Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07/03/2025, 23:44
Behavioral task
behavioral1
Sample
44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe
-
Size
56.0MB
-
MD5
bf362ca5f9b4dfa01b0ca45937f0f8d2
-
SHA1
0dac7e77257f51ee11e04803874d764e8fa8ae3a
-
SHA256
33e648333f7d85219d6b82e64c44f9ee849e99da8691deddcb34ee694c73c538
-
SHA512
4b83fd771113cdfc2c4c4a58546802e8e8d115a546193b74a5eccd73a1420819a4f5c117b1a33cb5c715fad5bb3513b472dfd81af928a9c24290abe5fad39497
-
SSDEEP
196608:cmKu818v8SYdQmRm8Qnf2ODjMnGydS8GrNs:Gu81olYdQdF3MnG38GrNs
Malware Config
Signatures
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Avoslocker family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 35724 bcdedit.exe 35692 bcdedit.exe -
Renames multiple (7662) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 3952 hack.exe -
Loads dropped DLL 4 IoCs
pid Process 2676 44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe 2676 44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe 2676 44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe 2676 44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI hack.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: hack.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1388936280.png" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_48.jpg hack.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\GET_YOUR_FILES_BACK.txt hack.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\GET_YOUR_FILES_BACK.txt hack.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\InkObj.dll.mui hack.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\rtscom.dll.mui hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\zh-cn\ui-strings.js hack.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-cn\GET_YOUR_FILES_BACK.txt hack.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ca-es\GET_YOUR_FILES_BACK.txt hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordR_Grace-ppd.xrm-ms hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\da-dk\ui-strings.js hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-tw\ui-strings.js hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\uk-ua\ui-strings.js hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\eula.ini hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\plugin.js hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sv-se\ui-strings.js hack.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\GET_YOUR_FILES_BACK.txt hack.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-il\GET_YOUR_FILES_BACK.txt hack.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\images\GET_YOUR_FILES_BACK.txt hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Trial-ppd.xrm-ms hack.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\playlist.xml hack.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\vlm_cmd.xml hack.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\Locales\fi.pak hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\en-ae\ui-strings.js hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fi-fi\ui-strings.js hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\japanese_over.png hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-white_scale-100.png hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_OEM_Perp-ul-oob.xrm-ms hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\rhp_world_icon_2x.png hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_download_pdf_18.svg hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription2-pl.xrm-ms hack.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msdaprsr.dll.mui hack.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\identity_proxy\win11\identity_helper.Sparse.Internal.msix.DATA hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-cn\ui-strings.js hack.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\excelmui.msi.16.en-us.tree.dat hack.exe File created C:\Program Files\Common Files\microsoft shared\Triedit\en-US\GET_YOUR_FILES_BACK.txt hack.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\VisualElements\SmallLogoBeta.png hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\example_icons.png hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_listview.svg hack.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\MS.PNG hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Office.PowerPivot.ExcelAddIn.tlb hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial4-ppd.xrm-ms hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_MAK-pl.xrm-ms hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_OEM_Perp-pl.xrm-ms hack.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\NOTICE.TXT hack.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\identity_proxy\win11\identity_helper.Sparse.Dev.msix hack.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\adcjavas.inc hack.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_US\List.txt hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_folder-default_32.svg hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Trial-ppd.xrm-ms hack.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Locales\lo.pak.DATA hack.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\GET_YOUR_FILES_BACK.txt hack.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\zh-tw\GET_YOUR_FILES_BACK.txt hack.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\themes\GET_YOUR_FILES_BACK.txt hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\cardview-linkedentity.png hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.scale-80.png hack.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui hack.exe File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\ja\GET_YOUR_FILES_BACK.txt hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.scale-140.png hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ca-es\ui-strings.js hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_MAK-ppd.xrm-ms hack.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Consolas-Verdana.xml hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\themes\dark\warning_2x.png hack.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\Locales\bn-IN.pak hack.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\css\main.css hack.exe -
pid Process 35796 powershell.exe 8140 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hack.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 35680 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3952 hack.exe 3952 hack.exe 35672 WMIC.exe 35672 WMIC.exe 35672 WMIC.exe 35672 WMIC.exe 35796 powershell.exe 35796 powershell.exe 35796 powershell.exe 8140 powershell.exe 8140 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3952 hack.exe Token: SeIncreaseQuotaPrivilege 35672 WMIC.exe Token: SeSecurityPrivilege 35672 WMIC.exe Token: SeTakeOwnershipPrivilege 35672 WMIC.exe Token: SeLoadDriverPrivilege 35672 WMIC.exe Token: SeSystemProfilePrivilege 35672 WMIC.exe Token: SeSystemtimePrivilege 35672 WMIC.exe Token: SeProfSingleProcessPrivilege 35672 WMIC.exe Token: SeIncBasePriorityPrivilege 35672 WMIC.exe Token: SeCreatePagefilePrivilege 35672 WMIC.exe Token: SeBackupPrivilege 35672 WMIC.exe Token: SeRestorePrivilege 35672 WMIC.exe Token: SeShutdownPrivilege 35672 WMIC.exe Token: SeDebugPrivilege 35672 WMIC.exe Token: SeSystemEnvironmentPrivilege 35672 WMIC.exe Token: SeRemoteShutdownPrivilege 35672 WMIC.exe Token: SeUndockPrivilege 35672 WMIC.exe Token: SeManageVolumePrivilege 35672 WMIC.exe Token: 33 35672 WMIC.exe Token: 34 35672 WMIC.exe Token: 35 35672 WMIC.exe Token: 36 35672 WMIC.exe Token: SeBackupPrivilege 5484 vssvc.exe Token: SeRestorePrivilege 5484 vssvc.exe Token: SeAuditPrivilege 5484 vssvc.exe Token: SeDebugPrivilege 35796 powershell.exe Token: SeIncreaseQuotaPrivilege 35672 WMIC.exe Token: SeSecurityPrivilege 35672 WMIC.exe Token: SeTakeOwnershipPrivilege 35672 WMIC.exe Token: SeLoadDriverPrivilege 35672 WMIC.exe Token: SeSystemProfilePrivilege 35672 WMIC.exe Token: SeSystemtimePrivilege 35672 WMIC.exe Token: SeProfSingleProcessPrivilege 35672 WMIC.exe Token: SeIncBasePriorityPrivilege 35672 WMIC.exe Token: SeCreatePagefilePrivilege 35672 WMIC.exe Token: SeBackupPrivilege 35672 WMIC.exe Token: SeRestorePrivilege 35672 WMIC.exe Token: SeShutdownPrivilege 35672 WMIC.exe Token: SeDebugPrivilege 35672 WMIC.exe Token: SeSystemEnvironmentPrivilege 35672 WMIC.exe Token: SeRemoteShutdownPrivilege 35672 WMIC.exe Token: SeUndockPrivilege 35672 WMIC.exe Token: SeManageVolumePrivilege 35672 WMIC.exe Token: 33 35672 WMIC.exe Token: 34 35672 WMIC.exe Token: 35 35672 WMIC.exe Token: 36 35672 WMIC.exe Token: SeBackupPrivilege 35796 powershell.exe Token: SeBackupPrivilege 35796 powershell.exe Token: SeBackupPrivilege 35796 powershell.exe Token: SeBackupPrivilege 35796 powershell.exe Token: SeBackupPrivilege 35796 powershell.exe Token: SeBackupPrivilege 35796 powershell.exe Token: SeSecurityPrivilege 35796 powershell.exe Token: SeBackupPrivilege 35796 powershell.exe Token: SeBackupPrivilege 35796 powershell.exe Token: SeBackupPrivilege 35796 powershell.exe Token: SeBackupPrivilege 35796 powershell.exe Token: SeBackupPrivilege 35796 powershell.exe Token: SeSecurityPrivilege 35796 powershell.exe Token: SeBackupPrivilege 35796 powershell.exe Token: SeBackupPrivilege 35796 powershell.exe Token: SeSecurityPrivilege 35796 powershell.exe Token: SeBackupPrivilege 35796 powershell.