Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
Albabat-0xb.exe
Resource
win10v2004-20250314-en
General
-
Target
Albabat-0xb.exe
-
Size
974KB
-
MD5
45d20637261dea248644a849818659a0
-
SHA1
29a81b7cf0f5f4a69fe47c4ccf3d06a300899997
-
SHA256
483e0e32d3be3d2e585463aa7475c8b8ce254900bacfb9a546a5318fff024b74
-
SHA512
a9c935eb23fba99ba74299db7b8ac3a158183d9fe9ccaaa87e8a1b9d39c518d223563378d981e6bf386f058b159609fb42e14ca45c023f7688ca57e0c61d2519
-
SSDEEP
12288:fFDF/UI+c+xTOQUMnufZUgxXu/VzcccSCO4lkAjx9h/MR1V:fjnb+OQUMnufZ+tzcccSCO6ke3/Mf
Malware Config
Extracted
C:\Users\Admin\Albabat\readme\README.html
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (153) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Albabat\\wallpaper_albabat.jpg" Albabat-0xb.exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping6764_711138910\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6764_1120771568\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6764_1120771568\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6764_1933585926\manifest.json msedge.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Program Files\msedge_installer.log setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\6096_13388203777086735_6096.pma setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6764_1292104826\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6764_1933585926\office_endpoints_list.json msedge.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\63df1e6c-7466-48c0-b77e-93a8a87e8eab.tmp setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6764_1292104826\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6764_1292104826\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6764_1120771568\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6764_1933585926\smart_switch_list.json msedge.exe File opened for modification C:\Program Files\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\settings.dat setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6764_711138910\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6764_1933585926\manifest.fingerprint msedge.exe File opened for modification C:\Program Files\msedge_installer.log setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\metadata setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\8b6fcb0d-76b4-4a17-b410-e8885e1acdc6.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\5524_13388203777030952_5524.pma setup.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5216 sc.exe 3844 sc.exe 4820 sc.exe 1824 sc.exe 1640 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3772 vssadmin.exe -
Kills process with taskkill 17 IoCs
pid Process 4048 taskkill.exe 5816 taskkill.exe 6032 taskkill.exe 348 taskkill.exe 2792 taskkill.exe 4624 taskkill.exe 3468 taskkill.exe 6020 taskkill.exe 6040 taskkill.exe 3604 taskkill.exe 3624 taskkill.exe 748 taskkill.exe 5872 taskkill.exe 5020 taskkill.exe 4812 taskkill.exe 3364 taskkill.exe 4816 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133882037766206033" msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-805952410-2104024357-1716932545-1000\{7CC7C4AE-175A-4E60-86B0-16CC805FEB0A} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 6764 msedge.exe 6764 msedge.exe 7044 msedge.exe 7044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
pid Process 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6764 msedge.exe 6024 msedge.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 32 Albabat-0xb.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeBackupPrivilege 4948 vssvc.exe Token: SeRestorePrivilege 4948 vssvc.exe Token: SeAuditPrivilege 4948 vssvc.exe Token: SeDebugPrivilege 3468 taskkill.exe Token: SeDebugPrivilege 748 taskkill.exe Token: SeDebugPrivilege 4048 taskkill.exe Token: SeDebugPrivilege 6040 taskkill.exe Token: SeDebugPrivilege 5816 taskkill.exe Token: SeDebugPrivilege 5872 taskkill.exe Token: SeDebugPrivilege 4624 taskkill.exe Token: SeDebugPrivilege 2792 taskkill.exe Token: SeDebugPrivilege 3364 taskkill.exe Token: SeDebugPrivilege 6032 taskkill.exe Token: SeDebugPrivilege 6020 taskkill.exe Token: SeDebugPrivilege 3604 taskkill.exe Token: SeDebugPrivilege 3624 taskkill.exe Token: SeDebugPrivilege 4816 taskkill.exe Token: SeDebugPrivilege 5020 taskkill.exe Token: SeDebugPrivilege 4812 taskkill.exe Token: SeDebugPrivilege 348 taskkill.exe Token: 35 32 Albabat-0xb.