Resubmissions
27/03/2025, 13:07
250327-qcpqrastdx 1027/03/2025, 13:06
250327-qcewjsstdw 627/03/2025, 13:02
250327-p9s9rstry4 10Analysis
-
max time kernel
203s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 13:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/whizkydee/Awesome-APIs
Resource
win10v2004-20250314-en
Errors
General
-
Target
https://github.com/whizkydee/Awesome-APIs
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, wscript.exe \"C:\\Program Files\\mrsmajor\\Launcher.vbs\"" wscript.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" wscript.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wscript.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\disableregistrytools = "1" wscript.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file 1 IoCs
flow pid Process 318 2272 msedge.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 7zFM.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation BossDaMajor.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wscript.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 3 IoCs
pid Process 3792 7z2409-x64.exe 4276 7zFM.exe 2824 BossDaMajor.exe -
Loads dropped DLL 3 IoCs
pid Process 3340 Process not Found 3340 Process not Found 4276 7zFM.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "C:\\Program Files\\mrsmajor\\Icon_resource\\SkullIco.ico" wscript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 201 drive.google.com 202 drive.google.com 348 drive.google.com 349 drive.google.com 46 camo.githubusercontent.com 47 camo.githubusercontent.com 50 raw.githubusercontent.com 52 camo.githubusercontent.com 54 raw.githubusercontent.com 242 drive.google.com 51 raw.githubusercontent.com 53 camo.githubusercontent.com 200 drive.google.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\zh_TW\messages.json msedge.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\7z.exe 7z2409-x64.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\ko\messages.json msedge.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 7z2409-x64.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\ur\messages.json msedge.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 7z2409-x64.exe File created C:\Program Files\mrsmajor\Doll_patch.xml wscript.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\en_US\messages.json msedge.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 7z2409-x64.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\page_embed_script.js msedge.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt 7z2409-x64.exe File created C:\Program Files\mrsmajor\def_resource\f11.mp4 wscript.exe File created C:\Program Files\mrsmajor\MrsMjrGuiLauncher.bat wscript.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\ms\messages.json msedge.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt 7z2409-x64.exe File created C:\Program Files\mrsmajor\def_resource\creepysound.mp3 wscript.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\cs\messages.json msedge.exe File opened for modification C:\Program Files\7-Zip\History.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt 7z2409-x64.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\bn\messages.json msedge.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt 7z2409-x64.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1982855811\sets.json msedge.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt 7z2409-x64.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_2026622064\manifest.json msedge.exe File created C:\Program Files\mrsmajor\def_resource\Skullcur.cur wscript.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll 7z2409-x64.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1553593988\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\ta\messages.json msedge.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx 7z2409-x64.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1793774709\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\pt_BR\messages.json msedge.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt 7z2409-x64.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\fil\messages.json msedge.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt 7z2409-x64.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_74613822\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1067703153\_locales\fr\messages.json msedge.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sw.txt 7z2409-x64.exe File created C:\Program Files\mrsmajor\reStart.vbs wscript.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 7z2409-x64.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1793774709\manifest.fingerprint msedge.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 3168 wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3280 4964 WerFault.exe 171 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z2409-x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BossDaMajor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\Cursors\Hand = "C:\\Program Files\\mrsmajor\\def_resource\\skullcur.cur" wscript.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\Cursors wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\Cursors\Arrow = "C:\\Program Files\\mrsmajor\\def_resource\\skullcur.cur" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\Cursors\AppStarting = "C:\\Program Files\\mrsmajor\\def_resource\\skullcur.cur" wscript.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133875541589234172" msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "233" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe -