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 4388 wrote to memory of 2676 4388 44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe 84 PID 4388 wrote to memory of 2676 4388 44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe 84 PID 2676 wrote to memory of 3952 2676 44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe 85 PID 2676 wrote to memory of 3952 2676 44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe 85 PID 2676 wrote to memory of 3952 2676 44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe 85 PID 3952 wrote to memory of 3892 3952 hack.exe 87 PID 3952 wrote to memory of 3892 3952 hack.exe 87 PID 3952 wrote to memory of 1356 3952 hack.exe 88 PID 3952 wrote to memory of 1356 3952 hack.exe 88 PID 3952 wrote to memory of 2632 3952 hack.exe 89 PID 3952 wrote to memory of 2632 3952 hack.exe 89 PID 3952 wrote to memory of 3592 3952 hack.exe 90 PID 3952 wrote to memory of 3592 3952 hack.exe 90 PID 3952 wrote to memory of 1048 3952 hack.exe 91 PID 3952 wrote to memory of 1048 3952 hack.exe 91 PID 1356 wrote to memory of 35680 1356 cmd.exe 94 PID 1356 wrote to memory of 35680 1356 cmd.exe 94 PID 3892 wrote to memory of 35672 3892 cmd.exe 95 PID 3892 wrote to memory of 35672 3892 cmd.exe 95 PID 2632 wrote to memory of 35692 2632 cmd.exe 96 PID 2632 wrote to memory of 35692 2632 cmd.exe 96 PID 3592 wrote to memory of 35724 3592 cmd.exe 97 PID 3592 wrote to memory of 35724 3592 cmd.exe 97 PID 1048 wrote to memory of 35796 1048 cmd.exe 98 PID 1048 wrote to memory of 35796 1048 cmd.exe 98 PID 3952 wrote to memory of 8140 3952 hack.exe 101 PID 3952 wrote to memory of 8140 3952 hack.exe 101 PID 8140 wrote to memory of 10880 8140 powershell.exe 102 PID 8140 wrote to memory of 10880 8140 powershell.exe 102 PID 8140 wrote to memory of 11068 8140 powershell.exe 103 PID 8140 wrote to memory of 11068 8140 powershell.exe 103 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe"C:\Users\Admin\AppData\Local\Temp\44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe"C:\Users\Admin\AppData\Local\Temp\44000c80effa84d7b149003e07b9c73ebfdb73f21672f6beee69f6a298c226fb.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\tmpuj8ib8xs\hack.exeC:\Users\Admin\AppData\Local\Temp\tmpuj8ib8xs\hack.exe3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SYSTEM32\cmd.execmd /c wmic shadowcopy delete /nointeractive4⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete /nointeractive5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:35672
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c vssadmin.exe Delete Shadows /All /Quiet4⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet5⤵
- Interacts with shadow copies
PID:35680
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c bcdedit /set {default} recoveryenabled No4⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No5⤵
- Modifies boot configuration data using bcdedit
PID:35692
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c bcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:35724
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"4⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:35796
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$a = [System.IO.File]::ReadAllText(\"F:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:8140 -
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\1388936280.png /f5⤵
- Sets desktop wallpaper using registry
PID:10880
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False5⤵PID:11068
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5484
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
916B
MD52296751e8a23f7ef21b9b806043fb365
SHA199ddaa8f716654f392a1541c6eb4c8bed7e81d6c
SHA25682fe7fab3a5bbe2bb9131e4e4cb2c5642f57534fa186289e4562c8c1a2752948
SHA51253d5b473f4a7a06ae3ed1edc88a59843f0c9176e8bf796d7c6cbf5ca617661c4f69cbe29532f70f95e3eaf8134e52402980bd9cda01098ad98d7bf093ae25e76
-
Filesize
4KB
MD5ca6be0387f7fda50b08b26514cc1b479
SHA1194d29d9b8b9baf7301346d4b4c10beef36a8964
SHA256a483582f437f02d58c9f43783850608041c5893a5d92d608c17975e6c8c43c1a
SHA512178000e134082ca926e6992bd4b2faa577853567d5870ad79df32ed987209a14af3afd612fd9fce75f7317a1dceff4b0bb3e74de3d8e2d65e79f48ff63f23ea9
-
C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\identity_proxy\beta.identity_helper.exe.manifest.avos2
Filesize2KB
MD58ca6fe2565816d77bfcfc78e0aa1e520
SHA1bf900b773bccc3fd279f605916230e65cc38abe0
SHA2560953eb029219be87db9a062c0b134b26ac4ddbbcff12146322f344faecb1c2c8
SHA512a6b33f486ba13ed3fb08ff3b0fcf0ed8e61cce2037f2708bbfb55ce16f85cbb349d6b8900a3c2cc987e323c77fb3675297f6f2309b05f3934d3ae06b2ad5158b
-
C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\identity_proxy\canary.identity_helper.exe.manifest.avos2
Filesize2KB
MD51bac3bd2b3288c03cb8dd4097813f089
SHA1ca9ba94f33d5900eea8da86cd5027172c2f10953
SHA256c281b98f2f134b300316b58b1f1a3e7d65e588a1d998ff4455713f8a82ad8d97
SHA512a053e9ce1ceb4ded4f431d6147132713e87bbb8644eed5cf833c3f47f3d1746c0e5d9675eb9258c5bc22c9e793ba5044b78967bda570e204c0006782ff78adee
-
C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\identity_proxy\dev.identity_helper.exe.manifest.avos2
Filesize2KB
MD59a036c961302a4de6c3236ba871a88a3
SHA1915d7f5207e20c6492fcb821eabedf4f37614fef
SHA256c466018a5dc1f4c733216bef274105b71ace588a5afbf313b9c25e37bd409f59
SHA512d6e3f6258995ece1d6e1c2cb6da4793b4d77bcbf326bf47f4c082484bee3f12a8e9c309e93ba78fae650d11d353e4d3f119d80a5b8292e23ade8774a30c2a81e
-
C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\identity_proxy\internal.identity_helper.exe.manifest
Filesize2KB
MD5dc9bfa099f755edc614b678460b5b688
SHA1e88af41c03633efa98c34e48fb9f5d65fe4ea8c5
SHA25650f068466856b8480695840841dd8c18fd6223b79a81ea1775cbb76a1ce312c4
SHA5123cf5f7a2835f59b5971daf6905dfea26322a84ea05b8526784191b9077c6a81f3769ab688730c27a5c6d786bd14f8af731dc6a5fbcef9739b510ded32715e29b
-
C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\identity_proxy\stable.identity_helper.exe.manifest.avos2
Filesize2KB
MD5621e0707bc903e155cd5fb4d491fc38b
SHA1c45b790e5c54317119bfe288e4e60dccbbe70dc1
SHA256c6277ce1fb31768aeccbe5c67b11002d883cbc242208ecfb364733fbec7a45c6
SHA5121e496a54c474890c603758398d9a71bd5218007487aac6ea4f56580c6f009fa179cba86e9515ac7f4c37b992ea9ac1739075655cb7c2632314bd4a702358e3e8
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\AdSelectionAttestationsPreloaded\ad-selection-attestations.dat.avos2
Filesize1KB
MD5ae5521e8ee3b11763cf78810fae8f9ec
SHA1038b2ae4a8a7a6a387cc10e7cd58c9c361dc77ea
SHA25624a75827aef4e70e2ce59107c0101d617851c6d9acca8341682db0fefaa7622f
SHA5125cf189d3ce5067fa5c7270df96b738522afcbf8e707c53be3eb42b27290652d4a309cd46d870e7940a68a99a2dee772f3f54c8d09ea588bbea78a707ebec755f
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\AdSelectionAttestationsPreloaded\manifest.json.avos2
Filesize1KB
MD500d10f286ecf5515a9aeafcaefdb4b84
SHA1a4e1097c6391f586f0375ba70ef02484bc6944cd
SHA256a6b61ee0f213597f3bcbf90a1fc46c05a3ecec6eba5865a9f645c92591300a42
SHA512eb50daf383f005766d3d35e96bf8ce2b425c5a4656aab23900058fbd9510ebc0033845b6c2e58f0900acce96f48cd1f3d6395ec89d8ae8eba966e63fa120304e
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\Extensions\external_extensions.json.avos2
Filesize1KB
MD57d767a5292c9ef25aceaba75e5861008
SHA1c4da7ccf311ea024c8152f84cb2418496612c9af
SHA256342c2fd7f0a988ab33afbe2c3ff957ada16ba3b70645cff4155198fce9457101
SHA5128576efc6b8e64a0fdf39720c9df1224cb36eba69715e315a58356785e60bc965857e1afd8cd06c5bec64b64c8eda9f3190df693d481d02a7025d252b566f6d60
-
Filesize
1003KB
MD517267ee279940e92b60d39966d06a7d7
SHA1def85257c50a9c0459587c5ea85b9fde2a6e1095
SHA256f32e5d81ecc88929aee5b35fdf61d39043935d549067ef1695821e5447ee86fe
SHA512ba24464666a81a19ae45bd5c84d9eaa924c0bdaf466361fe8394161ed9dd6833a3c6df82a1e22427b7a17bc1484336f1e6451b5ae0fbfa42adea6300d5e655c6
-
Filesize
1.4MB
MD51f3b187aa7ffdff7572ffd29ec9659ba
SHA16e4db54102175df055fb0f557d1157274048b3ad
SHA256abf469447f01655f0f48ad799f19ec4d1a8b33e44ea5706295f547888949216c