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 6764 msedge.exe 6764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 32 wrote to memory of 3772 32 Albabat-0xb.exe 91 PID 32 wrote to memory of 3772 32 Albabat-0xb.exe 91 PID 32 wrote to memory of 860 32 Albabat-0xb.exe 92 PID 32 wrote to memory of 860 32 Albabat-0xb.exe 92 PID 32 wrote to memory of 2584 32 Albabat-0xb.exe 95 PID 32 wrote to memory of 2584 32 Albabat-0xb.exe 95 PID 32 wrote to memory of 3028 32 Albabat-0xb.exe 96 PID 32 wrote to memory of 3028 32 Albabat-0xb.exe 96 PID 32 wrote to memory of 4840 32 Albabat-0xb.exe 97 PID 32 wrote to memory of 4840 32 Albabat-0xb.exe 97 PID 32 wrote to memory of 2688 32 Albabat-0xb.exe 98 PID 32 wrote to memory of 2688 32 Albabat-0xb.exe 98 PID 32 wrote to memory of 1032 32 Albabat-0xb.exe 100 PID 32 wrote to memory of 1032 32 Albabat-0xb.exe 100 PID 32 wrote to memory of 2976 32 Albabat-0xb.exe 101 PID 32 wrote to memory of 2976 32 Albabat-0xb.exe 101 PID 32 wrote to memory of 1924 32 Albabat-0xb.exe 103 PID 32 wrote to memory of 1924 32 Albabat-0xb.exe 103 PID 32 wrote to memory of 2836 32 Albabat-0xb.exe 104 PID 32 wrote to memory of 2836 32 Albabat-0xb.exe 104 PID 32 wrote to memory of 2260 32 Albabat-0xb.exe 105 PID 32 wrote to memory of 2260 32 Albabat-0xb.exe 105 PID 32 wrote to memory of 4560 32 Albabat-0xb.exe 106 PID 32 wrote to memory of 4560 32 Albabat-0xb.exe 106 PID 32 wrote to memory of 1244 32 Albabat-0xb.exe 108 PID 32 wrote to memory of 1244 32 Albabat-0xb.exe 108 PID 32 wrote to memory of 4168 32 Albabat-0xb.exe 109 PID 32 wrote to memory of 4168 32 Albabat-0xb.exe 109 PID 32 wrote to memory of 1888 32 Albabat-0xb.exe 110 PID 32 wrote to memory of 1888 32 Albabat-0xb.exe 110 PID 32 wrote to memory of 2952 32 Albabat-0xb.exe 111 PID 32 wrote to memory of 2952 32 Albabat-0xb.exe 111 PID 32 wrote to memory of 1904 32 Albabat-0xb.exe 112 PID 32 wrote to memory of 1904 32 Albabat-0xb.exe 112 PID 32 wrote to memory of 1848 32 Albabat-0xb.exe 113 PID 32 wrote to memory of 1848 32 Albabat-0xb.exe 113 PID 32 wrote to memory of 1732 32 Albabat-0xb.exe 114 PID 32 wrote to memory of 1732 32 Albabat-0xb.exe 114 PID 32 wrote to memory of 1324 32 Albabat-0xb.exe 128 PID 32 wrote to memory of 1324 32 Albabat-0xb.exe 128 PID 32 wrote to memory of 3980 32 Albabat-0xb.exe 129 PID 32 wrote to memory of 3980 32 Albabat-0xb.exe 129 PID 32 wrote to memory of 2692 32 Albabat-0xb.exe 130 PID 32 wrote to memory of 2692 32 Albabat-0xb.exe 130 PID 32 wrote to memory of 4228 32 Albabat-0xb.exe 131 PID 32 wrote to memory of 4228 32 Albabat-0xb.exe 131 PID 32 wrote to memory of 4700 32 Albabat-0xb.exe 132 PID 32 wrote to memory of 4700 32 Albabat-0xb.exe 132 PID 4168 wrote to memory of 3468 4168 cmd.exe 140 PID 4168 wrote to memory of 3468 4168 cmd.exe 140 PID 2688 wrote to memory of 748 2688 cmd.exe 141 PID 2688 wrote to memory of 748 2688 cmd.exe 141 PID 1904 wrote to memory of 4048 1904 cmd.exe 142 PID 1904 wrote to memory of 4048 1904 cmd.exe 142 PID 4228 wrote to memory of 3844 4228 cmd.exe 143 PID 4228 wrote to memory of 3844 4228 cmd.exe 143 PID 2692 wrote to memory of 4820 2692 cmd.exe 145 PID 2692 wrote to memory of 4820 2692 cmd.exe 145 PID 2584 wrote to memory of 5816 2584 cmd.exe 146 PID 2584 wrote to memory of 5816 2584 cmd.exe 146 PID 1924 wrote to memory of 5872 1924 cmd.exe 148 PID 1924 wrote to memory of 5872 1924 cmd.exe 148 PID 4560 wrote to memory of 6020 4560 cmd.exe 149 PID 4560 wrote to memory of 6020 4560 cmd.exe 149 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Albabat-0xb.exe"C:\Users\Admin\AppData\Local\Temp\Albabat-0xb.exe"1⤵
- Sets desktop wallpaper using registry
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:3772
-
-
C:\Windows\system32\reg.exe"reg" add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /f /v DisableTaskMgr /t REG_DWORD /d 02⤵PID:860
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM taskmgr.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\system32\taskkill.exetaskkill /F /IM taskmgr.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5816
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM onedrive.exe2⤵PID:3028
-
C:\Windows\system32\taskkill.exetaskkill /F /IM onedrive.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6032
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM cs2.exe2⤵PID:4840
-
C:\Windows\system32\taskkill.exetaskkill /F /IM cs2.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:348
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM mspub.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\taskkill.exetaskkill /F /IM mspub.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM msedge.exe2⤵PID:1032
-
C:\Windows\system32\taskkill.exetaskkill /F /IM msedge.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6040
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM msaccess.exe2⤵PID:2976
-
C:\Windows\system32\taskkill.exetaskkill /F /IM msaccess.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM outlook.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\taskkill.exetaskkill /F /IM outlook.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5872
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM code.exe2⤵PID:2836
-
C:\Windows\system32\taskkill.exetaskkill /F /IM code.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM sublime_text.exe2⤵PID:2260
