Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/03/2025, 15:54
250322-tcp83awvbt 822/03/2025, 15:52
250322-ta25vawtfx 622/03/2025, 15:45
250322-s66bpszmv6 1019/03/2025, 16:38
250319-t5tf7asps4 819/03/2025, 16:34
250319-t24sraywgz 1019/03/2025, 16:30
250319-tz5bhaywez 1019/03/2025, 16:29
250319-tzg6zaywdz 119/03/2025, 16:26
250319-txvdhssns2 819/03/2025, 15:43
250319-s53jesysez 418/03/2025, 23:39
250318-3nfnfatky3 6Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2025, 23:33
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 102 2560 msedge.exe -
resource yara_rule behavioral1/files/0x00070000000242f3-450.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 5148 Popup.exe 4988 Popup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 102 raw.githubusercontent.com 96 raw.githubusercontent.com 97 raw.githubusercontent.com 99 raw.githubusercontent.com 100 raw.githubusercontent.com 101 raw.githubusercontent.com -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping1640_379063605\typosquatting_list.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1640_379063605\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1640_379063605\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1640_379063605\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1640_2079557873\data.txt msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1640_2079557873\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1640_2079557873\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1640_1169789260\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1640_1169789260\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1640_1169789260\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1640_1169789260\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1640_1169789260\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1640_379063605\safety_tips.pb msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Popup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Popup.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133868144056326761" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 35 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Popup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" Popup.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Popup.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Popup.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{885A186E-A440-4ADA-812B-DB871B942259} Popup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" Popup.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e8005398e082303024b98265d99428e115f0000 Popup.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff Popup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" Popup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" Popup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" Popup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" Popup.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Popup.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Popup.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Popup.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Popup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Downloads" Popup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Pictures" Popup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Popup.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Popup.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Popup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" Popup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" Popup.