SHA5129e6191d753fb73f0cb7ad596a41d42406ceaa8c3723d665d4ffca371705a272b15f26aa0637e53aed794610907215f42c6eeb085b56e43822d48bcd8f7aaca2e
-
Filesize
1.5MB
MD576b36938a1c08d4414b74271ace0a604
SHA1fa7451592dc1bd68002ec4eb7a5c34c2e99032d5
SHA256aa7032c00f89d18a3d46b8ca5156ebf2ff4263d040972d2046a6ad762a4bfd93
SHA512c06a0a8dd1d0fc81d5318ded7392e6913ffd50ecf4f4d377eb1f7219a4ff998e027aa94979039d9b9bea99a4af9773c330a08131dc570309de435335afa14a03
-
Filesize
2.1MB
MD507d789ea4280ee5b1dc4f47b065a3c58
SHA1c723c5a9856c7c926995a8ce64ecbfc0234b52be
SHA256cb3e9871b93058e9d6608d528e0929d49abc5a42e697df33b802e21425c89d75
SHA5125c16432337db05cef8c01b58192fa2460d133380da616026e4905be4ee0bcc08a62159817fc477f7fe61b61ad1c619af208554499ae9c87d1ee5a8c98298c189
-
Filesize
1.1MB
MD578a25b1f87f1e18257dbf8716392104b
SHA1e668171e8381b17d2ecd89124f55d95b53b472af
SHA25627569490a86860dfafb63d4bc80eafdd7f66efe18b128a5f45001931048a48a4
SHA512c19254c4aad4e4e059a400484854e3aad8532f304944d97c6acbbbb2ba74ad964f387ac0ec3bdfb0062af9d833a60adfc60c1cfabd1f05cf0e1eb13c36b1b2e5
-
Filesize
1.7MB
MD5a53763ec0e4c8c38c1b7d46e7ff66913
SHA114da57fe5ea56caafd8cd33d942e067d0721a31d
SHA256b90cc1ebbe417ca835c9373255679e75b8a94eab2b5566427cc4dfbde0a2e34e
SHA51266c31270db227b9d9a1bdb6713dab122c925a8b934864280bce9de30980694ad07079939d3586edb10676f6c77abc00ea4742bf2f107686a066a841f777b7f0a
-
Filesize
2.2MB
MD5f1e309a52a93939d17c53148ab49ba28
SHA1a969392910f7dffc26320a8c75638047fcd8eb2a
SHA256973614c0d7049801da7ddeb62b356fb934fafdeff109f092c4f1de3b13a99cd5
SHA512bc5f5a8fecd78b27821f6e6cb2029c7cc4755ec79b963941f021cf54602e884a9df98061ec70db112d9ef76ee8b3f8ddb69165617c2ebcf2eeaa72f75aa773e7
-
Filesize
1.0MB
MD5a4aed037613f2c3ef2932050d39ac538
SHA186cc10c78eaead0e4bc3fc286024142f6e902683
SHA2569d73ac81878a4ab20bbe921cd5617c4c2a03c718c05e4867e6679f105cd3f2bf
SHA512040edbce18c8bf2a7e9097d3c4f054c90a62650530c8c05d99e1dc256b6648681f1e99bc7fdb9829d38622dd32e80cbc61cba774e4dc536fae03dbd581f45191
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\Locales\ca-Es-VALENCIA.pak.avos2
Filesize1.1MB
MD51585d1e69fa33e1ce5643c3b9110c740
SHA1112299fe71839972e8531ebaeeb1a94d2a8b396c
SHA2568c12891e522e25bd90ff74853ed72d63415863cd93aeb6b2315323f997d4e0ff
SHA512bd5e6e67bf46c7174b3f232c84564ca14371eb27e416a9fe8f7d7cd3e7b64454720deaeccc0e0b262d5c053ba7975f541ec925c0ce87b6987a13b0a79ab53a7c
-
Filesize
1.1MB
MD534148d92957f1a3a2ccb7eee8132066c
SHA1fee841c0e1bc1fbc3d6b58c2ddb1f164c396a455
SHA256ebf36bbf7c2412c6ef0b9af0233d54658f5f9d4a89ca2c72fd6dcd92e8e04c3f
SHA5129908ba17489bd2d134c465ee8c5f47b2450c87b5b0c694ef91d4be1611dcd77808832a43d5e6f8c44336353abf2a9e2b4c71611d968aad32866d150f9de9619e
-
Filesize
1.1MB
MD58fb3b334030c267374d1bbda8dffcffd
SHA1fdc318a26e1db8d1d1e572ee2020f262ea958e74
SHA25656c7bdbe11e8ab448cba311287f3ea0a7b4f4fce6d0571958aadde26c342f1d5
SHA512e182e5c542fce8a3782a9267989c370b7827fa3d2de2c55afdacdceed14df6e97e0c65d0a6abc803726949a4eafcbff91aa451b077177964072eb6ff24bdc6b4
-
Filesize
1.1MB
MD5228cb9e0632aca01533cd273472d6394
SHA1bdab74bdfccf69e68c522beea6b30c57f148a115
SHA256b67e8c067f7990ca7d3db976efc45971bf3beea7cab95e536e89a8aa02a8caef
SHA5124e3e58b2f5ee67cd006d6f658f569c72e7229bff28dc8a484f9c0639cea1193175012e76a048d93fb34a801dbdddefc5177ede91e309c62da6a83f5ee73e35c3
-
Filesize
1002KB
MD5fb7c227e4bebbae35aace9dba69fb71e
SHA1eb1a496f2152908c6f2b4b1fe633315e208b605e
SHA25689a873134d76f33d577d33baffcac5e0ff84081360028d558106fb99bf375ccd
SHA512d2223d9f490d9363e1adb451484adb960b91db85315427eeb14cb84a8a86f62c3d316586c3afa80d2068a2826d306de45eceeaeea5fc15c9574bb3fe896506db
-
Filesize
1.1MB
MD520a5de66b02680df43b98b89be340bf4
SHA1a63ee30c844afdd20eed78dd4a81d18f76659ec1
SHA256cdcd07d1174af40250928c228e1a9e17b2a50680dd0091ef52d645453a2d858a
SHA5125893a8ba3016a0270455c53a03afccc4fdf8d6ca062a241d8ae4886b9f6ab06e26704c72afb81a4684d585541047cb06ea70d2bddfa890e3fd270eb78a900cc5
-
Filesize
1.9MB
MD5af902253f52c085dcc7978eab582cb62
SHA1dc53e1d26819ca4f2900853c29046911a484c7b2
SHA256aea4e2ea31d607a63e3115e64b5416d88ce248e9328978bf4487b39defbb97ea
SHA5120c6491ff0d787bd6e2cfa98bff5079ea5c7a7f781f1ebe8475bf677de829495f9be93460dd03344a843f874ec0d6d4de8925c35f52c11785015ebe268e816479
-
Filesize
914KB
MD5f33eb451ed55f4a2b20f58bcf1d5c52d
SHA1f00fdb83c217f2982b529cbe521ae1c341accf49
SHA2563e9c2d4e9d1a211324744b13da48d4cf1d115c433acaf2619f58c8d291ef8f5e
SHA51238475c69329c5710463b0266143c5829fd903fab5457ee3c231d2a57ceb7f8d354205f20147620531fc938f8d52b9063c2d90309b684aab6882c971e111c55cf
-
Filesize
902KB
MD5f5993346ee1606b53ea8c3216dd44de8
SHA137a9ffd03446f87eca1c9cf184aeb9fa25a02eb8
SHA256282493e644b930706e9f6763d8e937e4b052c8dd78984676a8d4eeac0234304f
SHA512fa496f755d25d324a3ce375b0a44baf6273bb73646325061f597ceab5c9b4d7fb3bdfaa5806a4a70dfafd9d0bdb425f3007aa27918d222cd9fa85b577a816b27
-
Filesize
1.1MB
MD59de76fa5cef8c97fef5f6b37099c623d
SHA11b6104bfeb586bc26917d31ab73081a47cf06881
SHA2563f93d7dec28ace3e4809279dc9136084e3415e4129eac249b4465f7c4e6c9837
SHA5125b142dfa12116e2378e59e0cc04a1a1d855c2206b223c517566975f79989337717c1768617c5b97e759d519fba7cc3973e536fa12738a79e2001b19e5eff7976
-
Filesize
1.1MB
MD5339f342d01dde4977afd1c89f216381d
SHA1eb8d2e55be6b9d86cc161cd04a195731666746ff
SHA25644f6cec72227b2b05b3d51fc73a97797498b3998f5648555bbfe9b21b0c9a929
SHA512350b8a579edfcc0efba224a524868080772fc2346598684a9a37f2348604a9312af35da0a6d0b8bfd9777aa2a7c7f7f5cecb63e0bb66a461d22d655a7920979d
-
Filesize
991KB
MD58bf6464b701858b385924b93c8b66514
SHA1febaae7d1721895c3b0b60c5e9b3dc79f718c753
SHA256d1d127402983970b5141a01fe6e24b1e0e6fc57355fc56a1889da208d6481a3e
SHA512dfd648f7247a4d3bda222dea222049735bdf605a1a6df11315e5adbf39ba5a32abceeb896b78067cda2af6e6e3b1bbdbef88651648f1367a161d261afe8e1255
-
Filesize
1.0MB
MD5ad1e9f04197c8a37c6df00e7d756f173
SHA10de341a67ff7a20034a59073061259e28aa016c3
SHA2568eef4dce2c780b42352c3162184c339f3db26a239efbc448fe3c25e340670c42
SHA512a3d10bdbce1d3604726f10c87ee10fdae0698665485ec9432629f9c6d2fe9bfdac6cc5fa7d0b50309b1852aa919ab8f98bc01391ef60aeedf2f304a34374d00f
-
Filesize
1.5MB
MD58ad23af47db99568ae9e6129d519f7e0
SHA1357e02787d2aa3385321e01115fb698a9dfad9d2
SHA2564e08952255dd8b4204043e8c89d82af4a57a54bb002c39f6055e5ea8f70dc21b
SHA512ea5615ba9fd7c8500aaa40354ce0ecd98d525c7e7294821e37d607443470ccdef9d07a9a53fa9eb567e877ac8aa15288d93a4d6310c67ca4eaa1b232179916bc
-
Filesize
1.0MB
MD58dc1715c9bb6074da43cbe6ad78b4b57
SHA13782dd5999b67fa67a0c832d125e3ecc0ce04997
SHA25684e0fe2592229f33f20e4b1bedd50346461860d73ad75fc01584e9f58bc9fb7c
SHA51277e2af995819ed73819bc917931eb1a458a7837b3e3bbeab1a9df3e62b74d064a6c8af17c25cefb6db046956a6464fc023176c8d39e533b0a654a93e52396024
-
Filesize
1.1MB
MD55b28686ddc11923761e2afbfd295d930
SHA1e0b384e8fa966c885c9ff606ce51d8490739ff0a
SHA2565875c814198efb92361767b7f7e9ec80e8a2409c3edd871568099fa2122bb508
SHA5124f498975e9874e0bc31f6200636a96d48b30b510c15cccfb44e9ab7b29549012d1231b675dd162925be97468fca48c969648ee0f7c2af3e484d253c7df96b62f
-
Filesize
1.2MB
MD5f874ea818483a3bf7b83c78c18435661
SHA1422799afd10e05a545c419f52af209693753f789
SHA256639634157d0d0717c9f97b01f8eefee4c8f24cc45e528a51691ade3b69ca0ed2
SHA512b0a2436da6c7eda3e2f35f7189ccfaa6c3d4c15e5a432c8b930f7a4a7b22b171a06e6612262ea6d208ce9738b6a4b90f57c05ed04ec9d9b810c346fb417d233b
-
Filesize
1.2MB
MD5125c3db509f73b6234e26a1e5a1552e7
SHA1039782722ed6c5055890ceb02d306736bddaba2e
SHA2560968010f9289fce39e0f537fb611ae4462c2318d3c76dbb51675e59e2767e800
SHA512796aeab499be7300bc50afaffbb66aec0eeb64e0ce72bd506c83cf95814621f783da37f82eef57c5a7cb4a51243b4737af65a3adf594c536e15854bef3f9af50
-
Filesize
1.2MB
MD5ea069ffb11fc7499f0956c356cafc4dc
SHA1da8e430acf7c4c36b0e32250d5435e1be17ee1fe
SHA256c603f4605391739da40d5d90a3d78c9a0c6152ad82a9a250de63e52add2c23e2
SHA5122f964ab21968d1c21ef2ddc2660d03cccad008a6a60be46bc101e1bff09c8a502cd01a816e806f6e9948ab5451d736da634a09a2df978b68ef21f192fb83ec68
-
Filesize
1.2MB
MD5e373fb87f3e304bd3c2baa6db954af4d
SHA11cd9e0864e21e5821552e4fdf2f0105b94d3232e
SHA2565a1f048119b5b6df946bf1c01d0a10fd35972e75da2921a68305d56e2ac70449
SHA5125dbf62f3b2e11de1fb81719ea100d26ab8d618b281ae80781818889947f61a578d6e97c221ca776b0530fa25a93ca66cd162aa05984adbaeeeb05723b07e8618
-
Filesize
1.0MB
MD56b4fb203ff8be7f97b460f8b81c1cbab
SHA1e3759a5d82b0e00c85d2a867b78220247dc681c1
SHA2567eb06c0111f9aaaf71fb5d5938f42c8f1a91877bd604220b274823f52645afe9
SHA51295f0fc6c756dc18c5c8139e9266f3c642f900d8a7811e6097d0278d6e0561dfc2ac3ee220919463711af0bfea2cde0b6b4636a4326cc16ef74d998d7146dcc30
-
Filesize
2.1MB
MD53d0aecd33da7efe26e13e25e8b4894bc
SHA15d56b959ab10fdcd0714cf9cb7123f4a05554496
SHA256e083ed4a5c6b5ff0feda616440c896a8b74bc7654aa06b03d870c6dbc3967870
SHA512a2de8eef6eb3bd7f9a6f280603fa9d202fdeb405361713b6dde159ee1358ecb30764a4d123867eb2f01f254f2f14b570245730f819bfd42a388d611f799268c8
