Analysis
-
max time kernel
2220s -
max time network
2132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2023 15:59
Static task
static1
Behavioral task
behavioral1
Sample
Telegram Desktop.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
Telegram Desktop.exe
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
Telegram Desktop.exe
Resource
win10v2004-20230220-en
General
-
Target
Telegram Desktop.exe
-
Size
3.8MB
-
MD5
1d156ea00258d8c5ed190ab425b6bf67
-
SHA1
92014a052c4654a167e933702d8b12b13ca6a90d
-
SHA256
96890d1d86aad9940fd54604ef09dd7e2dcf5cc084eeaf63a1062b4fbead91ae
-
SHA512
1eaa1fe0a8bfab0004d6dc5b773f710aebd5027f2258e41b5cf24eb164a70eb65a2395cee7d3244898e011baee3e3fc6d83dbcfbe1048d117984fa9fc40d8a54
-
SSDEEP
98304:iFgMEhr3Or19KXlcw1CdU2uP318hXjETV:uzGrO4n2uP3iwV
Malware Config
Signatures
-
DcRat 37 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1448 schtasks.exe 5500 schtasks.exe 4432 schtasks.exe 5560 schtasks.exe 4208 schtasks.exe 4792 schtasks.exe 6008 schtasks.exe 5468 schtasks.exe 3752 schtasks.exe 2900 schtasks.exe 5856 schtasks.exe 5904 schtasks.exe 5136 schtasks.exe 6076 schtasks.exe 5784 schtasks.exe 5356 schtasks.exe 3900 schtasks.exe 1508 schtasks.exe 2184 schtasks.exe 5852 schtasks.exe 4088 schtasks.exe 2496 schtasks.exe 4848 schtasks.exe 6124 schtasks.exe 4388 schtasks.exe 1828 schtasks.exe 1672 schtasks.exe 5212 schtasks.exe 5920 schtasks.exe 5392 schtasks.exe 6000 schtasks.exe 5624 schtasks.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Telegram Desktop.exe 4444 schtasks.exe 2220 schtasks.exe 2324 schtasks.exe 4292 schtasks.exe -
Panda Stealer payload 2 IoCs
resource yara_rule behavioral3/files/0x000500000001dac2-1883.dat family_pandastealer behavioral3/files/0x000500000001dac2-1884.dat family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Process spawned unexpected child process 36 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5500 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3752 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5136 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4444 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4432 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6076 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2900 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1672 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5852 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6008 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5784 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4292 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5392 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6000 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5212 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4848 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5920 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5856 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4088 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5560 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5356 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5904 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6124 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5468 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4388 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4208 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1828 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5624 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2496 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3900 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4792 1440 schtasks.exe 147 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1448 1440 schtasks.exe 147 -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 4 IoCs
resource yara_rule behavioral3/files/0x000200000001e2aa-1889.dat family_stormkitty behavioral3/files/0x000200000001e2aa-1888.dat family_stormkitty behavioral3/memory/4172-1890-0x00000000004C0000-0x0000000000510000-memory.dmp family_stormkitty behavioral3/memory/4432-2615-0x0000000000340000-0x0000000000390000-memory.dmp family_stormkitty -
resource yara_rule behavioral3/memory/4204-2362-0x0000000000700000-0x0000000000990000-memory.dmp dcrat behavioral3/files/0x0002000000022fca-2368.dat dcrat -
Downloads MZ/PE file
-
Drops file in Drivers directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\pciide.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\srv2.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\WppRecorder.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\acpiex.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\agilevpn.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\AppVStrm.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\exfat.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\mskssrv.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\Microsoft.Bluetooth.AvrcpTransport.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\rhproxy.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\wacompen.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\en-US\cdrom.sys.mui SearchApp.exe File opened for modification C:\Windows\System32\drivers\bthenum.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\rteth.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\isapnp.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\NetAdapterCx.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\TsUsbFlt.sys SearchApp.exe File opened for modification C:\Windows\SysWOW64\drivers\gm.dls SearchApp.exe File opened for modification C:\Windows\System32\drivers\fsdepends.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\kbdclass.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\en-US\ws2ifsl.sys.mui SearchApp.exe File opened for modification C:\Windows\System32\drivers\IPMIDrv.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\umpass.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\Wdf01000.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\Dmpusbstor.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\dumpsd.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\dxgmms2.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\hvcrash.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\intelppm.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\rasl2tp.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\WUDFRd.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\en-US\wdf01000.sys.mui SearchApp.exe File opened for modification C:\Windows\System32\drivers\Ndu.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\raspptp.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\usbuhci.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\asyncmac.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\TsUsbGD.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\UMDF\en-US\UsbccidDriver.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\drivers\KNetPwrDepBroker.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\en-US\mouclass.sys.mui SearchApp.exe File opened for modification C:\Windows\System32\drivers\en-US\mrxsmb.sys.mui SearchApp.exe File opened for modification C:\Windows\System32\drivers\UMDF\PosCx.dll SearchApp.exe File opened for modification C:\Windows\System32\drivers\hidbatt.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\hidparse.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\qwavedrv.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\Udecx.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\en-US\modem.sys.mui SearchApp.exe File opened for modification C:\Windows\System32\drivers\dfsc.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\Microsoft.Bluetooth.Legacy.LEEnumerator.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\ndisuio.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\en-US\volsnap.sys.mui SearchApp.exe File opened for modification C:\Windows\System32\drivers\en-US\wacompen.sys.mui SearchApp.exe File opened for modification C:\Windows\System32\drivers\UMDF\en-US\IddCx.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\drivers\urscx01000.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\USBXHCI.SYS SearchApp.exe File opened for modification C:\Windows\System32\drivers\vhf.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\vwifimp.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\en-US\storqosflt.sys.mui SearchApp.exe File opened for modification C:\Windows\System32\drivers\usb8023.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\USBCAMD2.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\vmgencounter.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\cmimcext.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\devauthe.sys SearchApp.exe File opened for modification C:\Windows\System32\drivers\drmk.sys SearchApp.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Checks computer location settings 2 TTPs 32 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation CHEAT and Bypass Matrix.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation CHEAT and Bypass Matrix.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation RussiaHack.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation msSurrogateHost.exe -
Executes dropped EXE 64 IoCs
pid Process 4916 Matrix Bypass.exe 4172 RussiaHack.exe 5792 Matrix Bypass.exe 5564 CHEAT and Bypass Matrix.exe 4204 msSurrogateHost.exe 4512 SearchApp.exe 3792 msSurrogateHost.exe 1476 msSurrogateHost.exe 3952 msSurrogateHost.exe 2032 VapeInstaller.exe 4432 MatrixHackByFilard.exe 4640 Matrix Bypass.exe 6036 CHEAT and Bypass Matrix.exe 4188 msSurrogateHost.exe 4528 Matrix Bypass.exe 3396 msSurrogateHost.exe 5648 msSurrogateHost.exe 4000 msSurrogateHost.exe 4908 msSurrogateHost.exe 4132 msSurrogateHost.exe 1852 RuntimeBroker.exe 1504 System.exe 700 Idle.exe 1848 sihost.exe 796 SearchApp.exe 5652 taskhostw.exe 536 winlogon.exe 4940 RuntimeBroker.exe 4524 System.exe 5972 conhost.exe 4904 smss.exe 3232 Idle.exe 1636 sihost.exe 4492 msedge.exe 4156 SearchApp.exe 1952 msedge.exe 6108 msedge.exe 968 msedge.exe 4544 msedge.exe 2424 msedge.exe 6040 msedge.exe 2608 msedge.exe 4972 msedge.exe 5516 msedge.exe 4600 msedge.exe 2044 msedge.exe 5500 msedge.exe 4608 msedge.exe 3852 msedge.exe 2844 msedge.exe 3956 msedge.exe 6864 msedge.exe 7444 msedge.exe 6808 msedge.exe 7992 msedge.exe 6092 setup.exe 6896 identity_helper.exe 6876 setup.exe 7284 msedge.exe 7440 msedge.exe 4112 msedge.exe 6888 msedge.exe 5940 msedge.exe 4052 msedge.exe -
Loads dropped DLL 64 IoCs
pid Process 4132 explorer.exe 4132 explorer.exe 4132 explorer.exe 916 Process not Found 916 Process not Found 916 Process not Found 4492 msedge.exe 4492 msedge.exe 1952 msedge.exe 6108 msedge.exe 1952 msedge.exe 1952 msedge.exe 968 msedge.exe 4544 msedge.exe 4544 msedge.exe 968 msedge.exe 2424 msedge.exe 968 msedge.exe 968 msedge.exe 2424 msedge.exe 6040 msedge.exe 6040 msedge.exe 2608 msedge.exe 2608 msedge.exe 4972 msedge.exe 4972 msedge.exe 5516 msedge.exe 4600 msedge.exe 5516 msedge.exe 5500 msedge.exe 4600 msedge.exe 5500 msedge.exe 2044 msedge.exe 2044 msedge.exe 4608 msedge.exe 4608 msedge.exe 3852 msedge.exe 3852 msedge.exe 3956 msedge.exe 2844 msedge.exe 2844 msedge.exe 3956 msedge.exe 6864 msedge.exe 6864 msedge.exe 7444 msedge.exe 7444 msedge.exe 6808 msedge.exe 6808 msedge.exe 7992 msedge.exe 7992 msedge.exe 6896 identity_helper.exe 6896 identity_helper.exe 7284 msedge.exe 7284 msedge.exe 7440 msedge.exe 4112 msedge.exe 6888 msedge.exe 5940 msedge.exe 4052 msedge.exe 4052 msedge.exe 5940 msedge.exe 5792 msedge.exe 4060 msedge.exe 5792 msedge.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4}\LocalServer32 MRT.exe -
resource yara_rule behavioral3/files/0x000300000002272a-1954.dat vmprotect behavioral3/memory/4172-2326-0x000000001FA50000-0x000000001FAD4000-memory.dmp vmprotect -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MatrixHackByFilard.exe Key opened \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RussiaHack.exe Key opened \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RussiaHack.exe Key opened \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RussiaHack.exe Key opened \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MatrixHackByFilard.exe Key opened \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MatrixHackByFilard.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MRT = "\"C:\\Windows\\system32\\MRT.exe\" /R" MRT.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msedge.exe -
Drops desktop.ini file(s) 33 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ktopini-systemtools_31bf3856ad364e35_10.0.19041.1_none_345e4e1d2701732b\Desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..l32-kf-commonvideos_31bf3856ad364e35_10.0.19041.1_none_923716ddadd939c8\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..opini-accessibility_31bf3856ad364e35_10.0.19041.1_none_905c6a851ca62951\Desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shell-wallpaper-theme1_31bf3856ad364e35_10.0.19041.1_none_8ccb1090444b78d3\Desktop.ini SearchApp.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-2548970870-3691742953-3895070203-1000\desktop.ini explorer.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-fontext_31bf3856ad364e35_10.0.19041.423_none_7c917c97525f1487\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondocuments_31bf3856ad364e35_10.0.19041.1_none_04c252e5678f305a\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ini-accessoriesuser_31bf3856ad364e35_10.0.19041.1_none_d9f53b39b3834744\Desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ini-systemtoolsuser_31bf3856ad364e35_10.0.19041.1_none_d69cbb4282e4fe2c\Desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..l32-kf-programfiles_31bf3856ad364e35_10.0.19041.1_none_cb8c8caad1a2ad44\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-fontext_31bf3856ad364e35_10.0.19041.1_none_5476a60692fad199\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..32-kf-commonstartup_31bf3856ad364e35_10.0.19041.1_none_b2014b56ea660ec9\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shell32-kf-commonmusic_31bf3856ad364e35_10.0.19041.1_none_2f07a4cad3dec315\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..l32-kf-userprofiles_31bf3856ad364e35_10.0.19041.1_none_39d6d106c6f70bec\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-programfilesx86_31bf3856ad364e35_10.0.19041.1_none_3870d3554f39ac78\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ini-maintenanceuser_31bf3856ad364e35_10.0.19041.1_none_bbf8ad8ff53c9b5b\Desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..kf-commonadmintools_31bf3856ad364e35_10.0.19041.1_none_0b090bb5ae01dd1a\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ktopini-accessories_31bf3856ad364e35_10.0.19041.1_none_a208296858c76413\Desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-ie-objectcontrolviewer_31bf3856ad364e35_11.0.19041.1_none_2108f0881e5a7a03\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-publiclibraries_31bf3856ad364e35_10.0.19041.1_none_cbd9ad4986c925d5\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..i-accessibilityuser_31bf3856ad364e35_10.0.19041.1_none_19358785a81a86d6\Desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shell32-kf-public_31bf3856ad364e35_10.0.19041.1_none_0cf1a65e91dfb2be\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-ie-offlinefavorites_31bf3856ad364e35_11.0.19041.1_none_4b0e6b545bf0f4e7\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..2-kf-commonpictures_31bf3856ad364e35_10.0.19041.1_none_36436b821c9e7209\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ktopini-maintenance_31bf3856ad364e35_10.0.19041.1_none_148b41803c849a3c\Desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..sktopini-sendtouser_31bf3856ad364e35_10.0.19041.1_none_be359f0533764571\Desktop.ini SearchApp.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini explorer.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commonstartmenu_31bf3856ad364e35_10.0.19041.1_none_f6eee8789c1c6fdd\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..32-kf-commondesktop_31bf3856ad364e35_10.0.19041.1_none_a81a33274fb1b624\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..2-kf-commonprograms_31bf3856ad364e35_10.0.19041.1_none_047fa97bc9873117\desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shell-sounds_31bf3856ad364e35_10.0.19041.1_none_cd0389b654e71da2\Desktop.ini SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-shell-wallpaper-theme2_31bf3856ad364e35_10.0.19041.1_none_8ccaf9c8444b9274\Desktop.ini SearchApp.exe -
Enumerates connected drives 3 TTPs 28 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 113 ip-api.com 136 icanhazip.com 181 ipinfo.io 182 ipinfo.io 192 ip-api.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\autorun.inf SearchApp.exe File opened for modification C:\Windows\WinSxS\x86_microsoft-windows-s..ccessagent-binaries_31bf3856ad364e35_10.0.19041.1_none_3802d0d85b60df4c\autorun.inf SearchApp.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\colorcpl.exe SearchApp.exe File opened for modification C:\Windows\System32\it-IT\cacls.exe.mui SearchApp.exe File opened for modification C:\Windows\System32\ja-jp\msmpeg2enc.dll.mui SearchApp.exe File opened for modification C:\Windows\SysWOW64\ncryptprov.dll SearchApp.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PrintManagement\MSFT_TcpIpPrinterPort.format.ps1xml SearchApp.exe File opened for modification C:\Windows\System32\dialserver.dll SearchApp.exe File opened for modification C:\Windows\System32\DriverStore\fr-FR\msmouse.inf_loc SearchApp.exe File opened for modification C:\Windows\System32\en-US\takeown.exe.mui SearchApp.exe File opened for modification C:\Windows\SysWOW64\spp\tokens\skus\csvlk-pack\csvlk-pack-Volume-CSVLK-3-ul-oob-rtm.xrm-ms SearchApp.exe File opened for modification C:\Windows\System32\migwiz\dlmanifests\WebEnroll-DL.man SearchApp.exe File opened for modification C:\Windows\System32\fr-FR\svchost.exe.mui SearchApp.exe File opened for modification C:\Windows\SysWOW64\Windows.UI.Core.TextInput.dll SearchApp.exe File opened for modification C:\Windows\System32\cmstp.exe SearchApp.exe File opened for modification C:\Windows\System32\it-IT\fhsvc.dll.mui SearchApp.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\ScheduledTasks\MSFT_ScheduledTask.format.ps1xml SearchApp.exe File opened for modification C:\Windows\System32\ndfetw.dll SearchApp.exe File opened for modification C:\Windows\System32\de-DE\smartscreen.exe.mui SearchApp.exe File opened for modification C:\Windows\System32\Speech_OneCore\common\toast-hero-image.png SearchApp.exe File opened for modification C:\Windows\SysWOW64\KBDINEN.DLL SearchApp.exe File opened for modification C:\Windows\System32\de-DE\ntmarta.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\it-IT\SRH.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\es-ES\SettingsHandlers_QuickActions.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\it-IT\WofTasks.dll.mui SearchApp.exe File opened for modification C:\Windows\SysWOW64\vsstrace.dll SearchApp.exe File opened for modification C:\Windows\SysWOW64\en-US\Fondue.exe.mui SearchApp.exe File opened for modification C:\Windows\SysWOW64\DeviceSetupStatusProvider.dll SearchApp.exe File opened for modification C:\Windows\SysWOW64\it-IT\onex.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\tsmf.dll SearchApp.exe File opened for modification C:\Windows\System32\DriverStore\en-US\c_fsactivitymonitor.inf_loc SearchApp.exe File opened for modification C:\Windows\System32\ja-jp\DAMM.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\spp\tokens\skus\ProfessionalSingleLanguage\ProfessionalSingleLanguage-Retail-1-ul-phn.xrm-ms SearchApp.exe File opened for modification C:\Windows\System32\dhcpcore.dll SearchApp.exe File opened for modification C:\Windows\System32\de-DE\Licenses\Volume\Professional\license.rtf SearchApp.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\cpu.inf_amd64_0abeab1ee6572232\processr.sys SearchApp.exe File opened for modification C:\Windows\System32\wbem\IMAPIv2-FileSystemSupport.mof SearchApp.exe File opened for modification C:\Windows\SysWOW64\fr-FR\UserDeviceRegistration.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\de-DE\certca.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\en-US\DscCore.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\fr-FR\efsext.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\Speech\SpeechUX\ja-JP\sapi.cpl.mui SearchApp.exe File opened for modification C:\Windows\SysWOW64\cryptnet.dll SearchApp.exe File opened for modification C:\Windows\System32\DeviceMetadataRetrievalClient.dll SearchApp.exe File opened for modification C:\Windows\System32\Dism\it-IT\WimProvider.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\it-IT\CallHistoryClient.dll.mui SearchApp.exe File opened for modification C:\Windows\SysWOW64\AzSqlExt.dll SearchApp.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\MsDtc\MSFT_DtcClusterTMMappingTask_v1.0.cdxml SearchApp.exe File opened for modification C:\Windows\System32\DriverStore\ja-JP\rspndr.inf_loc SearchApp.exe File opened for modification C:\Windows\System32\en-US\winver.exe.mui SearchApp.exe File opened for modification C:\Windows\SysWOW64\kernel32.dll SearchApp.exe File opened for modification C:\Windows\SysWOW64\lt-LT\comctl32.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\DriverStore\en-US\pmem.inf_loc SearchApp.exe File opened for modification C:\Windows\SysWOW64\F12\pdmproxy100.dll SearchApp.exe File opened for modification C:\Windows\System32\C_852.NLS SearchApp.exe File opened for modification C:\Windows\System32\es-ES\acppage.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\fr-FR\inseng.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\HelpV3.format.ps1xml SearchApp.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\SmbGlobalMapping.cdxml SearchApp.exe File opened for modification C:\Windows\System32\ActiveSyncCsp.dll SearchApp.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\acpipagr.inf_amd64_a3248d35e6aba0f3\acpipagr.sys SearchApp.exe File opened for modification C:\Windows\System32\DriverStore\fr-FR\btampm.inf_loc SearchApp.exe File opened for modification C:\Windows\System32\fr-FR\objsel.dll.mui SearchApp.exe File opened for modification C:\Windows\System32\DriverStore\en-US\c_dot4print.inf_loc SearchApp.exe File opened for modification C:\Windows\SysWOW64\batmeter.dll SearchApp.exe File opened for modification C:\Windows\System32\en-US\p2p.dll.mui SearchApp.exe -
Modifies termsrv.dll 1 TTPs 1 IoCs
Commonly used to allow simultaneous RDP sessions.
