayer.exe Token: SeCreatePagefilePrivilege 1788 wmplayer.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1788 wmplayer.exe -
Suspicious use of SendNotifyMessage 42 IoCs
pid Process 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe 1108 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1108 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1316 wrote to memory of 3840 1316 msedge.exe 83 PID 1316 wrote to memory of 3840 1316 msedge.exe 83 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3200 1316 msedge.exe 84 PID 1316 wrote to memory of 3064 1316 msedge.exe 85 PID 1316 wrote to memory of 3064 1316 msedge.exe 85 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86 PID 1316 wrote to memory of 4464 1316 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://cdn.discordapp.com/attachments/1331019630176636969/1331020592236728501/nicolrrss.m4a?ex=67901906&is=678ec786&hm=3c144849fe35b3eef0fef5803f2294cc61143461f462b2c0299d52c04a2f2740&1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc825846f8,0x7ffc82584708,0x7ffc825847182⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4028 /prefetch:82⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:5072
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\nicolrrss.m4a"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1108
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\nicolrrss.m4a"2⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:5904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:12⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2332 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6772 /prefetch:12⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=7032 /prefetch:82⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5552 /prefetch:82⤵PID:5744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5496 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6748 /prefetch:12⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1764 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6788 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6868 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1768 /prefetch:12⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,675977461214250655,7634674316280161750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6856 /prefetch:12⤵PID:652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2fc 0x5001⤵
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2336 -
C:\Windows\system32\dashost.exedashost.exe {7bf942ae-c20c-4c77-b919664d6eed8a6d}2⤵PID:4308
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1788 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
PID:4104 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:5152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
47KB
MD50d89f546ebdd5c3eaa275ff1f898174a
SHA1339ab928a1a5699b3b0c74087baa3ea08ecd59f5
SHA256939eb90252495d3af66d9ec34c799a5f1b0fc10422a150cf57fc0cd302865a3e