-
Filesize
1.3MB
MD5f4e774f0ca8760904095c510e4fbcb2f
SHA1c5ab3536f9c076e46e2bd24c8412ce4ea1124714
SHA256b77db05cc7e5954c1d05458c2d6a296b58a9dbc837cf0464fcbfae7497d6693a
SHA51266c9d95727494b827733d9d8703580c22d86bb4a19d1961e2c2c87693bf59699907dd3c46b8ae38f09e1b76a09c8da5506cbf2083c3d7d2278671c09f94f32ce
-
Filesize
2.1MB
MD5d9346e5f6b54c04d1490a66c53778117
SHA187e7748ac7c3c2f1fbca47ead6ab98e875b677b3
SHA256d6103e10bbeb2a0be71bd00e39a7ffe12f118b4f520d3a1097de62d5d65b9b93
SHA512f989758236ca2daa0e7cdc4cd0aacbb845336f283d99ff48b51b6fe5628a97d53207b14e3b0db5435fe0be1449e7df4200ac889b6629790567612112bcd2f747
-
Filesize
1.1MB
MD568e7253ac8f0b2141c63d78851313d57
SHA159948477230be684ace896468bb981e78dcd6673
SHA256eb0bcbbfceb36e8f73ecd3a83f0cdde0b9a1e555896b0b0b5276e705ebe346ba
SHA5126e139ea71e65f937e91467b4a93fe70c53075aa2ce5c23350e3dc6c1d69aa8e6a39541f2669e9bdf5e2d9ceaa27c102c4fa3b03d2e408fe0d5cff289c32f1b66
-
Filesize
1.1MB
MD56cf268a7b784bbc2d1bcc62d76327c3e
SHA1456008b771fc8eddc00071ddcd9b60fa37ba7029
SHA256a2461108e9c4fa4d85abc971260091b913807c86fbd925a77dad1e19d2e118c1
SHA51268d71538ddebd387d35fb83245af62ff8f7b5fb3f9394eb102debf92bf33396eed2348a52d345d97ce43db5845912e34369747f9dbd3573872a6b3593dcf1d77
-
Filesize
984KB
MD5eb3ef5528c99a9c51b75927259c9d5e1
SHA152c35f8c7927d5d0e0983d9af3240d155c81f723
SHA2561225d4558cc2bb94fd6a2e2fce04d02aed30aa6073dfc441e2f6b7f23142a0ca
SHA5125ba0b981fe8273254945a1febca48d8df0594110d6826d5ab430ed89183e02e08bf6cbb290df409a9b1b650cd1e974f55dadc992bdd3216ba7446cb49a5268d2
-
Filesize
1.0MB
MD55d87929750869e9e334ae5360b0f0289
SHA1ade4a73854d6286ec15799a64c485d0526e7d2c6
SHA25636a76966a0366e4eb8db0346dd7a87cc3e906d141a1a07374063f617b8adad8d
SHA512ffe51fc12b990f07bc83dbc90484b1eafe78a8184d7466a8426391341541b38d916664f7907a2c7fcf8de20ffb4d54b2bebe21e740969aa1627bca2a344fd836
-
Filesize
1.1MB
MD56a6f3a90c9dcc68b9c4762c5925916de
SHA1e60931a15335c874e90de8add366f85af446fc83
SHA2568e8ec9099e67d53eda9660bf6a353b43e437f09cf1f48a50d4d7d6ff71530869
SHA512db01953c9fe0f7e70dc8cc553784cdc077958097d5fb83e1a62f171a50830b94ec1862f7eb99430040ddba2edd38b4fff699ea397c3f634540076a41abc6f2d9
-
Filesize
1.2MB
MD5ee3d32b6f46368f2074d3ea490c2d662
SHA1f96f09040d206b92109173c76655dd2bcaaa9886
SHA2568c9f1bc2bd6b3e56f3ef4d87b2cd2b4f603ff0ce296d944b74a393d66747eff2
SHA512db1800cafc6a5db06e01dbb7d08b3c6e5a301317cd76a5748c8b88da0e2118144816a121cd94f3a37c908d4b1522bd5d81c959847b087ce0980f49cbf355d360
-
Filesize
2.3MB
MD5791078fb111ade783b53771853319346
SHA12b9e035d05a24b7dc9ccaa6e00cbbe211d00d16e
SHA256bc9403f58e10f805624d32fbda30b7f3604aea10559c0bad2fe3d5d5c6994abb
SHA512939cfcb08e1b0f3071c92359dc91d3039081c726b001d1ab2b7256c0d28117f9aff275158837100b972f528bfbd41c90b8600d4e82600f660805c7c8260b8253
-
Filesize
1.7MB
MD5bff5be14ea1e7a603b8269d54c17a372
SHA1f1e3951390905560d8122ee3d7c97f65b6b19713
SHA2564f3a46d125de54a8bda8280a13069b29ea55c0b9659ae5a98ac105399e5c22ed
SHA512d8a184351cfeded3dbb296956046b9bbcc42b3846e71283784e4cd69662903144269d28eb557bd0273ef39a3d19d5c73f64dcb518361fa264c51858a5492d0dc
-
Filesize
2.3MB
MD5154269d322ea3eeffa586aad229a4224
SHA1424a4266164191aee1273bab13356b602f2f29f6
SHA256adc08bc4458ae7558294d975d4a5c999cf23039a134f880d47b274a40c769b8e
SHA5128447f5fc6cb30cae0704fdf4a831b2ee85153cf5a501267e8d5733fbf88819e2df564eeeb7bbb57c72caa5a7b64f03b76428eb56a99db270e3fc428026c1b3bf
-
Filesize
2.3MB
MD51be50d65df524e71055b79d4f7ee61f1
SHA16fb855c9313357c95173e62f37115633d182262c
SHA256b5645ef4cdf3e50fc53bf5632ecf57b121fc113f299d96a16f8d35918dff87fc
SHA512c9a0099c2d2ca53d4ecbdc611830ab7d0d8a383584f1d5c1eb7d61fb2281e5724db9af3c2ba03aa56fe1bfe4542612273a3778deda5af85bad0ac3ca704ae924
-
Filesize
1.1MB
MD5cb5dbc3622e6d3198c407472329fdc8f
SHA1e3fe649dcfcf307e8a70840fc95c65e4f969d35b
SHA256bc38d6caa9ff4b79c7aef9b33ad04740427f7efcd4110731be21787a84d7ed29
SHA51223748f72939376222742c892b1728911ccd0722218373c56ae1d2413b899e998fa57b57ce73ff8975dbd89fa2fc54c61dc88f129c171dbcd2c4f8cfd543a0a60
-
Filesize
2.0MB
MD55ff71ea14475d862fdcebaaaf5942c6d
SHA16fad46b2f1e144a8acd7c8102d1ab7fd50b03a44
SHA25667670772a2f4d66e179cb6a78ebfee88d46b779a9b98d324595d3c05b375143e
SHA5125ae310593e4644f29a59da2250daf83474cc15b85084ec8a72cb372c04db11334e42455905560879b29e8a77f74039af46e4920839eb822fcd8815ed206dd267
-
Filesize
1.1MB
MD580ad27a2bcf64ecb3da7d5ff4cd6de45
SHA10bf2c05b2548687fa2405bbda8b8f1cdcadfb755
SHA25604fe6f7dc4cbc12b7b11644a16fd5ded49812fe2dd2231bcd1d4408a28a252fd
SHA512c724ad2f290f4e32dec5a97dd90fbe9de12f53e6b10225003bb5e44c3efd879b3dae0835ac5fe226a9a5e1202230916395250543fdd73d4f52daa3989bb15d50
-
Filesize
2.0MB
MD57eef1228f1eeab3b67e64bb405368f24
SHA1bc5e8fb93955234a558f3cd5a129985e9921fac7
SHA256045a7d1d79480650a9173c3bde0ad18b3f7fc5543b31d5f2e59559acd4508489
SHA5126cef7c674d1c91a6cdb98466f18218ad2296c84782f4625e91c1e13256d006b794e951b910035596e3dce65b9b5caaf1685732c1d49b3ba816f28fc7ff9e269d
-
Filesize
1.1MB
MD5cfff1d8974a92a9db9ee4568a9406339
SHA152e18747c1b025b1af3051ebd455e24216a4299f
SHA256f3fa8fd5bf9d3a27382ee83fe8ae5a37e5792efabb602bbffb609fc3574748d0
SHA51238cf82907b89c6d9577e942b776803a2eeb57dcec602df3ffce128c90e9dd635157534474519fa03ca82fcbb86491292b74b265cb6a7abadf6bda0a3bb940f22
-
Filesize
1.1MB
MD5a90a16df7fbea7706b2458e56051765b
SHA1fc37bac94fd2523189b1bbecd7b3db3df14b5179
SHA2564bec14741394bf201ebcfa3daf88d4d855b2e82846fd49f12341228125e67e50
SHA51259318813c27e2596f80322ab64a531a815f94dd5784310b199a42578b2a3ab0ee94161a9d1685070498fec0f0470c29a39af365b840b97dbb786eb99786e471f
-
Filesize
1.1MB
MD54e94289fdf8806e21f6e86a3f4ac3bac
SHA1cd03ab9584ceab39f2a9b060b8ee585fab01389f
SHA256653c6f48378504dce70e9051a196b027eb5991801e920a19018b7fcc8e1a165c
SHA512cd43220f8a6b4f6b6a321ec30610c52f629229f9f3b880c2def6fbf6fb89a79ab08f14640b7c77ca0a95aa17f9e919e851978ae0dd15d9a396ddf76af26d75f6
-
Filesize
1.7MB
MD57e386c0c4bb3e6549dd7fe69f23e04a1
SHA1bd276a31e5b4ad13060fb6a5729bb9ab70d785c5
SHA25682e503def334a5426aeaf518478a5498b917c59c8753e62d873041a6970f2bc3
SHA512272fac3df0cd39650546ced8347c151deb22a580694e4f1e74efb8e9265024c87af66778286a435ecf4b4900d6cb96556b8ed2cdde0e67988b616ce7ec7947c8
-
Filesize
2.5MB
MD568775af66bfa7cad57c128b53774730f
SHA15d8a6dfc20d8f7fd1561dca6d10baf91259b2cdc
SHA256345168f4db78b6c5105f8e48c4a89b932128def388870490d30ef3fb42c1d802
SHA512f8ef0be65ffc21104ebc7892da91d1a0b8519825b12d6a9f67bbf982eebe3480f598c58dc262215703472cb32312fb138f09df3b4bab06c0924449469c67d30b
-
Filesize
1013KB
MD5654a0cf701bcc2c56c6981cd65104d27
SHA1c59db95c1a3270c338f761520f7cc9409d36cc2b
SHA256fa7e014e30dc3fa7a795ccad92be5732c1cddc34609ffd4e645fabdf775f0a11
SHA51261958749a2256e24d34a60a66f7fb0398dfc5228605f2b2cb21994659e9ae8f40285b20c3e749ec687a9165ed32cb519b6fa10d4da2580b96262af03dafb5d61
-
Filesize
1.1MB
MD5237d66c25d9490486604306c02889045
SHA119002aa2cdb78707122f9311d2a75d4181dd12cb
SHA256af3526063de798a4924115e7c2cb1704e32ec0de7994d4b5dd7774ac1a8fcd07
SHA5129eb7995a824079a1f53c85a9cc4fd7c011cfcda9a7a8897cc05d05899a5ef08000ce2c02cfbc13c4731299fa5a07b6e8673a6cae11ef4ec48941394ffc495d86
-
Filesize
976KB
MD5b2b184053f93b36b9bea8eb25c570669
SHA187d90061216e68d3e08188357eeaa4a46255ed75
SHA2563f2cb2ea1cd23909f8ea676f8771d282f091ff7420f824c838fab41a2a36cb59
SHA512c6519824fbecafe6c0920011df3a958173a71fe354b5f547529f3128f99f6bb811600394aac2b97589ece28c8ac3a51950d60d0654e7822e916ec271f19e4be6
-
Filesize
2.2MB
MD502df82edc0ac02444fefadb103dda0fd
SHA1bb69ce341e68593e671c54e228c04676a9728c08
SHA2565f1b9d29060e6a971127c0952df3d0c3c5cd27ffa97a72af9ba3bbb4a318f721
SHA51235074c3c02d203193b8b9614369d40e1bf47eb07442a35a058e68c0e653b25d15dbba1b184c7ef38fac01c145d09ef230f852765d1deb302264c0d80437c090d
-
Filesize
1.0MB
MD5c9d30ae8ba83108f7f44a5782463a2ed
SHA155e96fdb778bd0214f980827b83503a51cc07a5f
SHA2569fff365887376c6e5eda70b372704b31f21d51d27a48c2c21f59a8ec0cd41065
SHA512b2ca338b65e186ba69ea7621ab2386cf341e2fd53ae3c738bb69b0b2cada5823fc6ec4ce89745e43507a94cad2bb8307445a6787af085aa453a4e01adf116025
-
Filesize
979KB
MD5a81f19898d4bc8aabf9788aab0d9e22f
SHA1f310abc8cb39ebf4df24ec053ea0610085b556c6
SHA2565def5c388ae530e42b6f1a1473b193339e3437c4b3e7331a3aac2cfad38d64b1
SHA51272accee9b97b533692ff0163370855a8610bd6ea31103df36128677a5f99b9399d8d622c9eb51431aefc3d9a69fd9273caccfb87f7413fff73bf8a50837faf23
-
Filesize
2.3MB
MD5d7a306234416bd32125a216ad229b8c2
SHA17236b6c0170222c63860d3ffb26e23d9c04bca1d
SHA256f782f2dd6cba582fede2da8ba305613bd146b41dfa27613576cb7cf8344e9650
SHA512d546a75f24472e6a6f118e7f2ab5e0e3eea2fdd1d4eb09e232063ff4b2a7cd8b800a472951bc3d3f700192fd9fe95113348e6850275400da620d1bef71fc39eb
-
Filesize
2.1MB
MD5054dc59325187aa07ed4158d69422b52
SHA18dc6ee6f0e274f53a064826de5d1e7ca698b2de0