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings Popup.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Popup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Popup.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Popup.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Popup.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Popup.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy Popup.exe Set value (data) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Popup.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{EE70E1DF-4A8A-41B3-BF8D-FBCEEEDF6BEA} msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" Popup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlgLegacy\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" Popup.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5148 Popup.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5148 Popup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 4932 1640 msedge.exe 85 PID 1640 wrote to memory of 4932 1640 msedge.exe 85 PID 1640 wrote to memory of 2560 1640 msedge.exe 87 PID 1640 wrote to memory of 2560 1640 msedge.exe 87 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3648 1640 msedge.exe 88 PID 1640 wrote to memory of 3176 1640 msedge.exe 89 PID 1640 wrote to memory of 3176 1640 msedge.exe 89 PID 1640 wrote to memory of 3176 1640 msedge.exe 89 PID 1640 wrote to memory of 3176 1640 msedge.exe 89 PID 1640 wrote to memory of 3176 1640 msedge.exe 89 PID 1640 wrote to memory of 3176 1640 msedge.exe 89 PID 1640 wrote to memory of 3176 1640 msedge.exe 89 PID 1640 wrote to memory of 3176 1640 msedge.exe 89 PID 1640 wrote to memory of 3176 1640 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Trojan/Mobile_Legends_Adventure.apk1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b8,0x7fffa962f208,0x7fffa962f214,0x7fffa962f2202⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1836,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Downloads MZ/PE file
PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2308,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=2304 /prefetch:22⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2368,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=2344 /prefetch:82⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3452,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:5788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3492,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:5928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4828,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5072,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=4296 /prefetch:82⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5492,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5604,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=5592 /prefetch:82⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5604,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=5592 /prefetch:82⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5592,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=5976 /prefetch:82⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5536,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6184,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=4312 /prefetch:82⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=5792,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=6228 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6464,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=6528 /prefetch:82⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6720,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=6584 /prefetch:82⤵PID:864