description ioc Process File opened for modification C:\Windows\System32\termsrv.dll SearchApp.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\EntCommon.dll SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\contrast-black\MicrosoftLogo.scale-200.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-24_contrast-white.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Curve25519Wrap.dll SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-white\LargeTile.scale-200_contrast-white.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailWideTile.scale-125.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxSignature.p7x SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-48_altform-unplated_contrast-white_devicefamily-colorfulunplated.png SearchApp.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\BeGreaterThan.ps1 SearchApp.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msxactps.dll SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MixedRealityPortalAppList.targetsize-24_altform-unplated_contrast-white.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\AppxManifest.xml SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-black\MedTile.scale-100.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\StandardShader.ps.cso SearchApp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\InputPersonalization.exe.mui SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageWideTile.scale-150_contrast-white.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\StoreLogo.scale-150.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\SwipeTeachingCalloutArchiveImage.layoutdir-RTL.gif SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-16_altform-unplated.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNewNoteSmallTile.scale-100.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-96.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\LinkedInboxMediumTile.scale-100.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-40.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarAppList.targetsize-32.png SearchApp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ThirdPartyNotices.MSHWLatin.txt SearchApp.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-white\MedTile.scale-125.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-16.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-60_altform-unplated.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.targetsize-64_altform-unplated.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\StoreRatingPromotion.dll SearchApp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\GenericMailSmallTile.scale-150.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\LargeTile.scale-200.png SearchApp.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\WMPMediaSharing.dll.mui SearchApp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\tabskb.dll.mui SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\resources.pri SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\WorldClockMedTile.contrast-black_scale-100.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubLargeTile.scale-200.png SearchApp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\tipresx.dll.mui SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\Weather_SplashScreen.scale-100.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\3039_24x24x32.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarLargeTile.scale-200.png SearchApp.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\libsmartscreen.dll SearchApp.exe File opened for modification C:\Program Files\Windows Media Player\fr-FR\wmpnscfg.exe.mui SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.2.2_2.2.27328.0_x64__8wekyb3d8bbwe\mrt100_app.dll SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\AppList.scale-150.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\SwipeTeachingCalloutImage.layoutdir-RTL.gif SearchApp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\models\de-DE.mail.config SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Server.exe SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxManifest.xml SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\dictation\SpeechOff.wav SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSectionGroupLargeTile.scale-200.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-black\PeopleAppList.targetsize-32_altform-unplated.png SearchApp.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Data.Services.Client.resources.dll SearchApp.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\mpvis.dll.mui SearchApp.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxManifest.xml SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-96_contrast-white.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\BadgeLogo.scale-125_contrast-black.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\AboutAdsCoreBackgroundImage.jpg SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-48_altform-unplated_contrast-black.png SearchApp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hu-HU\tipresx.dll.mui SearchApp.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceDaYi.txt SearchApp.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\LargeTile.scale-125.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\WideTile.scale-400_contrast-white.png SearchApp.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailBadge.scale-100.png SearchApp.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-wsp-spaces.resources_31bf3856ad364e35_10.0.19041.1_de-de_a7cd2f07cddcc60d\mispace_uninstall.mfl SearchApp.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-a..structure.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_509c290d28f760ee_apphelp.dll.mui_59096153 SearchApp.exe File opened for modification C:\Windows\WinSxS\Catalogs\2358b4f8885173c84e8d21b1a458c9810b3185f06bafcce5580848d19170ae8d.cat SearchApp.exe File opened for modification C:\Windows\WinSxS\FileMaps\$$_system32_windowspowershell_v1.0_modules_psdesiredstateconfiguration_dscresources_msft_processreso_2b8bad1c8e2e5413.cdf-ms SearchApp.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\es\System.Web.Mobile.resources.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-eventlog_31bf3856ad364e35_10.0.19041.1266_none_518a2f9fc80a85ad\r\wevtsvc.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-f..allconfig-installer_31bf3856ad364e35_10.0.19041.1_none_d76ee614d28656b9\cmifw.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-netevent_31bf3856ad364e35_10.0.19041.1_none_1a8c10573e4d18a9\netevent.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-s..l-service.resources_31bf3856ad364e35_10.0.19041.1_es-es_ff4dc2331fb2ae79\InstallService.dll.mui SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-store-licensemanager_31bf3856ad364e35_10.0.19041.906_none_142faef31fe5c6a3\r\LicenseManager.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\Manifests\msil_microsoft.powershel..ctivities.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_dd07923cfb9354cc.manifest SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-spelling-host.binaries_31bf3856ad364e35_10.0.19041.746_none_eb2cdd2a40f60c45\MsSpellCheckingHost.exe SearchApp.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-onecore-c..yaccess-policy-chat_31bf3856ad364e35_10.0.19041.1_none_da5a57a55c0eb399.manifest SearchApp.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-npiv.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_35746819e44cd64a.manifest SearchApp.exe File opened for modification C:\Windows\WinSxS\Manifests\x86_microsoft-windows-csvde.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_0cb744b1fe8eb2b6.manifest SearchApp.exe File opened for modification C:\Windows\WinSxS\x86_microsoft-windows-m..-cpxl-dll.resources_31bf3856ad364e35_10.0.19041.1_it-it_800b69f2c60c83ff\mscpxl32.dll.mui SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-m..namespace-downlevel_31bf3856ad364e35_10.0.19041.1_none_f1842539350f99e4\API-MS-Win-EventLog-Legacy-L1-1-0.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-ndis-implatform_31bf3856ad364e35_10.0.19041.546_none_33e4748aa2ae4bad\NdisImPlatform.sys SearchApp.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-s..rtup-core.resources_31bf3856ad364e35_10.0.19041.1151_en-us_c9f16b25e2c56827.manifest SearchApp.exe File opened for modification C:\Windows\servicing\Packages\HyperV-Guest-KernelInt-merged-Package~31bf3856ad364e35~amd64~en-US~10.0.19041.1.cat SearchApp.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_lsi_sas.inf.resources_31bf3856ad364e35_10.0.19041.1_de-de_19b628732a1e67b9.manifest SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-comdlg32.resources_31bf3856ad364e35_10.0.19041.1023_nl-nl_18d9d627ae1a50eb\r\comdlg32.dll.mui SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-rasbase-rascustom_31bf3856ad364e35_10.0.19041.1202_none_6dddb24371ed0da6\r\rascustom.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-s..ink-inkanalysiscore_31bf3856ad364e35_10.0.19041.1_none_092c8875cf1e850d\Windows.UI.Input.Inking.Analysis.dll SearchApp.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-IoTUAP-ShellExt-Tools-Package~31bf3856ad364e35~amd64~it-IT~10.0.19041.1.cat SearchApp.exe File opened for modification C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\es-ES\assets\ErrorPages\pdferrormfnotfound.html SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-o..nefiles-extend-apis_31bf3856ad364e35_10.0.19041.1_none_42e3cabad3a93bec\OfflineFilesWmiProvider.mof SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-p..rgraphing.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6f58df9e51a5bc36\p2p-mesh.mfl SearchApp.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-msinfo32-exe.resources_31bf3856ad364e35_10.0.19041.1_en-us_0cabc95cc0d9eab0.manifest SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-i..stencemigration-net_31bf3856ad364e35_10.0.19041.1_none_61a1cf633b14d3fb\MSFT_DASiteTableEntry.format.ps1xml SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-msmq-powershell_31bf3856ad364e35_10.0.19041.264_none_a6e44092b2d6a51a\r\Microsoft.Msmq.PowerShell.Commands.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_xamlbuildtask.resources_31bf3856ad364e35_4.0.15805.0_fr-fr_1a61591801ad15c6\XamlBuildTask.resources.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-a..r-service.resources_31bf3856ad364e35_10.0.19041.1_de-de_21882d7392957643\tzautoupdate.dll.mui SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-v..payloadrestrictions_31bf3856ad364e35_10.0.19041.1288_none_c59e86728dfb9a43\r\PayloadRestrictions.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-hyper-v-vfpext_31bf3856ad364e35_10.0.19041.1237_none_7578510aa0f564fa\vfpctrl.exe SearchApp.exe File opened for modification C:\Windows\WinSxS\x86_dual_ntprint.inf_31bf3856ad364e35_10.0.19041.264_none_66e0b708f017bc79\I386\MSXPSINC.GPD SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-errorreportingcore_31bf3856ad364e35_10.0.19041.1081_none_955497efbb030cb9\f\wermgr.exe SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-f..ysafety-refreshtask_31bf3856ad364e35_10.0.19041.1266_none_d375b5361b806b32\r\WpcRefreshTask.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-s..entication-usermode_31bf3856ad364e35_10.0.19041.546_none_226fb48607847890\authz.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-wlansvc.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_a08e14b35cd2332e\wlansvc.dll.mui SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_dual_ntprint4.inf_31bf3856ad364e35_10.0.19041.746_none_284758abe10778d6\f\ntprint4.cat SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-onecore-t..ngservice.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_c2e36723432e342d\TetheringService.dll.mui SearchApp.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-a..installagent-binary_31bf3856ad364e35_10.0.19041.746_none_8cf3567db70e4d37.manifest SearchApp.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-s..-vaultcmd.resources_31bf3856ad364e35_10.0.19041.1_es-es_824d729f59a6d976.manifest SearchApp.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-wof-tasks.resources_31bf3856ad364e35_10.0.19041.1_es-es_2332423073b1c24a.manifest SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\f\aspnetca.exe SearchApp.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-hyper-v-o..s-merged-deployment_31bf3856ad364e35_10.0.19041.1_none_aa08eb37179e00f2.manifest SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-p..st-common.resources_31bf3856ad364e35_10.0.19041.1_de-de_7791de258c1dd099\NetPeerDistCim_uninstall.mfl SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..ast-white.searchapp_31bf3856ad364e35_10.0.19041.1_none_2f147508fcb33106\AppListIcon.targetsize-32_altform-unplated.png SearchApp.exe File opened for modification C:\Windows\WinSxS\msil_system.web.extensions.design.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_2aee2db048323697\System.Web.Extensions.Design.Resources.dll SearchApp.exe File opened for modification C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\es-ES\assets\ErrorPages\WpcBlockFrame.htm SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-i..tmlrendering-legacy_31bf3856ad364e35_11.0.19041.1288_none_cab1ce8990fa99b4\r\mshtml.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-w..iamanager.resources_31bf3856ad364e35_10.0.19041.1_es-es_7e1a3215900845ea\wlanmm.dll.mui SearchApp.exe File opened for modification C:\Windows\L2Schemas\WWAN_profile_v6.xsd SearchApp.exe File opened for modification C:\Windows\SystemApps\microsoft.windows.narratorquickstart_8wekyb3d8bbwe\ConfirmCloseContentDialog.xbf SearchApp.exe File opened for modification C:\Windows\WinSxS\msil_microsoft.windowsau...commands.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_770b14145c527c1e\Microsoft.windowsauthenticationprotocols.commands.resources.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-security-netlogon_31bf3856ad364e35_10.0.19041.1_none_bdfd6f190bb830cd\netlogon.dll SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-userexperience-desktop_31bf3856ad364e35_10.0.19041.173_none_6486f23c2831aaf3\InputApp\InputApp\Assets\StoreLogo.scale-150.png SearchApp.exe File opened for modification C:\Windows\WinSxS\Manifests\wow64_microsoft-system-di..s-diagnosticinvoker_31bf3856ad364e35_10.0.19041.1081_none_790ff2ab51e8e31f.manifest SearchApp.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_microsoft-windows-n..os-snapin.resources_31bf3856ad364e35_10.0.19041.1_es-es_a484256cee63add8.manifest SearchApp.exe File opened for modification C:\Windows\WinSxS\Manifests\amd64_multimedia-mfcore-w..oyment-languagepack_31bf3856ad364e35_10.0.19041.1_es-es_642bb37b4b0d0d63.manifest SearchApp.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-iis-legacysnapin_31bf3856ad364e35_10.0.19041.906_none_699a0ca245158f14\f\IISUiObj.dll SearchApp.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\userdeviceregistration.ngc.winmd SearchApp.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_en-us_64f5aaf4bb13ecef\ipnathlp.dll.mui SearchApp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 5884 4432 WerFault.exe 243 3372 2024 WerFault.exe 362 4720 4156 WerFault.exe 374 8148 7688 WerFault.exe 409 3564 7752 WerFault.exe 411 4160 916 WerFault.exe 26 5668 6056 WerFault.exe 434 4432 6024 WerFault.exe 461 5136 3652 WerFault.exe 483 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 MatrixHackByFilard.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier MatrixHackByFilard.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RussiaHack.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RussiaHack.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe -
Creates scheduled task(s) 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2900 schtasks.exe 2220 schtasks.exe 4208 schtasks.exe 1828 schtasks.exe 3900 schtasks.exe 5136 schtasks.exe 1672 schtasks.exe 5920 schtasks.exe 5904 schtasks.exe 4388 schtasks.exe 3752 schtasks.exe 5852 schtasks.exe 2496 schtasks.exe 5624 schtasks.exe 4432 schtasks.exe 1508 schtasks.exe 4292 schtasks.exe 5356 schtasks.exe 6124 schtasks.exe 5468 schtasks.exe 2184 schtasks.exe 5784 schtasks.exe 6000 schtasks.exe 5212 schtasks.exe 5560 schtasks.exe 5392 schtasks.exe 5500 schtasks.exe 4444 schtasks.exe 6076 schtasks.exe 2324 schtasks.exe 4848 schtasks.exe 4792 schtasks.exe 6008 schtasks.exe 5856 schtasks.exe 4088 schtasks.exe 1448 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5420 timeout.exe -
Enumerates system info in registry 2 TTPs 14 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 5704 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133310592852906346" chrome.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1E\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\0 = 500031000000000000000000100041646d696e003c0009000400efbe00000000000000002e0000000000000000000000000000000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings CHEAT and Bypass Matrix.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\GroupView = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\3\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\3\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B12D072C72328B94587F9315339AC357\ProductName = "Update for Windows 10 for x64-based Systems (KB5001716)" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\2 = 14002e8005398e082303024b98265d99428e115f0000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\GroupByKey:PID = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\13\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\GroupByDirection = "1" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\LogicalViewMode = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B12D072C72328B94587F9315339AC357\Clients = 3a0000000000 msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\IconSize = "96" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\Rev = "0" explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2548970870-3691742953-3895070203-1000\{55301F96-B1D7-4735-9A65-2716752C80E5} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B12D072C72328B94587F9315339AC357\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\PastIconsStream = 