SHA25670616467c6cb7675944c91d53c808cd7792b68bbeea3f9d33dbe9ac1acae7cf2
SHA5128dd346002526f6b69c27349a02e13b68bd3aaabe83557251ca38c8c482784289f62bcafb92ca88a1838e5eeaaffacca96793c57558e925a38d3fee760d786cf3
-
Filesize
1.1MB
MD5534007e979290a3c2eaee7352bb7fb54
SHA1659084220a60c33cea9719183a2932afd62081c9
SHA256573bdc4d1ae5c8d837f8f451d94449c085cdc26231bf1d22777f0718c02cb189
SHA512f0d2143eb201ec645a6e618a2aed8d42d561dcfc72bb8f30319b3a1a12acb5302f1fcdba336a2b22a5e460f893afc67a63cc7a7998c71fc05af261ce25bad128
-
Filesize
1.0MB
MD54d00189fab9b1309b69ee14df3fbb8ae
SHA14b8f1bde5b164b9f9d680d5586d1881a84a47d51
SHA256daccea1e500d4031d28daa8a3a0dcbc0cecbca0101d4058420f8a2eb9c04e034
SHA512e1d92637b6a47c158ecee1ecad38487c8400aeb40e8db55a1d70c227ba80c01e825c2060faeec2bfa2eb302789e1763d7f76d2d022e106e63f704056d5d68b40
-
Filesize
1.1MB
MD509c65e61b35fe27887aec55e175c38e7
SHA177a6ac7f6085586185de08cdc0d80e987f1f1885
SHA256d5efa91593005846b3864b8ac4dc63d2b1d76dd6f12dcf1bdbab36dac9d4f563
SHA5120ee45b50a5160808b8ccacd99fb704cfe35707aff00765794d6a3c59d5a9b781b335b030b748094ec64c4a339c5862bac0711546868c578584f36d5510a67724
-
Filesize
1.1MB
MD52d68f63e21f13afdd27e3a090df5984d
SHA12668fcea3d1d2bc9ab4cdbdb3b303e0938e66cba
SHA256d7977ba0e415aa8da3750cc0c229b42843e3832942f7fb8dbbc23c41b547ae9b
SHA512943cf501079420dc389ea93130ff11c3ef99cc6b4e98c8c27e23be8ca559d08af2d62de43fa2d067c30b6f99025b87a20bf7fa530b2bfd925afa8a918ce85d69
-
Filesize
1.1MB
MD5909f89d3b29f4aa09b16e1de5e08aa7c
SHA1d10cb6948b51b4bfc3dd2256b35b29db3ee0d7cb
SHA25650b7e09b96210bfe321cbf953a8cbc2f1199c766dbd16b86851e3340d13a029c
SHA51207c0a088d967089cbb96af0d5cf4b321e05cd1489db2a35b66c6a9d7942196a8cb1c4f0c57991b7a159ea20a35dbbd741429029b85fdde49aa5f85f17f4bdf50
-
Filesize
1.7MB
MD5994c5ce746caab31ce750577e2addc2e
SHA1281039d6e9f14d711342eb766ec6b6058353961c
SHA2566d428181139db388f249aca7fc86817fe46a898fb0699cb282e3309eea7c9e3d
SHA5122b49d4f3b51cfda8b9c2a2ae80236a17a848a7dae6694616fb4e3d7ff40705fa38747e6b87c71bb3090d7cf58dfd9b3e781a44e8395b211033bda03f08e093e5
-
Filesize
1.1MB
MD5b71cc24396093be0cdfdfd058309717c
SHA1b60f1f6c9295e527bd1d948a68f68a6a854a56f8
SHA256ea4d090f9d4e6c5c5ed4ea9c532aa1218caccc9687156539cb8f4a8e55775731
SHA5122983ba47f5d56d9e5d07bbd0243db269d87dedac2972466f87678c4d4eb2e40cd69914cb45125edfb880169e3ae3f546857b2e2aacdbaf5ecc6b90c580092f30
-
Filesize
1.1MB
MD584023c1b380fcd4ee747e43af742bb73
SHA1716328174099f96f696fe7832edd08e93d4d515b
SHA2566176a4ff77add1689874624ded466697605983ba5aeeb387a6510cc4e5cf8771
SHA51289c3e1d777cb21f49d2605e320d570cf607a5ffa34679d8543ac7b85cee33f1765583ed06b4f98fd383c0f6fc3add3dc21f1d760da144b0d298bd5f0ccd1b23f
-
Filesize
1.1MB
MD5083de515876a9fdd54e3a73197d3b76c
SHA12dea5fccf63b9f24ca136ec89ca6e99313df0035
SHA256e7297384934b2ea00ac56901bbba8baffde210baec2cf95991c3db55410f115d
SHA512a9c303b0744edd303a5f38f8b62f4f9ea5029cca059fa8faaa35aa3b75842f8702d104af7e57fc1af49946c72891bed2012601694f44b75edf8bab6e0782ec78
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\Locales\sr-Cyrl-BA.pak.avos2
Filesize1.6MB
MD5e2bdf7ed1c6e90a5fc52156c591e9c4e
SHA15eebc4c24d765acf19a0908df2570b9fc68ea80c
SHA25611e0e9c60ebd668455749160b8ff8aee91f7762ace2ef6b07a3b1ab9992017a4
SHA51275ede2790e081da13d6f24c7ec73216c786cf3bdbc624a02214ce6f913db96f9563d8402417156262e8f1b7529c4b887fdd524df86ddff29a8d92d3929dc92eb
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\Locales\sr-Latn-RS.pak.avos2
Filesize1.0MB
MD51b720498abcd4e4e2a828e120e0590a6
SHA1a85857dffa77ffa8dce2a3de1be61c45d5cc0995
SHA25616ecf7bf6e36ec4329afd085b8e7a3d0e94c57471e9e908b060756fe34f3089b
SHA512e6be7520778faa66d4691689930a01aea94be1acf392e6b5265d40e83acf4073e9a27c071140d8155f33e23c570ea5aa78bb965a13b0c6ec8d56957609b47a5d
-
Filesize
1.6MB
MD59b573bed14de0013b2f07b51e3b0de3d
SHA1f6c36a0a48a5151b83ec7080adc48c209cf92d17
SHA256bb2f57d244c3fb772bf451287a1316deaa235b357dd8f41107058e06719a4c97
SHA5126af7a95d0b52fc8673ddd9cb382e78cb6f52168796959fc4afe797d2f744508974fb43ccff1ce6799bcf5d80b3e1da48fee72dae43034fe97621a5ccf5b0b009
-
Filesize
1001KB
MD53893ba2db1cd00743721a07306ffc09c
SHA15aa3fae0069bd28307fefbee871b605a4110eba5
SHA256c3e9404b21ba57495794083e70876073e131e18a5949a900aa49401663a3efc6
SHA51250cc02bd0d7e0fac5e7a667d01e359f8121f758940aa42e45ea2168534badd7875b3d63975e9f4de1a5029ca010fa8cce4cb346c5a5f06ebe998220e16e28c30
-
Filesize
2.5MB
MD544e2c84ecf2008072530cb59c9e7dcec
SHA18d93dab5bfb73fa33ecc7c3e2ee8e41f1f95e518
SHA256547fd0d87e95fbf9408049779b26a5e4b336048422611f485dc126e56f41789e
SHA512a57105a3b82fda9f150082b6c9b514b15c60a0558ac7ff71c47994ca3a3dc4d26125eb4bc8bd138171f964015e46b2628fbece406a13062309cae04a22dbaa3d
-
Filesize
2.3MB
MD5d54eef221bc1dfc596dc37ee27984561
SHA11df55798b621026e33e7b2c43640a8f7e041c913
SHA2564c72bf9110e71a155810998019da379d545e57a99cccfe4181bed0a38d3d87ad
SHA5124932381513557c9d5d3c80d58a17a6790be95b164363961aae0f09f233c470e2a07aa1269fa3ad77655fcdde569b910ab58f5a368a7b212bf59245c43d8c676d
-
Filesize
2.0MB
MD5d9256d8f2f9da30d67894c069b77cca3
SHA112c481e647136cf7f0b8acfe389e38358a7940b3
SHA256e30225cfa0a37451a25efab0e72bab834998ea61a243d83c772979f1b290aa75
SHA512e88b853227a73dbe8516cde82d4f41eeeea06a1ec29abcb696da9a563e464e0e25e17ad976a12b87351f738573932ea367298b0135d3c413a09a4619f057c199
-
Filesize
1.0MB
MD534a54801b1fb8cce651ba63c78a0bbea
SHA1f964aafda5b754ce6b9de03a1d74da7eeab5000f
SHA256a2b5297995c681847f9de8970c8cba77d1ad70989dde5a266240cd1ddaebcb19
SHA512419a1a151733fc112c5581c9d7ce72f447180793de0edd8b5a8a2b7abf404919eab96a92928a4c02dddc49b3b73e1dea97b4570ac82208f52c7846a182ff7267
-
Filesize
1.6MB
MD5ca3022f0814706efb4695762535fd2a8
SHA196c61c0ddbbda2a62faa81c65c6579ec8d5908c3
SHA256d5f9b14adfe8b65536bf19384517b9ecc60d6feabaa05efb1d4cb5946442a5b7
SHA5128e98dfecc7c83a73258b5fe63fcdd10ed39d5ec5d7edbc9bb8763ba3bc175e4222f3b02b34ddd8daeead8de3b70876398b9e1e364e84f8d17e44f93e0960e46e
-
Filesize
1.6MB
MD5e61d51125bd2f1ce67a0c061d5e19e5f
SHA1db6055ac818d03819d963a6491ef93562746ffc6
SHA25616d938cb41c98a9ff2706b9059289120a7c1154c19230131425dae14cd813109
SHA512678174d8d9dec0c16fb37f4ab8f25d5c08b00641acab5f9cfe76e080f88cbea75baa009b4498db093aabdf09f4508d24bb3776e8e0ac7b09f2d71508720218b4
-
Filesize
1.7MB
MD540e677046dbdc38635c8d9ba2d9bbdcd
SHA13b527971427eb1f5f84b28fd3754aa534264577e
SHA2561da4d0639ee609202e33d5b7dd0e76ce08994a727edf28e9c071cc13792c25c1
SHA51242651675d1a1979e32fbf9a6ba39fab3bb8e092a91349d6009800d85be7bfa12a18b70d6471159914d46a037cb7337fcfc5a00dcdc0fbeff4eeaf758c485c74b
-
Filesize
1.5MB
MD5e6126410b23faf8316e5332942a7a22a
SHA14b0474df436c0d371653f1fcb9616a6c1b6495a8
SHA256da378b73e22358d25b1c35ca4e701a0445f9fdc560618727a960983f683a2964
SHA512d77da045d9b5dc358c6a82f2411ad00cc1de99f78f09d923e158dce8e46a337bf9c71ccde0a0c9166e6dc80c1c28775fe298630082c89d5dff825f36f2b039ac
-
Filesize
1.2MB
MD55d04e7f02838a01f541cbac2b3a2ec32
SHA170c65d3c02944ebfa885fecb7e4700fdbb2dfcbb
SHA256e776fd7b2e638af103c436e8c4352a1379952ef6659d8dda278443c70f22d9d7
SHA512ae7ac8135395f7bcc3241c87835a6be5c50e5bb5ed81060ba9a90ced49284d4e061dd71820fe08c3f9e5a4230356da1a2abf61b6354c10e908675b2f339e4f9e
-
Filesize
860KB
MD5cf9ad11310d0aedb8f41c216b42dca62
SHA1792a40ef6380f7146d55f85d4a8e933739b6bb70
SHA25638346998aeccd64297c685a722a9140cfdb014f744ee4a1c0d81c3a25bb6038b
SHA5129044acf8d524b3211d41b2a738b73f808e72334e59ea36c9fe3abc1104ea0430cdd17758bc5b07e4fc8d2317ece510e53b44ec4f21c34755efd8d94bd5afaee6
-
Filesize
887KB
MD5dd4c4d6356b3b3782ed6d908f6db3ea7
SHA194ad0b66c7a19f385abc284049578e08a7f85170
SHA25647a4c21cf957f2990534731125bc2c364d76e4787e5ff66069b9701351c4e809
SHA512a48cdf35702b0874361820dfe7662c6a645ea4fe0bc74ac9153b1dde4e06831390989183025e716d8d7ed1381913868126f123ea3c13d07df912e252ea0987df
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\MEIPreload\manifest.json.avos2
Filesize1KB
MD54e7ce98f3bba54e6c464d2f2d3714aa8
SHA11e8f8e70de1abaaf66387ed44dc88bff537d1bbe
SHA2561a9a99b170eb05e3e69d09d8bf9fdb5353259a5712beb407635a89c7662565cc
SHA51238cd7d4023c421e727d476f1bbd1700b9a54574af2ca5d92910ab2e5a73074d46b088bc1abce0b5407c4843f906597ab6be59ecc604e6a421675b14f93245ef4
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\MEIPreload\preloaded_data.pb.avos2
Filesize9KB
MD5d3c3cb95577664a9a3563be532f7e026
SHA1f11eb1afb9d630c6c023328b7cd31f327ba5057f
SHA256ce9fd15704aff57fffb2614b66c829abc2b1fc62f9720453c176b7c9aaea027f
SHA5121e8bf6c930a3bec585a529698b5f4ed4beb8a55b836938984a8c242e502fa978137e0496b0a48a3b15cb808ee395767b33825439380f794534ffb664ff494c42
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Edge.dat.DATA.avos2
Filesize13KB
MD5017530463295f9e840e38fd03737b581
SHA11a08aa16140b45fae127bcf99a2e9f90850a5eb7
SHA2564c51b40beffe4b0341164b6919673a093405de25d317616b9e309f7ef07b5e97