SHA51226edc1659325b1c5cf6e3f3cd9a38cd696f67c4a7c2d91a5839e8dcbb64c4f8e9ce3222e0f69d860d088c4be01b69da676bdc4517de141f8b551774909c30690
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
67KB
MD569df804d05f8b29a88278b7d582dd279
SHA1d9560905612cf656d5dd0e741172fb4cd9c60688
SHA256b885987a52236f56ce7a5ca18b18533e64f62ab64eb14050ede93c93b5bd5608
SHA5120ef49eeeeb463da832f7d5b11f6418baa65963de62c00e71d847183e0035be03e63c097103d30329582fe806d246e3c0e3ecab8b2498799abbb21d8b7febdc0e
-
Filesize
19KB
MD51bd4ae71ef8e69ad4b5ffd8dc7d2dcb5
SHA16dd8803e59949c985d6a9df2f26c833041a5178c
SHA256af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725
SHA512b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863
-
Filesize
63KB
MD5226541550a51911c375216f718493f65
SHA1f6e608468401f9384cabdef45ca19e2afacc84bd
SHA256caecff4179910ce0ff470f9fa9eb4349e8fb717fa1432cf19987450a4e1ef4a5
SHA5122947b309f15e0e321beb9506861883fde8391c6f6140178c7e6ee7750d6418266360c335477cae0b067a6a6d86935ec5f7acdfdacc9edffa8b04ec71be210516
-
Filesize
34KB
MD5744172b2c526ad323cd32ee244214ee3
SHA127434c614392c8666cded0f78eddb2b7a15c04b7
SHA256b64ee40aac51761ba449cc3a4cab7671461514b0cbd9e05263e3a7704fffa756
SHA5122eb1b5710b642eed3b908e398af98603de9bdda5449d89dc862e0428d6ee6f94db3895bf70aa562b00b21253a1eb9094d47a9261012fe2002fd3d586d1af2e97
-
Filesize
34KB
MD5d74b9d94121977b55b511eb72f20b014
SHA1764c6faec43aa5abd0da58468bf14a22d44dba63
SHA256aa3247aed53ac3005eb62ea8e51ab5d0e4bba6fb14f0eaade2be834b46bc2677
SHA5121faf9e03370e7fa9787364f3fdef36a96222217a969ed815c9e37ac8d3f1d6cf7cd6816177ae3d8c9e380f99ff2b4256f43d5482860ae06bee17f21b8245d492
-
Filesize
49KB
MD565da8d6932ad74d3b51694b5a28dd0bb
SHA1aa6e37cdacda153f499c299299a4dacf50c93765
SHA256309ec80a404d5ba8c9816e0932bff343c8e205fe36819908682289ed7c7ae482
SHA512bfce7ba0e18dde7d6f833709e565f704701d7a51b14d7c11b06cdce0b057290a334219c9aa4f7ea098c097eb779a2ceca397a9ad1ede0784348f78c81fd55015
-
Filesize
637KB
MD56063256272d8ecfa4fe4421d6c6cac80
SHA1978c24facdde195388a702cf3d25b765d0111432
SHA256cd15681f4833ea8133eb8da4c2d45356b5f1eb426cfd3a715afccc83cbc0ed3c
SHA5121d192b4ff84d58f03dc534f31935c569fbc39af0f6ff9e110219922c2bc2075a0b6498e81d06f83a35123f0f9ca0b63f826d62943a07be631c3ec03c8b428b66
-
Filesize
20KB
MD5c0a053d5cb8160124a684a9a1cacd12b
SHA18e473639f9b01ec520d54a77f43225e814f56d16
SHA2561242cb9c4c1e9a840baa2a6d67a4fe7f6fe349b5563d56a0088822c0fb0c7e27
SHA5121cc56db0e7adc985644b34e54b774603eb10f66aabc0853657977701a8a6387aa10d2a4f48ebee707a20127883d22e02ce22524f5e6327bb899ce3bb779d698d
-
Filesize
55KB
MD5cfd886e1ca849a7f8e2600763f236d78
SHA1c1fc2b10d20c529c01b465a1edc0ed2fe04f0bd5
SHA256c0b1c3c6995c24eabd1a6fcc4f00523e022b546cf1fa4fce6c30d04763244d1b
SHA512254e37e3650b2c87b524c96f517586b690094abf7c8e0539b050ecdc4c56c2593bedab7b1a830b827ddc19f1c3e05ff4096ebdf4cc969b5bc5fd33cb34e94fd8
-
Filesize
257KB
MD50fe5cc7005c56590b1d79b34a24c56f4
SHA199ead8acb9872f078d5b9b832db6a864b37c1d2d
SHA256b0a269f5c25261a7739512513f0efa913c67170bedcfd1185e012626831144e9