1400000005000000010001002000000014000000494c200620002400400010001000ffffffff2110ffffffffffffffff424d36000000000000003600000028000000100000004002000001002000000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060606060a0a0a0a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060606060ffffffff60606060000000000000000030303030868686869999999999999999999999999999999999999999999999999999999999999999babababaffffffff60606060303030300a0a0a0a3c3c3c3c9e9e9e9e9999999999999999999999999999999999999999999999999999999999999999babababaffffffff606060603a3a3a3a999999996b6b6b6b464646467d7d7d7d8c8c8c8ca6a6a6a69999999999999999999999999999999999999999babababaffffffff606060603a3a3a3aa6a6a6a69b9b9b9b7d7d7d7d6666666666666666666666666c6c6c6c8c8c8c8c9b9b9b9b9b9b9b9b99999999babababaffffffff60606060404040409f9f9f9f8e8e8e8e808080808080808066666666666666666666666666666666666666666666666684848484b7b7b7b7ffffffff606060603030303097979797808080808080808080808080787878785a5a5a5a66666666666666666666666666666666666666669c9c9c9cffffffff606060602626262687878787808080808080808080808080808080802828282820202020666666666666666666666666666666669c9c9c9cffffffff606060601d1d1d1d4d4d4d4d535353536a6a6a6a6b6b6b6b40404040101010100000000000000000202020205a5a5a5a69696969a0a0a0a0ffffffff606060601d1d1d1d4d4d4d4d4d4d4d4d4d4d4d4d4d4d4d4d3a3a3a3a00000000000000000000000000000000000000000000000063636363ffffffff606060601d1d1d1d4d4d4d4d4d4d4d4d4d4d4d4d4d4d4d4d484848480e0e0e0e000000000000000000000000000000000000000060606060ffffffff606060600a0a0a0a4d4d4d4d4d4d4d4d4d4d4d4d4d4d4d4d444444440e0e0e0e000000000000000000000000000000000000000000000000a0a0a0a06060606000000000000000000000000013131313131313130e0e0e0e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000056565678888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf4d4d4d6c33333348888888bf6f6f6f9b2b2b2b3c888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf6a6a6a953737374d888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf808080b4888888bf888888bf808080b30909090c6c6c6c97888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf787878a8111111186f6f6f9c888888bf888888bf5e5e5e831010101711111118888888bf888888bf888888bf888888bf888888bf888888bf888888bf888888bf4d4d4d6c000000000909090c4d4d4d6c888888bf888888bf888888bf101010176363638b888888bf888888bf888888bf828282b65c5c5c81696969934545456000000000000000000000000011111118888888bf888888bf888888bf6f6f6f9b0808080b4242425d4f4f4f6e4c4c4c6b111111182222222f1515151e000000000000000000000000000000000000000067676790888888bf888888bf888888bf838383b96a6a6a956666668f6666668f777777a7888888bf3c3c3c5400000000000000000000000000000000000000000909090c565656786767679056565678808080b4888888bf888888bf888888bf888888bf808080b40909090c0000000000000000000000000000000000000000000000000000000000000000000000001a1a1a24787878a8888888bf888888bf676767901a1a1a240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf30303030000000000000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef30303030000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8fffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff30303030000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbfffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040dfdfdfdf0000000020202020ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000010101010ffffffff0000000000000000ffffffff0000000000000000ffffffffffffffff00000000000000000000000000000000ffffffff000000000000000070707070afafafaf0000000040404040cfcfcfcf0000000020202020ffffffffffffffffffffffffffffffff6060606000000000ffffffff0000000000000000ffffffff40404040000000009f9f9f9f8f8f8f8f0000000050505050bfbfbfbf000000000000000060606060ffffffff60606060ffffffff0000000000000000000000000000000060606060efefefef10101010000000008f8f8f8f8f8f8f8f00000000000000000000000060606060ffffffffffffffff00000000000000000000000000000000ffffffff505050500000000010101010efefefef303030300000000000000000000000000000000060606060ffffffff0000000000000000000000000000000000000000000000000000000080808080bfbfbfbf0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfdfdfdf303030300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffff000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff00000000ffffffff00000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000424d3e000000000000003e0000002800000010000000400200000100010000000000000900000000000000000000000000000000000000000000ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff0000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff0000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff0000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff0000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff0000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff0000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff0000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff0000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff0000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff0000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff0000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff0000ffff0000fff90000fff100008000000000000000000000000000000000000000000000000001000080070000e0070000c00f0000ce3f0000ffff0000ffff0000ffff0000ffff0000ffff0000ffff0000f0000000000000000000000000000000000100000003000080070000c0070000c0070000fc0f0000ffff0000ffff0000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff0000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff0000ffff0000fff90000f3f90000e3c80000c3c400000b2400007b2400007b3600007b3600007b2400000b240000c3c40000e3c80000f3f90000fff90000ffff0000ffff0000d80f0000df7f0000df7f0000c0000000dffe0000dffe0000dffe000007fe000077fe000057fe000007fe000077fe000000000000ffff0000ffff000000000000000000000000000000000000000000000000010000000800000020000000090000001401000001000000000000000100000000000000010000000000000001000000000000000100000000000000010000000000000001000000000000000100000000000000010000000000000001000000000000000100000000000000010000000000000001000000000000000100000000000000010000000000000001000000000000000100000000000000010000000000000001000000000000000100000000000000010000000000000001000000000000000100000000000000010000000000000001000000000000000100000000000000010000000000000001000000000000000100000000000000010000000000000001000000000000000100000000000000 explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2548970870-3691742953-3895070203-1000\{147A6A9F-5D30-44FC-8C0F-DCFE2A888852} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\12\Shell\{B3690E58-E961-423B-B687-386EBFD83239}\GroupByDirection = "1" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B12D072C72328B94587F9315339AC357\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B12D072C72328B94587F9315339AC357\SourceList\LastUsedSource = "n;1;C:\\Windows\\SoftwareDistribution\\Download\\0cf3a2c25c7bc6712b379a33a93e5668\\img\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "4294967295" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 explorer.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 4768 explorer.exe 4768 explorer.exe 4768 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 976 msedge.exe 976 msedge.exe 1664 msedge.exe 1664 msedge.exe 1952 identity_helper.exe 1952 identity_helper.exe 1640 chrome.exe 1640 chrome.exe 5692 chrome.exe 5692 chrome.exe 4916 Matrix Bypass.exe 4916 Matrix Bypass.exe 4172 RussiaHack.exe 6092 msedge.exe 6092 msedge.exe 1844 msedge.exe 1844 msedge.exe 5792 Matrix Bypass.exe 5792 Matrix Bypass.exe 5016 identity_helper.exe 5016 identity_helper.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4172 RussiaHack.exe 4204 msSurrogateHost.exe 4204 msSurrogateHost.exe 4204 msSurrogateHost.exe 4204 msSurrogateHost.exe 4204 msSurrogateHost.exe 4204 msSurrogateHost.exe 4204 msSurrogateHost.exe 4204 msSurrogateHost.exe 4204 msSurrogateHost.exe 4204 msSurrogateHost.exe 4204 msSurrogateHost.exe 4204 msSurrogateHost.exe 4204 msSurrogateHost.exe 4204 msSurrogateHost.exe 4512 SearchApp.exe 4512 SearchApp.exe 4512 SearchApp.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 6072 7zFM.exe 4512 SearchApp.exe 4768 explorer.exe 7220 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 57 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 5708 msedge.exe 5708 msedge.exe 5708 msedge.exe 5708 msedge.exe 5708 msedge.exe 5708 msedge.exe 5708 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1664 msedge.exe 5948 NOTEPAD.EXE 1640 chrome.exe 1844 msedge.exe 1844 msedge.exe 6072 7zFM.exe 6072 7zFM.exe 6072 7zFM.exe 6072 7zFM.exe 6072 7zFM.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 4788 explorer.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe 64 taskmgr.exe -
Suspicious use of SetWindowsHookEx 38 IoCs
pid Process 4512 Telegram Desktop.exe 4512 Telegram Desktop.exe 4148 CredentialUIBroker.exe 4996 CredentialUIBroker.exe 4512 SearchApp.exe 4792 StartMenuExperienceHost.exe 2456 SearchApp.exe 2456 SearchApp.exe 2456 SearchApp.exe 2456 SearchApp.exe 2456 SearchApp.exe 2456 SearchApp.exe 2456 SearchApp.exe 2456 SearchApp.exe 2308 StartMenuExperienceHost.exe 1420 SearchApp.exe 1572 StartMenuExperienceHost.exe 3676 SearchApp.exe 4000 helppane.exe 4000 helppane.exe 2508 StartMenuExperienceHost.exe 4768 explorer.exe 3604 SearchApp.exe 4768 explorer.exe 4768 explorer.exe 4768 explorer.exe 4768 explorer.exe 4768 explorer.exe 4768 explorer.exe 4768 explorer.exe 4768 explorer.exe 4768 explorer.exe 4768 explorer.exe 4768 explorer.exe 4768 explorer.exe 4768 explorer.exe 4768 explorer.exe 4768 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 3600 1664 msedge.exe 94 PID 1664 wrote to memory of 3600 1664 msedge.exe 94 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 4332 1664 msedge.exe 95 PID 1664 wrote to memory of 976 1664 msedge.exe 96 PID 1664 wrote to memory of 976 1664 msedge.exe 96 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 PID 1664 wrote to memory of 2444 1664 msedge.exe 97 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedge.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedge.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MatrixHackByFilard.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MatrixHackByFilard.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Telegram Desktop.exe"C:\Users\Admin\AppData\Local\Temp\Telegram Desktop.exe"1⤵
- DcRat
- Suspicious use of SetWindowsHookEx
PID:4512
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffe74e46f8,0x7fffe74e4708,0x7fffe74e47182⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,3266883843877316159,5391189815478541293,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,3266883843877316159,5391189815478541293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,3266883843877316159,5391189815478541293,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3266883843877316159,5391189815478541293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3266883843877316159,5391189815478541293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3266883843877316159,5391189815478541293,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3266883843877316159,5391189815478541293,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,3266883843877316159,5391189815478541293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵PID:3940
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff685bc5460,0x7ff685bc5470,0x7ff685bc54803⤵PID:4976
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,3266883843877316159,5391189815478541293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3266883843877316159,5391189815478541293,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3266883843877316159,5391189815478541293,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3266883843877316159,5391189815478541293,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3266883843877316159,5391189815478541293,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3266883843877316159,5391189815478541293,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6188 /prefetch:12⤵PID:3596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2760
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1640 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe4a99758,0x7fffe4a99768,0x7fffe4a997782⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:22⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:82⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:82⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3108 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:12⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:12⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4460 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:12⤵PID:5320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4652 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:82⤵PID:5376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4380 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:82⤵PID:5408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4820 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:12⤵PID:5536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3540 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:82⤵PID:5732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4704 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:82⤵PID:5852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:82⤵PID:5920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4732 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:82⤵PID:5964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5088 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:82⤵PID:6056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5208 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:82⤵PID:6104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4676 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:82⤵PID:5616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5180 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:12⤵PID:5860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2736 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2720 --field-trial-handle=1824,i,1064222009633722060,12727465311134644372,131072 /prefetch:82⤵PID:5760
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5228
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Пароли Microsoft Edge.csv1⤵
- Suspicious use of FindShellTrayWindow
PID:5948
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" NonAppContainerFailedMip -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4928
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" NonAppContainerFailedMip -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4996
-
C:\Users\Admin\Desktop\Matrix Bypass.exe"C:\Users\Admin\Desktop\Matrix Bypass.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
C:\Users\Admin\Desktop\RussiaHack.exe"C:\Users\Admin\Desktop\RussiaHack.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4172 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵PID:5588
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:5880
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵PID:2304
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:424
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵PID:3232
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:5864
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵PID:1548
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp8556.tmp.bat2⤵PID:3232
-
C:\Windows\system32\taskkill.exeTaskKill /F /IM 41723⤵
- Kills process with taskkill
PID:5704
-
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:6084
-
-
C:\Windows\system32\timeout.exeTimeout /T 2 /Nobreak3⤵
- Delays execution with timeout.exe
PID:5420
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe74e46f8,0x7fffe74e4708,0x7fffe74e47182⤵PID:5752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:6092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:5680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4296 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3680 /prefetch:82⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3680 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:5764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3096 /prefetch:22⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3228 /prefetch:82⤵PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4356 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1492 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1760 /prefetch:12⤵PID:5772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2164,3632269044651599717,9325001401451382913,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4020 /prefetch:82⤵PID:3820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5024
-
C:\Users\Admin\Desktop\Matrix Bypass.exe"C:\Users\Admin\Desktop\Matrix Bypass.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5792
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:2620
-
C:\Users\Admin\Desktop\CHEAT and Bypass Matrix.exe"C:\Users\Admin\Desktop\CHEAT and Bypass Matrix.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5564 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\Q2YeCqE8qxd61K1ktFeXh5Nj.vbe"2⤵
- Checks computer location settings
PID:1616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\L2kmnRelizDcO70ipFvI.bat" "3⤵PID:6012
-
C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4204 -
C:\odt\SearchApp.exe"C:\odt\SearchApp.exe"5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies termsrv.dll
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4512 -
C:\Windows\explorer.exe"explorer.exe"6⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4788
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\f0julmxe\f0julmxe.cmdline"6⤵PID:5532
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB50D.tmp" "c:\Users\Admin\AppData\Local\Temp\f0julmxe\CSC6E23EEF5366C4D9EA7DC77BF34F1A3E.TMP"7⤵PID:3872
-
-
-
C:\Windows\explorer.exe"explorer.exe"6⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:1260
-
-
C:\Windows\explorer.exe"explorer.exe"6⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Drops desktop.ini file(s)
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:4132
-
-
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\file.vbs"2⤵PID:5376
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\CHEAT and Bypass Matrix.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:6072 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7zO8B7562CB\Q2YeCqE8qxd61K1ktFeXh5Nj.vbe"2⤵
- Checks computer location settings
PID:5864 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\L2kmnRelizDcO70ipFvI.bat" "3⤵PID:5164
-
C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"4⤵
- Executes dropped EXE
PID:3952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO8B758E3C\msSurrogateHost.exe"C:\Users\Admin\AppData\Local\Temp\7zO8B758E3C\msSurrogateHost.exe"2⤵
- Executes dropped EXE
PID:3792
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7zO8B7AD52C\L2kmnRelizDcO70ipFvI.bat" "2⤵PID:2612
-
C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"3⤵
- Executes dropped EXE
PID:1476
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO8B7708FE\msSurrogateHost.exe"C:\Users\Admin\AppData\Local\Temp\7zO8B7708FE\msSurrogateHost.exe"2⤵
- Executes dropped EXE
PID:4908
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7zO8B7326EE\file.vbs"2⤵PID:768
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7zO8B7080EE\Q2YeCqE8qxd61K1ktFeXh5Nj.vbe"2⤵
- Checks computer location settings
PID:3792 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\L2kmnRelizDcO70ipFvI.bat" "3⤵PID:4424
-
C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"4⤵
- Executes dropped EXE
PID:4132
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\odt\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:6076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Windows\Migration\WTR\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Migration\WTR\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\Migration\WTR\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\es-ES\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 13 /tr "'C:\odt\taskhostw.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\odt\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:6008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 10 /tr "'C:\odt\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft.NET\sihost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft.NET\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:6000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\odt\conhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\odt\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\odt\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Application Data\winlogon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Admin\Application Data\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Application Data\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Music\taskhostw.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Users\Public\Music\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Users\Public\Music\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:6124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\odt\SearchApp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5468
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\odt\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\odt\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\odt\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\odt\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\odt\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1448
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4792
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2456
-
C:\Users\Admin\Desktop\VapeInstaller.exe"C:\Users\Admin\Desktop\VapeInstaller.exe"1⤵
- Executes dropped EXE
PID:2032
-
C:\Users\Admin\Desktop\MatrixHackByFilard.exe"C:\Users\Admin\Desktop\MatrixHackByFilard.exe"1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
PID:4432 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵PID:1824
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:2608