-
-
C:\Users\Admin\Downloads\Popup.exe"C:\Users\Admin\Downloads\Popup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5148,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:3700
-
-
C:\Users\Admin\Downloads\Popup.exe"C:\Users\Admin\Downloads\Popup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6496,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=6252 /prefetch:82⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=3464,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=6284 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --always-read-main-dll --field-trial-handle=3728,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=6376 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --always-read-main-dll --field-trial-handle=6232,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:5604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=7008,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=7020 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=6304,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=6820 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5372,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=7116 /prefetch:82⤵PID:6048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=7596,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=7056 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --always-read-main-dll --field-trial-handle=6972,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=7080 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=7336,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=7332 /prefetch:12⤵PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6492,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=7392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --always-read-main-dll --field-trial-handle=5988,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=7148 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --always-read-main-dll --field-trial-handle=5984,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=8080,i,12889859486482957126,8494981900559698327,262144 --variations-seed-version --mojo-platform-channel-handle=7700 /prefetch:82⤵PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
52B
MD58c32b9f390fcc4f061885661dbe797bd
SHA1c681595df03f9f74ec600e70069c879daf2ca923
SHA2561431c36e66b4fc53ca74e9b10ea0213245631ad7543fef183a8dd2720a5b4ab4
SHA512e8bbde18d5de7fe2a8162951d3fe75460efbee71afffb4c0c22f2088dee146fb6bfcccae18d4955608e60a7df716eeb47c0687f45344b45130b368eeaf316418
-
Filesize
72B
MD5a30b19bb414d78fff00fc7855d6ed5fd
SHA12a6408f2829e964c578751bf29ec4f702412c11e
SHA2569811cd3e1fbf80feb6a52ad2141fc1096165a100c2d5846dd48f9ed612c6fc9f
SHA51266b6db60e9e6f3059d1a47db14f05d35587aa2019bc06e6cf352dfbb237d9dfe6dce7cb21c9127320a7fdca5b9d3eb21e799abe6a926ae51b5f62cf646c30490
-
Filesize
280B
MD565044109d1beb8ed8d59560642cbc519
SHA10084485b0aa26069232fab51ee603682e8edfd17
SHA256a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d
SHA51296dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6
-
Filesize
355KB
MD548b35cad85a57fd875454003739ec5b5
SHA1a5188495ad3f26525e2092485688e5dda44ab39e
SHA2566ad1fde7b00a7b93c2cf0aaca70870d8725cbfa3ce3b69ec3df1091297d60d13
SHA512565ff8fb90a7ba20009e5744dd5ba390fd2d430bb7dd54567608173570840b5c6e4ecac2bb3f99bf19b45409d0bafa065d4cf81b28cfd852cc77560b52944607