Modifies registry class 35 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings 7zFM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\DefaultIcon\ = "C:\\Program Files\\mrsmajor\\Icon_resource\\SkullIco.ico" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mp3file\DefaultIcon wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2409-x64.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3342763580-2723508992-2885672917-1000\{F5FC82EB-D1E8-47AB-99B1-C86E9D531933} wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip32.dll" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\DefaultIcon\ = "C:\\Program Files\\mrsmajor\\Icon_resource\\SkullIco.ico" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\DefaultIcon wscript.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3342763580-2723508992-2885672917-1000\{76D892B2-8690-44B9-9D67-36C29E94ABB5} msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\DefaultIcon wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mp4file\DefaultIcon wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mp4file wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "C:\\Program Files\\mrsmajor\\Icon_resource\\SkullIco.ico" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mp3file\DefaultIcon\ = "C:\\Program Files\\mrsmajor\\Icon_resource\\SkullIco.ico" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mp4file\DefaultIcon\ = "C:\\Program Files\\mrsmajor\\Icon_resource\\SkullIco.ico" wscript.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4188 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5440 msedge.exe 5440 msedge.exe 4276 7zFM.exe 4276 7zFM.exe 4276 7zFM.exe 4276 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4276 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 23 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeRestorePrivilege 4276 7zFM.exe Token: 35 4276 7zFM.exe Token: SeSecurityPrivilege 4276 7zFM.exe Token: SeSecurityPrivilege 4276 7zFM.exe Token: SeShutdownPrivilege 2060 unregmp2.exe Token: SeCreatePagefilePrivilege 2060 unregmp2.exe Token: SeShutdownPrivilege 4964 wmplayer.exe Token: SeCreatePagefilePrivilege 4964 wmplayer.exe Token: 33 692 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 692 AUDIODG.EXE Token: SeShutdownPrivilege 4964 wmplayer.exe Token: SeCreatePagefilePrivilege 4964 wmplayer.exe Token: SeShutdownPrivilege 2824 shutdown.exe Token: SeRemoteShutdownPrivilege 2824 shutdown.exe -
Suspicious use of FindShellTrayWindow 45 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 4276 7zFM.exe 4276 7zFM.exe 4276 7zFM.exe 4964 wmplayer.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3792 7z2409-x64.exe 3792 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 5724 220 msedge.exe 87 PID 220 wrote to memory of 5724 220 msedge.exe 87 PID 220 wrote to memory of 2272 220 msedge.exe 88 PID 220 wrote to memory of 2272 220 msedge.exe 88 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 4588 220 msedge.exe 89 PID 220 wrote to memory of 2724 220 msedge.exe 90 PID 220 wrote to memory of 2724 220 msedge.exe 90 PID 220 wrote to memory of 2724 220 msedge.exe 90 PID 220 wrote to memory of 2724 220 msedge.exe 90 PID 220 wrote to memory of 2724 220 msedge.exe 90 PID 220 wrote to memory of 2724 220 msedge.exe 90 PID 220 wrote to memory of 2724 220 msedge.exe 90 PID 220 wrote to memory of 2724 220 msedge.exe 90 PID 220 wrote to memory of 2724 220 msedge.exe 90 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wscript.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/whizkydee/Awesome-APIs1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x260,0x7fffc867f208,0x7fffc867f214,0x7fffc867f2202⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1784,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Downloads MZ/PE file
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2404,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=2400 /prefetch:22⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2460,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3492,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3528,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5108,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=1660,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=1668,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=3628 /prefetch:12⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=6012,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --always-read-main-dll --field-trial-handle=4292,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=6196 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=3812,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=6168 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=6328,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=6480 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6508,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=6088 /prefetch:82⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5260,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=6064 /prefetch:82⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7160,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=7172 /prefetch:82⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7160,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=7172 /prefetch:82⤵PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5976,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5528 /prefetch:82⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7144,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=7172 /prefetch:82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5920,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=7244 /prefetch:82⤵PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7212,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5688,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5900 /prefetch:82⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=5880,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=7328,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=4288,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=3788,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=3760 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6092,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=6544 /prefetch:82⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=6532,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5740,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5768 /prefetch:82⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --always-read-main-dll --field-trial-handle=4024,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=7624 /prefetch:12⤵PID:5512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --always-read-main-dll --field-trial-handle=7864,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=7580 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --always-read-main-dll --field-trial-handle=5964,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=7776 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=8144,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=8180 /prefetch:82⤵PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=8212,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=8208 /prefetch:82⤵PID:1732