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:5996
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵PID:4748
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵PID:1748
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:5932
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵PID:3000
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4432 -s 31602⤵
- Program crash
PID:5884
-
-
C:\Users\Admin\Desktop\Matrix Bypass.exe"C:\Users\Admin\Desktop\Matrix Bypass.exe"1⤵
- Executes dropped EXE
PID:4640
-
C:\Users\Admin\Desktop\CHEAT and Bypass Matrix.exe"C:\Users\Admin\Desktop\CHEAT and Bypass Matrix.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:6036 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\Q2YeCqE8qxd61K1ktFeXh5Nj.vbe"2⤵
- Checks computer location settings
PID:5560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\L2kmnRelizDcO70ipFvI.bat" "3⤵PID:4940
-
C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"4⤵
- Executes dropped EXE
PID:4188
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\file.vbs"2⤵PID:3816
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 4432 -ip 44321⤵PID:4824
-
C:\Users\Admin\Desktop\Matrix Bypass.exe"C:\Users\Admin\Desktop\Matrix Bypass.exe"1⤵
- Executes dropped EXE
PID:4528
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\CHEAT and Bypass Matrix\" -ad -an -ai#7zMap17655:104:7zEvent196191⤵PID:4812
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3424
-
C:\Users\Admin\Desktop\CHEAT and Bypass Matrix\msSurrogateHost.exe"C:\Users\Admin\Desktop\CHEAT and Bypass Matrix\msSurrogateHost.exe"1⤵
- Executes dropped EXE
PID:3396
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\CHEAT and Bypass Matrix\Q2YeCqE8qxd61K1ktFeXh5Nj.vbe"1⤵
- Checks computer location settings
PID:4724 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\L2kmnRelizDcO70ipFvI.bat" "2⤵PID:6000
-
C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"3⤵
- Executes dropped EXE
PID:4000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\CHEAT and Bypass Matrix\L2kmnRelizDcO70ipFvI.bat" "1⤵PID:5040
-
C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"C:\Users\Admin\AppData\Roaming\msagentsessionruntimemonitor\msSurrogateHost.exe"2⤵
- Executes dropped EXE
PID:5648
-
-
C:\odt\RuntimeBroker.exeC:\odt\RuntimeBroker.exe1⤵
- Executes dropped EXE
PID:1852
-
C:\odt\System.exeC:\odt\System.exe1⤵
- Executes dropped EXE
PID:1504
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵PID:2240
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious use of SendNotifyMessage
PID:64
-
C:\Recovery\WindowsRE\Idle.exeC:\Recovery\WindowsRE\Idle.exe1⤵
- Executes dropped EXE
PID:700
-
C:\Program Files (x86)\Microsoft.NET\sihost.exe"C:\Program Files (x86)\Microsoft.NET\sihost.exe"1⤵
- Executes dropped EXE
PID:1848
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt1⤵PID:1732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault37f925b2h9e7ah4c77h833bh86eddd1d2dd71⤵PID:636
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7fffe74e46f8,0x7fffe74e4708,0x7fffe74e47182⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,10425187529597008235,12415107776137207575,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10425187529597008235,12415107776137207575,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,10425187529597008235,12415107776137207575,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2900
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {24AC8F2B-4D4A-4C17-9607-6A4B14068F97} -Embedding1⤵PID:5904
-
C:\Windows\System32\DataExchangeHost.exeC:\Windows\System32\DataExchangeHost.exe -Embedding1⤵PID:6004
-
C:\odt\SearchApp.exeC:\odt\SearchApp.exe1⤵
- Executes dropped EXE
PID:796
-
C:\Windows\system32\utilman.exeutilman.exe /debug1⤵PID:3136
-
C:\Windows\System32\SystemSettingsBroker.exeC:\Windows\System32\SystemSettingsBroker.exe -Embedding1⤵PID:1932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:5228
-
C:\Users\Public\Music\taskhostw.exeC:\Users\Public\Music\taskhostw.exe1⤵
- Executes dropped EXE
PID:5652
-
C:\Users\Admin\Application Data\winlogon.exe"C:\Users\Admin\Application Data\winlogon.exe"1⤵
- Executes dropped EXE
PID:536
-
C:\odt\RuntimeBroker.exeC:\odt\RuntimeBroker.exe1⤵
- Executes dropped EXE
PID:4940
-
C:\odt\System.exeC:\odt\System.exe1⤵
- Executes dropped EXE
PID:4524
-
C:\odt\conhost.exeC:\odt\conhost.exe1⤵
- Executes dropped EXE
PID:5972
-
C:\Program Files\Windows Photo Viewer\es-ES\smss.exe"C:\Program Files\Windows Photo Viewer\es-ES\smss.exe"1⤵
- Executes dropped EXE
PID:4904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe74e46f8,0x7fffe74e4708,0x7fffe74e47182⤵PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,18106293616764387377,17969182385135211276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,18106293616764387377,17969182385135211276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,18106293616764387377,17969182385135211276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18106293616764387377,17969182385135211276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18106293616764387377,17969182385135211276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18106293616764387377,17969182385135211276,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18106293616764387377,17969182385135211276,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,18106293616764387377,17969182385135211276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3896 /prefetch:82⤵PID:5928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,18106293616764387377,17969182385135211276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3896 /prefetch:82⤵PID:5136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18106293616764387377,17969182385135211276,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18106293616764387377,17969182385135211276,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18106293616764387377,17969182385135211276,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,18106293616764387377,17969182385135211276,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4084 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
-
C:\Recovery\WindowsRE\Idle.exeC:\Recovery\WindowsRE\Idle.exe1⤵
- Executes dropped EXE
PID:3232
-
C:\Program Files (x86)\Microsoft.NET\sihost.exe"C:\Program Files (x86)\Microsoft.NET\sihost.exe"1⤵
- Executes dropped EXE
PID:1636
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:2308
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1420
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:1572
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3676
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 420 -p 2024 -ip 20241⤵PID:4012
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2024 -s 21961⤵
- Program crash
PID:3372
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy1⤵PID:5948
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:2308
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy1⤵PID:400
-
C:\odt\SearchApp.exeC:\odt\SearchApp.exe1⤵
- Executes dropped EXE
PID:4156 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4156 -s 9402⤵
- Program crash
PID:4720
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy1⤵PID:4732
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 536 -p 4156 -ip 41561⤵PID:5364
-
C:\Windows\helppane.exeC:\Windows\helppane.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument microsoft-edge:https://go.microsoft.com/fwlink/?LinkId=5288822⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:1952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe74e46f8,0x7fffe74e4708,0x7fffe74e47183⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2940 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:6040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4416 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4372 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7336 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:6864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7360 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:6808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7568 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:7444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:7992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Executes dropped EXE
PID:6092 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff685bc5460,0x7ff685bc5470,0x7ff685bc54804⤵
- Executes dropped EXE
PID:6876
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7124 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3492 /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1952 /prefetch:13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1692 /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1340 /prefetch:13⤵
- Checks computer location settings
PID:7908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2144 /prefetch:13⤵
- Checks computer location settings
PID:7508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3584 /prefetch:13⤵
- Checks computer location settings
PID:7672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:13⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,10032389218917246219,15605042239522296698,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:13⤵
- Checks computer location settings
PID:7680
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument microsoft-edge:https://go.microsoft.com/fwlink/?LinkId=5288822⤵PID:4168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe74e46f8,0x7fffe74e4708,0x7fffe74e47183⤵PID:7832
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2776
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe74e46f8,0x7fffe74e4708,0x7fffe74e47182⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4112
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DevicesFlow -s DevicesFlowUserSvc1⤵PID:7688
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7688 -s 9202⤵
- Program crash
PID:8148
-
-
C:\Windows\system32\DisplaySwitch.exeDisplaySwitch.exe1⤵PID:7736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DevicesFlow -s DevicePickerUserSvc1⤵PID:7956
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 7688 -ip 76881⤵PID:8100
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 464 -p 7752 -ip 77521⤵PID:4332
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7752 -s 19481⤵
- Program crash
PID:3564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultedf77144hb8a8h4ec7ha167hd843a530f2871⤵
- Checks computer location settings
- Loads dropped DLL
- System policy modification
PID:5792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffe74e46f8,0x7fffe74e4708,0x7fffe74e47182⤵
- Loads dropped DLL
PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,12621867644757589601,4049257137283301784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵PID:2324
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy1⤵PID:6604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DevicesFlow -s DevicesFlowUserSvc1⤵PID:6056
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6056 -s 8842⤵
- Program crash
PID:5668
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 472 -p 916 -ip 9161⤵PID:6508
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 916 -s 87361⤵
- Program crash
PID:4160
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "3808" "968" "832" "972" "0" "0" "976" "980" "0" "0" "0" "0"1⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5332
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:5628
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe74e46f8,0x7fffe74e4708,0x7fffe74e47183⤵PID:2768
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
PID:7220
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:2508
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3604
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 524 -p 6056 -ip 60561⤵PID:6516
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 384 -p 6024 -ip 60241⤵PID:7076
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6024 -s 19241⤵
- Program crash
PID:4432
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3616
-
C:\Windows\system32\wuauclt.exe"C:\Windows\system32\wuauclt.exe" /UpdateDeploymentProvider UpdateDeploymentProvider.dll /ClassId 706e13cf-cf9e-4ca4-94c1-6c5ce2c69fe8 /RunHandlerComServer1⤵PID:6304
-
C:\Windows\SoftwareDistribution\Download\Install\Windows-KB890830-x64-V5.113.exe"C:\Windows\SoftwareDistribution\Download\Install\Windows-KB890830-x64-V5.113.exe" /Q /W2⤵PID:6164
-
C:\Windows\system32\MRT.exe"C:\Windows\system32\MRT.exe" /Q /W3⤵
- Registers COM server for autorun
- Adds Run key to start application
PID:7240
-
-
-
C:\odt\SearchApp.exeC:\odt\SearchApp.exe1⤵PID:3652
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3652 -s 9322⤵
- Program crash
PID:5136
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 404 -p 3652 -ip 36521⤵PID:5736
-
C:\Windows\system32\wuauclt.exe"C:\Windows\system32\wuauclt.exe" /UpdateDeploymentProvider UpdateDeploymentProvider.dll /ClassId 5f6a0cd6-9260-4dd6-8103-8b0beddf7281 /RunHandlerComServer1⤵PID:7636
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Modifies data under HKEY_USERS
- Modifies registry class
PID:2640 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe -delete -tn Microsoft\Windows\WindowsUpdate\RUXIM\RUXIMDisplay -F2⤵PID:1132
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe -delete -tn Microsoft\Windows\WindowsUpdate\RUXIM\RUXIMSync -F2⤵PID:7100
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe -create -tn Microsoft\Windows\WindowsUpdate\RUXIM\PLUGScheduler -xml plugscheduler.xml -F2⤵PID:6536
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD52f1a0d15f5fec79d0d1d9dcfe136ad14
SHA14b76c5bb72337109c904e47bf2fe11078313efd3
SHA25638ad8735e69bac3510268ffcd266462953ceb59fbdb98a32f2e8fe9da2e66476
SHA512ac933db356a285940095e1222e58e582d322c4edd42415e0cce1dc2ac4d2b3bcfff55f24b699c483411fbed3997c7fca08e837d97718f9afaf6775706bfe24d5
-
Filesize
2.5MB
MD575136c00a06c6ee8c30e8a969fac27a9
SHA1d4d02785c465a544573f6d113849d48f2ad35fed
SHA25628c79c3f0bd6ee03025e4e4f61a2d25a00bebc0b1d3776bfabc824fc49013fcf
SHA512187385d74f340932ba2b46970846e72f0da058a29f49a50879edde3aef17dc910ca49fb0ae24cc2d49745cd1f21c4450aa4f3d258b8a129918a51b217506af2d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1f3d34f8-ae2b-437e-89d5-5e521138ad8e.tmp
Filesize6KB
MD50ef2c0ead563f8686dc022c332ef86c0
SHA10c0e3b859db6eb70c13f4b7e4b213de7eed27b21
SHA256b578b07bdfecad3929bcb01283dff0ba1a99811a7a4cb356f6bcd57f1e9df2e6
SHA512c1c7bf0104ba7c415f53c59551420139298cd1775d82eb4b3f84c39b024f3ca9bce3fc045acf750d8b948e000584f81d83ddfe9e0da844d0e10c7dc329a0dba2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\128.png
Filesize4KB
MD5913064adaaa4c4fa2a9d011b66b33183
SHA199ea751ac2597a080706c690612aeeee43161fc1
SHA256afb4ce8882ef7ae80976eba7d87f6e07fcddc8e9e84747e8d747d1e996dea8eb
SHA512162bf69b1ad5122c6154c111816e4b87a8222e6994a72743ed5382d571d293e1467a2ed2fc6cc27789b644943cf617a56da530b6a6142680c5b2497579a632b5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\af\messages.json
Filesize908B
MD512403ebcce3ae8287a9e823c0256d205
SHA1c82d43c501fae24bfe05db8b8f95ed1c9ac54037
SHA256b40bde5b612cfff936370b32fb0c58cc205fc89937729504c6c0b527b60e2cba
SHA512153401ecdb13086d2f65f9b9f20acb3cefe5e2aeff1c31ba021be35bf08ab0634812c33d1d34da270e5693a8048fc5e2085e30974f6a703f75ea1622a0ca0ffd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\am\messages.json
Filesize1KB
MD59721ebce89ec51eb2baeb4159e2e4d8c
SHA158979859b28513608626b563138097dc19236f1f
SHA2563d0361a85adfcd35d0de74135723a75b646965e775188f7dcdd35e3e42db788e
SHA512fa3689e8663565d3c1c923c81a620b006ea69c99fb1eb15d07f8f45192ed9175a6a92315fa424159c1163382a3707b25b5fc23e590300c62cbe2dace79d84871
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\ar\messages.json
Filesize1KB
MD53ec93ea8f8422fda079f8e5b3f386a73
SHA124640131ccfb21d9bc3373c0661da02d50350c15
SHA256abd0919121956ab535e6a235de67764f46cfc944071fcf2302148f5fb0e8c65a
SHA512f40e879f85bc9b8120a9b7357ed44c22c075bf065f45bea42bd5316af929cbd035d5d6c35734e454aef5b79d378e51a77a71fa23f9ebd0b3754159718fceb95c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\az\messages.json
Filesize977B
MD59a798fd298008074e59ecc253e2f2933
SHA11e93da985e880f3d3350fc94f5ccc498efc8c813
SHA256628145f4281fa825d75f1e332998904466abd050e8b0dc8bb9b6a20488d78a66
SHA5129094480379f5ab711b3c32c55fd162290cb0031644ea09a145e2ef315da12f2e55369d824af218c3a7c37dd9a276aeec127d8b3627d3ab45a14b0191ed2bbe70
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\be\messages.json
Filesize3KB
MD568884dfda320b85f9fc5244c2dd00568
SHA1fd9c01e03320560cbbb91dc3d1917c96d792a549
SHA256ddf16859a15f3eb3334d6241975ca3988ac3eafc3d96452ac3a4afd3644c8550
SHA5127ff0fbd555b1f9a9a4e36b745cbfcad47b33024664f0d99e8c080be541420d1955d35d04b5e973c07725573e592cd0dd84fdbb867c63482baff6929ada27ccde
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\bg\messages.json
Filesize1KB
MD52e6423f38e148ac5a5a041b1d5989cc0
SHA188966ffe39510c06cd9f710dfac8545672ffdceb
SHA256ac4a8b5b7c0b0dd1c07910f30dcfbdf1bcb701cfcfd182b6153fd3911d566c0e
SHA512891fcdc6f07337970518322c69c6026896dd3588f41f1e6c8a1d91204412cae01808f87f9f2dea1754458d70f51c3cef5f12a9e3fc011165a42b0844c75ec683
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\bn\messages.json
Filesize1KB
MD5651375c6af22e2bcd228347a45e3c2c9
SHA1109ac3a912326171d77869854d7300385f6e628c
SHA2561dbf38e425c5c7fc39e8077a837df0443692463ba1fbe94e288ab5a93242c46e
SHA512958aa7cf645fab991f2eca0937ba734861b373fb1c8bcc001599be57c65e0917f7833a971d93a7a6423c5f54a4839d3a4d5f100c26efa0d2a068516953989f9d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\ca\messages.json
Filesize930B
MD5d177261ffe5f8ab4b3796d26835f8331
SHA14be708e2ffe0f018ac183003b74353ad646c1657
SHA256d6e65238187a430ff29d4c10cf1c46b3f0fa4b91a5900a17c5dfd16e67ffc9bd
SHA512e7d730304aed78c0f4a78dadbf835a22b3d8114fb41d67b2b26f4fe938b572763d3e127b7c1c81ebe7d538da976a7a1e7adc40f918f88afadea2201ae8ab47d0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\cs\messages.json
Filesize913B
MD5ccb00c63e4814f7c46b06e4a142f2de9
SHA1860936b2a500ce09498b07a457e0cca6b69c5c23
SHA25621ae66ce537095408d21670585ad12599b0f575ff2cb3ee34e3a48f8cc71cfab
SHA51235839dac6c985a6ca11c1bff5b8b5e59db501fcb91298e2c41cb0816b6101bf322445b249eaea0cef38f76d73a4e198f2b6e25eea8d8a94ea6007d386d4f1055
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\cy\messages.json
Filesize806B
MD5a86407c6f20818972b80b9384acfbbed
SHA1d1531cd0701371e95d2a6bb5edcb79b949d65e7c
SHA256a482663292a913b02a9cde4635c7c92270bf3c8726fd274475dc2c490019a7c9
SHA512d9fbf675514a890e9656f83572208830c6d977e34d5744c298a012515bc7eb5a17726add0d9078501393babd65387c4f4d3ac0cc0f7c60c72e09f336dca88de7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\da\messages.json
Filesize883B
MD5b922f7fd0e8ccac31b411fc26542c5ba
SHA12d25e153983e311e44a3a348b7d97af9aad21a30
SHA25648847d57c75af51a44cbf8f7ef1a4496c2007e58ed56d340724fda1604ff9195
SHA512ad0954deeb17af04858dd5ec3d3b3da12dff7a666af4061deb6fd492992d95db3baf751ab6a59bec7ab22117103a93496e07632c2fc724623bb3acf2ca6093f3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\de\messages.json
Filesize1KB
MD5d116453277cc860d196887cec6432ffe
SHA10ae00288fde696795cc62fd36eabc507ab6f4ea4
SHA25636ac525fa6e28f18572d71d75293970e0e1ead68f358c20da4fdc643eea2c1c5
SHA512c788c3202a27ec220e3232ae25e3c855f3fdb8f124848f46a3d89510c564641a2dfea86d5014cea20d3d2d3c1405c96dbeb7ccad910d65c55a32fdca8a33fdd4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\el\messages.json
Filesize1KB
MD59aba4337c670c6349ba38fddc27c2106
SHA11fc33be9ab4ad99216629bc89fbb30e7aa42b812
SHA25637ca6ab271d6e7c9b00b846fdb969811c9ce7864a85b5714027050795ea24f00
SHA5128564f93ad8485c06034a89421ce74a4e719bbac865e33a7ed0b87baa80b7f7e54b240266f2edb595df4e6816144428db8be18a4252cbdcc1e37b9ecc9f9d7897
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\en_GB\messages.json
Filesize848B
MD53734d498fb377cf5e4e2508b8131c0fa
SHA1aa23e39bfe526b5e3379de04e00eacba89c55ade
SHA256ab5cda04013dce0195e80af714fbf3a67675283768ffd062cf3cf16edb49f5d4
SHA51256d9c792954214b0de56558983f7eb7805ac330af00e944e734340be41c68e5dd03eddb17a63bc2ab99bdd9be1f2e2da5be8ba7c43d938a67151082a9041c7ba
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\en_US\messages.json