-
Filesize
72KB
MD53b00a00bae2c66919eebe937465c236c
SHA1b39ae448755d27229f75905f7a7b0729bcc587ef
SHA2567a0f5efc73a3c3ff54e4c298fa39820706d791614eefb74afc63ea8139372f8c
SHA5125698799929b598bd6768164a7aea8b810ed9136a4be70372dcaa0969325f68a4da4208ae84c65d7cc186932f1a61ffab921210a919fff379a85bd93030c874ba
-
Filesize
20KB
MD547356bcbaf8d7b047ab22ee0493c94ac
SHA17b8e0e61000d5cc7aba1f97bf442cc69c4970841
SHA256b75055cdd20938daa0b443c05a00e4aa585d4a278c94321066a7a014776aac4f
SHA512d3493db3baec0baca281e4473c609139d8b79ee5fe7f3d8c7bc8ac3459b4b374342a77288acbbf109544d090a7fde7f68cedaa50c5ac959baa9854df21d6eaa7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD5487b418b7b1d5bfdee7b81e98f270eef
SHA12dd6419242536aff0054a5b47ed07500d8750787
SHA256ed9ff780bbcd02124a0325e947a291ddb3b5d733db29e3707907df3f2c09917d
SHA5122bcd4dd302b1749296576e75e11bf18a4b62e949815a372f30d16fa761292bea3159bdda1fd489fbb4c6726ae70b4aee9d725c7762da8304de267866bd921856
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57de2b.TMP
Filesize3KB
MD5b249317737ece68d013d96c8eada6e79
SHA11146bd1aa147583df8c274b4f93b20f181be1310
SHA2566e05d0db47b525f0e83933180b21bc8844739d52246c6cd2c16cf9a8a6b864a3
SHA5124c89e230597e6b845c70aaa06038c6f7473fc04bf0b3c15f1fe961ae67529d7a17e6edadbf160f19736abf20f65a16985ac95382abf7fcf133b86e25441b2613
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\LOG
Filesize343B
MD5764845acf6cad840c9762a1dde19d842
SHA1db6ecac2db5e9df387fed4e4289363cf177ea212
SHA256def2a34e3274e4eb9a97493aa4c7e4ce1052b5b73d8d54f6339dbd59c29e2e72
SHA5127796d3c3005ff8697e96baf13ee45c5051ac10a715e73e8d3899f0f4c2589ab403c1496242ec012dafc8d28d1fa49c821300ef20a0fd5605ce11b113d289d425
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
10KB
MD5ad602b78b2c407ae9eeeb831e830cab2
SHA17d0f80c8f13475017ce7b15c0b315e95c4374891
SHA2569f3500cc36bed76917aeb4395b1966992b2bd56831e61f9dd69858781a8e1e04
SHA512b3b651d56dcefad04f173c99b6458a723a4207ecc6aa1cb9856c11eda3efc97ed9cf77e31c1aaff1ce41b70608481cb2908c4e06d12236cb1a6a5735244d3ef9
-
Filesize
2KB
MD56b12aa1b4afc1250c8c123857767846b
SHA1a3ece3ae2f4043c68a94b5528494f0ee4f477fa0
SHA2566d02609458855cd65c652283abafbd0e5a4bfd873916ffb7e4f1fcc0a57b9c05
SHA51288f515edc93eb3cfd396b821b925666b9878e1e9b72e1f7f98407067d7d853357d0bcb94e6f7fcdd0b9e3c120b1349468e6aa70470b7868f38316b7b1995ddcf
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
19KB
MD57f3234869ee2a9a92ead8d29afb76cea
SHA128a7de2e668f0a7204d2457435f42dd2acfb27a9
SHA25624b2a0891275f957352597e404e3a3bd8fd2e2028e5128d35a22546590260ac1
SHA51281606a1db8cda8d9cdd7a8957800500b36eb024838e0b5b92c578b80bcf077a6b32468a9d9cb31d51052050fdbe2be2c5831644dd3cca907fa87a27e22c7541e
-
Filesize
19KB
MD5b948e4e1b4240df76b0a466990298677
SHA143f0fdd797a376c85059003d517c9dea550a56f9
SHA256ca6fe1b72741a9fda0a9b09b44338993b678cfd8e2bcbaefa0ef3d590401aedd
SHA512d8bdd6e792aa80958f3957bd338e11e91597dcb1ae1bad8ce710ec1ba1dbfbbbc2fb6413c00fae3eb849c5750ad440791a64149862238a526573a081f8002920
-
Filesize
16KB
MD5b214c46f579dcabb52f45e8d3f22798b
SHA13fb9a641a9bb4a1bbada14bb43b8284cb05cab65
SHA25686e6c1bce0dc376397843b76a1cbc3ab0f31a3604fc71a294b2fff5f511436c3
SHA512a02365c6764e9f543b5d44a6362760f36fa5bfdfb42d83b718bd82b7024023a9a3d6ddb67cafa91bd39fd350c363d72906b8626a75795aac4bae7f82f0c414a6
-
Filesize
36KB
MD5dfe3b2b5dca31ec5b1b3cb367840c169
SHA1f43a212dccbd4c6bddc403b29cf4a9c2b67f0a7b
SHA2568907b34732cfbe2d2452947f8b88a48bb01dd74789aac6a4ab4bac0a9dacbd64