-
-
C:\Users\Admin\Downloads\7z2409-x64.exe"C:\Users\Admin\Downloads\7z2409-x64.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7768,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=8140 /prefetch:82⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6384,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --always-read-main-dll --field-trial-handle=6080,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=6636 /prefetch:12⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7828,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=8248 /prefetch:82⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --always-read-main-dll --field-trial-handle=5476,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=764 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --always-read-main-dll --field-trial-handle=7232,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --always-read-main-dll --field-trial-handle=5752,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5700 /prefetch:22⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --always-read-main-dll --field-trial-handle=8120,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=7988 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=8284,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=7072 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --always-read-main-dll --field-trial-handle=8152,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=8436 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7656,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=3424 /prefetch:82⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5728,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=6668 /prefetch:82⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3468,i,14294361625137185879,1348999612548234740,262144 --variations-seed-version --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:5544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2060
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:4944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:5064
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4760
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\BossDaMajor.7z"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4276 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO4B007CC9\ReadMe4urSafety.txt2⤵
- Opens file in notepad (likely ransom note)
PID:4188
-
-
C:\Users\Admin\AppData\Local\Temp\7zO4B00401A\BossDaMajor.exe"C:\Users\Admin\AppData\Local\Temp\7zO4B00401A\BossDaMajor.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\system32\wscript.exe"C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\2D3B.tmp\2D3C.vbs3⤵
- Checks computer location settings
- Drops file in Program Files directory
PID:1488 -
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"4⤵PID:3880
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Program files\mrsmajor\mrsmajorlauncher.vbs" RunAsAdministrator4⤵
- Modifies WinLogon for persistence
- Modifies Windows Defender DisableAntiSpyware settings
- UAC bypass
- Disables RegEdit via registry modification
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Access Token Manipulation: Create Process with Token
- Modifies Control Panel
- Modifies registry class
- System policy modification
PID:3168 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" "C:\Program Files\mrsmajor\def_resource\f11.mp4"5⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4964 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon6⤵
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT7⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 23446⤵
- Program crash
PID:3280
-
-
-
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" -r -t 035⤵
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4524
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x344 0x46c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4964 -ip 49641⤵PID:4392
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa38e8855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3792
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD588518dec90d627d9d455d8159cf660c5
SHA1e13c305d35385e5fb7f6d95bb457b944a1d5a2ca
SHA256f39996ab8eabdffe4f9a22abb1a97665816ec77b64440e0a20a80a41f0810ced
SHA5127c9d7bd455064d09307d42935c57de687764cf77d3c9ba417c448f4f2c4b87bcd6fea66354dfe80842a2fa3f96c81cc25e8bf77307b4ace1bbe1346cbe68435f
-
Filesize
1.8MB
MD5c4aabd70dc28c9516809b775a30fdd3f
SHA143804fa264bf00ece1ee23468c309bc1be7c66de
SHA256882063948d675ee41b5ae68db3e84879350ec81cf88d15b9babf2fa08e332863
SHA5125a88ec6714c4f78b061aed2f2f9c23e7b69596c1185fcb4b21b4c20c84b262667225cc3f380d6e31a47f54a16dc06e4d6ad82cfca7f499450287164c187cec51
-
Filesize
967KB
MD54eaae49d718451ec5442d4c8ef42b88b
SHA1bbac4f5d69a0a778db567e6978d4dabf2d763167
SHA256dc4fdcd96efe7b41e123c4cba19059162b08449627d908570b534e7d6ec7bf58
SHA51241595b67c8506c054c28ce2b5dec9d304651449464c6e1eb092a049d49326594584900cff4e9b8210ca3ad8a23e9c22d8df1ae8af15f44a69f784cc546fcced3
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
53B
MD522b68a088a69906d96dc6d47246880d2
SHA106491f3fd9c4903ac64980f8d655b79082545f82
SHA25694be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88
SHA5128c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff
-
Filesize
118B
MD5bfd928cc511db8e8550a3e5a00cfe169
SHA1569543caeacc652b8a78bc1aee3ae06027456eb0
SHA256c49d97c9219d36b85b6541c049f1fb766a6b587b064253ea7a2a4daf3cad64e3
SHA51294ba54500dafee7013cb90c921509f1be94de9d9ad4825aa0444f4038c178bf2f70e9210943247582f36af81c93a94af68424b3f3ac25743acab145fc7ff61e9
-
Filesize
280B
MD5df2d1721cd4e4eff7049314710dc7c11
SHA1f5aed0158b2c0a00302f743841188881d811637a
SHA256ba336ffd1b01965d7ab0e5fac5415e43cb594139c76b19e4c0d9b5b3b67c1e93
SHA51211fd520176193f284563c7d050e6a7ab4e9895bac49fdc05759bab2c8a69f224858ccc784b351fc1d3ee5d39345430f9234623c9390978d7daf6a08ff5576ef4
-
Filesize
38KB
MD5b8103746b4757c6332fe545f11de8f70
SHA1588965d6333eb015af39c7f44ce71dfac67fb0f7
SHA2564177d563a186175d3a67091c399db6c57fc271e202406e244d4bc8ad95b1aebd