SHA5125f70aef4c90e377e5c2a8b6f74a0f30ac12c76d4ef42cd2743162c4b469188a8a9f27fce296c31de788f913575b8c1ebd327628308da6d621691a5a41a4492b2
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\EdgeWebView.dat.DATA
Filesize9KB
MD599a0ba5890a7020910a52f164d2cf9b6
SHA11049b17f222cf213d171f818dd881874be76cb80
SHA25682609435c24f3ac13154866b2f5c594e696df3c627d662b20cd8ed4a31be61e5
SHA512f9637a1ec66b840f8d0ef1e55aa16ba02ab309190e61088cad7714d81800866e0d0fc1b8f2addf6b102e4088d9584707ced3bb2bc79d7c33a02c94fcf90902c3
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Mu\Advertising.DATA.avos2
Filesize25KB
MD520b382f5706ee6251972a844490a625f
SHA112e744cbeef45d27f11fd0b0db0002401327aee0
SHA2561b93b8d8f6526a7c07ea55f03e93eca4491f35e56ae792287bae3c881c9edbc6
SHA5125be5f8138fe1e484898365cf35825bb9dd33dab71f0f8c3da25ced5cb5b7bd78be16648e36e62c1d5da4d775fcf303d62c47b41f64d1b4e55bfd73afafaf7a7b
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Mu\Analytics.DATA.avos2
Filesize5KB
MD565e9d9ba310b20783cf92c4dbede55fa
SHA1e76a7be0af1d2f87398e6ac44bc154cd272eafd2
SHA2565dc177611a1080a80787ca5b04e0327c851e70ffac952a8bd62fa6597ccd2855
SHA5121848f1759a7f097274430a38a67faa2c7137bf2ad25ad6510e200b5293f331e55539ab35a451e32e2cc892f1cdf10d8f115871fee307504b9e440fcd8c9114c9
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Mu\CompatExceptions.DATA.avos2
Filesize1KB
MD57242cf31c3704fef3db9eb063cf3d3b6
SHA1cdb12db6646a0a223e76b512da03186224a23c22
SHA256bf32c82cca6b084ca27bca944255ede1c069d7776934013a2d0ac72765ed36af
SHA51258d56341d9250735ffed8b796764ce7471a0af711a7e85f96740fa96cc43588606689045423c115517a05272c2a04e9da6a13fdaec693d319ccf8000ee329722
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Mu\Content.DATA
Filesize7KB
MD578b4181617a47f432d90dc3e09b8d591
SHA13cc31f40c4b76d75afb507dbcbf02f2a876022fc
SHA256b16650d5995800347c78f78a473c3decf327d14dcce785a0ba8618f7b2c4d59c
SHA512bee3d541f779f28535dbe53611226e72664849aa2fedefe05224f55ca170660ae0a13f0881be6f3452151caee02a2868cc5728804469d228fe5c5ba8ab9f9e23
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Mu\Cryptomining.DATA.avos2
Filesize2KB
MD55d15b8e2e8cd996f0db1b8b350470246
SHA14817e05d8e977c57bceee52251975a507f53e00f
SHA256b20d4862fb9dab06c7995cba7268cf8df66f754032f2e24eb2ff33fc6e1d7610
SHA5127e8aa0de08776568b919f8d3b806cb1d05149071371f767f64436ac1ed978b8ffebeb929f899b1d7b1148bf70ed0c8faf06eb529336a9720dd8cb7348f7656c3
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Mu\Entities.DATA.avos2
Filesize69KB
MD58bf68352e8aacfe9bcd7015d9a9832cd
SHA1e6545bf316be7c8c5f4bb8d77db5d112c95b533a
SHA256d88386e5f262be8082daa1947d026484868e8d028940b0b8fc1610ac0e88acb0
SHA5126480539e16213cd3578801e65b17704868b107b8643febc50a15edde3323528bfb4daad6cbdc42722f1b1def37c2cc09822546b2a5495f23aea4c671191e7f00
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Mu\Fingerprinting.DATA.avos2
Filesize2KB
MD57695312cc06c6b6044a0f2f59717c9a0
SHA11f5cfb974506212dd4c264ca9f5d60a59ecbe066
SHA256d3691ad3812060fc09263bd6695905e11413b14df4fc72fb1131c79c3d0f85e5
SHA5127130f41e058d6ced0702a9349d1a5fe3e9e7a135ec810bf1903684b7c580ffa73ac7cf7d7edb195b0f30f7808f6188bc31847b0493d56bef39ae65fabfe62663
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Mu\LICENSE.DATA.avos2
Filesize35KB
MD515323c51c68f0849231d44c7d6a84e60
SHA142bc22ad5de48cfa8a719e77af6fbdbb00cba180
SHA256e3357bb79028481c435db75bc7d100c1c96181c7a86dc4035e6673f33a0dd6f3
SHA5125891cb6233874f29defaea0318e36916b652adcdc3295753b2035d147fd59589ad87f0540d7bdc9962856f67200606f5d64a5779237099fd522253b3db0e8ad2
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Mu\Other.DATA.avos2
Filesize1KB
MD5245f9ba80d6c738f6790cce5fbd44b28
SHA1d6d63b423fbbed18a03dcdf52742df98922da499
SHA25640bfc715698dcfec103914cf9672db1121e4cd27956b92038246b0224f1401b3
SHA51283012d5fc334790f8cdad6167f704da49977404c50ca09b4c9a85034610a423a09947dd0ac306580f62f04f168ba1e44d7fabfc6b5d1481cfcea666dc47cedf3
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Mu\Social.DATA.avos2
Filesize1KB
MD51946b3ec037a65a2fe1d97f1531186eb
SHA1378dee3433b7f65efc2b58a6998a6917e901b7e9
SHA256293664d4a8330c1298f4257f04a1e9aeb3994b2777dd4dd655229272177d50d2
SHA512ff28d952f5da3b247745a9a3aebfa68596fc7547e489222f9baece2adbe7d0d18ae4a19ccd380c69f398b88f82dd4f91a58c3d71798ff95eb20b7f5d7ebd58ad
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Mu\TransparentAdvertisers.DATA.avos2
Filesize1KB
MD59d2e56b04de1ef1e7937556ad9a63c3a
SHA1e8c460fb60f92af409fe07e54f45af69349b0a40
SHA256b45a19410f314af5461a73e7c8da3b3bf409903f6b85058693eda914f7984aa6
SHA512475275066b4361b6805a89ef21d02256ea4ded59591bef9e29e6e62497e360794abba8e01678b6ce157a5cde4c86fa6cede3facd77b7d69408a07248a37d47c1
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Sigma\Advertising.DATA.avos2
Filesize3KB
MD55e40259d99fb9c0d21a8d737568a5818
SHA1a0245512b58cd6f17d6a82577595deaf183632cb
SHA2560a69d6346bfc123e4901e87de65fa80e061dfd8e6f0b31d7170ecbc6a401b511
SHA512461457328ab72e06d1195294a6166b7bf6bc366dea1cae9861d0ff631a7c9098e32357cc3329ef8808204c1672d15dd1df721dcc3e710091409549ff7b0af489
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Sigma\Analytics.DATA.avos2
Filesize1KB
MD56cc2924719c64c7e0ef7f6818422825f
SHA1faded22993eed586b7cc53ae90eb2d78bb9f92d5
SHA256737f499ce6845b5b3014bf87e56dc89c979c13cad97914531369abfcddb6ec0d
SHA5125a9bbc369c897abe87c554f1934139d9c78f9c4a7956f61c513a7c518ebe000e2e0890ed730c7450b1408b840cee073afea23edb62673319a482d7b49e247a7e
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Sigma\Content.DATA.avos2
Filesize1KB
MD5576933f361fb704bb72ac5afa15fbffb
SHA1159d3b1c47bc23d60d3dcddbc3bb4030a54c1058
SHA256f76fb3e39736237d11fe1edb0e8c3245b0ba30491ab853de065dd1c8e8dd0f14
SHA512ba6a5bfbcbfca18ef28755ea7d8465286cc61bff5bfc9f37f84817c07428dc36c0c3d46d104d3994a14e3cdfbe199efb42dc2a6177f27591bf7b8c9c460dc5f8
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Sigma\Cryptomining.DATA.avos2
Filesize1KB
MD52ad6651355ef577d4130269f9b319cb8
SHA16ae4b583c81cb25d958ad9660599341a3af1f9ae
SHA256c4417662531261a2f4e09b3890bb667ce14ce1fc0e982ee436a523863b78181f
SHA5129476be26c48e6bbbea1ef08d59696f2bab5af53e7f37ccebc62eebad310d262467841f63aa7496fb57ab459bf606439d95f1876c4e99fe3e7f9429bfe37f724a
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Sigma\Entities.DATA.avos2
Filesize43KB
MD51b4bf7c619181f117e8d3f9d2f6617a5
SHA12bbe591da252ee5068e9ea03244e6ec523651b0b
SHA256c76fe15118ccbdccb5ac4f8c0b948fd553cd1511d3e771eaf31c20355169c751
SHA51219b8f4d1f1974a780028814f5273c04ac218c6c80f08f1c9a3a5642abeececf370adc842b81f591ec1ca9d0c32d05c3b4270b83c76ae40a7b28f520a6f42ba6c
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Sigma\Fingerprinting.DATA.avos2
Filesize1KB
MD50e1f33df34d83239d32b2bcb009b9546
SHA17a02777f59b80dbaf8b6af42146871ebad07762a
SHA2568e25ab444d060e2d016a5f70574b98a618a44aa97186fa935aa3cf34955d68a3
SHA512b410ace3e087bde3ae03f7eeb4acb4da14549cde9d7f20500753fc353937af5f3d2e85a70ccc424821a5e31a60bc8f768d08919ccb16a4e429f5ae50167564b4
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Sigma\LICENSE.DATA.avos2
Filesize1KB
MD5d0a4151d98456c13963375525bf400a0
SHA1c588423f6a15c05fb51e43092a18098a93b9096b
SHA25622ed4707e3d8a5e6245b4394dec061d7d3de13ab7097dc308dde53063a5d37eb
SHA5126ff1618d0908ad304ebc76112064ed1b3d787a509a2b2eacee4a219eceae84f6c47f05c16c78cb6e1870e716d27bcf1d4c5a84eace246bf2660faef9f6036350
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Sigma\Other.DATA.avos2
Filesize1KB
MD5a625389fc8082a58964638fac933c9c1
SHA155c4f7be7368de91fc45b960f2588202816e374c
SHA256fa6996dde40eac8a0a3abb84de19a49d5c42f02eb866d8336c9bb37d8adec470
SHA5123547bde6f85cdfc9b1442eac7ec3acf80276a926b15174c6aa05d712eeec5b59c2b775e4907d8999b1b453178383b4f620ebfef51e8e11d53bf10ec1b14a2153
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Sigma\Social.DATA.avos2
Filesize4KB
MD5d175d95519d9de3dd50abe9108522f7f
SHA197776752aaf7d7d271c33a8a64ae76ed1bdb25b5
SHA256da87414bfca5a8ede512a863b8d013a9b5dba3008ba527d380f8ab1feb8e7e02
SHA5120a8b92ed0716319943a4538f6d1f2b3885ccb95fdee1b3c18896d858653916ef8d86c6926d09672bac938c4ad6bcbb62c27792e78a8eb7addfcd8591058fc61a
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\Sigma\Staging.DATA
Filesize17KB
MD519814c42a4b3ea9cf099c9e6231b4516
SHA140c315fe1d872acb861766af57a2b09128106100
SHA256d6a1e22e58da62e89dba5ee42962104e29656e48267b3d658989f5925cdfebde
SHA51285d800a24740f632bacb172f4a7903f1e51f300446aab350f1ecb6724b52da220e25d1eb5b432b6d04808eff47cbed2997dab4189aa3fe3f711c92d053625fd2
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Trust Protection Lists\manifest.json.DATA.avos2
Filesize1KB
MD599db446bfc63f6ad11fd7bdb0d29d32a
SHA1a6e23dd6c500cb9020404ba8a825726b24596466