SHA51275bb76be9ff3d919a719af14405f21fbde415ccecb77c1a53ba23405a4cdb5627ea1bfba59025993864d880954fa5a8b3123483aeaeebde5d4d1dad29398709f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\0664cb19-ad22-4ed4-b2cd-7c7d2d8a1310\index-dir\the-real-index
Filesize72B
MD5ee924520a587372b67161aed2d4d21fa
SHA1c58b2f725aba8d0e620a8410ee508ba0ab71bf59
SHA256df52f3ce4aef5266a12d3574f40318622a7024fa83004665d77063da624703d5
SHA512ada274377f20e52a5f3448b30b73d6f7bf3ef02369b0d8407280ed7779d62b53fa9c0b2a655e4395a2c3b85a75b3afcba051f92d05b2e530f6b35820da9b55c8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\0664cb19-ad22-4ed4-b2cd-7c7d2d8a1310\index-dir\the-real-index~RFe5928fa.TMP
Filesize72B
MD55e1459bd9056728873ec9db69c07aa49
SHA10f3cd8d15823a4121fcf51cd074ab12b35b3808d
SHA2566bce55e5cef57294ee29667b9e41b7ebea7879111a63bb6ae157d02cf64a6044
SHA512e10509b55fb51532cff00dd3d7c08e6c4c8e0581a516fecce173151196b3944cc6dbc502a0fd8ef0ffb12c9fdc509adbf7994bb19d9425ecc1a25f2c9cb87080
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\aa960c8a-829f-4ded-889f-c5a553abdce6\index-dir\the-real-index
Filesize96B
MD5d401b8cb55778c3be5fa9dd742e6acec
SHA121746f082b35374d1980759eb4b43f4cc65de093
SHA25612875613d0bd98a21e799252fdc59d7f310d7bfbf77bc490ec7c683cea0f3756
SHA512286fba2f4190ba24fdc2bebe7f7d3a0c5241b9088473a53217144c26e5f9eb3c179a987c258071ddbf7c5c56611272c0fe9a514a1859db75be2e5cd79751f028
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\aa960c8a-829f-4ded-889f-c5a553abdce6\index-dir\the-real-index~RFe5939f2.TMP
Filesize48B
MD51fac00315419aca00682b88ac64bc9a6
SHA1c1cb327ad5d1dac4345d119450d9b4b33d1ed711
SHA256dc3650004ad22b6663aef0a20bfa031ebb715787a6c5cab2970f6a1cd8520341
SHA5127e6ed332938c34bbc850d83fc9edf331f20188b0be9ec7023df805611ba182fb23ba243884cae09a6676813296c6da3def0bd924a66a15ec48f989ce1c5625cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b063b10c-aa74-40e9-8097-2e7a6b21975e\index-dir\the-real-index
Filesize2KB
MD5afa6caf4ac44094ba0c7c0c5f112be59
SHA1788a703d081fde6a5be8894c44f899ac80295de6
SHA256e95bc07cff4ce6b49b46ab2dbeee21b0bb9c4a61e0ca9db03968a5ae782f14d6
SHA512237f2a76e2e86cff9e4c672e8432824fbe46871506041a871b701cba8a460b4d0ee47885909a4c9db9817368c2d35661b0a8290995da6f6daf499d7df0ce636c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b063b10c-aa74-40e9-8097-2e7a6b21975e\index-dir\the-real-index~RFe593f9f.TMP
Filesize2KB
MD5dea4350224faee401c217b308308df60
SHA1146f9e16e0342a0e383c4f4edaf51fc9fed729c3
SHA256f0f1df570bd00669176876aae4ba04e910030a0c0163aa2fd06d752bf3f7dd8e
SHA51224b33fcecdc15681f260d0ef9639e9d8f58132400948d6a01814ce3818804f3687fb2515547a7497f52b8b2388108236768893b4dfaade5716c45ac224360ab3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b90a9dce-b22a-4b5b-8760-65ac93bf0dcf\170ce29fd1bcbf73_0
Filesize57KB
MD50d7e4662419bf5b6552394a3aa3b637d
SHA1344659be82f3e2c67b41d7332cb4b7a568bde007
SHA256a612834a12d3d5a03ce26c7c3efbfd864ec33406086966215d467fc7b8b267a3
SHA5122aaf462da1a4b51e260e63bddb08a075dbde9ce524416dde5e6bddca47b81b293dd733f827aae31e902d87844ecbe61ab0815a76d74911c374c23dd86c4ddbc1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b90a9dce-b22a-4b5b-8760-65ac93bf0dcf\index-dir\the-real-index
Filesize72B
MD5a1078cba552a428c3f9f8dd1cb874d9e
SHA185f54ceba831923cb5c24ef5c2e0eec6bc9edf10
SHA25684c6acf7fd576f2d571336af576db5d1c809663ce8321ac01e6ce9af555f3751
SHA512a2a5249dc8bb40c9d86cb2b75a8f49cc17670db9ce79f5ba5e31b6a476a923dcd6d2da1a2aba9a2b04ba716b850ee395f1df631dc8ac4060663821f77165b307
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize327B
MD5ad9b3fb13381442346c6d1a9bd2e226f
SHA18db8b70d3a2a445d167cca11a5214fcee6e82550