SHA512c83bd52d674d90752dfffeb76971a4f9684054d6f02cfdbe8f336758ac46d8b430f306cc64be00112b8c38d191afd1b8395d58600b12cefcb6a052ab70214ebf
-
Filesize
37KB
MD5bfda78672fa2098a6c4266a33e799f69
SHA17a51f4a9980e6f9d5a484d12fa3e35baddc753e9
SHA256bdfc29cd8b54192ada7194936da17428629bb5925e31a2846682571bebe402b6
SHA5127d01483a7da3941afcd7b1566c868018ac80927209269e98a6dab0078c1a14c0a380402efdd5b257e0a37ca6b45f68817dc774cbb32b5e7ba5f3cdefc2bc72d3
-
Filesize
21KB
MD5ec0963f084571ccba8609e51d71bf6ec
SHA1b4a93e1b2e235488747b17c212ae14e5551c2db9
SHA25639041d7cca3821b6b33037d88740780d6c1b380cf4973f7a869b101d35b015c3
SHA51288689aab98763297eb045308d3a1c415bcb0dcb58dc5d3f4338e5c92018666a0b0c5bc2cc444ffe333c4b6ea54f0286a4c6310a9e18d418fba83ff2698be5525
-
Filesize
18KB
MD589ee4d8818e8a732f16be7086b4bf894
SHA12cc00669ddc0f4e33c95a926089cea5c1f7b9371
SHA256f6a0dfa58a63ca96a9c7e2e1244fcff6aea5d14348596d6b42cd750030481b82
SHA51289cc7dfae78985f32e9c82521b46e6a66c22258ebe70063d05f5eb25f941b2fd52df6e1938b20fe6c2e166faa2306526fdf74b398b35483f87b556a052b34c5e
-
Filesize
16KB
MD5db2656b672846f689c00438d029d58b6
SHA143b8d5085f31085a3a1e0c9d703861831dd507ce
SHA256aa3f28db9caadce78e49e2aeb52fda016b254ed89b924cdb2d87c6d86c1be763
SHA5124c57c347b10ea6b2ca1beb908afc122f304e50bd44a404f13c3082ba855796baef1a5eb69276d8744c1728578fa8b651815d7981fcec14a3c41c3ca58d2b24ab
-
Filesize
21KB
MD583bb1750070e745b75b98fc47e4ef2aa
SHA182b8842f5ec513da92868cd4c83350a9be084760
SHA25656e6bbebad2d669437b7c2e18009ef193adfe7d83f33253ac91abebb37efa6a5
SHA512add8d6f985038245f513e938a381a399a8a67b30cbf7e24042a0be5d99d47fcd7454daa476a549fee0df048c0d738ca70768f65539bb2381d4608724b34ef866
-
Filesize
27KB
MD5fa2d7364a6cdbe8144bfc6add239bfe7
SHA12b37b884e7235429a2b4d675cf1d4975f9081d4c
SHA2563624f864be1b01a4fbcaa4623e5408ae4adf66702cf2339ebf5eb5b4cf993ac5
SHA5125a30f88a98af6ab94a0847989d9bb98d7e459232ec7a0ebfd0aa7f4405d0394fdbc439f33fbe2f72319f7cd8789e80443a122fde0b4f743833ebdc28bda37f92
-
Filesize
16KB
MD5dde035d148d344c412bd7ba8016cf9c6
SHA1fb923138d1cde1f7876d03ca9d30d1accbcf6f34
SHA256bcff459088f46809fba3c1d46ee97b79675c44f589293d1d661192cf41c05da9
SHA51287843b8eb37be13e746eb05583441cb4a6e16c3d199788c457672e29fdadc501fc25245095b73cf7712e611f5ff40b37e27fca5ec3fa9eb26d94c546af8b2bc0
-
Filesize
59KB
MD5057d50611dc6da29ea09acf98b39fd50
SHA18a4e4078a370de6863dd5d306bee57b3991987d6
SHA25667ccab355ce3aa4cbd201df34c15356b4d8f003b60d1f5fec6562dcb61da5c4d
SHA512a2c9b21122040d7de0bd2716f739faf24f81214bbb5bd01a1a2bc150039936d1193382cef256176f62eb9345b61df712491d75b1fd01f4c54ad60b1f39f645f5
-
Filesize
45KB
MD55569de99ab1fabb4a341f6491b8ae9cf
SHA101bd34e042fe11149a50d8a5772c7f55bb20d59c
SHA256cdfa951fea7ca30043fb919904f7ba8af0757d017b03ae48ccddae4d1d9e6417
SHA512d16c027aee5e5e0a2009c8e1227bf2a708083217e575cb5ad9b53bb3e1414d95f6ee266294d6bce9ff7b97b84469bfc9b10d7309399fe17d74d56094045efc21
-
Filesize
55KB
MD592e42e747b8ca4fc0482f2d337598e72
SHA1671d883f0ea3ead2f8951dc915dacea6ec7b7feb
SHA25618f8f1914e86317d047fd704432fa4d293c2e93aec821d54efdd9a0d8b639733
SHA512d544fbc039213b3aa6ed40072ce7ccd6e84701dca7a5d0b74dc5a6bfb847063996dfea1915a089f2188f3f68b35b75d83d77856fa3a3b56b7fc661fc49126627
-
Filesize
88KB
MD52dfda5e914fd68531522fb7f4a9332a6
SHA148a850d0e9a3822a980155595e5aa548246d0776
SHA2566abad504ab74e0a9a7a6f5b17cadc7dea2188570466793833310807fd052b09c
SHA512d41b94218215cec61120cc474d3bc99f9473ab716aadf9cdcbcabf16e742a3e2683dc64023ba4fd8d0ff06a221147b6014f35e0be421231dffb1cc64ac1755e2
-
Filesize
110KB
MD5df4ef1fa06bc34706b3b8245d4831d54
SHA1ba8f9d4b813ee160a56e162c36d29c1bc2a3bef1
SHA2564a34fd6dd56215d4c81be8f211ba69410018d336605334cb190886e4b6adebcc
SHA512b6b436366a3305228cd3ef912731ee4a6481db7cd43595f5217c2ab91b1a7c19168bf45e8ce8f4943ab3b393240b9c507073d4b7492016689ef0c1735700ea9a
-
Filesize
16KB
MD5dc491f2e34e1eb5974c0781d49b8cbaf
SHA1b73ca9b5f9c627d49da4ecbc3455192e4b305a3f
SHA256f956049f0d96d455a71003eba400cb94f7067bc52620cd05b81006ecfdd438d8
SHA5125c9bd0d5c93a05ca76eb727328a0fde40f2be7fe53b6b6c9eb260e8f20f92cfc831fd4b46f954d85baf151ae8aba1cdd6f76b0faf96217922cad844c905f3645
-
Filesize
162KB
MD5991014eaf48542461785cad6a917bd93
SHA18d509db065d93b97241d81da23b2da0a7360e0d7
SHA25652d6a322e5c6624e8cf78af3acdf8b8cd95ce60a95fe672dd5f0421e15dbbf7d
SHA512daf33a7f7fb85aaf666ef03dd0742d8b4b0f05bb8a0fad36655a020ed1e7d0d95d38f3aedea9bc634b0def08891ce9dcb9e5f5f20e01290dcca65de4377734d5
-
Filesize
64KB
MD555db53a89098f4b6b215e1cc6e9efc60
SHA14a1d73f9c6e11a1597c8e1237e99487aa5bcf05c
SHA256d2ffa7fdd7892b4822eff4a89232bb1a4a37a52474819e5fa6b2c0b1d32e8e43
SHA512cade704e8ae437799fd726b92c8ba98020878e7bb2c0d5920986745b11e5542e55170597cc9da5d20dfd525f47c3a1c2c85a1c67e6f281801cc63bc44fa35102
-
Filesize
128KB
MD5d3ad899ef6d314e078caf478e7a2c723
SHA1cbda8ea1659223493a14d9f2e612e8da8f4690ac
SHA2567a585b6bc904769860ba80499cd8bbe50f2f75f1db6a831ca6de4a85cc48b84d
SHA512a8661b8acdc4596487a65bb4731bef9a496273d2ad60aa9cdcc18d728ed71677befb4d78c3a45ab9fb5f14e62b17a608934f36aebb0e4e6b5ed6a5053f5705bb
-
Filesize
128KB
MD550490e74744e3484057ac4261edf03a5
SHA1337c73d6f5bd0929b217d7a9cb1267e8819c7b08
SHA25689f37126b7f65f86ce2d62dcb0186b7d87f643fbea80e2d96428173f24cb8dc9
SHA51283b7a2c5b4a38ea1a26d1ae91640e6a0a289550987e6553898c8389e844652db5675a4b971a71c942b83231fd041fd09ea7bc1b7c60722dddb2a0930db72778f
-
Filesize
57KB
MD56fd89696f92cce575af9aa323400bc41
SHA1934c8596f8ddee6830725f84fda92d0db8be3613
SHA256f5feff0cdf42945c5d2a928792b7322fac01c673d4adca84d6eed2f128af63ee
SHA51231819492274e951b0011be160b9c91bf0d73e06c62c82983d6bc3127b170b76298b431d4a1cf03ba9537ba89bcd86d6bc3ff6d6923c5659cd72565d46227bba2
-
Filesize
19KB
MD5935bb5d465d94cb39aef1382236a2ec6
SHA15dc667df91f97d5f6cb7b348f8f2f90bc2c2237a
SHA256fd8f992d68fe06460dd6bbd387de7526c83ca822fcf83faf075ec666a5f34a34
SHA5125c571a507d72d686e57fd1b6f6aea31178a5b575844ebf55d45d6412c0f3e2a1bc656540c3ae6555e6d0e8e0de3874679d6e073afebede9eb523f1c67b7cf841
-
Filesize
58KB
MD5a0494e2459bbd1881d950135235ac57d
SHA191636661f0c89698a283e01b9771f72ceb5c441a
SHA256b3945bff387adaab2439c3aead472ed85a941a7104cd53ca03d775cd594043f3
SHA512f85f91059a340c3c22ce890a3025deb952c67211c7f936bb83e566dab791b473c6c2ee000b3c7aef1834884981e6ef0322cc40172fa4da1ebec6ef316bd9f076
-
Filesize
16KB
MD504e1f6c4827af415993124bead3b89d3
SHA1fc9736c8a180d55b9f22fff832e11d1f22cd0e2f