Filesize1KB
MD5578215fbb8c12cb7e6cd73fbd16ec994
SHA19471d71fa6d82ce1863b74e24237ad4fd9477187
SHA256102b586b197ea7d6edfeb874b97f95b05d229ea6a92780ea8544c4ff1e6bc5b1
SHA512e698b1a6a6ed6963182f7d25ac12c6de06c45d14499ddc91e81bdb35474e7ec9071cfebd869b7d129cb2cd127bc1442c75e408e21eb8e5e6906a607a3982b212
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\es\messages.json
Filesize961B
MD5f61916a206ac0e971cdcb63b29e580e3
SHA1994b8c985dc1e161655d6e553146fb84d0030619
SHA2562008f4faab71ab8c76a5d8811ad40102c380b6b929ce0bce9c378a7cadfc05eb
SHA512d9c63b2f99015355aca04d74a27fd6b81170750c4b4be7293390dc81ef4cd920ee9184b05c61dc8979b6c2783528949a4ae7180dbf460a2620dbb0d3fd7a05cf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\es_419\messages.json
Filesize959B
MD5535331f8fb98894877811b14994fea9d
SHA142475e6afb6a8ae41e2fc2b9949189ef9bbe09fb
SHA25690a560ff82605db7eda26c90331650ff9e42c0b596cedb79b23598dec1b4988f
SHA5122ce9c69e901ab5f766e6cfc1e592e1af5a07aa78d154ccbb7898519a12e6b42a21c5052a86783abe3e7a05043d4bd41b28960feddb30169ff7f7fe7208c8cfe9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\et\messages.json
Filesize968B
MD564204786e7a7c1ed9c241f1c59b81007
SHA1586528e87cd670249a44fb9c54b1796e40cdb794
SHA256cc31b877238da6c1d51d9a6155fde565727a1956572f466c387b7e41c4923a29
SHA51244fcf93f3fb10a3db68d74f9453995995ab2d16863ec89779db451a4d90f19743b8f51095eec3ecef5bd0c5c60d1bf3dfb0d64df288dccfbe70c129ae350b2c6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\eu\messages.json
Filesize838B
MD529a1da4acb4c9d04f080bb101e204e93
SHA12d0e4587ddd4bac1c90e79a88af3bd2c140b53b1
SHA256a41670d52423ba69c7a65e7e153e7b9994e8dd0370c584bda0714bd61c49c578
SHA512b7b7a5a0aa8f6724b0fa15d65f25286d9c66873f03080cbaba037bdeea6aadc678ac4f083bc52c2db01beb1b41a755ed67bbddb9c0fe4e35a004537a3f7fc458
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\fa\messages.json
Filesize1KB
MD5097f3ba8de41a0aaf436c783dcfe7ef3
SHA1986b8cabd794e08c7ad41f0f35c93e4824ac84df
SHA2567c4c09d19ac4da30cc0f7f521825f44c4dfbc19482a127fbfb2b74b3468f48f1
SHA5128114ea7422e3b20ae3f08a3a64a6ffe1517a7579a3243919b8f789eb52c68d6f5a591f7b4d16cee4bd337ff4daf4057d81695732e5f7d9e761d04f859359fadb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\fi\messages.json
Filesize911B
MD5b38cbd6c2c5bfaa6ee252d573a0b12a1
SHA12e490d5a4942d2455c3e751f96bd9960f93c4b60
SHA2562d752a5dbe80e34ea9a18c958b4c754f3bc10d63279484e4df5880b8fd1894d2
SHA5126e65207f4d8212736059cc802c6a7104e71a9cc0935e07bd13d17ec46ea26d10bc87ad923cd84d78781e4f93231a11cb9ed8d3558877b6b0d52c07cb005f1c0c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\fil\messages.json
Filesize939B
MD5fcea43d62605860fff41be26bad80169
SHA1f25c2ce893d65666cc46ea267e3d1aa080a25f5b
SHA256f51eeb7aaf5f2103c1043d520e5a4de0fa75e4dc375e23a2c2c4afd4d9293a72
SHA512f66f113a26e5bcf54b9aafa69dae3c02c9c59bd5b9a05f829c92af208c06dc8ccc7a1875cbb7b7ce425899e4ba27bfe8ce2cdaf43a00a1b9f95149e855989ee0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\fr\messages.json
Filesize977B
MD5a58c0eebd5dc6bb5d91daf923bd3a2aa
SHA1f169870eeed333363950d0bcd5a46d712231e2ae
SHA2560518287950a8b010ffc8d52554eb82e5d93b6c3571823b7ceca898906c11abcc
SHA512b04afd61de490bc838354e8dc6c22be5c7ac6e55386fff78489031acbe2dbf1eaa2652366f7a1e62ce87cfccb75576da3b2645fea1645b0eceb38b1fa3a409e8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\fr_CA\messages.json
Filesize972B
MD56cac04bdcc09034981b4ab567b00c296
SHA184f4d0e89e30ed7b7acd7644e4867ffdb346d2a5
SHA2564caa46656ecc46a420aa98d3307731e84f5ac1a89111d2e808a228c436d83834
SHA512160590b6ec3dcf48f3ea7a5baa11a8f6fa4131059469623e00ad273606b468b3a6e56d199e97daa0ecb6c526260ebae008570223f2822811f441d1c900dc33d6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\gl\messages.json
Filesize927B
MD5cc31777e68b20f10a394162ee3cee03a
SHA1969f7a9caf86ebaa82484fbf0837010ad3fd34d7
SHA2569890710df0fbf1db41bce41fe2f62424a3bd39d755d29e829744ed3da0c2ce1d
SHA5128215a6e50c6acf8045d97c0d4d422c0caacb7f09d136e73e34dba48903bb4c85a25d6875b56e192993f48a428d3a85ba041e0e61e4277b7d3a70f38d01f68aab
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\gu\messages.json
Filesize1KB
MD5bc7e1d09028b085b74cb4e04d8a90814
SHA1e28b2919f000b41b41209e56b7bf3a4448456cfe
SHA256fe8218df25db54e633927c4a1640b1a41b8e6cb3360fa386b5382f833b0b237c
SHA512040a8267d67db05bbaa52f1fac3460f58d35c5b73aa76bbf17fa78acc6d3bfb796a870dd44638f9ac3967e35217578a20d6f0b975ceeeedbadfc9f65be7e72c9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\hi\messages.json
Filesize1KB
MD598a7fc3e2e05afffc1cfe4a029f47476
SHA1a17e077d6e6ba1d8a90c1f3faf25d37b0ff5a6ad
SHA256d2d1afa224cda388ff1dc8fac24cda228d7ce09de5d375947d7207fa4a6c4f8d
SHA512457e295c760abfd29fc6bbbb7fc7d4959287bca7fb0e3e99eb834087d17eed331def18138838d35c48c6ddc8a0134affff1a5a24033f9b5607b355d3d48fdf88
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\hr\messages.json
Filesize935B
MD525cdff9d60c5fc4740a48ef9804bf5c7
SHA14fadecc52fb43aec084df9ff86d2d465fbebcdc0
SHA25673e6e246ceeab9875625cd4889fbf931f93b7b9deaa11288ae1a0f8a6e311e76
SHA512ef00b08496427feb5a6b9fb3fe2e5404525be7c329d9dd2a417480637fd91885837d134a26980dcf9f61e463e6cb68f09a24402805807e656af16b116a75e02c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\hu\messages.json
Filesize1KB
MD58930a51e3ace3dd897c9e61a2aea1d02
SHA14108506500c68c054ba03310c49fa5b8ee246ea4
SHA256958c0f664fca20855fa84293566b2ddb7f297185619143457d6479e6ac81d240
SHA512126b80cd3428c0bc459eeaafcbe4b9fde2541a57f19f3ec7346baf449f36dc073a9cf015594a57203255941551b25f6faa6d2c73c57c44725f563883ff902606
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\hy\messages.json
Filesize2KB
MD555de859ad778e0aa9d950ef505b29da9
SHA14479be637a50c9ee8a2f7690ad362a6a8ffc59b2
SHA2560b16e3f8bd904a767284345ae86a0a9927c47afe89e05ea2b13ad80009bdf9e4
SHA512edab2fcc14cabb6d116e9c2907b42cfbc34f1d9035f43e454f1f4d1f3774c100cbadf6b4c81b025810ed90fa91c22f1aefe83056e4543d92527e4fe81c7889a8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\id\messages.json
Filesize858B
MD534d6ee258af9429465ae6a078c2fb1f5
SHA1612cae151984449a4346a66c0a0df4235d64d932
SHA256e3c86ddd2efebe88eed8484765a9868202546149753e03a61eb7c28fd62cfca1
SHA51220427807b64a0f79a6349f8a923152d9647da95c05de19ad3a4bf7db817e25227f3b99307c8745dd323a6591b515221bd2f1e92b6f1a1783bdfa7142e84601b1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\is\messages.json
Filesize954B
MD51f565fb1c549b18af8bbfed8decd5d94
SHA1b57f4bdae06ff3dfc1eb3e56b6f2f204d6f63638
SHA256e16325d1a641ef7421f2bafcd6433d53543c89d498dd96419b03cba60b9c7d60
SHA512a60b8e042a9bcdcc136b87948e9924a0b24d67c6ca9803904b876f162a0ad82b9619f1316be9ff107dd143b44f7e6f5df604abfe00818deb40a7d62917cda69f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\it\messages.json
Filesize899B
MD50d82b734ef045d5fe7aa680b6a12e711
SHA1bd04f181e4ee09f02cd53161dcabcef902423092
SHA256f41862665b13c0b4c4f562ef1743684cce29d4bcf7fe3ea494208df253e33885
SHA51201f305a280112482884485085494e871c66d40c0b03de710b4e5f49c6a478d541c2c1fda2ceaf4307900485946dee9d905851e98a2eb237642c80d464d1b3ada
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\iw\messages.json
Filesize2KB
MD526b1533c0852ee4661ec1a27bd87d6bf
SHA118234e3abaf702df9330552780c2f33b83a1188a
SHA256bbb81c32f482ba3216c9b1189c70cef39ca8c2181af3538ffa07b4c6ad52f06a
SHA512450bfaf0e8159a4fae309737ea69ca8dd91caafd27ef662087c4e7716b2dcad3172555898e75814d6f11487f4f254de8625ef0cfea8df0133fc49e18ec7fd5d2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\ja\messages.json
Filesize1KB
MD515ec1963fc113d4ad6e7e59ae5de7c0a
SHA14017fc6d8b302335469091b91d063b07c9e12109
SHA25634ac08f3c4f2d42962a3395508818b48ca323d22f498738cc9f09e78cb197d73
SHA512427251f471fa3b759ca1555e9600c10f755bc023701d058ff661bec605b6ab94cfb3456c1fea68d12b4d815ffbafabceb6c12311dd1199fc783ed6863af97c0f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\ka\messages.json
Filesize3KB
MD583f81d30913dc4344573d7a58bd20d85
SHA15ad0e91ea18045232a8f9df1627007fe506a70e0
SHA25630898bbf51bdd58db397ff780f061e33431a38ef5cfc288b5177ecf76b399f26
SHA51285f97f12ad4482b5d9a6166bb2ae3c4458a582cf575190c71c1d8e0fb87c58482f8c0efead56e3a70edd42bed945816db5e07732ad27b8ffc93f4093710dd58f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\kk\messages.json
Filesize3KB
MD52d94a58795f7b1e6e43c9656a147ad3c
SHA1e377db505c6924b6bfc9d73dc7c02610062f674e
SHA256548dc6c96e31a16ce355dc55c64833b08ef3fba8bf33149031b4a685959e3af4
SHA512f51cc857e4cf2d4545c76a2dce7d837381ce59016e250319bf8d39718be79f9f6ee74ea5a56de0e8759e4e586d93430d51651fc902376d8a5698628e54a0f2d8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\km\messages.json
Filesize3KB
MD5b3699c20a94776a5c2f90aef6eb0dad9
SHA11f9b968b0679a20fa097624c9abfa2b96c8c0bea
SHA256a6118f0a0de329e07c01f53cd6fb4fed43e54c5f53db4cd1c7f5b2b4d9fb10e6
SHA5121e8d15b8bff1d289434a244172f9ed42b4bb6bcb6372c1f300b01acea5a88167e97fedaba0a7ae3beb5e24763d1b09046ae8e30745b80e2e2fe785c94df362f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\kn\messages.json
Filesize1KB
MD58e16966e815c3c274eeb8492b1ea6648
SHA17482ed9f1c9fd9f6f9ba91ab15921b19f64c9687
SHA256418ff53fca505d54268413c796e4df80e947a09f399ab222a90b81e93113d5b5
SHA51285b28202e874b1cf45b37ba05b87b3d8d6fe38e89c6011c4240cf6b563ea6da60181d712cce20d07c364f4a266a4ec90c4934cc8b7bb2013cb3b22d755796e38
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\ko\messages.json
Filesize1KB
MD5f3e59eeeb007144ea26306c20e04c292
SHA183e7bdfa1f18f4c7534208493c3ff6b1f2f57d90
SHA256c52d9b955d229373725a6e713334bbb31ea72efa9b5cf4fbd76a566417b12cac
SHA5127808cb5ff041b002cbd78171ec5a0b4dba3e017e21f7e8039084c2790f395b839bee04ad6c942eed47ccb53e90f6de818a725d1450bf81ba2990154afd3763af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\lo\messages.json
Filesize2KB
MD5e20d6c27840b406555e2f5091b118fc5
SHA10dcecc1a58ceb4936e255a64a2830956bfa6ec14
SHA25689082fb05229826bc222f5d22c158235f025f0e6df67ff135a18bd899e13bb8f
SHA512ad53fc0b153005f47f9f4344df6c4804049fac94932d895fd02eebe75222cfe77eedd9cd3fdc4c88376d18c5972055b00190507aa896488499d64e884f84f093
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\lt\messages.json
Filesize1KB
MD5970544ab4622701ffdf66dc556847652
SHA114bee2b77ee74c5e38ebd1db09e8d8104cf75317
SHA2565dfcbd4dfeaec3abe973a78277d3bd02cd77ae635d5c8cd1f816446c61808f59
SHA512cc12d00c10b970189e90d47390eeb142359a8d6f3a9174c2ef3ae0118f09c88ab9b689d9773028834839a7dfaf3aac6747bc1dcb23794a9f067281e20b8dc6ea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\lv\messages.json
Filesize994B
MD5a568a58817375590007d1b8abcaebf82
SHA1b0f51fe6927bb4975fc6eda7d8a631bf0c1ab597
SHA2560621de9161748f45d53052ed8a430962139d7f19074c7ffe7223ecb06b0b87db
SHA512fcfbadec9f73975301ab404db6b09d31457fac7ccad2fa5be348e1cad6800f87cb5b56de50880c55bbadb3c40423351a6b5c2d03f6a327d898e35f517b1c628c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\ml\messages.json
Filesize2KB
MD5a342d579532474f5b77b2dfadc690eaa
SHA1ec5c287519ac7de608a8b155a2c91e5d6a21c23f
SHA256d974d4fda9c8ee85bdbb43634497b41007801fcaa579d0c4e5bc347063d25975
SHA5120be5c0243a3ce378afa14d033d4049e38f0c5a1e4d30d45edd784efbb95d445f6c4f29e4cc2e28134ea4b04ecee9632ee8682810d9dbe9d5dd186671a508eaa4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\mn\messages.json
Filesize2KB
MD583e7a14b7fc60d4c66bf313c8a2bef0b
SHA11ccf1d79cded5d65439266db58480089cc110b18
SHA256613d8751f6cc9d3fa319f4b7ea8b2bd3bed37fd077482ca825929dd7c12a69a8
SHA5123742e24ffc4b5283e6ee496813c1bdc6835630d006e8647d427c3de8b8e7bf814201adf9a27bfab3abd130b6fec64ebb102ac0eb8dedfe7b63d82d3e1233305d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\mr\messages.json
Filesize1KB
MD53b98c4ed8874a160c3789fead5553cfa
SHA15550d0ec548335293d962aaa96b6443dd8abb9f6
SHA256adeb082a9c754dfd5a9d47340a3ddcc19bf9c7efa6e629a2f1796305f1c9a66f
SHA5125139b6c6df9459c7b5cdc08a98348891499408cd75b46519ba3ac29e99aaafcc5911a1dee6c3a57e3413dbd0fae72d7cbc676027248dce6364377982b5ce4151
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\ms\messages.json
Filesize945B
MD5dda32b1db8a11b1f48fb0169e999da91
SHA19902fbe38ac5dff4b56ff01d621d30bb58c32d55
SHA2560135a4da8e41564af36f711b05ed0c9146e6192812b8120a5eb4cc3e6b108c36
SHA512a88798f264b1c9f8d08e2222ccd1cb21b07f4ef79a9cdccdab42e5741ff4cbeb463caa707afac5bf14cc03ddbf54f55102b67266c0ba75d84b59c101ad95c626
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\my\messages.json
Filesize3KB
MD5342335a22f1886b8bc92008597326b24
SHA12cb04f892e430dcd7705c02bf0a8619354515513
SHA256243befbd6b67a21433dcc97dc1a728896d3a070dc20055eb04d644e1bb955fe7
SHA512cd344d060e30242e5a4705547e807ce3ce2231ee983bb9a8ad22b3e7598a7ec87399094b04a80245ad51d039370f09d74fe54c0b0738583884a73f0c7e888ad8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\ne\messages.json
Filesize3KB
MD5065eb4de2319a4094f7c1c381ac753a0
SHA16324108a1ad968cb3aec83316c6f12d51456c464
SHA256160e1cd593c901c7291ea4ecba735191d793ddfd7e9646a0560498627f61da6f
SHA5128b3e970a2beb8b6b193ad6ab9baa0fd8e1147cb5b9e64d76a6d3f104d636481621be52c2d72c588adf444e136a9b1350ac767255d2e680df44e9a1fb75e4c898
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\nl\messages.json
Filesize914B
MD532df72f14be59a9bc9777113a8b21de6
SHA12a8d9b9a998453144307dd0b700a76e783062ad0
SHA256f3fe1ffcb182183b76e1b46c4463168c746a38e461fd25ca91ff2a40846f1d61
SHA512e0966f5cca5a8a6d91c58d716e662e892d1c3441daa5d632e5e843839bb989f620d8ac33ed3edbafe18d7306b40cd0c4639e5a4e04da2c598331dacec2112aad
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\no\messages.json
Filesize878B
MD5a1744b0f53ccf889955b95108367f9c8
SHA16a5a6771dff13dcb4fd425ed839ba100b7123de0
SHA25621ceff02b45a4bfd60d144879dfa9f427949a027dd49a3eb0e9e345bd0b7c9a8
SHA512f55e43f14514eecb89f6727a0d3c234149609020a516b193542b5964d2536d192f40cc12d377e70c683c269a1bdcde1c6a0e634aa84a164775cffe776536a961
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\pa\messages.json
Filesize2KB
MD597f769f51b83d35c260d1f8cfd7990af
SHA10d59a76564b0aee31d0a074305905472f740ceca
SHA256bbd37d41b7de6f93948fa2437a7699d4c30a3c39e736179702f212cb36a3133c
SHA512d91f5e2d22fc2d7f73c1f1c4af79db98fcfd1c7804069ae9b2348cbc729a6d2dff7fb6f44d152b0bdaba6e0d05dff54987e8472c081c4d39315cec2cbc593816
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\pl\messages.json
Filesize978B
MD5b8d55e4e3b9619784aeca61ba15c9c0f
SHA1b4a9c9885fbeb78635957296fddd12579fefa033
SHA256e00ff20437599a5c184ca0c79546cb6500171a95e5f24b9b5535e89a89d3ec3d
SHA512266589116eee223056391c65808255edae10eb6dc5c26655d96f8178a41e283b06360ab8e08ac3857d172023c4f616ef073d0bea770a3b3dd3ee74f5ffb2296b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\pt_BR\messages.json
Filesize907B
MD5608551f7026e6ba8c0cf85d9ac11f8e3
SHA187b017b2d4da17e322af6384f82b57b807628617
SHA256a73eea087164620fa2260d3910d3fbe302ed85f454edb1493a4f287d42fc882f
SHA51282f52f8591db3c0469cc16d7cbfdbf9116f6d5b5d2ad02a3d8fa39ce1378c64c0ea80ab8509519027f71a89eb8bbf38a8702d9ad26c8e6e0f499bf7da18bf747
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\pt_PT\messages.json
Filesize914B
MD50963f2f3641a62a78b02825f6fa3941c
SHA17e6972beab3d18e49857079a24fb9336bc4d2d48
SHA256e93b8e7fb86d2f7dfae57416bb1fb6ee0eea25629b972a5922940f0023c85f90
SHA51222dd42d967124da5a2209dd05fb6ad3f5d0d2687ea956a22ba1e31c56ec09deb53f0711cd5b24d672405358502e9d1c502659bb36ced66caf83923b021ca0286
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\ro\messages.json
Filesize937B
MD5bed8332ab788098d276b448ec2b33351
SHA16084124a2b32f386967da980cbe79dd86742859e
SHA256085787999d78fadff9600c9dc5e3ff4fb4eb9be06d6bb19df2eef8c284be7b20
SHA51222596584d10707cc1c8179ed3abe46ef2c314cf9c3d0685921475944b8855aab660590f8fa1cfdce7976b4bb3bd9abbbf053f61f1249a325fd0094e1c95692ed
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\ru\messages.json
Filesize1KB
MD551d34fe303d0c90ee409a2397fca437d
SHA1b4b9a7b19c62d0aa95d1f10640a5fba628ccca12
SHA256be733625acd03158103d62bc0eef272ca3f265ac30c87a6a03467481a177dae3
SHA512e8670ded44dc6ee30e5f41c8b2040cf8a463cd9a60fc31fa70eb1d4c9ac1a3558369792b5b86fa761a21f5266d5a35e5c2c39297f367daa84159585c19ec492a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\si\messages.json
Filesize2KB
MD5b8a4fd612534a171a9a03c1984bb4bdd
SHA1f513f7300827fe352e8ecb5bd4bb1729f3a0e22a
SHA25654241ebe651a8344235cc47afd274c080abaebc8c3a25afb95d8373b6a5670a2
SHA512c03e35bfde546aeb3245024ef721e7e606327581efe9eaf8c5b11989d9033bdb58437041a5cb6d567baa05466b6aaf054c47f976fd940eeedf69fdf80d79095b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\sk\messages.json
Filesize934B
MD58e55817bf7a87052f11fe554a61c52d5
SHA19abdc0725fe27967f6f6be0df5d6c46e2957f455
SHA256903060ec9e76040b46deb47bbb041d0b28a6816cb9b892d7342fc7dc6782f87c
SHA512eff9ec7e72b272dde5f29123653bc056a4bc2c3c662ae3c448f8cb6a4d1865a0679b7e74c1b3189f3e262109ed6bc8f8d2bde14aefc8e87e0f785ae4837d01c7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\sl\messages.json
Filesize963B
MD5bfaefeff32813df91c56b71b79ec2af4
SHA1f8eda2b632610972b581724d6b2f9782ac37377b
SHA256aab9cf9098294a46dc0f2fa468afff7ca7c323a1a0efa70c9db1e3a4da05d1d4
SHA512971f2bbf5e9c84de3d31e5f2a4d1a00d891a2504f8af6d3f75fc19056bfd059a270c4c9836af35258aba586a1888133fb22b484f260c1cbc2d1d17bc3b4451aa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\sr\messages.json
Filesize1KB
MD57f5f8933d2d078618496c67526a2b066
SHA1b7050e3efa4d39548577cf47cb119fa0e246b7a4
SHA2564e8b69e864f57cddd4dc4e4faf2c28d496874d06016bc22e8d39e0cb69552769
SHA5120fbab56629368eef87deef2977ca51831beb7deae98e02504e564218425c751853c4fdeaa40f51ecfe75c633128b56ae105a6eb308fd5b4a2e983013197f5dba
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\sv\messages.json
Filesize884B
MD590d8fb448ce9c0b9ba3d07fb8de6d7ee
SHA1d8688cac0245fd7b886d0deb51394f5df8ae7e84
SHA25664b1e422b346ab77c5d1c77142685b3ff7661d498767d104b0c24cb36d0eb859
SHA5126d58f49ee3ef0d3186ea036b868b2203fe936ce30dc8e246c32e90b58d9b18c624825419346b62af8f7d61767dbe9721957280aa3c524d3a5dfb1a3a76c00742
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\sw\messages.json
Filesize980B
MD5d0579209686889e079d87c23817eddd5
SHA1c4f99e66a5891973315d7f2bc9c1daa524cb30dc
SHA2560d20680b74af10ef8c754fcde259124a438dce3848305b0caf994d98e787d263
SHA512d59911f91ed6c8ff78fd158389b4d326daf4c031b940c399569fe210f6985e23897e7f404b7014fc7b0acec086c01cc5f76354f7e5d3a1e0dedef788c23c2978
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\ta\messages.json
Filesize1KB
MD5dcc0d1725aeaeaaf1690ef8053529601
SHA1bb9d31859469760ac93e84b70b57909dcc02ea65
SHA2566282bf9df12ad453858b0b531c8999d5fd6251eb855234546a1b30858462231a
SHA5126243982d764026d342b3c47c706d822bb2b0caffa51f0591d8c878f981eef2a7fc68b76d012630b1c1eb394af90eb782e2b49329eb6538dd5608a7f0791fdcf5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\te\messages.json
Filesize1KB
MD5385e65ef723f1c4018eee6e4e56bc03f
SHA10cea195638a403fd99baef88a360bd746c21df42
SHA256026c164bae27dbb36a564888a796aa3f188aad9e0c37176d48910395cf772cea
SHA512e55167cb5638e04df3543d57c8027b86b9483bfcafa8e7c148eded66454aebf554b4c1cf3c33e93ec63d73e43800d6a6e7b9b1a1b0798b6bdb2f699d3989b052
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\th\messages.json
Filesize1KB
MD564077e3d186e585a8bea86ff415aa19d
SHA173a861ac810dabb4ce63ad052e6e1834f8ca0e65
SHA256d147631b2334a25b8aa4519e4a30fb3a1a85b6a0396bc688c68dc124ec387d58
SHA51256dd389eb9dd335a6214e206b3bf5d63562584394d1de1928b67d369e548477004146e6cb2ad19d291cb06564676e2b2ac078162356f6bc9278b04d29825ef0c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\tr\messages.json
Filesize1KB
MD576b59aaacc7b469792694cf3855d3f4c
SHA17c04a2c1c808fa57057a4cceee66855251a3c231
SHA256b9066a162bee00fd50dc48c71b32b69dffa362a01f84b45698b017a624f46824
SHA5122e507ca6874de8028dc769f3d9dfd9e5494c268432ba41b51568d56f7426f8a5f2e5b111ddd04259eb8d9a036bb4e3333863a8fc65aab793bcef39edfe41403b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\uk\messages.json
Filesize1KB
MD5970963c25c2cef16bb6f60952e103105
SHA1bbddacfeee60e22fb1c130e1ee8efda75ea600aa
SHA2569fa26ff09f6acde2457ed366c0c4124b6cac1435d0c4fd8a870a0c090417da19
SHA5121bed9fe4d4adeed3d0bc8258d9f2fd72c6a177c713c3b03fc6f5452b6d6c2cb2236c54ea972ece7dbfd756733805eb2352cae44bab93aa8ea73bb80460349504
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\ur\messages.json
Filesize1KB
MD58b4df6a9281333341c939c244ddb7648
SHA1382c80cad29bcf8aaf52d9a24ca5a6ecf1941c6b
SHA2565da836224d0f3a96f1c5eb5063061aad837ca9fc6fed15d19c66da25cf56f8ac