SHA256de3afa2a8954dba4abfbb99ceccd2703d368f048aeb3c03a1c2caea0318d4fac
SHA5128976bd6fff6787eb267dc305eb4e9216de9278b1393af733b47a6f5e6457f32710349fbe55b35e60d58ded1e7905328b70e47660f2a24ee7947ef476191f705f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt.tmp
Filesize322B
MD5628cc5654ab964700b1c2a2b3228428d
SHA174d94b9ccbd23b523c0ab700a90f7826bc1cc34b
SHA2569c330f58eb3e28fb77f53ba818af538f8dde0555f217603fe4949ade3c89a00a
SHA5121cfbd8021c06c081c1b1e39de32cb0a11faa9738f65a469456b711c0bf59ea68388c2c175838fcd36a26707d56028771ad84697e018109179e6e718628957dae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD50164e4e49522767fac0eed8a60829379
SHA19682ea228086a76f4871a32f173f0aa480ae3535
SHA256d56a902cb2f570afe3fed9c2d16ed35a784f6b4134b3399bf5c0fc9f255407cd
SHA5124b8c210360f29b4ec23fa1a0c2178266abd6fc11ce66b27bcdd684e6066a0234e24f6c8037079bae275b423035bdd547e59b5ee74e1464244b4fa4538b90362c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe593b69.TMP
Filesize72B
MD53235a6afd71192d6cc44088bd4e65499
SHA12b2b1eb1bf11236f294abadb64ec4e5fb4c380b4
SHA256a2415bfc9578e0d3e4217aee8f13ba376d7d37b00c648d8458a5ce65203b1e77
SHA5129f320b62cbc101b06f993f9524af9453d06508210d10c4a3c835107e502cc6c0308ea4ae3b07dcdf9baa1fa122f96bd51a905971b609e6e67e7229b2f7af79f7
-
Filesize
22KB
MD521f2fd19a0336cdc452b0507182fea88
SHA13ed48a83bc25339834e22b961c711b1792280f71
SHA2562d5cf7e987b9f40228ae201d2e0b39ed289316e405c1cdaeaa06730ca418dbcf
SHA512128fa32fb16239d997895ca93e1f88adbbafb791547af0457d82993f872cb1a0366963208a5bcf0f9595f67731e77db98d5c3a46308f1f13701bc86147c3c934
-
Filesize
112KB
MD5fd8717bad7cd0f60163e7c2b05210aaa
SHA11dd620b2a4b49d16a63d3b73495bbb0388cbdbc9
SHA256d5facea6ed705ea08962d52a30ebf38f6d42aea50a7af21b103d0388b7dae34a
SHA5127b3d3867977b04efce86c5cce45ae0125d25344fa85347a83977faaa9ecd205774a976be63d6af48b953b4ca355405aa090d6db482073f77d71607c948acb5ad
-
Filesize
469B
MD5ec1aace3dbd7704acc1449fd3759b527
SHA1b40d3cbe69a4ed2e59c07e3a212d8d14e181c4cd
SHA256c7f4a8e5ad74b868e86198ca7ba7608d99698dc2b9b12445cced63bfb1b9181b
SHA512d34407f169f7ccb0a0ac3abc8c1da3934d28ffd849c9d78d1e66c84bb8c263bf77e608b4c505fb4c60ed82a3abb98f13c1dad088dea017a2738dbbd30cb2e4a3
-
Filesize
18KB
MD56c3ad621bdb9d868bf12fbdee2b964b4
SHA1952836dc46837ce49ddae296e36202a463146463
SHA2567b0af1b64077f6ce4d22d61c1216540dedb154c2bca169ffeb0e32cb723f7484
SHA512cb043dab8495af3e8291b9583a2d6e38590217defcb2b71f5646956995840da0e5fb27fb6878e03a83ff8713d9fd6cca6ddb2ab97e883ce1c4f48a9fb7d7ba72
-
Filesize
904B
MD5a04505358095a6ac423d6f0e01adb738
SHA105985e7b93a5f114452ad2ea2245e6b833f574f6
SHA256055848ddce73fdb1b0541f2bf5b4743f88141e46c0a597d04cacd884d7aaf1a8
SHA5126d52235c19f39b5787a052e4eb303983ae017ac7eadf20298b833a67ec819665248327d5a8f0d4e4919bfe6d7c47c40d9f174015fa867376e5cfe837022081e6
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
55KB
MD5ed779baac876a73bb2220b52c0a52774
SHA14ffc2ad07d0e42212897316f713873b1c4264dd4
SHA25689045847e432bcc958aaded4fbc2c58f375a3cb643a5063727d65a1a953f611d
SHA51287ebe27e140c4bcca5280918f37f0b708821fff9027139f445eef24a14369045785cc7c562a9ac801f4bc4f246dac6e3755bd4c298830d95a3e9c30c28586472
-
Filesize
49KB
MD5587e0f9bfc8f13f3db01b6a9571441a4
SHA1a8f49a4ddc586af41fa57e5253642e411ddd51c2
SHA256bfdbfbe87d39f3c9be6fd31ef93bf646a80836e926d614b33102b573837b572b
SHA51269520a615845beeaeb9d568053be7f0166db153fac4f8164257ad44013cb4024f85f649971f46ec5fa5b6af0c3fb2fe65ee4713b833a2bd9976bccc5cae39ab7
-
Filesize
40KB
MD5c2da2833369559109e21aac39bdd6bd6
SHA1940f02965b750da3af60892607e928c4fe532658