SHA25686e848bb80d1e1586f2059d8bef552080d871057bc318c2e204ca552bc18041b
SHA5128469b83b6a271e3205bcfbd092271918dac86f6f2c1678c737eae06b1e2468188c070a5de98945462d813b9e6ed2fc54a3c4d9a024bb43316b9ba4c32733c968
-
Filesize
20KB
MD5126603dc5cf7f2aaa4f014c6f1b3f22f
SHA12dbda64230fc6652c905fd12fc704631a874d8c7
SHA256e446c1c9ffef5f742051d48ecef519177992c7d77eb14ef781b4076fa1c7dd22
SHA512d6b8e193b55440fb18bd637b0d40f8cf3a9f0bd61ec4bbec5d8a4bffbba301e283fe8b39c2a34ced9ceef34ead7f8b45c35e4de6494b335ad5c4c358cba521b0
-
Filesize
29KB
MD5ad490f5b0eaa2c8739ef9a9c99a78fda
SHA10bebd85de114ae08e755d7225529ac22d37217bd
SHA2562a0768e66dea9916800d5e352e6406a4b906f450c0b1272ff9011d2af9e56ce0
SHA512a209f5f2f4945e95ebf8337e4be1c53613ccf71e933b4c94a3915d8d0caadd5e39a4231c3199baafd347169a0b01c16d0618f36b945636ded305b8b5d9772140
-
Filesize
80KB
MD530520efac1a041d38c0a426292f01b64
SHA183571ed2163efa1babfa6c403ca9076825765bd8
SHA25660df6fbcb6b0d5e96ec267f402bc2e147fd1439d2771cc254ef470d70f2b8037
SHA512e10470ccc5a2aa94489c1979d4c637b28c58fdafabb456aa78fd791554691a8031946a2fe650bcae07440c5dad99631de9f265dd8c4fdd305427abe1bf189cd3
-
Filesize
62KB
MD5c813a1b87f1651d642cdcad5fca7a7d8
SHA10e6628997674a7dfbeb321b59a6e829d0c2f4478
SHA256df670e09f278fea1d0684afdcd0392a83d7041585ba5996f7b527974d7d98ec3
SHA512af0d024ba1faafbd6f950c67977ed126827180a47cea9758ee51a95d13436f753eb5a7aa12a9090048a70328f6e779634c612aebde89b06740ffd770751e1c5b
-
Filesize
70KB
MD5638b28824ff7d2a8b5eca31267ffaf3d
SHA151c91fb5de5248d6dbbe194565231c4bbbc197fb
SHA256a2477313b8f9735a83fff20ff6624d26a13c893601a3cf6148bc997022913011
SHA5120eb506d4d9f7bf3aef60dc2d69135a1eb6c9748eca15f721cf5310a7bfe131e21c3504dd75ad986ddfcde907cedd8522caa64845de1794000c2fe7a477189af5
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
106KB
MD54716c34831223261850822c9fd66512b
SHA1ec68a7f6110e531b2080fdf642246a6e956d4fcf
SHA25648b847d630702a82a1d8b0a27f8282ea7373f0bb5d160848465fdd2fb087f1b6
SHA512b7ca5b95c0ec106ad07e30e960aa0ff28a8ecb0e1ab79bda6f6a5af93b5132c7b9e73d6a24179508e8037a5eca4af1e3eb858dec56e2fc70077b5e62a0804d98
-
Filesize
8KB
MD59554e80c489f0dcbb9f9ab411db8551b
SHA10ab2ea7708e1f286dfe78152af4a50a611af7d1b
SHA25634d5f0ed8a9e8bb5279fb9135c9acbc25666c0acf8e55619fc447131a65a2f67
SHA51209b8c795864175d85738b2bf7ae0ff6eada625e3d8a4f764824cb7b2822c21a5e14481321c2902215f32be806b485d8008ff54aff2912a72be7277c398d1d918
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize9KB
MD5450522c7a07195508e4264b3df14e8df
SHA12819397dd34da5ac526e5877eb78e818cc3c9700
SHA256710c8bc4a81a12168a99846946d197ac04537582558ba769708057aad35a47ac
SHA512816f4a79e77c887c1ca519f57653de00641751d176956c72949f4d74a61998597d9f670d370ad1ee9bf832eaf0216cfe46bebbb195d622fdcb12c417756551cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe58ce19.TMP
Filesize3KB
MD533a76b603ed2041855a78861ba74173a
SHA11adf80270c0afa87b2d1f80f714172621a04a2fb
SHA2569cc77c008929a44a65b856435cf860fc6051e2b82a440c4b41332ad3855f6799
SHA512fc48b853823094424978e68c239c9fe74736faed88d5e2503623c14d809a0ac98cede459df77e922d0cbdf25d1107edb8e23a744840d4f76d6b1aaaab73ebce3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.90.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\000003.log
Filesize32KB
MD5693f1be456fdb673424fc59627b0ae4a
SHA174cbcd195caf4266fcf17b1443590eacd607a6c5
SHA25656058d056d34125c33ca001d682f9f2cd83bc83ad1b1d5d583c5102c2ab9c802
SHA512b8b69198a89dcf558afcf6b343374e0f0b7baf86ad046894f49f4dd7a7fde94769309be6b098651d0f78871fb5e42b5c56168c9949e5585aea784c762fcfe53d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\LOG.old
Filesize343B
MD5d2f5a8e40219bcabece383e85480bb0f
SHA1a98057bb9a8ac07d0f9740fa0da2607b270d7dc4
SHA2565dfb9f9c94f34b29f8ddd3e469c792ae2e0ff339f884a8f5bd29b998bf7f003d
SHA512b8eb294d7ec7c1672b972fbd16956f5a7f748585edc20a42cfca4757d6716809dabd5720eda5cf70fdf79b2c6e0ec241f3d992e5c8c24fdf2736e25e6a26522a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
6KB
MD539d221b62fff7a3f1fada8e5ac57ff21
SHA17a657fb57f0b2bb40115afb462f120f24356f39b
SHA256cd460522789646a00832ac5d81b81d7a73c9b1e1138dcdb4b7bd5faaaee8b6bf
SHA5121f78ce8d1abbd30b5d70423b28f624d1ac5be208b384336f86d97203d917850927bc8ae8a203f2b4edbfb6fe181b48d3b21feece52d4352fd09527b7f6ad8c3e
-
Filesize
10KB
MD5659df7ea80bffe3ce1aac409d49c3cc4
SHA1b5ff563b0b7ceae5358a7066b44c7f24b5586f37
SHA256018286e046f328ba24bc0259fcc1b2862b6cc7532bad55d4486ee54b9fe65f5b
SHA512b9fdf756a98602ef40e6cfef40c8639af97537380db88b469938221ad4ccb0666ef4dbbea7d31b22b1c992c55464f5f8d841a96c3cfb7a51849bbbf238ab72f8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
211B
MD52367f4ff2589a55bebba68b24071052c
SHA18818ad3b4b77014934cc3e55029d5641bdf40674
SHA2567adf7d2a205252015b5b800d3c20acf3d896be7bbbb9c3535ba18c5a406334fa
SHA5129b1f0b85bf06891a3b1938fc78dd4433941a58e0cfb95b94bdd9f82a38f04bf3f647b9b8cb98d92ec86386d70263050c5ac3a0cf24a6598ba6529938a1df2d69
-
Filesize
211B
MD55bf2e795ecb14aed6bd5d2f202cd9727
SHA16b68cf5a5a7315716355b20fd999e8ff1ff3b766
SHA2566e31df74b6e814688f42a1535caf7e926e096e2c4db745aa45fca159ebb17a36
SHA512a78a3d78b190536c722349e8d7996d73b5f5876628d87d33e1ce6d6dcb3e7faf523c3bda656d810ed224703d1948ecdd3cbd33ecf313ac18369d4977dd57ff85
-
Filesize
18KB
MD5d078c0bb3193e12b9c19555a116846a9
SHA1bb0922fdec3c391ad701448337ad1f4752ce2c14
SHA2567a28463666315b78574527c9f8124bf30e116ee9b3d44af07eb853ab0940cac2
SHA512888aa9a6397dcaaef9967acd42ccf719b00adfa6e59e68fc98fe68cd5b8ef7f3d6bc426115b62d371f3d06912f0958b0ed881332b85e7dbafd505211aba9f0ed
-
Filesize
20KB
MD5c8b7f1d5ed0e79029213f33f09cc469a
SHA1e7e1e32d006e3a93a9a4b22bfdf5b9d87ba6e7a6
SHA256da60fec92dcc5f396b1c04a9a9ca1f1af0ce0e02443ac2b127bf1ed6c8246ea8
SHA512243e539a44149435bd70a2b405dd9923008720e550d33877318baa4a2514a83a7e0d420d6642f2cda657d7a04e5f5e78c9385050923275a3147ce380e1b68558
-
Filesize
20KB
MD5fb4871db2145019f6ec70a7828e2fbf9
SHA12a189d8394a9af2fe53bc1c616c73393e665fbee
SHA256ae559308d9d989374f525ec67f6f1832802fafeea49d2b71e5d42960b5db8e11
SHA512f21639b91a743dc04eca7f71e93f8d277a0a4ffc281222a5b260e82fb02a682d2b2376725b783ef363f7a8ca5083814d986387c1c14d0fd4f7b1a87a8573f39d
-
Filesize
19KB
MD5fd247b755c65f1afb6091b0798ae61b0
SHA1599478b5c9b9c59f272b80be3d21064b7a9ee373
SHA256d8c19a38f0421b9f55715e3dc57488e3091df49007900ab8bc9601702bcdcd91
SHA512200fe3dc052dd8de124d69602637386c6f72575809e4f2546c3a3322a2a6bf147a37aac92447fce5b4c6bf25e5e9269aba04ce6aedee572440795ade284a8718