SHA512fa1c015d4ea349f73468c78fdb798d462eef0f73c1a762298798e19f825e968383b0a133e0a2ce3b3df95f24c71992235bfc872c69dc98166b44d3183bf8a9e5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\vi\messages.json
Filesize1KB
MD5773a3b9e708d052d6cbaa6d55c8a5438
SHA15617235844595d5c73961a2c0a4ac66d8ea5f90f
SHA256597c5f32bc999746bc5c2ed1e5115c523b7eb1d33f81b042203e1c1df4bbcafe
SHA512e5f906729e38b23f64d7f146fa48f3abf6baed9aafc0e5f6fa59f369dc47829dbb4bfa94448580bd61a34e844241f590b8d7aec7091861105d8ebb2590a3bee9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\zh_CN\messages.json
Filesize879B
MD53e76788e17e62fb49fb5ed5f4e7a3dce
SHA16904ffa0d13d45496f126e58c886c35366efcc11
SHA256e72d0bb08cc3005556e95a498bd737e7783bb0e56dcc202e7d27a536616f5ee0
SHA512f431e570ab5973c54275c9eef05e49e6fe2d6c17000f98d672dd31f9a1fad98e0d50b5b0b9cf85d5bbd3b655b93fd69768c194c8c1688cb962aa75ff1af9bdb6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\zh_HK\messages.json
Filesize1KB
MD5524e1b2a370d0e71342d05dde3d3e774
SHA160d1f59714f9e8f90ef34138d33fbff6dd39e85a
SHA25630f44cfad052d73d86d12fa20cfc111563a3b2e4523b43f7d66d934ba8dace91
SHA512d2225cf2fa94b01a7b0f70a933e1fdcf69cdf92f76c424ce4f9fcc86510c481c9a87a7b71f907c836cbb1ca41a8bebbd08f68dbc90710984ca738d293f905272
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\zh_TW\messages.json
Filesize843B
MD50e60627acfd18f44d4df469d8dce6d30
SHA12bfcb0c3ca6b50d69ad5745fa692baf0708db4b5
SHA256f94c6ddedf067642a1af18d629778ec65e02b6097a8532b7e794502747aeb008
SHA5126ff517eed4381a61075ac7c8e80c73fafae7c0583ba4fa7f4951dd7dbe183c253702dee44b3276efc566f295dac1592271be5e0ac0c7d2c9f6062054418c7c27
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_locales\zu\messages.json
Filesize912B
MD571f916a64f98b6d1b5d1f62d297fdec1
SHA19386e8f723c3f42da5b3f7e0b9970d2664ea0baa
SHA256ec78ddd4ccf32b5d76ec701a20167c3fbd146d79a505e4fb0421fc1e5cf4aa63
SHA51230fa4e02120af1be6e7cc7dbb15fae5d50825bd6b3cf28ef21d2f2e217b14af5b76cfcc165685c3edc1d09536bfcb10ca07e1e2cc0da891cec05e19394ad7144
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\_metadata\verified_contents.json
Filesize18KB
MD52f0dde11ea5a53f11a1d604363dca243
SHA18eef7eb2f4aa207c06bcdd315342160ebacf64e8
SHA2565a2940c7c5adba1de5e245dbff296d8abc78b078db04988815570ce53e553b1d
SHA512f20305a42c93bcde345ba623fef8777815c8289fe49b3ec5e0f6cf97ee0d5b824687674d05827d6c846ee899da0d742407670db22ff0d70ebee5a481ab4a0ff0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\eventpage_bin_prod.js
Filesize76KB
MD56a104f69e045f1416a5a5f8f9f911924
SHA1de00fc12632cd747d1cb334f6d6fe8e99997a0c5
SHA2563fb99493bd8e1a07ea015090e2e22df66b159411dbee5a42563774338fd33122
SHA51201b37165b3df19cc37ee30e4aef5f7d5f4cacb7071e8472885b5e20f79e8f7cb9a3f35b4f6d94843b4412ccdcd3fc0893df2e1165a401cd6b4e6bafb87fe91f5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\manifest.json
Filesize2KB
MD5bb6266a33a3823d0f6120b6700017d27
SHA11aee5fb22f2035425d96258c2a7587e82c5f3979
SHA25632bff6dc944e2842fda9fadbcdae5d4ebe5a14bd3cdcac7d7472b06465fe2fc1
SHA5127a7a16fbcd0c326067b1f215a7e1e3d86bfa1e39218d56d1eb3b01a042780b0141ff2f28c0f976d0353d983a6e5f42e0443297fb203932b99c8f953cde8e28eb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir1640_1008843618\CRX_INSTALL\page_embed_script.js
Filesize291B
MD562fda4fa9cc5866797295daf242ec144
SHA1b0fd59acfe000541753d0cb3cb38eb04e833f603
SHA256cae608555363a5ffe6940574ac6ecd03c9ac24c329484598b78ee463554bc591
SHA512f6a324ad4372387adc9f5b66e4bca678e22b16ca621e6ca8a57b7dd84bc9636f9c6fc3e07251d526ffde03200357c074762cc5d7b707b0a303f9c9a195d98f58
-
Filesize
52KB
MD5726d651b19795249d9386af6b259444e
SHA15f7f9e7df239b876114f46bdeedf21787dec20c9
SHA2562d02e00adea1934aeac7eae6bfb81b3e606c27bdb3b9614b0479ab3a26730995
SHA512213e74028558ba6204c4a5aea865bfc633a434d0f123a15f20f972db056dcc40a48cc6a9595d3dc39ad6e7245fd814c523f87a8d5fe4e8a05b73da59c318e670
-
Filesize
1KB
MD557582968d9df85da54c21de707fe2031
SHA16da0d982dc0f1594c3ebaa076c7016c1bac6a50d
SHA256c5c98d0753a8b3adc05d9aa0cf6d53886569ed86fa300a29a4848ec471e2ed8c
SHA5126222ad68fa5050407427ea2a30a25fe5c2942a06a421d256a1b69ff10385da9057cee8c76b46bf37a911fe9cd4b2f661bf8966ddcb2e01921e9dea58fcbc7f48
-
Filesize
1KB
MD5bb26b54f079adb975ca296491a4e595f
SHA1d8daee099789e3433c38e1cebb1bdd313aa85bfd
SHA2562b8403cf1bb7d0c89285a7acc27cf3dc23edb3764c98e0453e6134232a11fe70
SHA512d6235165bec8ceb7019042aaef156c725c7c61001df99ada3bff2c120ae68223a56bac36eace6980a04b2dee64e2c28327599811217911db734ec28e908a9d3d
-
Filesize
369B
MD53b6adf5af40c6899347c8ad12c385af4
SHA19504c4254344ac1e8423fb3230019564e4dcf425
SHA25620bdf5ba24f823a0d70ca9d7794b234c342cf8eecd30c661a74c54fbdb0c911b
SHA5122632eea39f7dfb2e446cf47d71c33ff1fb3185d58e236ab068ec1d4283aefd5188d6fbee44114c0f5194d5144589dd97ab6614e259f05dd91e6ae65fe4603f15
-
Filesize
6KB
MD5d590ec56a632666ceaa66b357c570d3e
SHA1f5f9ac507539ffbd09ba700ef98897b8940625f3
SHA2562361ce0f19c2dc4d6842e324163445c5705ae9f5626423182cecf4c4e5f8f2d0
SHA512371d976ff942d841c68234ac9075ce547284b45ecf58af414ee68c6dad11e922b923d55778600c54f9b499e3f08a41e4bc703cfd6a11eb9c826be78b1440c38a
-
Filesize
6KB
MD5c3176ab12619b9571dafdcab54eaeb7c
SHA148c2a732b590f40c55677682a46ffa3abb4e18ad
SHA256a516504839df83fb1738c2b2e3f3c981bfecf0825dea9b91ebb6fb141749fde9
SHA51294fceccd0c91368d6be9948d86be9551836eb8c6e8bf1870d59ca4e561fe49c527d6e0d95f015b91ec9bf26ff8bbf243993d07065f5c579efd8d50c727e32332
-
Filesize
6KB
MD530b26b0062982b2cf3177e75aae31720
SHA14896e6620872f206ed4f227942fe520a0ba76439
SHA25644925a6bf0dc63d5f450d1765733de533833b17cee49d4cbd4686ea7a2830290
SHA512095e25e89e0ad5aeba947d8fbeb8cc38a39c77b5c1528d67ae5cf1b90514925674b596e2c137f71d55aaada9b1438e239d85cfdf8548e40537074712b737fc65
-
Filesize
15KB
MD59561a98b1a3fbba02d1c42047cfab157
SHA1965fdc45883a5d9e41008892876284941120691b
SHA2563afcabeaa78de94e39275947230b6411f7334327eb6fbf184061f470f5216ce5
SHA5123eaf046c7bf09040888f9426c70c5e7b9097a8c41343394d5f0274f41719e298fc9f7f6df4fbaa1242812ee612e30b7ff184d07e7fb8f3423009089f0a02c6c6
-
Filesize
15KB
MD5286f525a1437674af1f23cd7f8033411
SHA11484814d952de19f1a552b925ed1b64f6a96597a
SHA256d2c6453bdc0255c107b13a615509f45728cee327b8d2eb6438d32fc62e35217c
SHA512cc1e85600132c3a024b275f1e1f48089228272e936ed5c7e8a7183a458e94b53712ae7a6630786b32ebdaed92695578cd7c47ad6ef8eb73c076fe20006f8a88f
-
Filesize
159KB
MD58add9c5a4753e1d55cfd42558c9b5f35
SHA19597f7f1c66225f8fcb383c9abb27796e39c8da9
SHA256f0a4f027786cfddf0ef75e3a784b629cf32924522e94ed59ae6ad795e047b1cb
SHA512879e3f13a2ddb647cf518218c3df92d49aa19830dbbd6ccd10ae410b51f45a2c6b7ee9ffc7408b7e6c46b17fd1589aa1bb3e4f036dd39228ef880f95fec1563c
-
Filesize
159KB
MD58add9c5a4753e1d55cfd42558c9b5f35
SHA19597f7f1c66225f8fcb383c9abb27796e39c8da9
SHA256f0a4f027786cfddf0ef75e3a784b629cf32924522e94ed59ae6ad795e047b1cb
SHA512879e3f13a2ddb647cf518218c3df92d49aa19830dbbd6ccd10ae410b51f45a2c6b7ee9ffc7408b7e6c46b17fd1589aa1bb3e4f036dd39228ef880f95fec1563c
-
Filesize
159KB
MD5fe1fe2d63c427b8bd639e3ee6eaf762c
SHA111cc3f7f7f21d5cd6a40f1963ab685287ef5ac51
SHA2561d92a18cbcb963a70e425cdff44ee07891abed7dc3768c7851a7104ff5f5f330
SHA512bdfd579a74ac347a287cab706cf4bde06ab4c99dded3ebd688d0a3312898a80f8427d4727dbc19aeba9e4d3fe56677762d1dc261323242126520c294bb8b5316
-
Filesize
104KB
MD5ca3a5f4763f0a5ad14e5530ccf490bc6
SHA12d20e6d34190378af14445a18988a10bc4965f04
SHA2561464bbf42b5cd12063b7b2014382856b552084b66be51255b670be6fa1620263
SHA512958e45ef279556b578a343683f91d9a27379cd6cf8460613147d6075143d8635c0966967bd704c5c21cfc147b2f5534bfb399ecd3448b0132313f45249f21c5a
-
Filesize
99KB
MD5778ba30a3852c453787fc20f948aaaa4
SHA1194661df4ee1bd85c6d22e13e963bd77dc8c065e
SHA2562a8c97768c415af71a032b2395e95a137d495d8a876872a470a91b1834a8f0dd
SHA512066a5721fb21851558e65bac1fd5fc53acab124ad55894c16606dd1a061069c7eab5f7e7a34559fd57a7f89cf40d6a6c97acb2abc9bfe9bbe8832d8bf7cbf117
-
Filesize
159KB
MD5483a31c3b2f4dc1ce73416b6ee57771c
SHA16bdc6202e1a1bf88bce11a0b93d5f1e9db922dc4
SHA256f21c3dc082404e6bff034b43aeec1b87ab19af002543326052ef0165eca26918
SHA51292479e77ea54cc37327507f140a24903d0e141381a3758f2cedf24b41cf735c1c53ab10cd5111953b6d0ef9911111381bb0f9f5b16cdfc4450c676869ca02b3c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
13KB
MD5b5e51e75d7ccff9c22e4a20445ef8ec0
SHA1cf3c2f8fe7a622b68023c3deb5b81368564b0168
SHA256bc0403a8405bbf2d88e2824afc8a88cbc0999108a5b7a9f1c348f4088e6cc382
SHA512bb982a2296e4348f784e3103f9304696628051da88d76c40cf3a1ba892964bd91e387ef3f04af860b10cad490ab08ef03908efdeefe7d6de9c82bd3f6ad5e211
-
Filesize
152B
MD5ae2c65ccf1085f2a624551421576a3ee
SHA1f1dea6ccfbd7803cc4489b9260758b8ad053e08e
SHA25649bfbbfbdb367d1c91863108c87b4f2f2cfffbbbb5e9c1256344bc7f52038c54
SHA5123abbfbb4804c6b1d1a579e56a04057f5d9c52cfd48ecbae42d919398f70da2eacd5a35cb3c3d0a559ad3515fadb1734b0d47be48dce0fdd9fd11578948a6c7ef
-
Filesize
152B
MD5c3770be634be8da92e71a3f9f76d79d3
SHA1f4538b79d313dd46e55d1fd3e6ca3d4681fe4c3f
SHA25623549094c00feed7abf21e56caae3c8b22a7bd89cfc2f5ea369cf13259273432
SHA51209c1a087be6dcb49fd0725936571946266f31298f8ae141d59b9ac60f3f0fe8e7d964f661818d72682633845b48dbb906d8c89bb33bd2060bb4971b3e14fc4a0
-
Filesize
152B
MD5cb2ff64f73629938a4349480a8654f8c
SHA172cdc3e5a55cb9b29beb17f643e0ccfe32d11fba
SHA256745c0c49f261cfb2caf19fa38574e4a9245a6f6ca1caa66b8220db26117b7f0a
SHA51275cc8eca1dca5077fb278870d4f4e0dee7cb4a180fe43c3d19522b94605dbe34daf9f19faa09fba4bfd6ae098e3643fb3cd022a91000d99f62f43f004d757b59
-
Filesize
152B
MD5cb2ff64f73629938a4349480a8654f8c
SHA172cdc3e5a55cb9b29beb17f643e0ccfe32d11fba
SHA256745c0c49f261cfb2caf19fa38574e4a9245a6f6ca1caa66b8220db26117b7f0a
SHA51275cc8eca1dca5077fb278870d4f4e0dee7cb4a180fe43c3d19522b94605dbe34daf9f19faa09fba4bfd6ae098e3643fb3cd022a91000d99f62f43f004d757b59
-
Filesize
152B
MD533fa4b98d7d2f92236d07a87a65aa4af
SHA12303b673212b3e684224b2692dd54239936e9765
SHA2561d4cc57fe3acc10c277d342fe9cc851bb837dfefd9b1d35ed9d3d8837d36603f
SHA512de98e5e0aca5bc3e47d147c759e2bc865b160163a6b217e9ad2e5f32881bde9646c3ee3bfa48f869ce47589f257eb593ea75f8c1a1ffb5c2cd3df55f35887dff
-
Filesize
152B
MD5e29216b1bfb5bcf8ee67711d76ed50f8
SHA1f1075f1a49e9792ec01465bff3641102ca02820a
SHA2562605ae1e58043fa7a7079b94426e2c311b27a7328bd648ab8caf1877e6879823
SHA512f6a1909cb4b5cf9721c04fe414b28ab3bc63e08916c94dd2fdeacf9f0ffc3ccb744e837f246d63b43277293d2cabdbc935f565e9a313fc8766faa6e1fb2f80a6
-
Filesize
152B
MD53c7e43383f90f8dd1b27d3956a19bf68
SHA13fd68573af80bf46a75d749031b49222e051b3e2
SHA256f84416fb7795ab3361a6c74cc975eb02eda11a968d25bcdd6b2e610e60fd4bab
SHA5120d53f2f4830a853d35b261548f669bad27d7f73ad369b3ed760f0755cd57595e1448c1e8df24c8ba65ecf51c82bb5a187d9ee996beef2c69b2280a62227b0772
-
Filesize
152B
MD565144009159c6b2407e904192a28013c
SHA19663c85a69df9acae09019a1e0f427c09ec70d37
SHA256ab6ba6f88b8e96dcc9485968fd491e2be58d4edccb37244faea250e3a64d2da1
SHA512d4bd17eecd236c7655aff5e0ccfd15a37563500ffad014a74e7baa6945221d06d348e79986d2424abc68e183a466f3d1bdafc4aefffe99b1eb5c79a98f445f43
-
Filesize
152B
MD5702ac7ae5e0a39d0fa0661bdfb5341e1
SHA14c11be6fee8294648d5a38d5014ff9feeb180baf
SHA25614797bce5104beb939f960a9dc0c57c9426934025b6c6103d3c26fe960c57469
SHA512b6a7fc8b5613e99b574a067f4d1bbdc86652aa22214a8517dc2c8799aa6a6ee4c03f85e36aed62931a323f0536a235491dbafa307b94b8611ab9303ada9567c6
-
Filesize
152B
MD5fb351c0660d65358a6241aff38243d1a
SHA1a46a84d4cd0f5c1a6bb6c20d69ed5fa184467183
SHA256e2dcdde30b0b469238addebfb323f4e4ff502370bd9c419aca1fc04f6357328e
SHA5125874ae7e21cae1889ecf9ff9615f0a6a2c44171b4f02a118d79da58415ec850ad2299084b37ebe52983dc3afdf5f003fc8fbdcee7ad4131d268617a0d628fb31
-
Filesize
152B
MD5c25d52ec4724c00affc277c98ee6643c
SHA17d26b5512892275ffd018b207cbadf78c1715444
SHA25677c92a64414c99c10bfdf268824a9b876d088bdf144a601c1877a38b85bf4c76
SHA5122fb58c1ca485c0c75cd2ada5732e1074da209e609098213ea0507cbd6933861557aec04bad7a44dbb0b6ea1956f49155a0b9a48a78c1e619ee48d1c8ee2b5a04
-
Filesize
152B
MD5291b03889fd5f15833a02dbbbeffbbcb
SHA1baa8588e723ed0d3e5a4b1f39336dac5029a8e5c
SHA2566d33f44faffef5e9a9d5fd8259d07fbb2d28d73bea6f277048de704fe034659e
SHA5124a0c24be1c6b8563f8dd1e5e13015a711e3fba71e431c184971013d0773b20c592e240f43f7b42de5cfd9c5a13d7829ce19afde771b13432b49af75e626e059a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7dc06e12-348b-4143-bd1c-95b935d3aad6.tmp
Filesize7KB
MD5de2eefa785a03b32fad27ed31f1141d5
SHA18a8591c6f7df5b6b6bf67014eb2ea9f5ed10f21c
SHA256f2a87dcdbf2a28d08783de473652d3daf6d31cedb355a46afdeac4c0f93fc9bd
SHA51264cc391ad771c1f516c0660b7534c92c143bac9796946c31832fdbc2a11209f136f334dc71eb3014cd2fdea38e99dd5dc2339eb7ce5fe7937c81ebb01d4250cf
-
Filesize
264KB
MD556c8149bda775629f78bd914b8a8bdda
SHA16ff01caa879a301572847a7d0b816a5aec3f5c1e
SHA256813b31175f92616270c0d29b51747dbea0aca28e577a979aa292fb89a2216e9a
SHA512a0113a1e9381839b994bc37e67651cf0b437d5d148e9e89180aa497b8df9c8d155a4101dd6454c0e15f321897d42b7fe1504aebe9867a885cb20e8842d2be5d9
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
69KB
MD59b13f2a8f8de9e8da40c4e3e1392574e
SHA1864fb91867e4c429d8ab821763bf11ce15fba384
SHA25666094d65d176790840968a73dec5c88cb77d1d573a9cf8c32da223fffe41cba6
SHA5129e40798ff8b457b8089c26b5745b99cb64dd125f0210894fea156346c767858e71b30af383ba8819bff54a0f9d1319bef0466b3d283fcf310d36570e4cf69806
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
38KB
MD5e4c780a544249a7967b82f07268ef432
SHA164b38d103f06b8de4241c62835f67b28a96d286c
SHA2564d2dc675ba41d56f2aa6cc1286f3f127590c9748f7b4e0bf4c79b0b4bd620a9a
SHA51274b9135f09dffd7a081889235d2f4c7a343291a4c4458ac69754cdd5790b455b9b98a128561d516202549e83671de13cc4e4b9cfb3ff195dc3d23b42885edf49
-
Filesize
996KB
MD50916f2efb7234958ec5ec185f6571ad2
SHA1d90022895b0e44e41390f591c9b552cb71c7b927
SHA256a45e3a7444f5986ba8f6fa3ec1071e6dcb7acd1daff729069d6aef29ff3bc9d0
SHA51255738a4ccefb90c3120a01b72680a79a89bfdb3c940a5a7a17e4846dae5e758bb89c2b22114cfc9b327f2277d73875a1477ed8f15ac9387e7c3805cbbffdea4d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD58e13b0ffeaaba5fe117450d90b2701ff
SHA188c285b50edb12cf80c16da60b1faff36ef2fe16
SHA25637fc0feb3c4781c24599e373116774e20f7b70741c1588ba0e4039ee34cb9a25
SHA512540013a47cda76a2dfa773b25301bbd80cf832d37093f5694f522d2ad53a52d71307d926c6372e188c9ad00b9e1e5046aec7cc63f58c213a06a0baa057312a86
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5382a40734127cdcb2ac03d96987c4fb5
SHA158594e2c1d99821ba9c5cb9ce2cd71542ed38b23
SHA25670de2df0ee9a69f115ac0d72dc437833a5d3a29a8681f7b66c9c1a728f0c21a9
SHA512efa6167f4322203c2a545a8643a527fd9c7eb6bb24a55539d08e8dc6609b36d54b87ff35e3ea9daec54efa2a342db2791acc834a1b7a922c054adaa144c7e35c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5f55293b6214563da32aec36c2e4e2403
SHA185f9465b7ba73ed8da5f2c17cadd0840ae364579
SHA2563aeb3b83c9bc5ef67fdf1a3b579a6a5644d4a1df6dae4aa7507998c15041c2e2
SHA51255f315f89d030753b535fa3ab7d726ccff31184aced59d8fc47807bad60668295d7e137db5141594e0b5eb472821308d80e66f9d1990d49562b9680f1fadc39a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD51499225dfdff4ef78c80e8185007b899
SHA1d3eab8b3b96a5c6b210de958383a114400cf742d
SHA2566fa03149eccd2cf518cf5ec76f44069bae78e172abddea0746b28f85389ceef1
SHA51223571dcc94b437fce8765aa1014cc87150c923058c9bb94ec11c818f0b909f92cd4e1b4cf199b2471901f77a29bdbc62f09e225ba843906a8fd17abb21d53560
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
141B
MD5d216b6f6fa382cc014c47750750a0204
SHA1f361a37b516b9ca7c26f8ff8f61e705588153878
SHA256a5ce647e738776cd31ded604bbf55bf8966664bcf87ca557dfab1497d35ad128
SHA5123be5ec5ce00501670911b960fd02b71a65917111c7eb02e3920fea789432db1ef7209c38ca8313f609bba49456208bca8b9f91900a9312d898174784904d7877
-
Filesize
141B
MD5a6cdf9d4ec880f82798a9ce875f54e82
SHA1ba0fc9104a6d29d6af2dbd344545513666bc47db
SHA2561e2169541d7efdae27a9b101ff69674d16dc2195b78781a48e7ecf8ded215220
SHA512dbe0b3759f613ad3eb35d275ed7ff9a95d5263b0b81147cecceaad897f4339ebd17a3b11fdaa3f448da4f18456aa6243f585fd9ae89c3ff649535c2b67c22231
-
Filesize
141B
MD5c2ae1bac1dd19da114c8d1029df90ce3
SHA14cc86385f3e70e735fd1b33cb874a1fc6c3d61bd
SHA256aa04736c87acaaeafca9459297967aeccbd6f523536041aea2b11bfc51b6a08d
SHA5121edfc795bbcead4f8d62ff1b1ae782aaaabba072af969e375d8453ebe1979448803a332d59d43dd55617e0289fb3a66dd482437a1127626205f060e1b5168416
-
Filesize
141B
MD5b979e59258d25f4406df584a5ec0317c
SHA1f07129d452cefddfe6c63bd0daebe2a1bce20265
SHA2563dfd1d3def4c8f3480fc228b4527f62144b694ca949918dce6030a87546986da
SHA512ab86edd07ed7bc168ced109b58960deff008b360934556237187b4b9492c353e8298823c4898f109fc61565880e63b12b90f798d54bb99c89d1dfde93e8ff172
-
Filesize
141B
MD52d3bbf5933aff2aefcc040e18fd12402
SHA16a1c910d6a35e1e0784920822c313f1c91b848e4
SHA256336425c3c264fa6bb2ed2e5c646352896742008cceb755179eae3305de2c6bdc
SHA51240d99d9a915afd918a67ad93aba754c31e686a74731ff32813d6f29f7274cb9c8f0ab90e08d66e5fa9a0bab5dec3a8a14f53f5ac1d445f0ad019d46965b64eeb
-
Filesize
141B
MD56999600a97e1173f75590c75a421d974
SHA15aa2bb6a3420540b56ebd7afb4efa0ae54a508e8
SHA25649a50c826141f558a00ad54747b1b7a025e2a785d471e8a5cd8c89c4d184dd67
SHA512421e18252c5dcf01d4909c18f6fe077757c73bcf9f3f6d10cfdc28c7c1bdbcea747cab36887dc75015bde6c17223e833d812fc028458fc217f46aebe89cdfa7f
-
Filesize
141B
MD597eef08a159ce389b9a510aeda94b927
SHA114ec748147131ec2d970b80b5bf6f69614548324
SHA2561fd7620cc0ea9b13b0007b19912275b116b32e4784030ca79ff203e4403dbff6
SHA512302affaf033439b1dceb15cd21ddf7b676024da83ef9cbc05f433917b662c8a2ec6806342bfee18ab221559aae5a4e6d3bd508200d70119a8756237de3d5f72c
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
124KB
MD5ed54bf3be8b7601d8eb7f05c9f0f8620
SHA1119ceaa59cdf7bfbd6a5f4d440d956587930e521
SHA2561ef15b0d1fe10ea1257548578e092dc4e59f84a67849c38cda84e157830b43da
SHA512d811f6c3f660f3f0c4332aa52995c59aee4a04f557ab91a979ae18632cf1aa80c58cba8c1ae8f11a791b08cf98d4726bad1b39b97c43e28a16445d4ff92d081a
-
Filesize
6B
MD5a9851aa4c3c8af2d1bd8834201b2ba51
SHA1fa95986f7ebfac4aab3b261d3ed0a21b142e91fc
SHA256e708be5e34097c8b4b6ecb50ead7705843d0dc4b0779b95ef57073d80f36c191
SHA51241a1b4d650ff55b164f3db02c8440f044c4ec31d8ddbbbf56195d4e27473c6b1379dfad3581e16429650e2364791f5c19aae723efc11986bb986ef262538b818
-
Filesize
334B
MD54c45dd5046de4d3e90ca5b852fad9a2e
SHA165b1c42ddd2b2548be66aa1b94ec83bd032b1ba4
SHA256618dab0ae165d0ceee5d546dd8369f9d4baf3817fa7b7d12199777ff98b84f51
SHA51231563c5480c8595c4d662c964301a77b25ef330f757f442417b388d73a18d600f45997f68f5d91454182d7c57bacf4dc1173669c5cf8aa46f12593525238a058
-
Filesize
2KB
MD5281a47b14489a0172b5add8b2f9b966a
SHA1f161f500080ba4a464bcdbf03ec48f8c0054e383
SHA2566c186e119005407afaf51a08ea94def8cab7fb6e1eb8ca17037c8c410dcdd90a
SHA512b8821a71a8e8868e44f791da4ae0528974e7b741001ae4147bea3b20dc5a63ae28fef190cc227e150cd94cd124506e3ef68691b0d2a70183a8f92c0fc05dcc82
-
Filesize
895B
MD5a85f540542743cd264b6121d27c7048e
SHA1923ae2a2593cfcc94fb6f9fe9d0e74cab733c25e
SHA256bc36245d1e9164080bdfdc852bb3641cfbafe91262139a949ca13425903aa511
SHA51254686bda8d6921db5bbbc4e65517f005f788392bef614c76524071a940ca2db6bb0d8195da2e0aa31c09dd085e65c0cee8214d82ccfc87b84283644596565804
-
Filesize
895B
MD5ef5fd815337c2507a74ff18f39cc689c
SHA14bdc6662eb7a6edc9cf1cf12414d3e4158b84c37
SHA256e9909ab4878d44ee04ead1fdaefd2cdabff63b28e8994d786e6d5fbba664f140
SHA5129d8e38df4dcdfeb5a47ce8a78ea236fa6cbaf09366152526efc639b77347347524ff0e3a47146d83820e9c37ca78bd98388e3447b0b00f55d6d97c2186980c87
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
7KB
MD5402561ebfa75af8b819387741ded8819
SHA195f6ab3ebeacd9988921783c92721a61f363ff66
SHA2569903300e6e2ca966594eed7dbeb369b444de508ed40ef470bcde9cf17d2b8d1a
SHA51273df5056e11d54caf521164a5b13be879328abf112afa5e794a405abd87775ea46ea1f2324bac2ee9a0b93be9f3b4f3d70483eb209b8730f087cb2f4b21e9584
-
Filesize
7KB
MD560f76c02704b3075e6df93eb18a5ecc4
SHA19d83b2aba71fdd48ab28fb4a2299fed773e9b86f
SHA2565e972d44af9a8f0ed0803480f3d772ce73bc323372bfeb64b8168a87c294ead6
SHA512c06318b7a09a121d225cb5a07e98c49a2512911220a241eedd68a9d54e986fa3cfe74333391b245b29d8f2c2bcb14e0fe51009960ba1c2c02a9414a8f02dcc63
-
Filesize
6KB
MD51c9a7d06570a0a56da0560ea5de696f8
SHA1464cc74181dd805924cf31f2063b24f521c09b37
SHA256d195a1a82153eba2371e7fa317af2f068ef0a558b852cf780ab5280c921ab3c5
SHA512af0ce4abc78814279f79f2e0ca63d3a79e806769971bf3beda22eaf0c95c7601ca2cbb1dbc78ec779529f6dbb81cfc7d8e8b5e407815f899279ad3291d27b2d7
-
Filesize
6KB
MD5c21e480067026713a94a51e637ca1d9c
SHA11144079d08c5503b5bfb26953d09ecf97b13ca34
SHA2562a110db6f155c51973bc7a12e6632087e659a986f89aa5338b376ce31628747d