SHA25644a07c6216dc1e8801c402ffc50b430c48bca6d7e61ddb3ca10156b64a512dcd
SHA512ea5cb2170e19853446357c54db5ddd3bf3728b6ec618ed2f96074cfeba24e065b5a0ea91e1d73cb324653ee7a061cf74bc2bfce439b07d9bb385ff20b8e5f1bb
-
Filesize
49KB
MD52bb3d9adf27777337c17fceb710d063b
SHA15d7482f0b2a6e1ee8b08dc2fb3b9360876543f84
SHA256c8d2fef29c89a0f21214ebd1853c63531b39b6e985704811336108bac7859d0c
SHA5124818b83cbb3f342fd1db03b7236ee8a69656237a113a86b44795266befb0ee3e7ada1ca9078ef746d095d6f7793f0001619a5e0a68c0b0456700c5f2c357a8a3
-
Filesize
54KB
MD57c34fba627f39b5044bfa7fc0ead5ada
SHA19e938961d820bca908eeb366a2ae04c84405b9b8
SHA25640a1284cbfb56b682804e45c088200b9c8f2431bf25afb840b24096013fbc857
SHA512142fb66d89d61c1de2dde03b7daa841404f492ad47a824074c86bf9ceb7ac17804d2fb14a5205c0b6fe746bf0344e39c2dcf2171e6c21fd507528a1cb39d3c38
-
Filesize
392B
MD506e664e13bd907a25b34e40f5894e2b5
SHA114ebac2de088c01bddfb9967f058dc6aa5833f7c
SHA256fbaf60c3cb92b84b26e46768c6b4bac6eae2db43d6060475822afcbfbd761873
SHA5125c1e78000d0830d44d24b4ba69b691ac6226ea0cb9ee8e4f70512b870c3b5f78da6871850774345bb084f93d05dcc275a77937e81a3472fae28d15dfd87927b6
-
Filesize
392B
MD50f52df7598606b7f1d80d866001b3ac7
SHA18823d0eb68be5e7065e492b70364de9af3a07570
SHA256d0512d2b2b6cb3f417588f0e330bc43d412230834e933cf10fcfde147452cc4a
SHA512f11913867430ed92ff7746699b6375869b28475cc5590d4fdb1c211598da1985997641a934d3a595744b7d74b96ad990b63bd1559ed54539b1ec517c5587a0de
-
Filesize
392B
MD5cf31ed8c6595b5ffb1e2877a0cb41260
SHA17ee0ccd6c5c549d74e6cae578acb22da6baa40c1
SHA256b0d3adac84b121dbbf12d0830e9be986a7732edc48d1a54cfedc4ec7e72f95f0
SHA5125628e51f16c0f95abb0dff37bb826bf62a0eceac0f62c6701ca44a1bd513bcc24fcc1415830ccbea71819a2940aef8c54c88b6484a04cc2a05321d0bddf358f1
-
Filesize
392B
MD5e27bf9169d92fe9c9a277d1d9f036b8d
SHA14170dab0d7d69a79d809c18e9e17170794153b00
SHA2569ed1048120e96617df53e884ba77fc0fc7d669fe8ef34b5acbbf4937768243f3
SHA5125ae5a7396eaca4b84a99c378dc739e26049a9f921c49dac0e603fffe4d78fbcfcf88795f8a0e51fc9a9d95d6ec290e1c65d97a3c053556dbe4c5019b8127f1be
-
Filesize
392B
MD52e534221556e00ba4202b8906ce52ad7
SHA15422b46b89b4a4b9da915d074b2706c9794917eb
SHA25655687bdb35dbba2a5fe132a3c87fbca64b4c5c22d0842d74bfcaca3486a8ab52
SHA512c1bbaf8951196d2847f21053f6de2dde149b403b29029b4664dce8b52a5d967b36bd05f760bcbada87916f9ab5bbcb7994e53e2d6ea6aa03534a0e58e373911e
-
Filesize
163KB
MD5bd6846ffa7f4cf897b5323e4a5dcd551
SHA1a6596cdc8de199492791faa39ce6096cf39295cd
SHA256854b7eb22303ec3c920966732bc29f58140a82e1101dffe2702252af0f185666
SHA512aa19b278f7211ffaf16b14b59d509ce6b80708e2bb5af87d98848747de4cba13b6626135dd3ec7aabd51b4c2cfb46ed96800a520d2dae8af8105054b6cd40e0b
-
Filesize
3KB
MD517c10dbe88d84b9309e6d151923ce116
SHA19ad2553c061ddcc07e6f66ce4f9e30290c056bdf
SHA2563ad368c74c9bb5da4d4750866f16d361b0675a6b6dc4e06e2edd72488663450e
SHA512ad8ed3797941c9cad21ae2af03b77ce06a23931d9c059fe880935e2b07c08f85fc628e39873fb352c07714b4e44328799b264f4adb3513975add4e6b67e4a63c
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5e26ee9b95ab83ab1460e386bd08e919b
SHA1899fc9a4749e2a5d2386b3bb8995a297673b98d5
SHA256b8524b115ff86e163a41061c9e627dbb08731e6901c5fcfcee90adac582c70dd
SHA512e8f6c03ad7957baa2f9ac5fd8b7d9eb2a64e516eeebcf0419ff153081db1902328b92b087950e990b308010951297458954af29a0497f56d9d1fb7c2fa30387b
-
Filesize
373KB
MD59c3e9e30d51489a891513e8a14d931e4
SHA14e5a5898389eef8f464dee04a74f3b5c217b7176
SHA256f8f7b5f20ca57c61df6dc8ff49f2f5f90276a378ec17397249fdc099a6e1dcd8
SHA512bf45677b7dd6c67ad350ec6ecad5bc3f04dea179fae0ff0a695c69f7de919476dd7a69c25b04c8530a35119e4933f4a8c327ed6dcef892b1114dfd7e494a19a7