SHA5121759a92f9cfb2bc2c77afbbbad60bfb35d3f8167d383e9b28308922139d2866d68353cbe94d7c6440e3b575da8f71ac8c723d6537cb4e3d02051ad2f2d071247
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
8KB
MD5dd625860ec1ec172d1e257afb212bc88
SHA1980d60a16d628c95dc63d79c5159b6c5151ea967
SHA25677f2260bab00083f48f3dec79681c6bd70c287f05b1586a24d94565988cda673
SHA512cc3de4123cea7d05edb69808810d806d7ab67a28191c9125b0143cdc49f8c1516ca6a0999361e361a1d97171855179d512e275d36ebf211da023a6f5bad95abc
-
Filesize
7KB
MD57291c8c863a2e5e04d228567acd0a8f6
SHA1320b40140b54ed0a80b12b1c4f348ab7c86fce85
SHA2563a5914b07051b2cee7b91e6ead414d30b3d6b2a919f4fb61a52c7fc10160908c
SHA5121206e5af78bfa492f963111f0a2c390ab227591012da30722ae8ceadda85567e02913e340486592abc306085e028709254c683ad1d638516b83003a31c99c7c3
-
Filesize
9KB
MD514a4a18f5aa096278e94d5e35499c741
SHA1f47fa485498e0b0c2846a91fe5abb087a2356b5a
SHA2569b04d26d56af0d0e70426b17640bac34cf5dfd244fa06abd701cdf25251cf96e
SHA51218f05b28a5318cea9b5648ec7516a5c3fd530d78d643dc5e82b66afa7dd7ee7bc8997f0bd22088c6d5ed6fb02403b576bf87698514bb37afb8990656889a01ba
-
Filesize
7KB
MD5100fb21bf598e5793301b4b5cc16f021
SHA13ba9ef6c6ccd39e161221d147385b8c2cae77576
SHA25661eeff7734806af96fcd347582824985facbf4685ff746c9793d04bf6c98367a
SHA512f9a522449e214a6050d88344f8c1637db015adfc9ab812375405873b25ae836ea6e4f4b1dfd1cae8a980c46828bfc89ba9d425875acf09c1d076987a2055aa3e
-
Filesize
5KB
MD58cd2750942a9f3220ec19e8bd56873f0
SHA1661bff38398a24d7a60c920292c9469ecf6b3ec1
SHA256b0153539a494ba2fc9a7daf636e8c36076de6d593df5217013901392fbb4c2fa
SHA512b658fc3386d7a638ec87fcc8ffb6a7c2be3e8fd17264a167a9b4bbf6f1bb32670ca51c3457ded1a31d02f4e314e033161bbb6ee04dc83780176ece4117420b0d
-
Filesize
6KB
MD5d0f61427859dd5a5c0a4604eb95fc05a
SHA1588d3857564bb2f8555fe65dccc8979d20d4675d
SHA256fb39eefdd32426f5be2822e969b276f86fd504f7b82caec61bfe04185c19ce7e
SHA512af1962579726d0af5db3e3875238fb3e79090e798b9cd9265562a19ed6b5fbe113ab36291515661b4cf85901e5302a404f078bafd0e49e3d2b1ea998baf5660f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\5e7b6ba9-ed54-435f-b478-60b37d35d214\index-dir\the-real-index
Filesize624B
MD5d0debeed8d77373a0acb2d4b992ceab4
SHA1a5059a7d87bd6a953d209efb7c8092bfd5faf5d9
SHA25632f968efce6961aba97c607664ea92b96fc01866127320f654b07efa8a646360
SHA51246e2f69c6f9de07af10d96054b4c58e94222fd9e2dcada7a21a310bfa4d33285c9bc254b19786134a93dd0c73404f4f30366fea14c78fa09bfacad3318e41c8f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\5e7b6ba9-ed54-435f-b478-60b37d35d214\index-dir\the-real-index~RFe59a3e7.TMP
Filesize48B
MD509d0ad0fa25a70ebf7e711a7c44c0767
SHA128036ce7e89a017f41b1095d674f6fa5037bac68
SHA2566e0c67d9acc3658cb3d457b5e3ba547958b7a1c600aff365cb55ea4f8d314e2e
SHA5125d5f30dc695c40f2934b86d66bc88c140d05512f44cb30f0d939686154af156e639a686ffbd4e8a4b893c28f19bb126d76fe38a6873ec73a09b2ea571c1da07b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\7b30873c-bfd1-4677-a944-141bfe0e9a81\index-dir\the-real-index
Filesize2KB
MD5c474635f59b6aea55636400b1e2f5885
SHA18c59d25dcc551c726f6a5175a509f8f6e9e2cac8