SHA5124c54ccfd96f621c01ac806e650ee1974b3ae1da49c93dd9ace26f6603a385b089bfe827684c97202da4af3909c5abe5e517b2eb7717da6130009e4a01967bdbe
-
Filesize
6KB
MD59366db87e6a4b9f8941bdf87d4e38587
SHA11c3ab6ee6c4cdf91f70885415ea8573a21004e5b
SHA25631bfabf5d7245e53c13adb5e1b63db8e6538563186518c451fd783a7ca600ed6
SHA5126554ff965a874ffee3f3a0dff7d85f1ba2e8ad467ba59a1d20b7af23496d32894ff6c5c87759e95e1bcf4c283f84fb7f46062b7182f66901cff670653331b8a5
-
Filesize
6KB
MD53861f3545927246063086ee9f4febbae
SHA1c52a9e6b32a354e41c69be1f4e697c372289dd41
SHA2566f3ca8ef6d7f464e8f77900a069524233aa8603a7fb96b1545f8e81b4d0df516
SHA512cb5cc2490141ff726af1054b6276ac6f1677cdee7c5dd8dd31339d13d9d6d863e817ad2d89df520d2236bf7e1e13e5b611c55ae9c13beef8dc88e3ee50b65ba2
-
Filesize
7KB
MD5eb0d85e90d4d28c82d71b3549dff5ae8
SHA17d632fb8144ea6df3608edb7b1aee743229b41a6
SHA256301a515f53a23bed97f5d1cd72162291d855ee6dca58bc5c032a6d351f67b8b1
SHA512c5e65b46e7a8dceef20ac8a3c82b62c07c34bc52aba4938177cf2d39f9fc5e773aa51c82c541c5c89e938fa961b3b3cfcdbc9fa74aca05c39f73ab5c147f3bb4
-
Filesize
7KB
MD54a2971db1acf41b5893c7048f37d1f4c
SHA104870d0da6973027ef8da2b6d307a3e7c58814e4
SHA256ec78904b4ceeb657a5a8c9aa1877f0df253214796119c935df6fb74975590f3b
SHA512d5cf8a6a4f5c18149542a20c6329f0fdba08c87212626cf12652a300f03f4c3146ee9ad0db5849ec04e74a45a307562e20f9fb909dde2e583e106b6172dd7d2f
-
Filesize
7KB
MD5147180ecbf5137af534259b28206a1c4
SHA116b813a51096b208b358f8c6a8899f8c3abae3ef
SHA25641b49c3553cf0b391bcd08e91a5984ae26b32d3137c5d3dd1f7229ee660e2846
SHA51230a08d02db659993d3e4e0f52c186eab8f8fdc34691fea293a2ab2181bab14b757978f88537fe0575a506be7f883e8539d7bcada92dd5e3d3d81519b54b4ec91
-
Filesize
5KB
MD55e19e29f93b8177aa85f768cc8715c0c
SHA182dddcb43fb47da1329e16d8bca7006ffd24de0b
SHA256f4401df557bc7559048ee350ee17427735d2be09b50059863c5783a8f9468c2f
SHA5122d7260c6f41608b38b15c42529811a5717b544d3680c1c5f8f88cc0d3241fab71cbb5914a241e00abca4435dbe214c5d1320001f407ff9d8dda8132a9018883b
-
Filesize
6KB
MD5731c98cb79d32cf77da8664254470279
SHA1de2812c356eb169b06d908b5ad22eed457be1d1b
SHA256b6f016a986e06a001cb56abbf42c4099118fdadb4893a8e7ced7e1bcaa2ec124
SHA512beeee15139d3c63f1cc054aa31b10dcb2645cbcb34ca4658dd6fd57fad53c969454666ce763c0da3817fbd124a2c152a95b6b085f05f59fe0819dd323114477f
-
Filesize
4KB
MD5458c588ba92407d2dee08d010ef7559f
SHA131bd334a0bf45dfa4bdd989750d473bb7455580e
SHA2569e5f78e4f3be56d4f4ff6d362a0cbeedd53585117c16a621434dd7cdb7420a7b
SHA5121659284fc293ccefc977cd47aa472e0fc1252da5e64a5520527ac37ae48a3b166e08c6914fe8d341f18fe287e4988e28480e5da01b9668817434673f2cee77b2
-
Filesize
5KB
MD5cd24cb15dd4060ddb5ac0bfbfee4c385
SHA107d9194a08fa8032ed82de271f4a0b0dc37c446c
SHA2566c12681918e319da470afd37b017f191497c71273a6a9aa571085662a0e46cdf
SHA512eb392a6e6c005b187e69c59229dcf800f0963f4017c6c7e7fcdfea1d0008e9ba16cd3e5dddfab289f9780a4e0bc2e7ee35940d24033c076dbf773feaefb3ca4d
-
Filesize
7KB
MD50052c03532c7b0cac96513f038bdf2d6
SHA178516a61cc49a82f90f1bb5019d62fc0b36106b2
SHA25699baa747f7b83796c0df30ed214519e3993d8b04154e794cf5d0564fc4ada04a
SHA512ba5288a3f97916a4d2413b73c0c54f574b4f215d5e0f6f974dac3fcd1791d4f8540e2843da422a5408b4331af46bb5b98df9c327f986eceaada960d5160a93e4
-
Filesize
6KB
MD5590d759cd33f0f115758733a354855a1
SHA1cbabf4ab72edd0178d268f490b5546b8126fe97e
SHA2569e847aed4a375e5397af976a6c88c4675a2d249868587aa9b0764fe03d46f623
SHA51284e8c690c5a89a8512c016f2e320961b4a39c47a66d8201e90b9cff431b434762ad0ceb737a52193ed1425dee1445087f616ceb66becd14b46e95621c0f57e15
-
Filesize
6KB
MD50473ad933bb9907d6f8e43c211041351
SHA1743055b9be1c64e595d0609b5f3948bd204a5ddb
SHA2565a500efd08a0bd44314ddc67c7129415f9cbec1ad9ba37bec7c0a434556aba1d
SHA5120d6f1900db5514a79749a9bde6e6a6640514cefd66d2f0532f304ab5bf465ea6bdaacc1b1c9bb6bebae0308d54387e1fd8526bf35fb899d1a369712d9681fcb3
-
Filesize
6KB
MD50473ad933bb9907d6f8e43c211041351
SHA1743055b9be1c64e595d0609b5f3948bd204a5ddb
SHA2565a500efd08a0bd44314ddc67c7129415f9cbec1ad9ba37bec7c0a434556aba1d
SHA5120d6f1900db5514a79749a9bde6e6a6640514cefd66d2f0532f304ab5bf465ea6bdaacc1b1c9bb6bebae0308d54387e1fd8526bf35fb899d1a369712d9681fcb3
-
Filesize
7KB
MD5cf477152b51c0933bd9a03de4f8cbede
SHA1c78cc419b3ba6e1c9160f269dfa7c8ffdac2b5d7
SHA25612fe4df75adf1e64aa8092708a71cd8c9639985c9da4ddb8d45eb19374a7ce6e
SHA512df1d68bdf8434f27a69e1299728dd5693428106fa27bd0b4e4176679b1a154dad143a985292001095bf7ee4e0c4bc7c699c9023656a47accddb6d132e6723692
-
Filesize
7KB
MD5f33304683331830f36397194d37bcca8
SHA1314e8bf0ec060d9e5f07c2da51a694f87b2c2bb6
SHA25687dc2101a188ec5856229951ac3e167d0ed9793f071253981db8332e9d7a6f09
SHA512f799e5617ac0791681549cae3fdd23caa59096cbc993423334e74764ecd9a65183c880c41ceef32b77e1f184ca78410f702d85ed67ff85fdf728ab692a4d2072
-
Filesize
24KB
MD5b3fbb8a02260d5e41407a7e1af3ee2f6
SHA19180c8b9593405936b0fe52272571b63829525d4
SHA2568c1434a31409aa606a51bdae37e0853597cb408a2cf199f05e02705df3fc15de
SHA5128a6ec40722054025a8969a80e795b026fc806a0710eb2f9e016feb68cc09a19333404a8a62910e9b0335729fd64e8e1b6250513ffc334dc8d669d96de62eb5d9
-
Filesize
24KB
MD5cfd585ce0db9a1484f8223dc2cfce2f8
SHA14e5e287160c05ecdff8acdfa0899faa5bad4de82
SHA2560bcae3ddcadfadb917e4f910daefde07af8d2708b7795f3a1146102dcf6cf445
SHA512b45dd6c3231a79155508d807d4b6f839d49e6120841c4f31147a83039515d3358822fa1fa4ae6f770b4369b96f221326c0b80dc2f0cd99d605440b12c93fb648
-
Filesize
24KB
MD5cd0288ea52cebdf7d9caf232e707ee50
SHA1b5105555785fa4ff970fa43c64a28af0877128e1
SHA256561e4405db15621e752ff9cf338ccb88d643e95561a61094d7d0349b7f3375c0
SHA512c29a043d19a6190cfe02f8151605cf34e6f945975df947596ed84bcd92fb4cd8ebe464916bd65914f89ff386756b6d61f1f85cf3608dd97083033a7b32bb63df
-
Filesize
4KB
MD5571a5cd091fc90f19c91256276023798
SHA12f66088d6c297ec284887ae239e6051639a425d6
SHA25628dcafbfe31be8b42c80d4c909776f1daed86220b419cadb55f63254ed6b34a1
SHA512c6d6de08cf4d705b0fa6cf536c77c54487bc017fd0225a9ce777176dd57b2b544a1d06d6d3c499595251f7279c60b78eb22db704322772cf1fe118440c49e33e
-
Filesize
350B
MD58c1a893d8bab734c49ffeaaa51097dce
SHA18403ae65e6b5b78b0640465bef0fc6685fb74d74
SHA256e8ee3859ee4729b6700d01e1f6a91a0d75719c97f92599e534bf326f1e7f771e
SHA512300b61ab7d635e23ecfecc3b7acbc8476a33a651cef2b0adb41eaa023378914617f09e3232bbb85d908e0f1a3a64f191df3339e2a097df2977a7b7098e583843
-
Filesize
155B
MD5aebbaa3748ba7ccc86142b2e6b1a1269
SHA1557a071013d5bc83c57096d5f3e2af16b814e9bc
SHA256939c37beeabde18ebbcf3d45ac65d14f15ec14df0f14a50b0c9b6f5186707bac
SHA5122724b44daf7b99f9bb02ecf468f0af53b4491ede50c32e8ee4c036f6ff2ed5ba6bfc2c5ee7d8d3444e297d617e4a60d5316da45059723d0223bcb3188d8d54c1
-
Filesize
622B
MD5f955e7a09bc6ea2fe7ef51398c99f65f
SHA1bc8584384e41257483a5d3aaff442f5432a9a5b7
SHA256ca762a697a099adae8c4329a2b31afae978e975dfa0536d572e18fc2839e0863
SHA5122157d1da6dc2230a46707cb71359b4b2de8ac498737a5ac1c993581162e06ebb0b06b27438edf207688c391c976b5718ce26ba0f0cd259a731a985258ed20a59
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_0
Filesize8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
323B
MD592c1500dbcc8425c9517a3747e90e508
SHA1e08f5ae1d7e4a540d4fdf445c648018e74ac287f
SHA2567c70f5b3408ca6147d9e29ad2a0d611de50ba2fd01d2bf0090f2bc2ed27ed7bf
SHA512f9e589ddff1abcfea9b68a318c3b2ba78d35198b80aa9182cadf28ad04d90b6a6d748232c99313299f2f0423e4bb8124aa50a69e7c804fb9434fe52ca3bd7b4a
-
Filesize
20KB
MD5f44dc73f9788d3313e3e25140002587c
SHA15aec4edc356bc673cba64ff31148b934a41d44c4
SHA2562002c1e5693dd638d840bb9fb04d765482d06ba3106623ce90f6e8e42067a983
SHA512e556e3c32c0bc142b08e5c479bf31b6101c9200896dd7fcd74fdd39b2daeac8f6dc9ba4f09f3c6715998015af7317211082d9c811e5f9e32493c9ecd888875d7
-
Filesize
703B
MD56bb79ef5e0b73ba9f39279a5ba4580ad
SHA179919d324f8abf219c8f15b214a2212d9f329aad
SHA256c689742932aeca081575387a7a8db472c6920929dd621c7f9074b00ed3f28a2c
SHA512bc54a6e6fc3d8e2ae5ab27b39b6bbbf1df73b524ed2209ffd63da14e00452e5e10fca8bfa439cafc13b6672628025f302574a4215c164db5c0935fed8221a280
-
Filesize
703B
MD552055866b46f69ffc3aa349738dcbb81
SHA1acc8543a7a6eb0a1cc46c51790c5035b04e56d58
SHA25609daaa558fa91381b4ef8c1e4f48154529b4f333d58e8e8d254a4eb81122e8a2
SHA5128afa039b6fc77b10e23fc3546fb3609732814a62f0c3cae3ef112ce7dc7f24a0aac450278c77829b783d48c689fc42a39618156e14e03552ed32b64019dc7729
-
Filesize
128KB
MD5b4cfef268e1a948100a6e73bc10d7472
SHA18f6c46a38cda35daf5bb612c448a3c10c5881d0e
SHA25603b0b34d08bb7a3af3b21f89ebf76511e669354ba0cfd19652a62ac63670b44a
SHA51292acddf794138307c273cfe1d1b1b627292dc87ad587d08d962338a860dda7426320ea0457953f1d11450bf75dce6950c6b1c614965ab3c16260a8e996cef853
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d8905620-38c1-4aab-afa3-9a71767e3060.tmp
Filesize24KB
MD574b73f8ac94bb7bceb825113a03136de
SHA1dcb36cd77c15345be8555d0901a5a97302c4631f
SHA256759d79e232f7e84b896a7be7b6253e5397ae8e66fc5a94c2837bd2d433311ba1
SHA512feea318d6ddf5a12fac4dcfe66446ea13e6561da86f947b4aada8520a420f454dd857648ffb31deafcc99ef747a651755f6879ed7e5eabc9c8d3a0e2a68659f9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
150B
MD545015b90a8b3f1297bdfa974647d6611
SHA16fa10e544b8bc95df420b343b2c64816e5a2df81
SHA25687e248a6087eafdf1d0185bf6453835834acd152382c26e6458a4ab033686b8a
SHA512ed2c02d005258ffde0a63263e711268fffba25b5530df21d2bbc52814ce4376cb5f8dbd45508262f67a644efe96a37369e045d7102daac65ed1c99df2ca226f7
-
Filesize
150B
MD5b5a4ff2aee07399850fe45464a997c36
SHA1f2b3c220ce2599a82e287e0b38a64da877e705b5
SHA2561a7ea751e405f078e9f146256758f474f7d2766297095249fa703b1462123951
SHA512d8120f8dc784a6b29e50e9d6a6b31c955b47687bff152a4e374ac4b5bb7ae18093dd2cedb46917322a2fd4b248e8e46e5d0832e6f89244f6655f3006b1c57f5a
-
Filesize
264KB
MD5a9fa9f776a8eb20bb6ac47d6b74b14a7
SHA16283edc58c9b323cbe251661fe8b8873a6d21220
SHA25617e9ab3e18c95ba6c02ba8aa1829983e1a867fcd1431e5c56267b5026033b82e
SHA512024c6e257633be9717edc3449c30bb5d54683e9407cb02f89c98d5c15373052e1ed083c415f6ac62ec975edc06f23d50bff05197b8905f2390ba534652d28b28
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
14KB
MD5cabe642631371ae4022319625157e850
SHA1717d7ffa55a44b3c93da7cfbfdafa4a1956ae044
SHA256b2650201cfead06e70605bf5b449072295efb1f9563aa8c7b243fb921b3387b8
SHA5121354071bb92006bb858c1515e5518ea39b482f5fd9559f3c94c1d715d9dba81470126e559d8ad68748ba8b1deec09ffe7278ac9eef655201cd0c69876a4ea502
-
Filesize
14KB
MD56d7b709bc9e12aa8ca7de094f010cc0e
SHA19b0cdb306cad6a9e0aecb2946e85eebb9ff33305
SHA25620e2226acd63c1c0679c082b3236372c0e570dc640c485103b1978d74057dbbb
SHA512f1b2b1d307a46d176b4f789e6678a03c36fbbe980d04ad9ad21bb4032fb35cc97bef4ca498b76e8c0bfab60272b3ac1bf42356c9e02f7f5211646158291cb504
-
Filesize
14KB
MD57bf0f32621144dc0e61e60e6df2658ee
SHA1cda08eb3385098777ec0fa6fab409120009643e9
SHA25689629f144fec6faea8445b25b5baa865b82a080b26fea870e2f965ed258f3d37
SHA5129907bf7c15e45c9a60cbb356bc872ff0554a8299301140525f2f60b13371e28f9ef5926592d3002ea6a8dd3a752d579252e6acdae7035d8e77db4e855e7e47d1
-
Filesize
13KB
MD55c076fab727732e429d6de1c148148e6
SHA180d3e022abea9b20ddc49f3b90dbd900b59b085e
SHA256b0df54e2a7582cad2e86f513c11c22ec1212e5bdc119682045cd7d5c934b04aa
SHA512f9354b094a8b403f1de1d70c78a43692477cabb106322ed33f3fec033d738fba5189487fcd34c744b2ba240ca6b3768479b3c208f11b3c977215626eadd39971
-
Filesize
13KB
MD5e6c0044bd63f667da2b64e5635b9211a
SHA1827fe2d42e38d1ee204022cb8ed6729fe3146f2a
SHA2560e76e06f0a126014d03d2c610b8ddca7b582baccf73f519267171507d049ccae
SHA512ed6bf6034c1e833f5ffcf5ad2fbd53ace818f54902389845c9059e748f19f4030f753c57923afb2f9c481d87eb774ccab4baa0afd40cc4a07eb576d71a93d9c7
-
Filesize
13KB
MD57e3d376e9bc28cdbe85440112613f4e4
SHA197c9ae5cd8683a2fe9b570b9b99990848ed15337
SHA256c2cd9d4cbf70097da594d8f8aaa9f8fe59fe99188b3ca4c50856c72712ce0c66
SHA51277138fe30541e4fe37044b77fcc5b956adc811bb16945948d9e4a5d85851b6f4f97d24c944fd99310e94a1652c9d4a3092e1d3d8e5488bbb124ae88ad7fda778
-
Filesize
13KB
MD539d5d8b6ea6b19f5af01df3f5440927d
SHA19a6b6f87b1376e5b7c762e408ab20b848d950447
SHA256a4ef1146abce7609dda99748cbc889ac4ae01aef8032104f66f9fdeb336b0fd1
SHA512febdc5d4accda97450cc3ebf3d024041c29e46cc8fb0b0b8a83ee7ad81b8594d4beb1f0a168c98637e14c0f3b00e54ca995a68da0f15b8b9c5c4b63dc104b46d
-
Filesize
10KB
MD54e00a3a8d70fd5b56970a5e67a0cd6f9
SHA19113518f04439302f8a8439ca5cd12599d3b86a4
SHA256c20c1d988e3280cf1d177df23d919957e7327e75e88e82abccd3d39cb5dab806
SHA5128f719da5ff582c8612aa902a855333c8f24a0329b0cb8ea612128670729561ec0557c58618f04ddea46db5b70013260925ac65078a300e9bf26c4efe27d7371f
-
Filesize
13KB
MD57951220488d6ddf77fb127a5ba7b9f48
SHA17839acc2eb97aac7291738fe48aeb9f5cb6eeccb
SHA256885ce85127329d7b71f10319081ed0b54442a8c34c70366647c51239c1ebdf8d
SHA5125846b7a97d9d8a05456a4af7b31a490d73e4e8889418f8ebe72e62c623b157d5301aa26c925b5309eda60ccfdf0b63c64b8dfb889acc740281ed5ad5d687a3c4
-
Filesize
13KB
MD57e3d376e9bc28cdbe85440112613f4e4
SHA197c9ae5cd8683a2fe9b570b9b99990848ed15337
SHA256c2cd9d4cbf70097da594d8f8aaa9f8fe59fe99188b3ca4c50856c72712ce0c66
SHA51277138fe30541e4fe37044b77fcc5b956adc811bb16945948d9e4a5d85851b6f4f97d24c944fd99310e94a1652c9d4a3092e1d3d8e5488bbb124ae88ad7fda778
-
Filesize
13KB
MD5240686bb00cfcecc8062b655bbf46a69
SHA173dc191839a11d7e9e075d5208953b61ac1035ae
SHA256f397ee9e146f299373fba004b3cf1ff9d4eb97ae4d6059365ef43a4a15c1765c
SHA512e011e112f376550b217cad4c7e6ae1cd827eab4a99ca8df328d256bef2c1efe635f0bc3287848abe6e2986974717f5b2e28336ef8e179d21449aa94744508a9a
-
Filesize
264KB
MD5b56fa9f8287bd2def509d4586f95860e
SHA12373a2634883453908bc353a40ff850b7a287054
SHA25624d00660d3bf0dc819cd58d0434fd8cdedc435f38504170888be1f4e465f5c8c
SHA51287c0e852721cdd7b5d39ec87e90e8339dd2074f548af3a323a61112e6f4ab2c9719ad11e3709923977f5f8dcaa6d4d5d867c73011d9489d00eefc52e892c32f1
-
Filesize
174B
MD5e0fd7e6b4853592ac9ac73df9d83783f
SHA12834e77dfa1269ddad948b87d88887e84179594a
SHA256feea416e5e5c8aa81416b81fb25132d1c18b010b02663a253338dbdfb066e122
SHA512289de77ffbe328388ad080129b7460712985d42076e78a3a545124881c30f564c5ef8fb4024d98903d88a6a187c60431a600f6ecbbe2888ee69e40a67ce77b55
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\3N5H207I\microsoft.windows[1].xml
Filesize96B
MD5c56b2c314662429f67b2cdcb41aa0f1c
SHA1c4c5cfbd34bd6d09f02e7c251790453aeea64bbe
SHA2562fa7ef318f66f214ed17c969ab17c0dd4d7749ca65a3c29b4950f4036fed615d
SHA512cd92aa4c9de9357582c7f43a0ca069d7b7ddd3b3c823d5f65932e345520b899d8b3347e3ab5880daff84ac3fc439d6e2279f48b0abec5eb95c777a712bfc8c6d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\8G46MO7P\microsoft.windows[1].xml
Filesize97B
MD5975f32b6660166b1135650262be0fa30
SHA124d24279cbcc231bd57257f06c9ca67f976cea7e
SHA25621299234c0cc986f8a5a914312e7cc0f931eec75ee8e1d74d63498116e5d8a2b
SHA51225cc60eab1653e61ec39ce6172facaafe051ef1b9ee91cdd71a38a656bd63b40eb3e20a5ba3e22ddbbb7d63660fd09694b510fcdbaf52ee60bb5b0da6d56a42d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{9053766B-1DA2-14CF-1B83-21855938BB42}
Filesize36KB
MD58aaad0f4eb7d3c65f81c6e6b496ba889
SHA1231237a501b9433c292991e4ec200b25c1589050
SHA256813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1
SHA5121a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_cleanmgr_exe
Filesize36KB
MD533cf1a9ad7e502fd7c2de69a7da48801
SHA1a71f1a144616eda1ca60886843fae98703417a0b
SHA256f160948153cf32d47d35bea85eccd51929566e662c6eca6f838515b0860704c0
SHA512edbee4a88c5e5f049ec86a4b8beadeac89f4eec81f1176ea35f2f689fb40f335ee1f85df856d02d224f5fb95e4ac1e9a85cf6d54b4c436a50e478859ec9fc517
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{4833d58c-46e1-4f00-b333-32d531544c19}\0.0.filtertrie.intermediate.txt
Filesize1KB
MD5238aa77f61556743aca3588fe8302be7
SHA19a24591f0810a6ae08f6beebc16abd39978050f9
SHA25600480514f0c13c510c474745a07ff9d2bdeba765b2479e1c039bdeca45c779c3
SHA51200c17de8fb233b8347729dddef3166b8707a250c974da7cc47ef5bb3df31d8306fd9f2e5f59fc2f2ddec233f5dc9f50906b359b4fa6184088d07e612375806e1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{4833d58c-46e1-4f00-b333-32d531544c19}\Apps.ft
Filesize2KB
MD59ea6b354196cadba3547018ddfb9a161
SHA1eddb4348090b6a0216ea62ca8f33fadc45c2b2f6
SHA256563acabcfbcd878c0bf7f13300432938b582b67192ded4e7bbfa490afb72a1bd
SHA5127755ba6ccc24080401dbe12ea436b98b9a03be8d57d0c872e35c078f273c6e15398cf876821e80388a435d9e6b661100d4256a5add34df7a2a41fd23f1d76379
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{814b17b0-7cc2-4230-947f-f02906f6d0bf}\0.0.filtertrie.intermediate.txt
Filesize1KB
MD59913dee3ab28ad6ebd60b930d6ee8da3
SHA16e6327df9f85d9037d83a4f537f32541f46a1dbc
SHA2563bfac338a56813338b62dba88261ff9b1aa7e505af5f7a50ab9960a35f6ed5e4
SHA512e7dead4ccbd7468e7d3d1cc930be40bc5fa0a881b406318bd56346b27651c3a58611c086b369de641f058af5748fa02eb5e02b9f482ff2443d2fbf442c04188d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{814b17b0-7cc2-4230-947f-f02906f6d0bf}\Apps.ft
Filesize2KB
MD5ae92d8e34c6863d31010632e1472cd7e
SHA1b6a286b8bc20d4b8fa1b29d234d71a89d696de9a
SHA256ed6fdb649852ae050e65b42f4b2f0151f06aeb57f58aee36818fd6925ce1e217
SHA512589e9ee259b2efe4cd4d94307075850274d324ba4232d2870ba4bf8fc570ad0b2d9b9ba1ea31f9aa81615b144c61418c6d09d6b24200a5d16b01eb36450e5eab
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{b1f8b4e5-510f-4551-a439-5bf22e5e23e7}\0.0.filtertrie.intermediate.txt
Filesize28KB
MD594bd20dcef0283b5145ee7a96e1b10f2
SHA1169e50fdd5d3be06bd63ff97b0b5aeb62293c85f
SHA25650dd9c13bba956a27d6f2eb84fcfc82aae185ea9de2aeb6ebf48829fcadee999
SHA5127ef990eceae6ec2364ae1a3b02fc537f3d104432758d36db2a11ca7e24176242c21cc1f3aacf0bc9d011b931b62ca8d40dca5d127c4a10a3c84821722cab2e33
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{b1f8b4e5-510f-4551-a439-5bf22e5e23e7}\0.1.filtertrie.intermediate.txt
Filesize5B
MD534bd1dfb9f72cf4f86e6df6da0a9e49a
SHA15f96d66f33c81c0b10df2128d3860e3cb7e89563
SHA2568e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c
SHA512e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{b1f8b4e5-510f-4551-a439-5bf22e5e23e7}\0.2.filtertrie.intermediate.txt
Filesize5B
MD5c204e9faaf8565ad333828beff2d786e
SHA17d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1
SHA256d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f
SHA512e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{b1f8b4e5-510f-4551-a439-5bf22e5e23e7}\Apps.ft
Filesize38KB
MD5be9b8079bc85a662286a3cd4bf3d9822
SHA19bb74848daf92cad54e8304afb84adb1e7441899
SHA256e4c5bde5f1de5f6f7b03bbcc524d3822065ff5563553ce8b11806413891d8b2b
SHA51270bf18c2f3e2df29c1f62c715e3560cec8729899c842bf8d502aaf59cc50581cf96320512e69da3b1c23635d00a4334a6bfdef180dbe79fc147cc721bc9dd748
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{b1f8b4e5-510f-4551-a439-5bf22e5e23e7}\Apps.index
Filesize1.0MB
MD57a7b18520d7eef89e997883202244910
SHA1dd92550480126b31f6a4188263f802c849b3d2c0
SHA256a8ababd8f0a4846af8f74669ba95e9d51746090c635841074d8c3cf7c43f22f2
SHA5124ff942fc576b428199823f3a443253e7d4b0a9138d1e524dfa5f2681ee2cf672536bbbadb9085ebf81818ead4958ef6c0942cd6aefe7d5b04a7f43d6938eb056
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{405d6445-de43-4726-a45f-516922d795ca}\apps.csg
Filesize444B
MD55475132f1c603298967f332dc9ffb864
SHA14749174f29f34c7d75979c25f31d79774a49ea46
SHA2560b0af873ef116a51fc2a2329dc9102817ce923f32a989c7a6846b4329abd62cd
SHA51254433a284a6b7185c5f2131928b636d6850babebc09acc5ee6a747832f9e37945a60a7192f857a2f6b4dd20433ca38f24b8e438ba1424cc5c73f0aa2d8c946ff
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{405d6445-de43-4726-a45f-516922d795ca}\apps.schema
Filesize150B
MD51659677c45c49a78f33551da43494005
SHA1ae588ef3c9ea7839be032ab4323e04bc260d9387
SHA2565af0fc2a0b5ccecdc04e54b3c60f28e3ff5c7d4e1809c6d7c8469f0567c090bb
SHA512740a1b6fd80508f29f0f080a8daddec802aabed467d8c5394468b0cf79d7628c1cb5b93cf69ed785999e8d4e2b0f86776b428d4fa0d1afcdf3cbf305615e5030
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{405d6445-de43-4726-a45f-516922d795ca}\appsconversions.txt
Filesize1.4MB
MD52bef0e21ceb249ffb5f123c1e5bd0292
SHA186877a464a0739114e45242b9d427e368ebcc02c
SHA2568b9fae5ea9dd21c2313022e151788b276d995c8b9115ee46832b804a914e6307
SHA512f5b49f08b44a23f81198b6716195b868e76b2a23a388449356b73f8261107733f05baa027f8cdb8e469086a9869f4a64983c76da0dc978beb4ec1cb257532c6b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{405d6445-de43-4726-a45f-516922d795ca}\appsglobals.txt
Filesize343KB
MD5931b27b3ec2c5e9f29439fba87ec0dc9
SHA1dd5e78f004c55bbebcd1d66786efc5ca4575c9b4
SHA256541dfa71a3728424420f082023346365cca013af03629fd243b11d8762e3403e
SHA5124ba517f09d9ad15efd3db5a79747e42db53885d3af7ccc425d52c711a72e15d24648f8a38bc7e001b3b4cc2180996c6cac3949771aa1c278ca3eb7542eae23fd