-
C:\Windows\system32\taskkill.exetaskkill /F /IM sublime_text.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM mysqlworkbench.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\system32\taskkill.exetaskkill /F /IM mysqlworkbench.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6020
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM postgres.exe2⤵PID:1244
-
C:\Windows\system32\taskkill.exetaskkill /F /IM postgres.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM excel.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\system32\taskkill.exetaskkill /F /IM excel.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM steam.exe2⤵PID:1888
-
C:\Windows\system32\taskkill.exetaskkill /F /IM steam.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM powerpnt.exe2⤵PID:2952
-
C:\Windows\system32\taskkill.exetaskkill /F /IM powerpnt.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM windowsterminal.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\system32\taskkill.exetaskkill /F /IM windowsterminal.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM chrome.exe2⤵PID:1848
-
C:\Windows\system32\taskkill.exetaskkill /F /IM chrome.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c taskkill /F /IM winword.exe2⤵PID:1732
-
C:\Windows\system32\taskkill.exetaskkill /F /IM winword.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c sc stop MySQL572⤵PID:1324
-
C:\Windows\system32\sc.exesc stop MySQL573⤵
- Launches sc.exe
PID:5216
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c sc stop MySQL822⤵PID:3980
-
C:\Windows\system32\sc.exesc stop MySQL823⤵
- Launches sc.exe
PID:1824
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c sc stop postgresql-x64-152⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\system32\sc.exesc stop postgresql-x64-153⤵
- Launches sc.exe
PID:4820
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c sc stop MySQL802⤵
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\system32\sc.exesc stop MySQL803⤵
- Launches sc.exe
PID:3844
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c sc stop postgresql-x64-142⤵PID:4700
-
C:\Windows\system32\sc.exesc stop postgresql-x64-143⤵
- Launches sc.exe
PID:1640
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c start msedge.exe --kiosk C:\Users\Admin\Albabat\readme\README.html --edge-kiosk-type=fullscreen2⤵
- Checks computer location settings
PID:6400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk C:\Users\Admin\Albabat\readme\README.html --edge-kiosk-type=fullscreen3⤵PID:6672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --edge-skip-compat-layer-relaunch "C:\Users\Admin\Albabat\readme\README.html"4⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x260,0x7fff4d83f208,0x7fff4d83f214,0x7fff4d83f2205⤵PID:6804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2236,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=2232 /prefetch:25⤵PID:7080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1920,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=2296 /prefetch:35⤵PID:7088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2460,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=2516 /prefetch:85⤵PID:7152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3432,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=3472 /prefetch:15⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3440,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:15⤵PID:5396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --string-annotations --always-read-main-dll --field-trial-handle=3864,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=3916 /prefetch:85⤵PID:5772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --string-annotations --always-read-main-dll --field-trial-handle=3900,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=3980 /prefetch:85⤵PID:5788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --string-annotations --always-read-main-dll --field-trial-handle=3904,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=3988 /prefetch:85⤵PID:5928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=4024,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=4036 /prefetch:15⤵PID:5960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --always-read-main-dll --field-trial-handle=4088,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=4068 /prefetch:25⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=4232,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=4320 /prefetch:15⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --always-read-main-dll --field-trial-handle=4348,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=3976 /prefetch:25⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=4424,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=4552 /prefetch:15⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=4448,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=4380 /prefetch:25⤵PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=4580,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=4568 /prefetch:15⤵PID:5828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=4608,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=4752 /prefetch:25⤵PID:5836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --always-read-main-dll --field-trial-handle=5508,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=5572 /prefetch:25⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=5772,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=4972 /prefetch:25⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=5876,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=5396 /prefetch:25⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=5844,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:25⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=5892,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=4648 /prefetch:25⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=5944,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=6704 /prefetch:15⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4436,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=4780 /prefetch:85⤵PID:5820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=6580,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=5460 /prefetch:15⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --always-read-main-dll --field-trial-handle=5928,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=5432 /prefetch:15⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5756,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=6748 /prefetch:85⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4640,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=5160 /prefetch:85⤵PID:6676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7320,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=5192 /prefetch:85⤵PID:6760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7632,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=7612 /prefetch:85⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7632,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=7612 /prefetch:85⤵PID:6140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7676,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=7720 /prefetch:85⤵PID:5636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7684,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=7868 /prefetch:85⤵PID:5992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings5⤵
- Drops file in Program Files directory
PID:6096 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x21c,0x220,0x224,0x1a0,0x228,0x7ff775956a68,0x7ff775956a74,0x7ff775956a806⤵
- Drops file in Program Files directory
PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --system-level --verbose-logging --installerdata="C:\Program Files (x86)\Microsoft\Edge\Application\master_preferences" --create-shortcuts=1 --install-level=06⤵
- Drops file in Program Files directory
PID:5524 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff775956a68,0x7ff775956a74,0x7ff775956a807⤵
- Drops file in Program Files directory
PID:5640
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7088,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=7108 /prefetch:85⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7996,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=7156 /prefetch:85⤵PID:5580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7908,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=8088 /prefetch:85⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7780,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=8188 /prefetch:85⤵PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=8320,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=8332 /prefetch:85⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7832,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=7900 /prefetch:85⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7360,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=4664 /prefetch:85⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4620,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=4948 /prefetch:85⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6224,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=6988 /prefetch:85⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7580,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=6980 /prefetch:85⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4112,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=5828 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:7044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7068,i,1067912743218679647,1068613012464421935,262144 --variations-seed-version --mojo-platform-channel-handle=3460 /prefetch:85⤵PID:4824