SHA25688250ed55c08694114676e185a0cfa896dbfac0ace661d5029248808f279d440
SHA512edf7fe7eaa3a670681118d4ec3e765ca1b42e0a2a15ea72a79b3a49790051591ae0a34892a250945f4451c04ccbff698a54804ba048408fe8f1b30236d3e672b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\7b30873c-bfd1-4677-a944-141bfe0e9a81\index-dir\the-real-index
Filesize3KB
MD526c9cf56c0ee78cf006e56cb27c6b6bb
SHA1ab48342489c248b260990aebdb681c28e13d6b84
SHA2560aa91407d07c2e8aa55dd74b994be860b41020a6bf8d41509fd402547ae8fc53
SHA51246ff24d7bbd832f331a8274a27b3f20921b733fd5e13ec3fc2d8914d88f7ed34ff9548e53bfc8fd0e12f2e3fb404c8d05f51f9ec42bcbb0ef16d0cdae5c6882d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\7b30873c-bfd1-4677-a944-141bfe0e9a81\index-dir\the-real-index~RFe5949ff.TMP
Filesize48B
MD57aca357987c1bce321f8430931c5ce79
SHA11ba770402d1b4fff2afbd4dc14c8acf11abd24d3
SHA256677224a129eb4495a9cd355c71de99f7c1cfbfb2ac4072d573412b9649d61cba
SHA5122add0c9d2d216e3d5304547fab04c384dac6cc6b72cc2796ca00dcbbf2a63c462a5c323c35b3d164fef75c0a0a3b5a0466b7ff96a252e5003263f394f4256120
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\c81ff5dd-709a-40c3-8e59-b83a7f75282d\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD527b507f83b5a90949f80ff07e36ae053
SHA141bfa7e6c2194eeabd7570d497023084319f6318
SHA256b92e97e688b0a187bcff4783f6f50cc228c4b70fa3f6da4cdd13e29f23e7f7c6
SHA512a1a4abafc38a001d45a63e8e774f4ee4bb48e0bfeb28ff305305c140bda1a00d39bc8c5c14f30bb43478acf4bfa008248d4c674e9bf744db9b7ca9b3b15ccdc5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD545461eb2c0e439d399bbf967e9bd95d3
SHA1ae7b56a11e43a65fe5ab777d93a9ba81f88462c2
SHA256ca7130eefeeb866a06956ba62b6de49d765adab68f807ef2a49b31bfad372d56
SHA512ab73f705c6e85b13a2d76e6d6f55b89da390c79e28162c20e2e70719f7acad257adbbacf25a2028d62afeba3a5f0e1aec27fb97a2da63c38c3cc74d5bd77d8fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize148B
MD5f8b44f557284ef9e353c365966314378
SHA173b323f476245c5566d0ca8d5d4a37de8ab13d19
SHA2561aab4dd97c5b9741b42faeba43a179a4d6869fd589b82541a159cd78e36a2bb7
SHA512ff628905bef29f64a0c022d03cf17ea08adc9153104e393d348d47f853c9e8486e770263d300e7ce6712eecf2e07bd27a245f48af3c9e4caf1bd7616a3c3d75d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize157B
MD5a6612b5ab858587baac282fc83234cb5
SHA123215473f6571f76b3d97d84fa7ed05f04352ad0
SHA2566e8c967edb4065c0d2c4f2a417b654aac7e694adae11acf5dbcacab7bb0b7ff4
SHA512dfb86b6487635a73b868c02aec3dc64b240fddcd14057e069604c87bca937d431a63e40300d165bc6611d283e5396356bd4ef3aade1b2c44ea6845e19e0dcf5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD543b850d7010052cdb339fea2b88ec0d0
SHA156933adf44ee7aa5f627b6dcc1c44ccd2a215192
SHA25610336b9c9f0e1855fb64915242852122a7fd5796e376901ab5e607624db69bcd
SHA5124942fc2d683a26948e9d2262ea283b05b4dfb972592c78e45173ce320c5a334b85fc23ea8f7442ac757c99d8049d878718ef14313efcb6eb138a89a5590b482b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize84B
MD598b4307c64ea4b7ecca6efa4bd698bab
SHA1f4c8417f7ba9f5af4d2b7e93e52fad0fe06ef240