SHA25647bfe681a0f07dae3ab6d1a21969a2ccbcc41820d88736d9f4b79e11442f9e93
SHA5123c4d9f12fc7b1ff77de5c1408d00d7213158c13f6a8591f0a9483075aa728694e904674c9caeb7681f0771663cccc27eef43db0f88ef91cbae9295d8a91a8729
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\VisualElements\Logo.png.DATA.avos2
Filesize32KB
MD5be0016d8af105dc31504f85c82594e4d
SHA157eba16027e7fcc3e181db5ddf06b16ae5023a78
SHA2568ff183428f2c17aa02c4a7752cf690871c2f805897192449adcb79351a7d6784
SHA51210dc5969a51ec8912c79f5fc91612eaaa72f93fa68355910eea6d5b199406742f19ca3e653d2b2941e45e9b990fac741e07c8f5db38fe7c7f2ae64966623244d
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\VisualElements\LogoBeta.png.DATA.avos2
Filesize30KB
MD56af34e232ea6498ec36f8c404c38196c
SHA182abe5829d4d1e35ced86f461abedf4921805763
SHA2569deb8df3f0d93771b43e57afcdc68a7d88e9b01eb760677252e7de30186a1b6f
SHA5121f9f781a8a6593ad7966c6cfd22c62390ffd0ed042959c4dccaed40ef3450121d3a97030732079936c5bdc551d114f1fa922cfeb023c63940098c6623dda11fd
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\VisualElements\LogoCanary.png.DATA.avos2
Filesize30KB
MD5973189cf16b441285d1593dd258ac074
SHA11ab6a26e3e75197bcde73b247cdba61a20a807b3
SHA256c48ad381b24bf4c925875f552a32418fdc215a8c179c4e07108bcfc4daf445a3
SHA512059a1231f997ad9ce09f4bf1a82b661703b37175c49fc797ffb190af8e1ace1d2b25e23860f5860fa355550a2dfd1ab49215266cfd544b776fbf369a2dffe249
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\VisualElements\LogoDev.png.DATA.avos2
Filesize30KB
MD515fe056e17809d40bad691416bf5a718
SHA1242d88cea18d176948beec384dc7edfafc7c4ac3
SHA256d7fed9141ef4cc6753d5c955c5c121ee6bf9c45ea7cf0d9caff383c98b597742
SHA512db72fa5e992ff242d8f0f1588c63c90ef554e9725e0d1918a254bdc13a384f2f7772bf73cbed994d7486d7d509f2960f7b7d789ee74fe191821ed3b4bacebf01
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\VisualElements\SmallLogo.png.DATA.avos2
Filesize16KB
MD5a1d0c652793d952878ac2f724f693344
SHA15ec08f51c7608d0b4b2d336448bb12e0855c3851
SHA2564e00767f4412bf82a2785ff5ca057a31d1b5ddc10d0a4e4dbd0efeb9bfa41fd6
SHA51295c4ad0a36bd88bc909e5b6187a198cd95b396b53bb443576f9841633ee75dbae81d71266a959c55caa13303236ece7ff47b42872714fcc739fbc22c79328b01
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\VisualElements\SmallLogoBeta.png.DATA.avos2
Filesize15KB
MD5d25c62830d8b01dd2f04a51ad6959dd6
SHA1777936731dc6bc8d4affeba6e3a8064d734f42fb
SHA256f3677a2031b1598bd162a4eb697911d3504b3cf4129443fb5e700d0d68f8c9da
SHA512d877d696af6638170b3fcf78a7934b8456d6f908610ee7aa325c9c9d18b5ef37c0d6149d0be2a18e3884853e2e911f7e126ef4fcd29a0cacd2023867e9ab7064
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\VisualElements\SmallLogoCanary.png.DATA.avos2
Filesize15KB
MD50a469ce4a550e6b276161fe4583dc94d
SHA13dd36d3fa1b549fe379f278c5ff216528e04f055
SHA2560dba7f9629da3fd33705d3b1f03b5431eb628a80ed26b07b606521cd91b9f0b4
SHA512206aea77060a572794f18ee38d855e9fd9e45d37922ee0cbf1ec9924debe6593ff1024a329d840e1dd00e9e374967f06468fea9df3189ac6affc667f5b9d8941
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\VisualElements\SmallLogoDev.png.DATA.avos2
Filesize15KB
MD56be1a0044033077b7e814e65f7297572
SHA17b2cceafbbe3e9c7f2b2d54166263c6f2fece0fe
SHA256225618af4652cc235d6592485fdf12bcd664b07e251355a1f09dd61f71149419
SHA512a0b9286190346e987de77934612dd036feb0a8f2de6a531cddb2ce52fe95b4142696c4fb138f0c12f999de5d4b658308f7836e7c7aeed35fcd45eba56f45ad9e
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig.DATA.avos2
Filesize2KB
MD521c9216b4fce202abc8012e155a72031
SHA12a832944ff06294e6fd3ccddfb7d95bf8b1a5d0d
SHA2563c50e1155c1ba17f96a1ad80e277af9c0234b10bbeab3fbcfe4b5e8724a097ca
SHA512f8e2ab55476b447f082c398813fe74d9425acab67f550553551e9a1ef6aa36b6f2ad4d5a31f726387afd19ccf01dad5ab83463d5b2a72d1bbfa031079f8ae607
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\WidevineCdm\manifest.json.DATA.avos2
Filesize1KB
MD5fa510c9b7eb87995b446e1e87c9094be
SHA16a6e9c94cdaa01195aeaa23eae837344ea4605e6
SHA256317a900b6af58bc4b2f3be356f2189a333c08890c8b22ee2a021e44fe794e4e6
SHA512d1c3bccb4fa7faa2ad6fb1a64afcc9fcf4d5fc1df1d7d68cd021b0ecece404ac72bc8819c4011c0c91c11280651f066a67f965b70938545e094d4d57d3cfc7d5
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\delegatedWebFeatures.sccd.DATA.avos2
Filesize18KB
MD5ef860131152237cefc2f4e62b045c191
SHA16de88aac44744d04aacbc5f312a2d22020aea1a8
SHA256047203d90f3bd18538d327541283825b76dd19347c86fed204e23d32fa3dba42
SHA5127bd9b5e4552f12b660686166f651e920a21f06e4358adaee61419d768705abf20e5b502d5c6186fece8308bc25b023270538b0a407722b68ab7f598036842286
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\icudtl.dat.DATA.avos2
Filesize11.4MB
MD52397eede54e2f69b14b7f94925703220
SHA1884d0e2458fac0c1a5bb9b8fc03f83ece05df528
SHA256f28c4636969d224352150e463003eb1446f1311dfa1f104a2f7d20f78ca35f24
SHA5128e6a1fb03631f3ad4165d2bbf1a5c488d4dcf5f1488881abbc0ab94ce7754ceefb3d9aa798d6c9f6172d1041be2a8a6c50c399ba59f4d93bb3f156ed09379517
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\msedge.dll.sig.DATA.avos2
Filesize2KB
MD5c17e94f95db58bda7eb132e5d3dc526c
SHA1d3ac0beed97fd1b26cf9d579ffaf86ab11719a99
SHA256e7f10b11a1b4dac0685488321924a25136744e0b51951a340d284363310e302a
SHA512f4c4f7cf8f8355d36877dc4c4f9e73381e0485ce5b678f39fe8d8e732dd817c7edc19a69d38d5cd4a2dd3fd25c2d0218721d565844e23a368fa3e08f95847ed7
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\msedge.exe.sig.DATA.avos2
Filesize2KB
MD538d8d569609c503dfc1f9dc4d691d951
SHA1bacf1e38ce402eb2ab0f47de186cc4f58f93f4f8
SHA2565f10780fe60ac41a7ff14a7ce8f2f3393278c2c2b65ab3cc56389912ddd3d334
SHA51209a6d09b9ac05bce13957fb366a59ada0a0d7e48a6707e1555e84b9ae94cc328434d5a3443038b7930fb2fba5309be55395b0b4b6cccf423ffbfca8b22564f99
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\msedge_100_percent.pak.DATA.avos2
Filesize1.5MB
MD511514c8b3ccb551d8ba5452aede9951a
SHA19481235114ac4bca03e2120b5965ac355df43c12
SHA25672d0adba951b4e41dd4ced02e045be4be394f178f94f01cad084937fc7c60846
SHA5126a9943a029dd6a0fe4be8fc3d711550c851009156dbf92f37dc6ed5ca4c9a3850f787404bf2a9991bfaecb33d3ddee83c25be973aad260b53624b50329b11786
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\msedge_200_percent.pak.DATA.avos2
Filesize2.1MB
MD539fbde298ca58d1d50b97f2c2c63e867
SHA13620e3233fb18b99c504643619a5f8512195c407
SHA25635652090fce2a38829037665ff2ec51bb97a2c165464de76a340a41c762f2f12
SHA512e74415c27ab634e7e96a735339dcd402949ad1819e19f5d7618c4d35d98cc72f61b09e373f5d69aa994d393b41f1aa7277130e9d81ec720df2d372628b375179
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\msedgewebview2.exe.sig.DATA.avos2
Filesize2KB
MD58e273aa8d52cf1618535800622651993
SHA1f5dfe375c7c65647fc9ff4abdc05d81b26d428e4
SHA2563091f21175d7d7fdb754fd28a044c89495d72328bd61036599e440245ebb42a8
SHA5123542141701b171cc785b80684033b1a9dbfdc6beffcfec24e3f6a0333372cc0d3d253866ab3f97b1e14a112be5699bed5a7d91dd721e03605f5ec1fa7b95d01a
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\resources.pak.DATA.avos2
Filesize26.1MB
MD5b9084fb01df7a9760f7d5fac1315d617
SHA11308c043f684957a3cbb1cea80cc96ad1c4ca271
SHA2567252c6e1a4df10170f8bbac3cd89a71e1438b832083f92f432c9d60ddb526d62
SHA512266eed46fe7189c9741f00208936120a346344f727e8410ded5e9f54f823f106bbb077d43119f4e99ed6672ef2bfb35375b4a7a3e1d929cce4ad895068bf7778
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\vk_swiftshader_icd.json.DATA.avos2
Filesize1KB
MD50981d23a9ec771d04627845a79e13777
SHA1148be7a0d559f2f5f82fc636740b3055d6cbbae1
SHA256088e4279cf1966460d424110e3d837708c9ab50cfbfd999d8d60cda6bad2cdcc
SHA5123334ab56e262544189be4f292582821509f65ddf67ffca76af9a2e9049a3e5371299fc7994af1e09bbb5ad09dfd35c3bfa86a588ebc5973279cec77834345cf7
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\edge_feedback\camera_mf_trace.wprp.avos2
Filesize25KB
MD5b54049f7ee885102f70ea74aa8ca7d40
SHA1f333e491a088907b4a0028588d989ffa989828f7
SHA256a07a63d96c4af130758074c5d2ed9f9d1de667a075a98e7e2485e29dc2602511
SHA512aea25e96bcdaee6248c04f2b001ef26a695412891f5643eb0d0aa5d3422b9ca2180c4d7d18c58606ac92ab5ba8e6cf3280e6cbef98b59f8bcfa0f43ca465cbdf
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\edge_feedback\mf_trace.wprp.avos2
Filesize13KB
MD5b2c937ee13b0f4b5b5ff643a0ce5ccd7
SHA1d210bf810653a339831a7ea33366bf3bfba7c299
SHA256a5dac1d61b1b84ea7f30c381c0b7364a34277580ef64a0bc74ac6022348b4ba0
SHA512a0fdb3f32269a9836dba2eb164466105ab0231a08ac7e71f3c049f712c78ff70aecb53f2e95b49285a4185ce27c128c63713cb0b90ca4182c38ab80e85d2e88f
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\edge_game_assist\EdgeGameAssist.msix.avos2
Filesize1012KB
MD5db46077e7c34aed805f03f8d520085d5
SHA178cc03fe01f64271b724dbb0288db6b5e9347b3b
SHA256af663afd01e43d4353d3eb54c8aa78d1f89906103bfa14ff496147f263a2e9dc
SHA51230bcc229f7654b2212400a774ef56df0a23b63ab213dde640cb3e02c72966ce79fe0664482f6f9bfaa0504d3678864e9a61fbe948e509107fd096ef2545e491d