-
-
-
-
-
C:\Windows\system32\cmd.exe"cmd" /C "del C:\Users\Admin\AppData\Roaming\Albabat-0xb.exe"2⤵PID:6408
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:6024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x260,0x7fff4d83f208,0x7fff4d83f214,0x7fff4d83f2203⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1716,i,2028495577204718927,3856440532704952861,262144 --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:33⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2176,i,2028495577204718927,3856440532704952861,262144 --variations-seed-version --mojo-platform-channel-handle=2172 /prefetch:23⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2592,i,2028495577204718927,3856440532704952861,262144 --variations-seed-version --mojo-platform-channel-handle=2608 /prefetch:83⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3540,i,2028495577204718927,3856440532704952861,262144 --variations-seed-version --mojo-platform-channel-handle=3844 /prefetch:23⤵PID:3016
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3736
Network
MITRE ATT&CK Enterprise v15
Execution
System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Indicator Removal
2File Deletion
2Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
928B
MD58534e46baeab4221bc19108ee3a70780
SHA1dc88a8581e15509cfa9985b1ec3bead5f68fa387
SHA256704068fded1f94134f228749dcab0ff607736809b8034af01635e6cbeb382351
SHA5122e0ef51ecb6be50370b98e8d7289aacbb5077bbdff690b7fe7bf09000259795514b6365c5a12b220a8b8e92a24b1c1c96e2115604fff9c2996aebc0d39fede46
-
Filesize
344B
MD51b7cdddfb06152ae01f12d9f253237d6
SHA11ef358781a086a0727f4fa95cd53510eb328bc52
SHA256fd668d6edcf6b6cc176edd9bf7b0d7f1881fe2f0d94ebae656127c27a359550e
SHA5124705c93b233be92dd2d04649d404b538bc76607bbe655d5e35a739653ac1af776ecdd12ec1cbf81476070ec5bae633f891817155014730a06939efb21bd132ea
-
Filesize
160B
MD5c3911ceb35539db42e5654bdd60ac956
SHA171be0751e5fc583b119730dbceb2c723f2389f6c
SHA25631952875f8bb2e71f49231c95349945ffc0c1dd975f06309a0d138f002cfd23d
SHA512d8b2c7c5b7105a6f0c4bc9c79c05b1202bc8deb90e60a037fec59429c04fc688a745ee1a0d06a8311466b4d14e2921dfb4476104432178c01df1e99deb48b331
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
108KB
MD594b83060eb860db45698fab04cacd399
SHA1a3c97efe08f4adb86b67d8e173c37148d309875d
SHA2563d2f003554abfe3a45305a60427d538825b6f2036532dac71fbfff9d36c6aa4a
SHA512b4a0681a4fc52c41d97ff0e5e6427f04f60161b54ef8f611a011583c5d7a4639864f14f6312f0ba4f84acbfb5f7668d5836eceb549021fc3238d795b9193bc71
-
Filesize
4KB
MD5d27644147fb2d151407c0ad3a66d94cb
SHA150fa783f147efbe2b1c46d44e111d134bd1d065c
SHA25637a4e16654e9f577752f9e9a05a34aaf46a5468cb4707e9b63bbca93622afc19
SHA51225bfac92215ed5920a99dd571aeaa3230d98fe02ddb26c74b19a7588821028687c5e64be691ca738bab1dc133ffd33fd46f45938e0ca55d54157f3f502436633
-
Filesize
6KB
MD58fe2fb5adf34c09547d7f645ff7010dd
SHA1e24e5c1e90898a618fad2c3b4e4b17eace536e20
SHA2566f2e8e5645c3a32d3326e7d7044a0d96c4e19252e3f5d737ba5a878027de3c51
SHA5129490f267625b869739b13581c6e1c729c052848d53d3a689dfe4d32add8fbef154f7faac6323a6441dd768954ae4c1639a2135aa1474218c1c4dddcd9d159512
-
Filesize
11KB
MD51fbfc828d3b51f6523a3fa63fdec3b38
SHA1f44dd96308efadb546a424233ac7d5dead968416
SHA256f0a9e7fd9c934e4e9028dda7f23916f970b87ee1043b3866b4f038fca5019b8c
SHA51248ce75112f844004e9fcb183825aff61689ce9a7014836fc36ddda5064bf049693a0dbc14c90e7fa2d904b75504b1b202aeb7c4445e49c20bdf440b9a0e4f481
-
Filesize
34KB
MD5cdd21e46a5979655fe9debcf8d59cd4b
SHA194f8ce57c0507b88952fadc3f6f244fce64d2085
SHA256de25a55ff7e70c900c5e49e32aad2a0704ab074af5fee3eac230dc9bab373f04
SHA512bd0ce1c5098ffcfb52e3e183ba025ef1be4d0dd4a3fe8a90b60bb139d4717263e427339f1028aeec6aa8d32ff31181ebff8d306d2c34b57015b2a3049c21f45e
-
Filesize
1KB
MD5e9f53c2fe8f64fb7d0734d13ee9a4e32
SHA1f93d0cfffe122ed8a1731b811593094c813a8456
SHA256ec235d691cfabc4ef54a889398e17d11541b10f27a066e10444429c86a4565bd
SHA512ec67691036ff7047aeed7b4dade254164d2a5e60cfd5a58269023ac843252e7d916c826e6f0a186fb6398a11e651e6fca9cf889a81894095efd43253fd5e1e7e
-
Filesize
2KB
MD5a4aa4f0c506a5e9c608773293ff7b794
SHA1b360063387c81c49184cd67341c1da46e7ee6693
SHA256c18a7519a841d7b8b32f5fedfb8d7cb1107c0d03c1c0d5ec7b6c41564814dddf
SHA51223e17b9ca42520c0a07a1031ae096dfb837196d3928205c8eadbceda87bfff5f1655ee953bd725298175564f96d96e751d9f02ee0b83d25b134b292fea175815
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD5aa136006ddc8286d8c43f834eb72f48e
SHA176d5ceb0657372399d3df51de920690757618e8e
SHA256138063b410cd3a5534ef4d423ffe43bc63183251e96b475552a2d48c3df0a8cb
SHA512e7ec9f27b9589f6d9eda1b9e331cb3e31f20d4f3bcf559e7ba4ff24dca213e63ad61d6cb9c91afd2849448c06b110d80bfbbb765fdedab7df34a4d8237429c7e
-
Filesize
280B
MD51589ef8f641918bb7d66e39315f3940c
SHA1dabc5a5c1108c9ca467786a74ac6fc999f57d59b
SHA256aef01b2f270b5c271d040051d028c1521f2f391c9b0389668f111a3dc66a87a3