SHA25646e90a54055001b500ba9e45dc7c142c0a659a30beb15d3f51d740501a38eed1
SHA5124a6922f6874af88732f48fbc30a6c58e19b10784027fe2a5ac93c519369449a27e18fe3ade7f4916cdc9b4595831d26520eaa612a4115490e0b049f8d950aeca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize153B
MD5ce9e6e2f6e6e14119913d23956cf828c
SHA1ab3fd3168758ff5e53b1ef95949ee8c2274b6c4e
SHA256b5762adab4b531f7dbca0c291657fcf2539cc2263867565bac22fad9353e6358
SHA512842d9e511a2c9bbdf6c70ac75de24a1509619c3919f9d479692fd6ba3990160358594cd0c11d7e07112e32c8ee44526407ee840d02c812c8d295e553f050e3e8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\index.txt
Filesize168B
MD5a7b8999054a30ffdf1c3797ac6f2ac7a
SHA1d5ff92ae9dd4539486ea0619c8f45a3ebe8ff1cc
SHA256ed2a2eb80c3708ec077857e726de6910130978e8ab09a8aad0dd030db2d65032
SHA512b776dec4d742b103de2e6bc976ba535647f31b90d885b575e8d424f7ea59a6890930d220d01ae91ba43d7942e0355c360a144b173d4bb3aae57629bdcbbb8e9e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\index.txt~RFe59c7ab.TMP
Filesize102B
MD57bca4a0c5fab783abb70487ce1d19787
SHA161feeb01f5b6c39cc9fe3b305f388148992672a5
SHA256798bca45a207695903308eb2fef68b3f2cc3c4e1925460f7e41bd58192d5398b
SHA512a09f83876ee6923cca9de2cf0130a1aa527981c075ff7244edd9ca664c5b9c822738c2b88423e6d61b477728f78a22293efdd1e3867191070fb0b60a4e7ecd3e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5a3e53ad480af0f3818163d913c6cf5c9
SHA10e1b04369eea14e8b06e6106a6b50400d6adba5e
SHA256536d9c9932da42e2b99d54d39d9552c6038e7c27150304fdb19275e709df25e6
SHA5123e656ece234f7d9e2a515e576204f642a00bbf306b9b065ea20cb5d6a5ad5c4394351647942a69074d85a2dc9da7ae47b897821749a8f994da4991f968cf31cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe599d11.TMP
Filesize48B
MD52daa738409b2dd8ec5bb816eb4fda043
SHA178f46863e09939a1681bc337dec47f784819b87a
SHA2564f87a7f2ed4075eff80b1158d0cb015c1b9d9190b881623b045c8c2d40031990
SHA512cf7b10ec6251cd34cce7cb755d0ea600ae968dce48e77f76bc1987122d45671b3652c6b4971f5a04a5ff84a0538d58096c935eea3b02b785f5199bc401223458
-
Filesize
1KB
MD5e196e313bd2bd82354ca24f2daf284f0
SHA14dc5eb366248af34e002c575079adfcaf9f2c43b
SHA256067e451b3dec10a21b45dc39652855fb1b788d47742b861dda65574d9ff2b689
SHA512dc5dd19196d7ec945ace91ed75dbb3a9f96a235c2b7a3f351fe9af918ff364405c103a05aeb99df23b550a38929b0cf62b402962c54acd69f277a7910f1dadde
-
Filesize
2KB
MD569fa0f91d41a5ca70acd60383bfa2d91
SHA1eb203792109bd506204daaa9acc6b5c5068af43e
SHA2564f6fa30249becb37445bb8ca1cadd5371661d68f3e5cddac490c042b50303b07
SHA512609b7a28e8f610ce1e0ab255b2a563edc4753c567a15a66f3193b7eadbb0d269574256dd7cb671408be6b8227c7fd23c90fb31b280076536f9a21ba68bcaceb0
-
Filesize
1KB
MD55b33d498e4b901c248d67548d0588747
SHA172108d4af4ab344dbe39210f91a03a6e0c717f78
SHA2561c8ecd961d83a1bb9092702ebf7e79406fcbeb91eebafae928be1eb1af4e2ca7
SHA512f7d16ee93b0f18c0aef2d03aa2a141ba2b730c54c77ac7f691c65628cd072ac49667bc75bc0b5cea19276f876b999022e4c5ac88c881f7ea1e6b34da8228fb78
-
Filesize
1KB
MD546134815ea91b628c97fc1dbf1e53735
SHA1955182ae2f5e6ab0f45e925d7823fd56255ca47a