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\edge_game_assist\VERSION.avos2
Filesize1KB
MD58155756cd69955780485a7497375d333
SHA171a6d0a4b379af80aab7dbe0b46ff446123d9370
SHA256bc099c8175b80998ec3a4fad6b9046f7e34eb866092d420e4c55e7434101453f
SHA5123d9ed6b1547ac6c0e9039d8aac9a2a45ca30abb373e3854bb555077174ab548eb990189599e0fe8e9c3d54ed32d65b0104cf6337d5dba805281e590ec509be9e
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\resources.pri.avos2
Filesize4KB
MD54cd6587a21b30eb760b0552364dad6e4
SHA1e5fc1c5ee290ce5a533de89be7366f876b1390da
SHA256582596d7727fecfca8389334511436ee2875ef85e7b6ccf21d01de722ab69893
SHA512b512396ebb558ab9a4c4009b8f51e257fa29c9519851a820d6e3c85e9c2def8f1f3e40d5cd91203b57cd7b96f181e5488e516b597d0690bb295fa8458e0289cd
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win10\identity_helper.Sparse.Beta.msix.avos2
Filesize54KB
MD54611208088f998d2661880682c6d599e
SHA1ae78b3402892261d4ea3ea994265855660361c5a
SHA2566ce5da5cbe71ddb89f723e1687c2f8e13e570e9b85e778d0b174809b71e2efc8
SHA512c784165ccd20b69e9a60afe610897f1c67846dd6bfe02106a6e676a48e710146bce1fb540116f671b7aeef5d9b954ebd353a7eb2fac3a9ecf24433420938ca15
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win10\identity_helper.Sparse.Canary.msix.avos2
Filesize54KB
MD5284ac60d82778fe1c8344ca5792b618f
SHA199b916bc67f294e813d03dded01fec5139a51691
SHA256a1bf5a947c40098eab20ab1c3bb8e9d1839a27f90ecac49e5b3435e270914338
SHA512d9c1ece13790b3ff5b672ff8448f72b708bf58f3e7c883ceb8fbe304556d5656264ffabb18f8de03d6aa3758fa8865fd8374db9ef17594163313f23347f08d9a
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win10\identity_helper.Sparse.Dev.msix.avos2
Filesize53KB
MD5ecbde88bb4a7ca97873f1ee88ecb51c0
SHA1fd667e790b4bac7f43aaac87252eacb1bc517336
SHA25603b0c793b604ae58878713020e2744487ccdf8cf52246c66eb58fa7bd4e1beed
SHA512315a537f385bb12a9c681f184868ae41fce3616b3ff07c71f3182465003d5f6669a8af9f344909a02ebea0412da6f3096fe8af94441307e18e8d84a2cc1817ea
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win10\identity_helper.Sparse.Internal.msix.avos2
Filesize57KB
MD5758d002e991cfd5fe5ccf2b9a93214ed
SHA1fdbab24dcefd75253b9e988175a9435b8837f797
SHA2567c9e6c3afc556c5b080e9d7796da31668cb06340124dbd3b2614e40f6324e304
SHA51200809b98082ed3f822067461291372a7dc56a6b4b7eab9bc6cea1648de1fab0adea041f7f866d5778aaa9ba21749b85dcbb6e0123afceddc2e7dd5dd75cc0ac2
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win10\identity_helper.Sparse.Stable.msix.avos2
Filesize57KB
MD54ffd5a362dae5e6dd1ab501655939227
SHA11c29afc07163ecd6ce9c46870e94739bbaaeeab9
SHA256b1a81fe68ed7e6f7b632b0802c48b9d85a8f9c6f751b241a65b7db5f8b5518e7
SHA51217fb412876f26a59e464fa3bb87ad434e6372bc8596482a1b416db57ccbd9fd27e11cccbc90fb9d6e38c0daf9a8dfdd398e16d3b02ca1c5449297f41a8dd6439
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win11\identity_helper.Sparse.Beta.msix.avos2
Filesize54KB
MD50b7dd80e660f8a516c620200317e1294
SHA19cc687d86bc1645cc9b513dd2eee51bc88aaa693
SHA256c5639827dfe701b30654e51453c1e3e0872fe691d89dd572287536f54ce6d80d
SHA512ee0950e424742cc515db41e36aacb05320d0b74720d34a861aaae91ebc1569a2459dbf8a382d33ba9d8627508ab5e07d0c261cd68b7bd4021bc7b0320d1eef91
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win11\identity_helper.Sparse.Canary.msix.avos2
Filesize54KB
MD531de1480b23d97308bf68f0ab3634330
SHA1e73ba65eb92563bddf3c56109b31a875bade4582
SHA25632b03d8d9cd97ec6c22cd18c02d780de5d6d0d473775369012a73c3e5f21867b
SHA512c3d68115a811efe7afd19600d0a4bd3392bb1a14698bdb7dc6ae8bb663b4ec86c83bab2d584aba6e28629f1a6458a82d0c381083cc3b2f3ea1764478cd66c789
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win11\identity_helper.Sparse.Dev.msix.avos2
Filesize53KB
MD5668d7c25f800d53aafc425dd81cbf7d5
SHA1ad1cb38b7c9e5e37520ce0160789c1b09dcc005d
SHA256a08acf5f296e496a02cde90f974fcdbf5e6e3f3b5b9ff5beb3feeb113b7d05bb
SHA512f0a609cf22467e5f5ed5b15f38e769a3d894c645ca813b14bec86054a6cb8affb477fc74332aec92b049fa13da534ed24078c60002edc6c449d8ac7a38e9f7d2
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win11\identity_helper.Sparse.Internal.msix.avos2
Filesize57KB
MD5f8a2b8fe06d2e43b2a33ae0c48de0547
SHA1edef9021a0583561b0e7924b42081339eca660f3
SHA2560c641eb95939d65ff5606f04a1d0fc4aebd6a102fdbd895b222e25ac5245e24e
SHA512045475ba7980be22290eaf26eabe21b1fab7599a85d708727c679284829dd75ea400a483d1772ae720dd46efc9c3253c380fceb064015c9a3d338a46b51ca85c
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\identity_proxy\win11\identity_helper.Sparse.Stable.msix.avos2
Filesize57KB
MD50e1054821a9a7077b0474df932353930
SHA1e51aaf8eb68b62dc75edbb329a4da43f03bbae39
SHA2569894f3f3cf88eda1188aff405ea8a7e5bf241d434587c194482462ebb4614424
SHA5127717a5015b748bd012f38e82c835b3da6731f20235fb66ce551aed15af65626c8be8609b661c17780bf8fd2d5be56c5fc1dc2db75bf26aea49cc0c24b0109c78
-
Filesize
2KB
MD5713ad359b75fe6d947468ec1825202b9
SHA119dcd19f18a2ad6deb581451aad724bd44a592a4
SHA25656572269ec031c63d966c6d3b4712600b908d38826c59c0f9a8225d0a783e9f4
SHA5124df344dec422bed85b186909dc7f9c35126b3bb45e100f18fb95b4a9943ace242479adf5f0194b054d38b67032498f897a5a54b49026efee0c4797cb5a5e54e8
-
Filesize
64B
MD5d8b9a260789a22d72263ef3bb119108c
SHA1376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
81KB
MD54101128e19134a4733028cfaafc2f3bb
SHA166c18b0406201c3cfbba6e239ab9ee3dbb3be07d
SHA2565843872d5e2b08f138a71fe9ba94813afee59c8b48166d4a8eb0f606107a7e80
SHA5124f2fc415026d7fd71c5018bc2ffdf37a5b835a417b9e5017261849e36d65375715bae148ce8f9649f9d807a63ac09d0fb270e4abae83dfa371d129953a5422ca
-
Filesize
245KB
MD5d47e6acf09ead5774d5b471ab3ab96ff
SHA164ce9b5d5f07395935df95d4a0f06760319224a2
SHA256d0df57988a74acd50b2d261e8b5f2c25da7b940ec2aafbee444c277552421e6e
SHA51252e132ce94f21fa253fed4cf1f67e8d4423d8c30224f961296ee9f64e2c9f4f7064d4c8405cd3bb67d3cf880fe4c21ab202fa8cf677e3b4dad1be6929dbda4e2
-
Filesize
62KB
MD5de4d104ea13b70c093b07219d2eff6cb
SHA183daf591c049f977879e5114c5fea9bbbfa0ad7b
SHA25639bc615842a176db72d4e0558f3cdcae23ab0623ad132f815d21dcfbfd4b110e
SHA512567f703c2e45f13c6107d767597dba762dc5caa86024c87e7b28df2d6c77cd06d3f1f97eed45e6ef127d5346679fea89ac4dc2c453ce366b6233c0fa68d82692
-
Filesize
154KB
MD5337b0e65a856568778e25660f77bc80a
SHA14d9e921feaee5fa70181eba99054ffa7b6c9bb3f
SHA256613de58e4a9a80eff8f8bc45c350a6eaebf89f85ffd2d7e3b0b266bf0888a60a
SHA51219e6da02d9d25ccef06c843b9f429e6b598667270631febe99a0d12fc12d5da4fb242973a8351d3bf169f60d2e17fe821ad692038c793ce69dfb66a42211398e
-
Filesize
76KB
MD58140bdc5803a4893509f0e39b67158ce
SHA1653cc1c82ba6240b0186623724aec3287e9bc232
SHA25639715ef8d043354f0ab15f62878530a38518fb6192bc48da6a098498e8d35769
SHA512d0878fee92e555b15e9f01ce39cfdc3d6122b41ce00ec3a4a7f0f661619f83ec520dca41e35a1e15650fb34ad238974fe8019577c42ca460dde76e3891b0e826
-
Filesize
1.4MB
MD59836732a064983e8215e2e26e5b66974
SHA102e9a46f5a82fa5de6663299512ca7cd03777d65
SHA2563dfe7d63f90833e0f3de22f450ed5ee29858bb12fe93b41628afe85657a3b61f
SHA5121435ba9bc8d35a9336dee5db06944506953a1bcf340e9bdad834828170ce826dcfb1fa80274cd9df667e47b83348139b38ab317055a5a3e6824df15adf8a4d86
-
Filesize
3.3MB
MD56f4b8eb45a965372156086201207c81f
SHA18278f9539463f0a45009287f0516098cb7a15406
SHA256976ce72efd0a8aeeb6e21ad441aa9138434314ea07f777432205947cdb149541
SHA5122c5c54842aba9c82fb9e7594ae9e264ac3cbdc2cc1cd22263e9d77479b93636799d0f28235ac79937070e40b04a097c3ea3b7e0cd4376a95ed8ca90245b7891f
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b
-
Filesize
28KB
MD597ee623f1217a7b4b7de5769b7b665d6
SHA195b918f3f4c057fb9c878c8cc5e502c0bd9e54c0
SHA2560046eb32f873cde62cf29af02687b1dd43154e9fd10e0aa3d8353d3debb38790
SHA51220edc7eae5c0709af5c792f04a8a633d416da5a38fc69bd0409afe40b7fb1afa526de6fe25d8543ece9ea44fd6baa04a9d316ac71212ae9638bdef768e661e0f
-
Filesize
1.1MB
MD5bc58eb17a9c2e48e97a12174818d969d
SHA111949ebc05d24ab39d86193b6b6fcff3e4733cfd
SHA256ecf7836aa0d36b5880eb6f799ec402b1f2e999f78bfff6fb9a942d1d8d0b9baa
SHA5124aa2b2ce3eb47503b48f6a888162a527834a6c04d3b49c562983b4d5aad9b7363d57aef2e17fe6412b89a9a3b37fb62a4ade4afc90016e2759638a17b1deae6c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
807KB
MD5e27b5291c8fb2dfdeb7f16bb6851df5e
SHA140207f83b601cd60905c1f807ac0889c80dfe33f
SHA256ffd933ad53f22a0f10cceb4986087258f72dffdd36999b7014c6b37c157ee45f
SHA5122ddbc50cd780ffbf73c354b9b437322eb49cb05bb6f287d54e7dcafb61dc4c4549e37ae2f972f3d240bfa7d2ca485b7583137f1bf038bc901f378cea0c305c6a
-
Filesize
1011B
MD5c92c2b70fb37f84aab38412ad9226aa8
SHA114f2e9a83285612d0a7b2c83b8f89bccfde6c154
SHA256d64639e873c0873b469cd856d1ef4bce7dc14a80fac6fe2bed9d629f05acc77f
SHA51204f9dcb3cd49909712535255b6eadd7fafcb2902bf1abd5a25e9bb5f5c4dc032611aec0a5b0ec89cd7dbc65276b935c54b906b391507d2e3e3aa65466b15f848