SHA5121e4dbf578b980cd2fd6c04e1e0b58b959dd9c78cf7f37e565da5c17e1e5df54f85325b9da47944fd078a9e7b2ea466410664670e0377d016f77a3214c8887cc5
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5a229bdef25f097e1220b5a11d7cfc6e7
SHA19f464bd92bc439444b0561b31fe05932a30f61df
SHA256fc8c0895063b16cad3d1ef054c206c972a5097e6b7a7ac779a6578ec402612fa
SHA512d44201fe7969551ba0f530cf13104a368e74b6320f324fb68ab270b3a3b4b69e01d40b87ff4050e28a5a38b2e42c8d461185a66583569adf9854bb57e4234cdf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Code Cache\js\index-dir\the-real-index~RFe58075e.TMP
Filesize48B
MD5ef04ef0786a412bbd7e7427dbbaca86c
SHA1ae2e68fa49e2983e3a8472d933faf71054ff69f3
SHA256c142309e159eca7a379f624d99930a988b608ef3b4f19c692e3f44ee60d05d6b
SHA51255148240d19907c7356788872216b6f224f37c46177b6cd84158e98336dc10d47dae71e6266afd22e0dcf2f024389a7f3ad47789a02e36fd9ed6abe13d708f42
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Network\Network Persistent State
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Network\Network Persistent State
Filesize1KB
MD5d2563b16a7a8257a627d5939e0bfa845
SHA11eb80ca4b3a77c479036c08e441a7520f5f8f80e
SHA25620d0a2cb23ad7198fb79734ce5fec1d831c789bf2e3a4b588acb220d6591d7cd
SHA512792bd09b69217137594af5dbc31f831ff0c60e87fe4880ffbdc19e3fdbc6dadb051983518ca3c4653fb5735b2ceacfe7d5ead61c6187290dad7bb9f64ac87bdf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Network\SCT Auditing Pending Reports
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5703806ee6b6463f759fd48a26b5ebb6e
SHA132ac9d797c31393fd0d582619b6a46231600293f
SHA25620c440b38a8b7bd77d3cf9ee6297e595bdf82511a32a80f384c147a0c336508d
SHA51211db67752d14270ce2be927c22997184aa780b8a380a73fdbfe5dd2fdbb0a119945fa3627810ca26f3937681c1a57f0f066e5cb0f4a0ead3bf90c1d2bb3ff164
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5bf58a4683761a683d8e6fb6373ef6702
SHA1d408cf9ffc076a7beb8c84ec302e852f619f44e0
SHA2568357f53b7bb73592507d9ac13e3386d09f638446b7422d593cd745d4295c7b36
SHA5127c9b4c2254aab7378e8acdd44c816d5bed8e316a7c83723cec65d28027dc1ff1da121b242cc7c7bc06c015d022a2f4f364ead4e99d6c8b395e585f95ec635716
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir\the-real-index~RFe58078d.TMP
Filesize48B
MD518dd96623094285e59a559b0516efb4e
SHA1439709a8c192405dc02b2caf055a82f5585e55d7
SHA2567d76b229fadf359743c21d8c993be7daac300f30003191d6ef96018ea8726396
SHA512c4a9d8fd75ddb84e33c53eefac1472a43020326b9a6ac9b24f0f7155ccbe0a2228684699d51eae5dce67bf7a293139726b50d3287f0ef97eb892191d780efdb8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\a642416f-acb8-493f-916f-01f297916081.tmp
Filesize29KB
MD5840eb796162cade07fade0256ee2a114
SHA1503f8d5e45c8ffc1d2d07ad61f40c34eeee04585
SHA25676f6c85fd14b1ede9c5d91cb6f3b5e04d61bf6dc45c41fc9a2bab9c4b09bfda2
SHA5126ccfd4fa2b3dc94df1884e2150dab50a4e63154c16a95758752d1ddff628ad9d6db85b57bcd7bbced2c958a16d0f1caaf0c370db12bed4979e9a313e9bb61bf4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\aa3ebf1b-bcd8-440d-8cc6-81908aa7f262.tmp
Filesize9KB
MD5b13bf314f502b0b81eb7b98460e07210
SHA1feb7ce46f97a44c471c77e3fb953e009cd5e73fb
SHA2565e07c4c23a26f566635b438458d389754018d58d7f80e8b4e3bde419e3b8ead0
SHA51218cfd527f241d1724225657295214f0ae7cfe114192ad1b0015f4b785ce4bcd428fb773bef3b3941b97666e4667af7b2bb0a6d5cd3a8ecc146351d91da62012b
-
Filesize
872B
MD5211e4f90c0bd94ba1414f7b186b512ac
SHA1cf303e9b63a6f6e1aa572bd6bbf2ea4cfd232f75
SHA256ee20a9811c64201a9c26139023e98f35cdab9b94b136aed7dcf8def1cee4c4a7
SHA51273640aafa72fbeab9e7db0701eaef8ea7f6e7e147e5526b63899c89bf99804e2f35b77493a40f384555cae7e1e5604e1d5381baaecb0d191c673a6c9baded2bb
-
Filesize
23KB
MD50267027a05ab888ad93207cf03560d29
SHA1af70ebfc25b1ab945e48f6f3d4ee3ddfc34c3a02
SHA256e791da362d4e16aa3b5e4da8ce5e52398fd496e8ee7c7befc30910583080ff3f
SHA512e2faadbdc975761d3280bf870d2f2ee1edf75263f23be61e0893c1eebc6f4c5cc7c247fe9e0cf85ba9add11f0f2fa17d101101ffbe1bfccf009c283fe295a709
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Edge Cloud Config\CloudConfigLog~RFe589bae.TMP
Filesize465B
MD5ff864f2ab7668dd93fa61bb46a0a7161
SHA1478b5c719f95b2cd17f38989b22a33f2220bd901
SHA256ecfa03eb6408fbb0af8ff7d7eb2a775a83020e3f3786e253608908254204c19c
SHA5122708066e32b656cbc792dccede71ee2e7aa9e397e488d567fe513ade06c57731a347d36683dc1a400ab9a3fe89540f35e08cf42879266d4844c71e5772441653
-
Filesize
22KB
MD53f8927c365639daa9b2c270898e3cf9d
SHA1c8da31c97c56671c910d28010f754319f1d90fa6
SHA256fc80d48a732def35ab6168d8fd957a6f13f3c912d7f9baf960c17249e4a9a1f2
SHA512d75b93f30989428883cb5e76f6125b09f565414cf45d59053527db48c6cf2ac7f54ed9e8f6a713c855cd5d89531145592ef27048cf1c0f63d7434cfb669dbd72
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Edge Cloud Config\OperationConfig~RFe58a0a0.TMP
Filesize3KB
MD547430e0e9ad4838b6b88191b7966810f
SHA18933b4ce19e396751f93687305d3d378c48e2e0f
SHA25698c1f419b9efe0d2a9f4350442d90916bd07593d9ecde4706030d1502cfb90d2