SHA256c3e578999a158341d84925962ade9b045901f27b20bdf22fda1902e5b5438d7e
SHA512c60e5cb6292bb0f8392e7234d1510544ce9eb5027c41d9e01949ae6ba5429ea7ae581264175305aed361c0d10a4d9de3befaff59b892cc89136e9754145d8066
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD535ac9e048fb57b946aca4dde237db856
SHA1ef2a158442b507b708e84dbed2c3ad52ace99bc0
SHA2563f7f369683cbc2bc89e211460999735b2d041c2187eedcdd6acda48f006cc807
SHA5123ef60dc849968e080a7b6dd94232c5fd4efdbddcd21bfd664e8f814dd5e49520890391ede2b75c7e6283cf7e9e37c504c98e564ff60c819948c812a5a374da8e
-
Filesize
10KB
MD5b290152eeaf17184d19665a21ead0726
SHA1654ad165e5e07ad86011b2113d82d7ff954c5818
SHA2560247a6d418718aeb1a299e78fc91ac51687d28c7a39d7cbb750676ab39c4d584
SHA5126faad454501fd0a50b08906fda5ec065f9942bb126732f09aad42af96c2492983552aa0e798df1e52bf9f3c18f7cbb426b38bea9dfc67aff49e6f2123a491407
-
Filesize
768KB
MD5614d94722bc474c9163e0b637f63fc1a
SHA141f1857862811c53c5cdd0fb71bf9927b18f083c
SHA2569645053d369aa9ae431288ce76add394cba29efd45e0d454d88b5f70fdc2bd9a
SHA512900c5c06fe72c196a83499febede2adf1aa1f2a42d6fcb0a870c7edda505a125363f475810385f7c7222f6c416386972d0aefb1fd4e0c36f5559080c40672dc0
-
Filesize
1024KB
MD54c787d5e14539f26d1890bcd8aa2f13e
SHA1c68f2fc73b6f98d5b3a5acd717013aa04b406b57
SHA25666eb69abf3d788277c4162bd49f1b4d981c5c2338033bf28fae49bed95ef560e
SHA51284feec58ba42731c4588a7b178c9673cccf5067ce5e1a7c2d3067a314c440ff3cb08ea46f226f793e37f64d0ac4153b63678293b4d8b1c1079fca1308dc1962f
-
Filesize
68KB
MD5900bedf512f1dda2ed0d80618db4d4f7
SHA143badfc65322b7b9fd18408ad326d260f4c2bef6
SHA256951e543bc8466cd1e4171825229a250cb3a08a92c34643993277bde94bdb7a84
SHA51297256b1962a6fad68f0530ae6abe992ff5b4f5abe4fcae473e261c4e74e14f3908758329881185366b9d317c0110231ead8eddc4f03a199f28a4c0c00f8debf8
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD55433eab10c6b5c6d55b7cbd302426a39
SHA1c5b1604b3350dab290d081eecd5389a895c58de5
SHA25623dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131
SHA512207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34
-
Filesize
1KB
MD50cc0f32113c8aad37e8a6d2131d90135
SHA184cb295a439d7a1264c57f130796a7c5f0536fd2
SHA2560258bd6b0f8313ba2335711843b3e3e134cfd3d1a1b25a5ae8b4c7d163b5b07c
SHA51251a125b12da4e429309707060d7a245e913d9fb7d17a1cb56782e8e4136a309018736c9783837a66d907f532677e9735e909e66fcbe0988f95a778b3bdbd40bd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD539ca3498fc678ed0de2e3612ec591fcf
SHA16a3c74f54a40235d1ad979148becb100eacb2703
SHA25624735a8c5916ee238b7e53d14afdda82204dc60ce2a304c49834ef32ae623d4e
SHA512fccef1deb11d6d8bc8b46e88bb233b5f2fac6f001d612a129bbcc358dd5a40eea17f21eafcfe190644195104ad7a9b2100c25a5504f6d3a5064a38083fea7ea4
-
Filesize
512KB
MD526d28f6b7fe239669bcee54759e77fc7
SHA1154ea43ed1c684366fee7a3a4d61bfdc96d0013c
SHA2562d12461cd5954dc8d0143f36ffd08a9a3e42ba57e32b030fdcd63ade3740a28c
SHA5125d7a4c40a1248d379745f8de14ab76095611092fe2ab3a236768161e1450a46cb1e5b785077e949682b9d8f4fc2194ce65b8dc0b0845fd02f43577ef6d984daa