-
Filesize
23KB
MD5b2e374eea0c9923d20d0996bf3090734
SHA1126bd83417fcf92f63313d8f084e23876cf89497
SHA2569d32e379e264eb43b8e373a2edbc7614ab548e72e8dd22b5d9075bf6ceacfe12
SHA512e6768432b38256e9aebf784eab77221fe1637e5c1c66bc06590ec496086e4d2bf4979130d8173075010fbef1059b34e300e1825861c4d920bb92605f3aa0e9cf
-
Filesize
21KB
MD510c9c60166c0254de46d3d2b987c856e
SHA1c44ed7e32bf4bd03fded835e4f6aa75eaee7446d
SHA256c884e73f213871d7ba24c67d6316617e4ae5a96dfdb8cee68a2bc8af87382617
SHA51279b6aa83b82e3a29678a4465383ddc7c7f5b950a10aa531456769d12fcfd83989577240084ab77f64f7a17c72f7acfd4c2e00d1d5b16140ad46eb17ccc115dbf
-
Filesize
36KB
MD5d91dd1e96144e0f6c21ae492eaf70f45
SHA1cda24fc387de20666473f054eb6f19fae7818d65
SHA2562c7bc1c7c39ab3e908b904dc1504b3ea48ec497a984ba1b13f3f7d269eb5792b
SHA512ed38ec6591458673ad60b5d23829e1ea57f67d2ee9d43b6cb3222b44821553b5ef36b53deaebbf8d38a33d4e9b156e0e2a797dae0d7a2ac9ae68ff6f6acae8f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\1be3dc37-c0e1-4d35-9bbf-a4585dd1c236\index-dir\the-real-index
Filesize96B
MD5ea10774b24b554c5fbc3a1e0ba905f39
SHA14c499d26ce77e03302536d5d6ca7df00e8071b3f
SHA256b7a4c767d52d2c5e0dd4548b0c3455fd2c98cabff7fdbe739b54aa81dc478719
SHA512a4b54ea3b20c70a9b97dbe5d569d5f34b9fdaf9439e2d5692f810b27ef7e3873ce4b7d096c7f2d8b72f9000f0014a8bc1be48f8ab4e5d1ed8b3d6cb12cc7f49d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\1be3dc37-c0e1-4d35-9bbf-a4585dd1c236\index-dir\the-real-index
Filesize96B
MD5fef186614b43c64a1c06152ac9729552
SHA1f4782142da38d621ae5ae1759a1d99a6e97fb96c
SHA2561811e8ef8c37e077a449ec8d3f8da9a559b507bada4420f060c826bce592c6bc
SHA5122537108d6f7151abc71142a75373b2c602b042e4946ae88654e23a352ca85225619adb049f5a2b0d98ab1848348ee64bba019c80797d9098c6fc088bf46476ea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\1be3dc37-c0e1-4d35-9bbf-a4585dd1c236\index-dir\the-real-index~RFe581e9f.TMP
Filesize48B
MD5d1f87e0899ad36a77f8f885bdac1eeed
SHA10084d4b65b340ec42fe33dfe29ab8e519c709418
SHA256c0ada92b111a86a154609d3598a72cf70953f5c927aa6c6d91356cbd84e8040b
SHA5123a779a25c379b38c99ec9fe9ef132ee2400545f6951d825b865627426a36194d0645b319ef70278c15cf5fa4faf01768c727607cc6702cf49b441d330203e480
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4ddf9bd8-4fcd-46bc-934c-7de2385b9545\ee91b116cc2005be_0
Filesize57KB
MD580623fd1b0e623f3fafebc0a4372ff04
SHA1ac97909bb281a12872d445d952902b2c37630468
SHA2563b2ca9bdfff750eb8997da647706257dbc935cef875d1fa71ce68938ee75f3f1
SHA5125937f61805f56e73f9d00a5987a450f6626bf6a3521ba9f174a56ff8fff2c5e7697d61fdde608cf49e0ce86cab5f8166f3beb8dcc5f15e69424ab793a37632a1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4ddf9bd8-4fcd-46bc-934c-7de2385b9545\index-dir\the-real-index
Filesize72B
MD5d37b19fffda099a293faff801e50c1a4
SHA1528ce846a3228124d530d4d4e07bff6cef95d66a
SHA256a0279477bec869e26bb22eeb78d48dbbd80c2c65397b1f132e2e816babab666f
SHA512b9cb9fe3608a0b1c9b9eb1b781c5e19591ca379929a0dab1a81e9365634e60a80010d720b486600c10e93871e19882bd2d9631aa6107cf0e8d997eb41cd940c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4ddf9bd8-4fcd-46bc-934c-7de2385b9545\index-dir\the-real-index
Filesize72B
MD573fe8a4b557316fb758b6a621ed6a4a3
SHA15375c7f0e1244971fa90e14eda15a60a70cd281c
SHA2562ac2133f0a770dac994809fcbb351686195178728cec870934eab520c6bc5a28
SHA512fd91d5e211dd3b834494a8e699636d6d27a72d298ad765d2ad76f5101c90c033075581c225c29c5c4082efd5f6de174c38451f7d69e57782f7fb3a6f5a3ada8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4ddf9bd8-4fcd-46bc-934c-7de2385b9545\index-dir\the-real-index~RFe57ddcd.TMP
Filesize72B
MD5377a7d0bbafb657b8a958ab4a2ff7e2b
SHA142ffbca029379d050f412fe253e9b145d3122acf
SHA256f986a1ea55f75641e03da215d265b5258d997149cfe359bd8b5b0c6e9521153d
SHA512d5086883adff3d06156dc4f0a78d8693d10be01791e0a6eda7180089e0632bdac03ce85f824c09042ec84a0449aeaa274e85e2177c58a8dc98f018bc54cd911f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\672850e0-716b-4785-b971-03b7429b7632\index-dir\the-real-index
Filesize2KB
MD5a82d9c8023b642913570dfdb5bc42cdf
SHA140477fcead67715de35c46e3b48549beb016a20c
SHA256396973715e035aa62a6f057d06c9d3f055395380960c18669d78dd007764334f
SHA512a094bacaba183159ed45b7c71d81dfe2238f071738ac0bd58468530d1ae96d6defd375308e791828c75386c967f282cb7154ad787f9e465bb16edf4baf5f5d07
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\672850e0-716b-4785-b971-03b7429b7632\index-dir\the-real-index~RFe57edea.TMP
Filesize2KB
MD509fdbdc8342f084bcb2a6803113f090c
SHA15d97832ee954357387b5d48c1b942c1cc7ef9689
SHA2560d95ad8ba7cd7395b7bb74d1eca0a954b5a7de51af5f557daaacec8d6883b71e
SHA512a880408d5712fef374ab2833e448829a84f83c51f61d10b0abfe7a7ad6b8e41ee5ae7638e854d6084393b3355609f5f9fb6cf881b5285bade0375ebb76f67c41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\99d9cfc8-60b3-40f5-86fb-3174ad33a7bc\170ce29fd1bcbf73_0
Filesize57KB
MD516c881944e2aa5c3065c2536d37fe81d
SHA18be50ef075774562d0ba18a4ca2fa97acc997df9
SHA256f132f894be0a2a1059c814b2275ab9ccb418bbc6d5495660dfca06b282e27c7e
SHA5125e4fefaa74d3709e132cd126eb59b24a75f25daf1f0d1250bef483b729f063f3568ae44d22506cd922b585a1b7d2cff9edd968df91c22c39fc56045ea7964495
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\99d9cfc8-60b3-40f5-86fb-3174ad33a7bc\index-dir\temp-index
Filesize72B
MD5ac13ffa8fc2c4b92550442f03275f83e
SHA1c147dfd0081a5b7cba80b918cb1d276fd27496ad
SHA256182e16dfd876341d3293319e54da5660689bed322442a14233950c1dd07eb793
SHA512eae66e04cc96b647fdf2ac565d6a99cb9360680356e568d25dff7d3f716b2b38e4825130e69810b773338a1e2dfda7831173871034f7f236b899af75bf301862
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\99d9cfc8-60b3-40f5-86fb-3174ad33a7bc\index-dir\the-real-index
Filesize72B
MD51161ef160b51c0635b536d1b0ce7ec10
SHA149a3f68277d59372494ca50f3a48f1e82cc3fc63
SHA2560512d0e9c4719bd098563bde157ed97d9b190b3e32d7e070c5721f1a79c1e287
SHA5123bf58e83a8fe6554b128d823bbda23d7601cc0fdc5215d319ea69f74bdfc30f1b9e09ae511360f5a4c261cf26f3f84a233df9c4f0d2537e48f56eaed4c6631a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize322B
MD5cc320a1c540bf615bacfa82d38d9631b
SHA1039e40914535ce5c8af9f08bcc8b80e16343362f
SHA256f09071c3e3e4d5d980dd8594bb6b908c359c53485cfceff20a6839e604f6cb79
SHA512b555afa2e1c8cce1fd5dd0e2269ac03a4d9452e4d59df6a6d7b8473d7677c72606023ade41c2c9aeac869cc45386ee393041efecf8db3bbd47f5bd2c8f4f88db