SHA512e3a4e44240a11ce2173acfe66f6b52bdae8fc9c97dfdca441700ab47b5c73a46b71405da95a2cc08c34507fddf4349923c33da57da244e45b5019b9898e6b65c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
3KB
MD52376fcb7031c5948bdfda085a2289f8d
SHA14b354e13725c4680fd9a83cd965ef26277ecb8c4
SHA25673a091c049d3647a0fdfe5232409757014f57694bfa141e00c2339274e392357
SHA51245f5d72f20a0646651a8b0a33d7030d9850b92a9603770dc433c4968ffcdb55371857b8eac260f2726d53791cbf44d328d0bc0bc2bf958a46342726e9d6e113e
-
Filesize
4KB
MD5f808d29549f8268490726c9e9f8dad6b
SHA1bc47b5c3ec5c88ab1a71bfbd0a1f5b82b97a70c0
SHA25684d908be0ed3f959812605805197ec343047aff97c53819517e556dad8bcc255
SHA512d2e88504978dc7163b2aaaee4a3bc8190e8686256919ebe9099d13d3841a38287598da220de3c79c3578c664693cd12caf94b36a6229171b543f984b6ef497b7
-
Filesize
29KB
MD5a055b3d9fb0270221e58dbd7d6681730
SHA15575c881a13ca63930386cfec0e6561a00d6b5a6
SHA2564885886b6f9fa8684f54d766b0ccf74ddc3fc11d3b1bd2309289e45699765876
SHA512fb5f3c755d2ef71892ea3b89f29f6e709505482b51cfe4adcc0e40f6efd4fc8576d1337b53d952889ac52b024e9c35c0edb551c6a9a080c386e3d8ff3dab859f
-
Filesize
33KB
MD5c148f0b4e3b47dad108847ea254a8e96
SHA19790d6617b60e081762aa78911b5b2fb7c433f82
SHA256319b71d5b33aff9ae72285ba283ea222b07f27a74d7ada8e034d1c878d0a6c5c
SHA512da973d66597c7a7c89201f2697bee529b4035c9b834eb0d5216e8453f5882253a712ea79071b1748a5c7e2a75d29a49fba7080cd436aff82747c7e82ae2a571c
-
Filesize
1KB
MD5e165f15845cf119b13541ca9397148e1
SHA13f049cc8bdeba953bcbbb6a2f333646cf58a4d61
SHA256d3aeed0f2f20418ad4838037bea0e347e9a30f3f69a5be21e9fe70ac7974286e
SHA5121d9cd22fa33b1ebe76bf425b1146582058da4e29659861c54cce7a65cb1c677191fde4e66fe690adeb90638d3edcfb4325152f7dbb6ab85e8bcb5e6732868074
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\WorkspacesNavigationComponent\1.0.0.5\nav_config.json
Filesize2KB
MD5499d9e568b96e759959dc69635470211
SHA12462a315342e0c09fd6c5fbd7f1e7ff6914c17e6
SHA25698252dc9f9e81167e893f2c32f08ee60e9a6c43fadb454400ed3bff3a68fbf0d
SHA5123a5922697b5356fd29ccf8dcc2e5e0e8c1fd955046a5bacf11b8ac5b7c147625d31ade6ff17be86e79c2c613104b2d2aebb11557399084d422e304f287d8b905
-
Filesize
280B
MD50db1d88802048ff847bfcf47035335bd
SHA1bb54059e5b145da464f6521ae67353889ce00771
SHA256416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a
SHA51232c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30
-
Filesize
280B
MD58734b4a181214bb62f91cfa36c7e2c98
SHA19cff323f10778a23d73ac3dcffc038d3bf661b78
SHA256e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5
SHA512e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\fcb6ab9a-7168-4767-b23f-8817eee9fe7f.tmp
Filesize2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\9f1c8426-8d44-4044-be38-c538fba25957.tmp
Filesize61B
MD54df4574bfbb7e0b0bc56c2c9b12b6c47
SHA181efcbd3e3da8221444a21f45305af6fa4b71907
SHA256e1b77550222c2451772c958e44026abe518a2c8766862f331765788ddd196377
SHA51278b14f60f2d80400fe50360cf303a961685396b7697775d078825a29b717081442d357c2039ad0984d4b622976b0314ede8f478cde320daec118da546cb0682a
-
Filesize
6KB
MD57c3062c44145efe559a06f3c3d12f447
SHA11bb7ec06369e42b22718c77ab3486004726db427
SHA2567c8be600243ba2884da954a295299010034e2da78a3da207675b70c3d89f65c2
SHA51208228352583e2bcd43357da49bc720d5255fcededa1b4f4d6e2449c933910668003e5b74eb53a7cfe59218d24b1b5cbd42637d80131540653f8507b5cdca0a49
-
Filesize
26KB
MD515f36800a437fea2f833b340338de069
SHA1d8901dc78a8cb743566b4029037da2e9c3b41721
SHA256f72fca3301a04e033ef5221f9899f198a65a38470baa83f5d2bc437008db1809
SHA5120bdc8294c36785121211ea5a7b6f9b8f7e7ddb9e2c8ad06c570e4fb42630b5428afc22420e3f8eb713cebd30854abd04a220f774c9549b5d5348d2cfe41b0f3c
-
Filesize
8KB
MD5cfd4069aaeb9513b13dec23691d96554
SHA1ad6834fa1ad5b35243b8169d8b7b669e472f0072
SHA2566189751235b3ebd94aaa076d06b058f97ad2ce1131b7121711d16aa225fe976c
SHA51281aa47b5383294f7066842549ef524a8b445d4e942b0bd45f964fd9470ceafb548392920bff9d8273b683cfe6d52bfc2df90508e953a33c03f8d24a8052be5a9
-
Filesize
6KB
MD5ee0fc104bc4fa16b08b6d74959936897
SHA111252bfe0983b1fe09a1f7219e77dea1d32b7ea8
SHA256af2c6e966acd14ce671edaeadd20312e1b99b4434028fc97f15a1700c1d7a9c2
SHA5124b67fe2929500cf9bb8b7e58bbfcc5927daa1209d2f6f95648c8c4b4b9f2807a632f964928999e9a982254925c51cde639dbfa33c38d2dc56dc3de80ae7357fd
-
Filesize
7KB
MD570348f145f56d3b80b95d79edd4b8687
SHA1bf5c90f32b1761e022483c8caa7e377070796db3
SHA2569ce031c461b6e9ddc381d097819ed13451993d88c7e2db7e6e607f4ae9188d27
SHA512e55daf2782b233af3188f5f586f434c589112a4cb1ca2dfcdd6a53ec6532bdfdfd18aadc93876525823f21f3e5ee8f4ee59e6ba2c1c3158e2fd8c49bb7a96dc6
-
Filesize
8KB
MD5c64a314fd1812a77dffc9079cdb2e5af
SHA113dc7c8d91e920fc0661f690720ed2b656e568ab
SHA256fe61c98c3a996b24d1685648210f8cf1dc6707256a05f3e0099aceed8d8e1767
SHA5124ff53a88c8d288a2433f05e84c7dccb4dc95dc8054ca4a684b7c8c56000923df8cd92fe0d36939ed5ffa632c5fc90fc988fdda3feaa9c3f81b5f8b8c8128dd51
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VSX8ME3MECNP5KC2IH2I.temp
Filesize3KB
MD53631f886fdbd350ae0c9a235d368f316
SHA19a5b8e29fead310811c9982486ab136684e304f2
SHA25663005e4e1b845de549a5ba8990beb352c0fad45886b6edc0132e1ee59d5b180b
SHA51251dd038a58931bd91b0e5588f9a41e28d7511953734c0bda92248016f006a58ed735f5d26e9960b06bc61ee099685511e02e51a4659ffa4e52f7a1316a3bce29
-
Filesize
166KB
MD51bef74ab5023df4207ced2e00d553ec6
SHA1923943df12eadf2a95400fbc0edd002b4f43560b
SHA2568de4d1ff6eb6d0e47bd617313729e1d227ed1f97618aff94447390cd6d96d37c
SHA512eae0d5eb15b7da820b5f23faa36c144bc0a2acb49ce0108684417c91c3034a6de1013e1ad412113e7251124566acd86875d2ec4536ec707d6ceddd2863accf8f
-
Filesize
227KB
MD555354a8053c926cc6b2a10f0e7f9a442
SHA12fc44da2adeeb9507e3469762bda1719b8682bad
SHA256015f04792e9b2efcd55c83269a58139c4fa63c575700620711968f5bcf502caf
SHA5128edd44ec73c939b4cd62c9343ed23b5a438ef220bca918a6c60c5ecb1a7e3bde4ac9f5b5322ae98cd1a772c1e2aa442b4432235bb66456dea09836f077b0fe86
-
Filesize
204KB
MD5ce22b3917e94f0896787a797bf1cea4c
SHA16a185aa3b9cfd64996797bf455c424ed58befae3
SHA256ef47bce5f917c41018ab0abff4227a103f4e344f6b7739bc2b7217e76cb7ef7e
SHA5122408ab525a03c31465687c54759fa04fd4584c910b362bcf525fe8ddf16ad020ba0c42e5f7744a5b443e8047f7b602e4c588fe22dc33afdaf701453e14c7e622
-
Filesize
242KB
MD508108031002200f9a956f51b5e64c31c
SHA15b7b7cbdf2c5b609bd8b164332b45f39cefd7025
SHA256ef0e7abbd3e58090e7d09040467aecb41e00bdd631d53036e2f7e9f86c114ba2
SHA512884268ca51caa5d185dd88b4b5c6c6807dd9ee3aa53f03d1274f9c04f80f5eb52e83fdb7150cbc06b5806317af89eb8a42e0d6730f0af57393b713419deb825a
-
Filesize
128KB
MD5374e04ee333bc69a983f0c03faf421ff
SHA19de2a5e8649633b02818811a2ab63df4a8a9444e
SHA256095b925148f7b77e9a41c6eae0ef2670169b28d20f2ecc3cea82126e0aee6c1c
SHA512446e379db752c1ecf41485db662d1d29844cb117b91257125d295675808e8977411a9ecec7493789d3ba2313e2b666e525fcf3a66ca6a0bd0c1d7acafef3457e
-
Filesize
234KB
MD51d931fe0617245b9f20d617069cb348c
SHA1952eeb7ea8e73316e5aa9bcfe49fe52a7941e7fb
SHA256f777e4e87b36bc8fc149901a822101738f594eb717a0b34466cd8a06738f508f
SHA512b74f5a60768af2b97108e37e8377effc01e354138cba00818253962897b1f482e51710c6138dd06c8e010d0251e3fe2626f220ce798b060486203a6e00dce57c
-
Filesize
174KB
MD542020e19a136f6d51647fbecc2be92ea
SHA184a5264c6efcd7cc7029c55871b0120268f5864e
SHA256b0fc5b0a7b84f983e42f03612f7ea4e8245fe56747df0338f402ab9dc3108262
SHA512b5155d65cf2faefc2bcb18563f48ae60ca8d9d7578b5e6ebbf0f5867581b7ab4feda4b2b5f31c57d776200a5cbc5aa7398287a6dc7f45167a45e3fbfd416adfd
-
Filesize
106KB
MD5f2847b4c38947f9bb8743232b96a6799
SHA13668ec17c64edc282e778ec61872b2e25871335a
SHA256dda9a029fcf84c7197b6497536f282118e7d393198f28e29ea2b3d03c48efabe
SHA5122ca02d15ab980329b0ec359f8c0a288291b5a73a555c95fae23c1b55a045bdcee126b967ae72a240cfa7f3c346c661179034ab848d30ee94edc4f3430f577369
-
Filesize
121KB
MD59a39c51ebd83ea1342d24800a4ef201d
SHA1fdf1719be1621db6eaa312ff15f223a413362a71
SHA256895c3a35da7f9bd069e03ea76082a66ed389caeb5b5e1c4a6b4097c121f06b63
SHA512496d761df56793497fe9a1462a79c44c1d08b09ce15ba338fab5de22ba608d0f8e63247dce9d1ce146c7bd430e3e4e2e51ca84429b9c78920caab9b28954bf52
-
Filesize
159KB
MD598547646cdb16487da7634b3a16c4791
SHA138a23fcc7717a9c480914e67bb55502f56bde028
SHA256630d0d66c0183e7a7900e8ffcf8c6203b1ade027a9ea786bacd87c5234609cea
SHA51261055331bdf8508cfb57ca72587f9684e6c731a85da3c5093c99d4c987e9b27635a4c2d8e1f2fc4cb88a977bef88988066d3a9a7baa42569bc7714997dd6df3e
-
Filesize
2KB
MD5978fc779962dfefeaf24314591c612f7
SHA182f71df456cd000e03cca6748c4f5445ee25c33f
SHA256c0fc5f539b34d558b07d3a25d68737af64adfc6eb74aedd1edcc3817a0bcb6b8
SHA512110885d1cd66e23a2e919bbe8e7c65a878d7b893b0e348e1172038af4239ea9e1018d7dcaf0e40c3855875dce30b5a83686b262726cf4cd51e68661a1769de7b
-
Filesize
651KB
MD5167657b7611c409c736e6ec83983a781
SHA1200d259775446c68345b5e68a781b7bf32d4e8d4
SHA256adbf66cf5c74200a9160d0732c3670142699df2b6990c812afde4d2d190beb86
SHA5121227e6b976d9977d74323e2121ab324f4e85df9098d25e8c819fb7c72dc7f358a6475b74b930e7430aa0369f76a4166f85e2dda0e90867095bd4e83af5c27601
-
Filesize
373KB
MD5105e8600b785bccb5d3690bcba125041
SHA1ee2c3d010121607113debcfdeda83edb103b2b9d
SHA256eb6145cfb9570c16d540f5e08710d66194a3809b3ec55fe4a6324d5eb5924dd6
SHA512925f6feb75834c14a32cc154e88b0254156a8a1d804c8d4240c01291ef9b948e8f6bc3c319c8b06eafd8b8012dccc16c2107783b26d561e69a79efa714da7b1d
-
Filesize
494KB
MD5c2b4e1d8824fb572c394f1f74373f8cb
SHA1e7a026537d025be8b04c8aeac3c95627fae47060
SHA2561830629397a349d97e25cfb68507068564021065edad5d06af7fe47a1e012470
SHA5125bbf389fc6944c6fa2c16b1e4f6d6eea75f0571d056da58f7c13f35d13f02ddd533d46780c18896b9d8e53867c0592f3cd79586e022d1d231fb7bca8b9447959
-
Filesize
421KB
MD59701dfc177866ecd5f0c16e24777e747
SHA1c4e38b362aa96f468821c3f7758bf07784b15d21
SHA256a0c3a3624429f514c9abb4add271474820317a77c8b123a5eb58b4f42bd11d16
SHA51240dd118d700440554e4537b926946033287da9d6768a85a7cd548763104d52ee8f00c533516c527f27e4b6e0f31479e30cf8f7f08c662177708b4508522425d9