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize322B
MD57ec6de925bc60c2921c8059a1ac47676
SHA111a6cb4a6b9abb2e49f123d98ac5f475561a58ba
SHA256182109c26b5a42dd98f81ed00bc11d910901e3df5bc700a4a3344e1dc3333df2
SHA5126829916ef9d2fe56f39574d0792f0787dd1f92276c986d9a0bfafd402617619027906d2916e5ed8d975aa570565e376255c4a0a518a60aaa3bd4fad9e496d31d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize327B
MD5d7dc8e52a602e18d761680cd3d35689c
SHA178d85a84e68f35fdf840d3134cdfb4eaa049c42e
SHA256e11b4b35de1351b477844097aa975916d60d5981496c90a3e8e51475d644fc6c
SHA512d2b5df6ec24cccc677c1fbdddd24ab61d2ffe308d61344db0345d927e35883e2701d76e4e0e24c9c444c0db11071a9214f502a6510344e21d2e30328df6bca82
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5d44622059f5e5454a5602e7ce38ced8a
SHA1a0a76ab0610fc6b61ea261d64fac979c14e0f77f
SHA256a740dddd8ae0e34030a351f8fcb87ba5766a20d129ad815d57bfaf845f8e8c4a
SHA512363db26f66d3bc9572d8ad8390d8c32a887b424c63432c49d8d2a026f2cee8dc4726ef1c82bf029672db37a4ba4b3f9217cdd9e85529b7a148a6b91cdd938b51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD599ac2cc64e89f5a74ea2ff1fc186087f
SHA119abfdb1801f9d21484fdfdd642d9700d24cf9da
SHA256a5887c6b1a378245f81675c9d78e99c1e25266e56957139d8ad719c01e01429b
SHA512a07e416ca4ff1d487e3654c074ff984dcb4c8732838bb6d92fde3f5dfaabd6fc65e37642b16fc12972deac6fc97d94d559a548ff1c118548427a9c326509a819
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57e918.TMP
Filesize72B
MD5f54bb522a675152bd16eefb6851e04c1
SHA12eed522436b326106c8339f9f625ea3f07105b87
SHA2561f6aef4c7197a68d501d9a90ad83d89ee14c258ea29b74d52af150230d34af94
SHA51207d21d25307221474efb877ab1842043dd9d4173612ad98fdae5eb28eadc7bc39cbd53d617a3b9cd5492dc4bfeb005d4a50cb377ed5c696e6aea50ac3a5c7785
-
Filesize
22KB
MD5221b8f09964992638d7afed2402b513e
SHA1796fd4fe0eee5c6801141879ac19739283bef448
SHA2565a6cbfb60035cb930cee8b00a26667f73353443a48a4f081a45e19d64beae689
SHA51237411c229a99666e600997219c662b7512f7f1a5c321a00e1de7178bba5c45e6ae15a308035d00c71bd738ab0a60fcadca807876105c82c9b8bb5b2b31093b18
-
Filesize
113KB
MD560beb7140ed66301648ef420cbaad02d
SHA17fac669b6758bb7b8e96e92a53569cf4360ab1aa
SHA25695276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985
SHA5126dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5
-
Filesize
467B
MD5ee6b8d1ecdbff1275591aba086323fa7
SHA11e5e6627b033d1a7f1a219755bb3952d198b4f66
SHA256dd1804de92de8ffdcf59d2faf2fab664934272f6ffb63243fa826360a2ee85c6
SHA5128065afa17f8c0d0a9e1bccd6f9ece70505873408bbc3570b699d8eafb7cb07d06c5c970b9c3c77678bf0727806254f516ba6eb188505892a61a47058cd16247e
-
Filesize
23KB
MD5542d356f5b267202d5a2bb8862078cae
SHA1239d3789dcaed416b347f8a27fc7995d0c8b2137
SHA2565baa928073791610ad37fdea682df45bf376fc7a945c494d88795918d841f124
SHA512df2bf3114e947d3a614a13736d655d90e9dd68e44317be654d7256c13bd46c30244a697f141cc16d74d86a6f527d8d87d98e85dadeced652a7ba4c03badb7a33
-
Filesize
900B
MD5d220afe727cde966826bd235d9aa0e18
SHA19ce1c926caeffd05e6a789d75f294a5baa1a2a8c
SHA256abb04fb89ad7b1a453b55cbc745b46d60296b648840b945b94dbfb3be819ced7
SHA512818792fba41b35cfd3bff5de39810f8ecf26220bcd6023d6a1616e549a6bbca931a7b1a4ce8de15f71856c618eec5eef174c80bd491c4fdf6b87910c7a4bc016
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
41KB
MD59c17f2a5d3a2c1d78d79dd835f7075a1
SHA15a47e22a360dc59ad9f496d4a570a1a3747968a2
SHA256e42d314f781297c546e92221db2d0452e998ff01c9ab336b853cf66aed662c3d
SHA5125e1ed28eebded9f698598edf83dc3a766905f2888ecdfc6fcedb848491613e659f03b671a7b3fc3edb5018fd752fe701268e18c275ee12b31d6cccdc7b8d2183
-
Filesize
50KB
MD524a0010a44bf5bb9831c79dca0adcab3
SHA1a80feb1a69d99a8dd9b33fc09cee74eaf9e0bfec
SHA256a687d85b67dd84fd42c802a4cea7555adf200f7bb36a41d6a54be761d3801ded
SHA51294fe67e641121e97d3d55382894a61072296cc19c47dc3c3ed9515b180fa8a50001d5362448276aeec86a5913b1797c59d5d32e25037012d2d92a3dd5cf0e86b
-
Filesize
55KB
MD5dd299d794096151a7459b135c4fa7528
SHA104cddb5983b1bf3b3a3c88c8767c910af525d5a5
SHA2561a5ab6b91b5b1ff147e29e9ba48562d286accf46a90e29db8fd0c483aaf886de
SHA512db8ab8bab2c1cdfd842580fdc5d06bd5921b99f3a2de1bd30165c67e59e03830f71e038570206619fc983e0758fef9a4cb97de85e2b4f2eec4a3475d9b058203
-
Filesize
55KB
MD5762b18432a0b9499229d9c73a408165b
SHA16942fa83538d0e8035db3a81e257804922961600
SHA256c9b8a35352b0a703db3231b6c9bddd18ee0986fd08e4c7ccbeb071821c2a084e
SHA5122a200ba18a89d5b2b8749308aed57c348a7f4491b5c35e5861b92f7ed724aa846af30de2f37591a09bb80bab79af9eb2fbc967c52a1a8b205f2849af381d8655
-
Filesize
40KB
MD5a874edfa3cec593f526b0503628baa74
SHA1e0c198108c00eb86346a5bda68949ea965797499
SHA256642cc7e5c2a91f8a24064b87d6cec5f534febe133730f012221e4f75b69cd2a1
SHA5123c1218190e9085baaad54e249f2c3e06b2ccedd561eea6c515603de8863f3c901fe9e8d3b6e1dad2f509bd250b3e0768646b214f7cd04d9dbbc2d5d706cb4907
-
Filesize
392B
MD5c172521c8f60a466c4fa64b506c13c10
SHA116ee8539c26b75cdf1b615a64a43ff979bec38d9
SHA2562dd57c5ac651303efebc69e073be32f706e35ab7b1571a51e780bb12ccd0bb01
SHA512c8980716f2656383800cde5b6d9bdcd1d70d926fd393ec18ce6fbffaa0dec0d2cd22e6636b127d4a05d9d642cd7078b41573063a83348007ecb28b8fca4ac9fb
-
Filesize
392B
MD5e4cdee87d6badec6d9f3b0763bd99e3b
SHA1e6274d5f5417888b716af0185f89c32cdd53277a
SHA2568b93b059a63b903bcd31be478f5f0c56c21a6334d80a09a8478c5ac700cb5af8
SHA512ab566c03be91a405fa77e3a81a391716d3fba7c2624a5a68aa09604607a2fae4eb1777f1d7438e978b7c53a147cd69dd32218e78282e44717223b5488c923cbe
-
Filesize
392B
MD5158578b2029769a82cd8c4b82ee5e9bc
SHA10c124dec1fbcf465ab9593ea197c1b705d99d130
SHA2560697b27080df2c845562e76a33fcf6fbdccd52a943784bc70c8e6e5349674c4c
SHA512d7c99735deb23ba3620724f7a73dc0c8c4f345093d19f5ee91716ce78204560deb1af29ce7cf8c39276f26edabe8dc08f579f5854614bc351d55a095c309beb9
-
Filesize
392B
MD5d990b4dbe83387c2e96d6ff447a5e0e4
SHA1dd33d908f0e80184f2da8fb7fe79261bb8c4cc15
SHA2563fb2f7963eda8922a2ace4fa142f17c82f34e04026c758a6efad25712eeb9035
SHA512a6ff7de634b2c48e129e8eff3297ac63d826fbbcea11dac0145bca2915919a3b5ceffd7e6ba5f7f91f1a09bc970f42f3dc492b571867e84ec2594c82be70ad3b
-
Filesize
392B
MD5c8e0de4cedfe8525717e4f151ed99901
SHA17cbfc9d49ffb64f38b5ece5d9cc4c9d2f1f739dc
SHA2565ae83abf262f9d42f796389da970ae7fe4a1a2790591dadd374148b3173a69de
SHA5122d6f6cfa1810bef5e4caa2b24c14c61347c8ba2b556c45a644bd5425679dfedb7b0845f3c9319f786cf23eee3478eed6e9fd8a7b637c3dcfb4bc0ec54aeece03
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.27.1\typosquatting_list.pb
Filesize628KB
MD5291dc27655975b5be12155942f2d5fe5
SHA1a2ed705924a4876ef92d17cca8883e7bd0ca6318
SHA256e3ad9d77cabb94127ba2788196495e416bc58e7e7062fde2dfadb49df8a54296
SHA512a34ead26dd64d97a30f2c76ff6a29d71573e1c343da5fe8b499e764fbd0a9c0cc432d309ed8e5b627eac59dd5597a8c64af69a96791ff5b9b85f134985fb6c65
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
896KB
MD5b8340f1bd4f6eb3660e40d6e1f2b43d3
SHA18af94480bb990f7bf9be28ba5ac5620b39e7bac0
SHA256f537a50612813a898f793c78bcc5fca9bfb932d18f1743d4c9001eeb34ada52e
SHA512d2328c8cb31b6b72a15e028546050fe9e393c234ca1110285a199ea2af8b86284a9c486c9de21846a3ac8712ed27339067cfd655f48cc8b877e929f011baae21
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5d33dfe89e68abfd3931dfb4368d4cd24
SHA1af6c53aa2f920408cb21e403b8e1faf250632640
SHA2568f7896a781ea5405e808b973aebe1dea9c0b308f4c6c98fb3b0f5dd673d393ee
SHA5125e0e72b145438a0dc8497b0da8b4265b984716281b9fed8cf8202fd699cdecb1dd0d70ddcc5cedef22270bba5e6d49d835746e847c8aa1da9ff9b81d747e9601
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1007B
MD55706bc5d518069a3b2be5e6fac51b12f
SHA1d7361f3623ecf05e63bb97cc9da8d5c50401575c
SHA2568a74eead47657582c84209eb4cdba545404d9c67dd288c605515a86e06de0aad
SHA512fb68727db0365ab10c5b0d5e5e1d44b95aa38806e33b0af3280abcefae83f30eb8252653e158ac941320f3b38507649cce41898c8511223ee8642339cfece047
-
Filesize
92B
MD50e4c01bf30b13c953f8f76db4a7e857d
SHA1b8ddbc05adcf890b55d82a9f00922376c1a22696
SHA25628e69e90466034ce392e84db2bde3ad43ad556d12609e3860f92016641b2a738
SHA5125e66e2793e7bc88066b8df3dccb554351287dea18207e280b69d7798ecd5cdc99bd4c126c3e394db9f45f54bb561e6688f928de4f638c5eca4f101dc2cea54a1
-
Filesize
360B
MD5ba81d7fa0662e8ee3780c5becc355a14
SHA10bd3d86116f431a43d02894337af084caf2b4de1
SHA2562590879a8cd745dbbe7ad66a548f31375ccfb0f8090d56b5e4bd5909573ac816
SHA5120b768995187f988dc15d055f9689cee3ab3908d10b05a625b40d9757c101e067bbd6067ccbcf1951ebb683f5259eec562802ea6161d59475ce86cf6bc7c957f2
-
Filesize
244KB
MD5c7bf05d7cb3535f7485606cf5b5987fe
SHA19d480d6f1e3f17d5018c1d2f4ae257ae983f0bb5
SHA2564c1cfbe274f993941ac5fa512c376b6d7344800fb8be08cc6344e6c16a418311
SHA512d30952a75d94dd64b7bd253ed72810690f3550f2262cfaaef45854fc8334f6201a8cbafb9b175c6435f7ce0499567f2fa8667b4b0046bfb651bf61eb4278e6c8
-
Filesize
590B
MD5b5a1c9ae4c2ae863ac3f6a019f556a22
SHA19ae506e04b4b7394796d5c5640b8ba9eba71a4a6
SHA2566f0bb8cc239af15c9215867d6225c8ff344052aaa0deeb3452dbf463b8c46529
SHA512a644c48562e38190720fb55a6c6e7d5ccfab60f362236fe7d63caebdc01758f17196d123fb37bd11f7e247ce8ab21812165b27496d3bd6ca5e2c5efefab8fb03
-
Filesize
7KB
MD53e21bcf0d1e7f39d8b8ec2c940489ca2
SHA1fa6879a984d70241557bb0abb849f175ace2fd78
SHA256064f135fcc026a574552f42901b51052345f4b0f122edd7acd5f2dcc023160a5
SHA5125577e20f76d6b1cccc513392532a09bdc6dcd3a8a177b8035dc5d7eb082e0093436068f92059e301c5987e6122c4d9aff3e5ae9cc94ccc1ecc9951e2785b0922
-
Filesize
3KB
MD5cea57c3a54a04118f1db9db8b38ea17a
SHA1112d0f8913ff205776b975f54639c5c34ce43987
SHA256d2b6db8b28112da51e34972dec513278a56783d24b8b5408f11997e9e67d422b
SHA512561860907fa2f53c7853094299758232a70c0cd22c6df3534abd094c6970f28792c6c334a33b129d661a46930d90fd8c98f11cb34f3e277cf20a355b792f64f0
-
Filesize
1.2MB
MD54a9b1d8a8fe8a75c81ddba3e411ddc5d
SHA1e40cb1ee4490f6d7520902e12222446a8efbf9a8
SHA25679e9a3611494b5ffafaa79788ba7e11dd218e3800c40b56684ccc0c33ab64eac
SHA512e7a28acb04ca33d57efe0474bb67d6d4b8ceff9198198b81574c76c835d5df05d113fc468f4a4434580b1b58189f38184c376976604dc05d1424af1721995601
-
Filesize
227KB
MD517042b9e5fc04a571311cd484f17b9eb
SHA1585d91c69c3f9e3d2e8cb8cf984871d89cc4adbb
SHA256a9b0f1f849e0b41924f5e80b0c4948e63fc4b4f335bbdf0f997b03a3aff55424
SHA512709076c6cef8dd61701c93e1fe331d2b1a218498b833db10ee4d2be0816e3444aeebfa092ab1bd10322617cf3385414e8fdb76fd90f25b44ac24d38937b4d47f
-
Filesize
266B
MD530cfd8bb946a7e889090fb148ea6f501
SHA1c49dbc93f0f17ff65faf3b313562c655ef3f9753
SHA256e1ebbd3abfcaddf7d6960708f3ccd8eda64c944723f0905ff76551c692b94210
SHA5128e7d98e6d0c05d199114d2d6ab8da886aed68de690c4d79643868eaf051c229fff94c88d937adb3da5e31fe48116613cf79dd00dda30f296746ce0a8aded9fe2
-
Filesize
1.9MB
MD538ff71c1dee2a9add67f1edb1a30ff8c
SHA110f0defd98d4e5096fbeb321b28d6559e44d66db
SHA256730a41a7656f606a22e9f0d68782612d6e00ab8cfe1260160b9e0b00bc2e442a
SHA5128347782951f2647fe433482cb13186653afa32ee9f5be83a138c4ed47ff34d8de66a26e74b5a28ea21c1529b2078401922a9a26803772677b70489967c10f3e9
-
Filesize
719B
MD56c39396259a3208e24733deaec3e6bb7
SHA1e2e463ff45eb9e0a3d8b201de7342288bf95d3c3
SHA256fa6b09bdb6a2a86c807cc220b0450257308b5288ffa9817d0ae1cf2032c928ce
SHA512c8ba7f5aa4a653706f14456fc1813b923a73222a34a6b8053b1156ed4a599d48cdee4ada752738a8bc18294b9225755512c57b7eb11b330cb21c09b289b4f30e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize3KB
MD5e04d58f5bfa7098569a8d15b58c82351
SHA141992500cea10466d346b8c9eb0d8bccef196e5e
SHA256325cd838b2009b07d99f8a3e4532d5ac7be15312ce529246c1b6c6fe3c0f7ba5
SHA512332d7f34a36691dcc84b3af632885f855b2b1da20464a717df43a52ef562b6ead13ab86981b640e68ebb100a9503b3be522724c1e7c768119e2aa8fca098015a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize1KB
MD5a39387c9aa7b1b6cd02f73eeb50e5863
SHA1f6f0b8544c850b21772a6d191cd3cf12dcd9b431
SHA256451531d55d22a62d624c8d3236eb4fc045d50fbc6ca9a4b8172bfbaaee1fd427
SHA512a3bf01e9468b0d89f9bf936a40f293fff621252b58c12f1d4420afc4b5a783fa1fae44f764aecb029adcedb3d4bd81cc49241f319bc9b3842c11f68178d1c554
-
Filesize
27B
MD5e20f623b1d5a781f86b51347260d68a5
SHA17e06a43ba81d27b017eb1d5dcc62124a9579f96e
SHA256afeebe824fc4a955a673d3d8569a0b49dfbc43c6cc1d4e3d66d9855c28a7a179
SHA5122e74cccdd158ce1ffde84573d43e44ec6e488d00282a661700906ba1966ad90968a16c405a9640b9d33db03b33753733c9b7078844b0f6ac3af3de0c3c044c0b
-
Filesize
1.6MB
MD56c73cc4c494be8f4e680de1a20262c8a
SHA128b53835fe92c3fa6e0c422fc3b17c6bc1cb27e0
SHA256bdd1a33de78618d16ee4ce148b849932c05d0015491c34887846d431d29f308e
SHA5122e8b746c51132f933cc526db661c2cb8cee889f390e3ce19dabbad1a2e6e13bed7a60f08809282df8d43c1c528a8ce7ce28e9e39fea8c16fd3fcda5604ae0c85
-
Filesize
1.7MB
MD5187bbac84c1878d4427fd901d1f85557
SHA1094a4ebd3c51923878b83a516545f12d7f556439
SHA256da8a8541e7b6c33f38a1c9607073989f08dec0695c18c18b15c8af199a807600
SHA512bc6962debd2b679ddcbb080607c2d60dbbda257f58f5303496f5ffaf6e448c3eea1ccb7ecf4f6bebb4de7c0016fdc12b4fae311d12db937cc4aade5f14ef373e