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{405d6445-de43-4726-a45f-516922d795ca}\appssynonyms.txt
Filesize237KB
MD506a69ad411292eca66697dc17898e653
SHA1fbdcfa0e1761ddcc43a0fb280bbcd2743ba8820d
SHA2562aa90f795a65f0e636154def7d84094af2e9a5f71b1b73f168a6ea23e74476d1
SHA512ceb4b102309dffb65804e3a0d54b8627fd88920f555b334c3eac56b13eeb5075222d794c3cdbc3cda8bf1658325fdecf6495334e2c89b5133c9a967ec0d15693
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133310596571427830.txt
Filesize76KB
MD51b10d91525894fdd77fde5a30d407fa5
SHA156f32e56b2ecd8620c4aa0611f27ba1ce5c69a92
SHA256199340b25628698d50d9b022b1b8e8eeb3cffd59b23222f2b9b1e3dbcd825a71
SHA512308975788abeac2ad9c62b5626e8bb7a81c1cfb443c9f41fb167a2912f127fadc8afb8b0134550f279d5eabe18d78da327d1a0a4398a944b39735fa5682463af
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133310602712667625.txt
Filesize2KB
MD5ecaea544af9da1114077b951d8cb520d
SHA15820b2d71e7b2543cf1804eb91716c4e9f732fde
SHA2569117b26ab2c8fdbb8223fe1f2d1770c50a6cf0d9849a5849d6aebcbe90435be6
SHA512dc7bedbc581818011aa2d313429f234b12e5e9cf320b02b8d7ceeaf9cdc1c921ffc51af7f4080b02740f2d2146fbb006ccbf37cdcba3e3a10009142daffdb919
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133310603873936881.txt
Filesize2KB
MD55bb053360fbeadbaeb5a4347721e2903
SHA1dbee64327f1a1a26d7c16707c564cd6f27cd97b3
SHA256e07e879e49acd9340d1fc718fbbdbbb8e055388172010d4990b604810d5377a1
SHA5128dd8acb7026e2ee43bef4e514b46bc6c6670241a3345fc1e8959f8faa62fb7a50e0bb4bdfb679e7b4ecd07b848e6327f4b310f15ee2d510263562da1888162e8
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat
Filesize1KB
MD554130a887d36c9f184179947795e1390
SHA1eff7f18ac826c8128eb691720203cfe80250425d
SHA2567c5df7bad36144892aa386ed2ffbf651e631fc99c916a4dcd4e9beb97209b814
SHA5125c3588b4c34cd90b98c5f9779b738e37bffca139b2c75f8ba395705a1b766aa6eefbc0c6aadcd941f05668177b25943ce2c33818a7fb5f171cceb8e4b528e7cf
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat
Filesize1KB
MD59bb747d97f8eabbebbb472447cc8ed31
SHA1296402c4eeb91c194f6ee9f16732cab4de80ac97
SHA256ada91e9c23bf0f4f90890780222d5b2988215d0830d44ea706ecf6e4d3f6df92
SHA5120f0c023eb80ac8260fd5b53d7b05d267110f9f0e2fa5f39ee2ad7f8470f6bc7ab6997890a9af5b20a28237d372af684bbff833e7bcaad8de971d90916e489976
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize5KB
MD53a2fac774d204cfca997405c7cc8971a
SHA192549d865011973a2eeb6111d0c33563ebae191a
SHA256643d078eed689a7d4fd6f3ea1019c67c4465f1d0d5bcf6aa66078537012a6f26
SHA51279e1b271a50986802b7f8626948aea8dbe44f8b32a8330cba042db67f1a9c2287be51c7f53818db66889538e822e0b2560e9e97d2403c28e7886a28a4666d71c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize5KB
MD5728880f2623b728fd03ade7ce9d9e887
SHA1cf0285d089728909e2eb622498bb2806f3f2bb43
SHA256b839a5fa2b3339197b67044d95f7ba8aaa92d18cffd645884692058cb485802c
SHA51263c151604c94c2e40b096594ebe15349ab4ff9703cae4d14a37f18fa44356f807a3cc37ce3aa8017b60bf6f693c167777c29b446d1f6f9bc3816eef970c87220
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize6KB
MD5fda3e2458f7424abe7a2a1edf1e761a3
SHA1264381334f723cb8c46465f06b395a260fa447e2
SHA256a82a3986c308e87af928b8d43185f4620076eb0dd0d5e15e06db16248e747af4
SHA51200c221b0be88136089bdafea6ae5805bb3553f47dbf06d73a52559c2dbcb1dce557dd7ee0bdc4e05004ab420c2e44c527e1bafaee27f87a76934e0201656212c
-
Filesize
233B
MD59719764b189e753dd43947095a6f02b7
SHA133e872f83f5370d00a3a462df8c273d23c11ccb0
SHA2560dff1318f84f87d552e7e01a08de8da13ef87f048aa58ef6d5ce5d8fd3bc52d9
SHA5127fd88d9f96bc9c26ef007c872f4221b2b2a0a04db505fbaaa89148be8720d65fc6edd7a5ffc411db58bb218f098158889874a1e19f0ba9b7511107220c512e03
-
Filesize
60B
MD5b6624ab28db92e8454896ba35912ab2f
SHA1feeea3355fb8843473929109d7dd3e5086760e7e
SHA256d67eb0c7b4677ac9994f1fdd1bac8f93f36118edade88f1621cdc5cf4cbc87b7
SHA51249bdd3c3dd062b0c883d9df6cf3a91ad760fd2af7c27ddf17fd85b4deac749a61c98153ce17571c0edaad006a6ac3722a942cc11a34179360a9f0002776aa743
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
95KB
MD5307416b9528643c08b71dc5805336352
SHA11e54f295ee8e5ac34831a25aa6f64e4e054dbd41
SHA256cdca931bee35f9d05c3dc9b7baf478b9ed7494c3b8583a59b166111870376bd5
SHA5129c1c0f8b6946b30f7da51e03f98842af5e779500cb8c609a22cd4e5474b77bd10e1d241d6aeb08938a44d194d3fa8647173939d99d59b0401643beb00992d1e2
-
Filesize
19KB
MD5d37168426c6bdff06e54694376fe4330
SHA1e70e590d29488d83881c45d99b9081fb9572ade6
SHA256cf58025622f4af57c4b7dfbe2099461a41af7842531ac6567885303c20d7cac2
SHA5120b4d67a15cbe17d4c8ad2e3c47c1085df89740474f92b2c75dda31e25e87eae8d93e72255ae2a42e3a26933c92809321d0a47af2d6e541a5b67428f708d7b6cb
-
Filesize
19KB
MD5971dc13abd190b27817bb4ded790701b
SHA1e8d8ad6e34ef3f8dbb26099fd7cae6d94e1a0c29
SHA2565d902f467c0c7785cf945b577ad9448dbf811770b5cb37a3be7bd399ef4c4b51
SHA5121047e89e080b9d9033e7464c59d7fe818747f567188eb2e8e558577923b1bc67678037f3347b8d4162c2d5da5b55b1d7640571b8790327cbb8c74cf07b2bb613
-
Filesize
92KB
MD51c5b2c3154838883c4f502d401ca16c2
SHA1a0663ced6caed0db13e9f925541c17802eb14aa7
SHA2560503a74e60b2a1d90bc277a57bf4586f84ad7303e92291cfd2c8b7e5c790713f
SHA5121ee14ee0778a6e4d53843add0f9c27f422fb89103b9211dc6ad25b9c3d3fe3982366b8092f4c06dd602d54a715b43c8fefec75464805cbbe2ae331e00aa6479f
-
Filesize
5.0MB
MD5ea9117bea1fc25a8b6bd65d7edb794c6
SHA1917dd46164e19c0a6a2bcb79de2f320bb28d5179
SHA25695bc319e3ad1d92672105b343689b968b4ae4ef5ea1788f3797a331fe44cc46f
SHA5121dadb5ac3daf424db006935f81bcb761dd80ec5cf847d5f9ae8bc5deeb4b0c0f2005114bc72e7243c1a090e798d5ad0f9e56fcb9735a6848584af91a454d59ed
-
Filesize
5KB
MD5fe7df6dfad87d1bc5d1229652a33aaa6
SHA13b645be5d0c208019709a55fb0b212ac6e2aa609
SHA256ab42178909545749fb3251e9589bd7ef17fbfb3b0ca78f6333baefb67de9b831
SHA512c4baeea205d0ec3dfcfed13a50b64e2ebc8da9f29a35d6adc5c088f3ff0da50b5af2d08013bfdd1ecbfcb1ead6e544300741a54b8d953ca3d313c60013692592
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
88KB
MD52cc86b681f2cd1d9f095584fd3153a61
SHA12a0ac7262fb88908a453bc125c5c3fc72b8d490e
SHA256d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c
SHA51214ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
Filesize
854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
52KB
MD5726d651b19795249d9386af6b259444e
SHA15f7f9e7df239b876114f46bdeedf21787dec20c9
SHA2562d02e00adea1934aeac7eae6bfb81b3e606c27bdb3b9614b0479ab3a26730995
SHA512213e74028558ba6204c4a5aea865bfc633a434d0f123a15f20f972db056dcc40a48cc6a9595d3dc39ad6e7245fd814c523f87a8d5fe4e8a05b73da59c318e670
-
Filesize
148KB
MD58cbc095882e12e0bd20e60e742982a19
SHA1d782dcd94dc083abca8516238175f7d5d1c72256
SHA2564913c2487c1904274ca6d7f3411316875b1c970d82f02634ebf71d1810d1b8d7
SHA512beeb57fcd3960bf0fdc0c4406c1a2c492631fee467105c0e26ba3355f4c0fd5842e3ba9f0b7c27ece7c8efe024cc2f222d4c578b36a8436ea6ee8c61ce3bcd9b
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\Browsers\Google\Passwords.txt
Filesize1KB
MD566492b71d503a9d378d19772363f6600
SHA1125f872d5dbf7fb98fa50bc5b916c491a56a5c71
SHA2568c904c662d7615b92bbe5520036f8f90effd52c62ea70a0e304747bde4d6ede4
SHA5126dc239e747ededb60e276a17344f947342bf2cab2e9a427bb6276a5e6f6f0ab3315392f571f9e775155bfeab51ac6521283067786c47bd70faa79c14c49bbb55
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\Browsers\Google\Passwords.txt
Filesize1KB
MD566492b71d503a9d378d19772363f6600
SHA1125f872d5dbf7fb98fa50bc5b916c491a56a5c71
SHA2568c904c662d7615b92bbe5520036f8f90effd52c62ea70a0e304747bde4d6ede4
SHA5126dc239e747ededb60e276a17344f947342bf2cab2e9a427bb6276a5e6f6f0ab3315392f571f9e775155bfeab51ac6521283067786c47bd70faa79c14c49bbb55
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\Directories\Desktop.txt
Filesize639B
MD5558079f6b08c101757d9ce40e29820dd
SHA1cba07eec64ea3b22a136aac247463c2321b20770
SHA256b4ea1bb705c33bdad54d64b06e07cbb2ce0b9c8d76c8afa88055854f17dd09e3
SHA5127a402e2524e94f21536b27fa91ed88271069a60e211ed558f87a62566e1aaf900d869da25af972555e74cd884e0fda1ef2b2e0f457bcce75ca51e36855cfbc38
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\Directories\Documents.txt
Filesize596B
MD5e410a6cf4da49e75d54cc076035d0895
SHA18f56e38e939635cfd08224b1fe2df313dd79912b
SHA256845746effcbe690791b9d0330329b4248b3ee8ab8cf77179cf4f37b535ce0bb9
SHA512d2d0ab285efaa4b76ef0a0647dac6fa909f93f236d1de07673acc8e7b826227b9b6b736ec35b0ec4cf32e71d9c125b44daa03060bd5488b3a75f3a762ac56ccd
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\Directories\Downloads.txt
Filesize736B
MD57ae651514360fddd3c274e6897c35b6c
SHA10742da9442ea009577094ddf88b156c1fccdc663
SHA2566d2901390102e57626cb6213f93a18b0c1e9c13cb6186c610ae44e9e1f28459e
SHA51292f742f28bb1b199e883adff4d52b7181608fcc4c9ab25fd5c69a71dd4d2a9897706b936f7d889a958b3df4c911474869309b698d8f4a1eda6e697036b9733c5
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\Directories\OneDrive.txt
Filesize25B
MD5966247eb3ee749e21597d73c4176bd52
SHA11e9e63c2872cef8f015d4b888eb9f81b00a35c79
SHA2568ddfc481b1b6ae30815ecce8a73755862f24b3bb7fdebdbf099e037d53eb082e
SHA512bd30aec68c070e86e3dec787ed26dd3d6b7d33d83e43cb2d50f9e2cff779fee4c96afbbe170443bd62874073a844beb29a69b10c72c54d7d444a8d86cfd7b5aa
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\Directories\Pictures.txt
Filesize368B
MD5d28e8e838e01a346320ce64c8cf68bdd
SHA10096898d329dbc8f5da174b96fade8494afe765e
SHA256f80529bf55588a0d79557dcdc2dd3112904ef17a89642c6375140da2a853e979
SHA512efbc52a29606b09ea68ed30cc53487364ca9288dbdfab1dbd32b1fe5bd7cb9e25b250c31c1de4f630d7dcf52cd5dc95068797bdf05b09ab1637b258b6fda070a
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\Directories\Startup.txt
Filesize24B
MD568c93da4981d591704cea7b71cebfb97
SHA1fd0f8d97463cd33892cc828b4ad04e03fc014fa6
SHA256889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483
SHA51263455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\Directories\Videos.txt
Filesize23B
MD51fddbf1169b6c75898b86e7e24bc7c1f
SHA1d2091060cb5191ff70eb99c0088c182e80c20f8c
SHA256a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733
SHA51220bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d
-
Filesize
888B
MD5978998778765d998928a0f974c906cd8
SHA17075a2166559310cd458144ced5b71e974ae8f51
SHA256e7b1a1224ecd6b42f8b9b82480f8547d63a1872f907b916cf501f5e0b3b6709d
SHA512c22fef9f68713c5f02aa61d58bb311b71b7c83578aa563391ca5cf1dc2248168ca88903f1841af19c60676c8edc97b07b731c69567787ee020704d7e8d51fc60
-
Filesize
4KB
MD509d0b6da6c500c9e4ab7147fad23e2d8
SHA1d282fd6b974fd582f011f33df155aa807d724fd7
SHA2561dcda9da9667806da89eb1b76da949a2ecfefcf5a39a87a796801a3bafca749e
SHA51277c151e140c0ec75bcba4c1ec78eec686b3fdfb5b120f1d8b68b36859a7465642b07b307d6ca1c0cea7db5996bbaeac65849f5e3d9e0daa28e74ba6d98fcb6c4
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\System\Clipboard.txt
Filesize10B
MD55bf379fe7929e224083d87c06a0555ec
SHA149161fd2b6c3f7c9b4aee07c6e382c96a723f5cc
SHA256abce7aa346286472c624e91c0ac3674e4519c312ee44f821e02e33364e25dcd4
SHA5122d179f27e132e425cd4c95dca1ce50c5209bc2c24a3bd745d3bec397f0df5a0addcc8e588763b91d454f1481cf07e781abeb47d1b4db90c0dac37762c98bd2f3
-
Filesize
2KB
MD551fd34c53ecee17df47332c5e07a8357
SHA1a197639478b55f83fa2fb7118b30aaf834bd8882
SHA2562a075541b2514fa6429e7705c823471fbf9587cd7f63cc9372bfe91a377d90f8
SHA512f417b33865091ba47ceaf72573a2cd44a7fc25d9b43e58d053f088051b857be517e8ef370e4231c86c9bdd90f2fe6ea92207d8fb43f16346e4b36e0bad452ca7
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\System\Process.txt
Filesize480B
MD5fab6859555b10bc70e0a5c40e7917764
SHA1b602b3fcce8ef719587aea31c786472c38beab08
SHA256a1c8d417529e482222f669512848792b6dfd75d33f979499553fbbbb063213b3
SHA5125950006fb677a0987ab570f0e427e0c5194e8686e0b99d30d2c397ef048914a22679372090c31d80518ba052c8c9a95e500600804468c312bcb00c473ca65ae4
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\System\Process.txt
Filesize1KB
MD57dd2a756aefe9439b74944454b196f64
SHA183468f0d3025d4a2fc16d4fb368ff875dc641ba3
SHA25677fa1a703c0e3404c875272f4a0b4e321ac1728a9559099b8c7ae42d2c13882c
SHA5126d1708e903d8db9f6c29ad21821a6ace282548e1f987f3b1a4699195e8a780431f0633ad4740f9d0209a1cd772f8d9524dadb5e54062eec64a7bac07168bab8f
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\System\Process.txt
Filesize2KB
MD5561ad4a374fd04fa3c4e5967bdb57211
SHA194a649c6995c893f217638ac2cb4cb89aa75d26d
SHA256484f80e291434d82ae37996f687b81ddf009a8b0e32b9523a365e1c20a84f215
SHA5127bc0b151dd7258f6213a08cdbebc1ac9161fd79bc13eeec6b1b7cbb6146cbbbe834fe47d74b11204c1ace5736228c925e53d0992222d0884063f5a1060e0675b
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\System\Process.txt
Filesize4KB
MD53f596d9c17926d7b07c6b81ce4e18b82
SHA11e7e62ae7a378c6df19633d9faf7b06e0d10c237
SHA2560622bb7ad5d75f46d85cfda4ab49a2d3436b87a53af422460cb25bd9dc9620bd
SHA51274d858542666404319aa3ce8a3df80fa9dde658266eada4a9509d7bde3382187d2e270a4fe440dceac392f3e6f9e2bce43a774f5fdda4f4b75fb064db428988e
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\System\Process.txt
Filesize939B
MD52e0430367dad8427a169800ee8ca312b
SHA1f2f56e27b99ea1fda04caba435e5eec8206e107a
SHA2565e74fe31c6aecf275df76d82b2787083b05907d524134d551bad380628d4ba6b
SHA51210c3f7d74ffc9e34a4215cb50381c6a79b89658e55290b60d648b3f94b7c4c1c8fcb4d372a8d7813def0c36936e8432c95cb913f29b67cafe48870a90edbb74c
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\System\Process.txt
Filesize1KB
MD52c7c52116ecfe804d67c46122867d4a9
SHA1b59c6ba01afa974c4638fe3a6b4db6af168fb4ea
SHA256622db4a5f14b3c48501adc8614fb903cb14a6b101b78522c52ddc690fe1699b8
SHA51278da56ae3be611be5639a75f04909bad7361445bf9d69223c3253fda451302e282b2c9a7a2723e7ca8cd785c3a4f2571dbf482875a3d1ce9e51df29600260004
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\System\Process.txt
Filesize2KB
MD53cca1cb8f18f4e20e6f626044b35cc8a
SHA11816c2d233097d2d90107b37797866c1a6c1ea8f
SHA2569600bbe8a45b78a53d320c867f8d43cb76f901fc5dd3c8fa76c76b813a7beeb9
SHA5121733953d505b9a0b328f99a1ba474ddeeeb1e3eaa3d1d85bb312142681411c08eb4ab368c1478e031c2697871fa95e8ee67ec7f7465c305c1348f8cdc38d13b1
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\System\Process.txt
Filesize2KB
MD56210c29936860e33027b662d0a27d472
SHA114e8dddc1fe602a54399f661f05f6dc85163a342
SHA256325b0dad8f83562315584edc2b12e7c78543e8238680a46b7ef0db1b2c3a6617
SHA5121a4c37691379eed62ab2f4537a197849baabad1cb9c847ffd268d44aeba82a0c06cb43ba94295c9edb90b9a3b0c5e6d7cbec2946f7e73bc6657f3d50a34b6125
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\System\Process.txt
Filesize3KB
MD512088845e78f3bb071f9a2a9c9a124bc
SHA1f76a936dd6cdec2cee44385f342f07d68bead971
SHA2562bacfee54ce305a0ea32fd1dadb4e3c627e48574269c77941c2cc6b53ddfbcd2
SHA512cad84d7054bed7df657fd74cdd7c283c521ba9a1e5e00064bb40bccf974bef160b143a903215a32ceb6a38271fd2e05cb7f2473d0e975adf28f966adeec48b41
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\System\Process.txt
Filesize4KB
MD51bf6df2ba9a65aeae188c427f1994ff0
SHA1708f46758eb8a76772a20f9cb2d96b79845098d7
SHA256a601c238c61f352298f3c4fd89fca493b62d895912ea0bf6b77a3afc2c6ab8ee
SHA5129a86eaf8eb3736b741aca38833476d4e5991b35761b3e46ea3f532e25ac9212879110d5ffe352be88d516ae9bd0cd317c8e7c49e05afda5b8d482b3ac97a63f3
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\System\ProductKey.txt
Filesize29B
MD571eb5479298c7afc6d126fa04d2a9bde
SHA1a9b3d5505cf9f84bb6c2be2acece53cb40075113
SHA256f6cadfd4e4c25ff3b8cffe54a2af24a757a349abbf4e1142ec4c9789347fe8b3
SHA5127c6687e21d31ec1d6d2eff04b07b465f875fd80df26677f1506b14158444cf55044eb6674880bd5bd44f04ff73023b26cb19b8837427a1d6655c96df52f140bd
-
C:\Users\Admin\AppData\Local\ead03f917564e413872c165557a5c031\Admin@LYVTYGSI_en-US\System\Windows.txt
Filesize407B
MD527d967a55ce385007b6c64005c2930e2
SHA1277864becb19fc355a3ec716aa068fc74971e362
SHA256e0ebdbfdde4c7b0a2d82120f48b6554d2c99d0620fff450c9667f4e643ee4d47
SHA51283f2a8c8dcd41b6044e4c2b9d8d5a0674306887585064c167c55490ac6e2278d40b5ee9f833c4b19aa05b714f5a1b216d4d56a9af9195963b3f674b0db36a80f
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD571540d08b5a40c68826b9f1edee2bc5b
SHA1d601562edb600e186e278c7b1d18cdafb1c92606
SHA2565206ab2fe957a2fb249a3bdb32de2662977dca859a6915504a0f9f08ef8d52f6
SHA512e6dcb46426bb6cf122878f1b2e18ec413d5bb9ea1565da5d99c20fd8037c8c1ff5190c080e78d20155c6c350539ca3cb1284e9573f072d92161976a73f72970a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5b420fec17735552e9302223679886152
SHA15c466b1ea079805cdcc2115ae5e8d67e3f4fbe69
SHA2566eee3f270b051d952dc104172d9e33fd9a38d8d05b719b07d9c45d6cd37e526f
SHA51238e5d96db633c8f47e577cca7da18510dc7095f4c908b09d3bd9092a9102fb3db2f6450ec680d8699668d79312b89a750ba059326b6a186748eec772cce8992b
-
Filesize
14KB
MD52257fa8cef64a74c33655bd5f74ef5e5
SHA1b9f8baf96166f99cb1983563e632e6e69984ad5c
SHA256ead48b70e048de6ccca219a229ca90b49a9d1b9c14bf3a7c5eaad544294fcfd3
SHA5127792be9b935a46a923e97bb76b76957070e116dcc4cb6fcd8b883c2d6f142285ebc9fd26cdf29bd19c8bdff412487f586abaa1724332b613e71afa45d7f3e4f9
-
Filesize
293KB
MD57a2d5deab61f043394a510f4e2c0866f
SHA1ca16110c9cf6522cd7bea32895fd0f697442849b
SHA25675db945388f62f2de3d3eaae911f49495f289244e2fec9b25455c2d686989f69
SHA512b66b0bf227762348a5ede3c2578d5bc089c222f632a705241bcc63d56620bef238c67ca2bd400ba7874b2bc168e279673b0e105b73282bc69aa21a7fd34bafe0
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a
-
Filesize
448KB
MD56d1c62ec1c2ef722f49b2d8dd4a4df16
SHA11bb08a979b7987bc7736a8cfa4779383cb0ecfa6
SHA25600da1597d92235d3f84da979e2fa5dbf049bafb52c33bd6fc8ee7b29570c124c
SHA512c0dce8eaa52eb6c319d4be2eec4622bb3380c65b659cfb77ff51a4ada7d3e591e791ee823dad67b5556ffac5c060ff45d09dd1cc21baaf70ba89806647cb3bd2
-
Filesize
632KB
MD59238be200dbf0dbe0466ebff4db56301
SHA1c1f411c2b8ff7b7bbb77b03340364d54247f99c9
SHA2560758146425c10208d3c8000b444e5f3d1ef203918e1b60a9f9f01214564fb9c5
SHA512daa98e642df2dd60a4c00384aa8ac77c5474264c55392e8aa07156f717a38bddd51bb882b90dfa9da9ff2e9cbd9b235a05d278119b7492027bf18e5530b41d38
-
Filesize
632KB
MD59238be200dbf0dbe0466ebff4db56301
SHA1c1f411c2b8ff7b7bbb77b03340364d54247f99c9
SHA2560758146425c10208d3c8000b444e5f3d1ef203918e1b60a9f9f01214564fb9c5
SHA512daa98e642df2dd60a4c00384aa8ac77c5474264c55392e8aa07156f717a38bddd51bb882b90dfa9da9ff2e9cbd9b235a05d278119b7492027bf18e5530b41d38
-
Filesize
311KB
MD565faddab9784289f8ba392f328871227
SHA177899e516c9025c0dff0e66127b1cfe00c20131b
SHA256f250bc5734ffad4a59e2cb017f85e495fc8070056c01c5002470567b7179f62d
SHA5129792de8310e1b87289a5503a2f49f3604d64fae72392d72913cd446f7382be5ba28e8e53558b706fabc424e4f2febd56bd508a327a8e735ac981ac51891f7699
-
Filesize
311KB
MD565faddab9784289f8ba392f328871227
SHA177899e516c9025c0dff0e66127b1cfe00c20131b
SHA256f250bc5734ffad4a59e2cb017f85e495fc8070056c01c5002470567b7179f62d
SHA5129792de8310e1b87289a5503a2f49f3604d64fae72392d72913cd446f7382be5ba28e8e53558b706fabc424e4f2febd56bd508a327a8e735ac981ac51891f7699
-
Filesize
244B
MD5e8f9fa7a9211e7554f027bf328784229
SHA1f78cbb1914f0184e2070283db8b3e783e864cefb
SHA25652f531d5314dd9c1f1c213fb74718e314c2376b3e8221c58e32cf680c0a9a30c
SHA5124efd377338cf6bd03479feb188160258df800f52d587f1d33aea12ea6c152921ec5f61a84cd3e255d8612ef51bbd89d649e28084623243cf279f6852c3343702
-
Filesize
150KB
MD5f22cf849186bfeef9dfe1e672acbc26b
SHA1948338bb56ef605156ed31fa84fbdda7f5ee38a2
SHA256f7c02cdf17ed8645d6968c37e49edb489cf70b45a9b6af36654c601477506d6f
SHA512d027980c191deb3a75b21a39bac08a98de25d2c40be1db35f7a0938edf66e9288fae8d0c84c60e186170b14cec163acdb6cb9b0408500bc196a7f1a751629bb8
-
Filesize
800KB
MD5d940cd48a612290591de0f66bc1e559e
SHA179b0ca9dbbe997226beebb4c9845d302ae79486d
SHA2564d8fa0508f54a7cace5497b570befb93f128a2ea2d5fed4ef72a099b069178a7
SHA512c9d8c37e33aadf460ae89dc54f07b68dda4e241faa264c06ecf9c03e0988a6bb53c005cd802715ff62de308d4684fe03482fd8982a9e6736b0a328594ee5bbd4
-
Filesize
17.4MB
MD5e4441b35490122e26fc5dd83fe2364ea
SHA1f09a7914bcdddc7df942dba9850ca729828e62a7
SHA256ee7ef31cd0c19613744dc88718545605dad9376436f50886bd6421f329ffac8f
SHA5123f472175cf50e9a1a63a5eb5e2b23f4d09433b2950f6946674c293a523b2d833f52d727e2a62103b7c8e566be73638fdcecaad09cf12ea2ab7313d6e468d36d1
-
Filesize
607KB
MD5a0c4ac6378ce0313955dccfd2d9208a6
SHA17ee2f0f3bf4504f4f7bbc63cb5fa883711c13801
SHA256abbe3285c58c830314f9f0ad2ddc769139c0d808e27893290adc69a535b996b1
SHA51272ea9f0d7399fa5d6865f3f887ffa07098b883b1428b33dcb552a40bb22ca6a461a546736667ca1aa97e5f06dffd10dab765c7f6e3e827dd0335b562b27d2fb5
-
Filesize
6KB
MD543f68eb7734887d0b42a2d788975405e
SHA1eb4f7680aa24a1988f7b9d6943186ea3daa055cd
SHA2569ad7b7b2f86d6015419ceb8b3ff1d75dabad2b4acd59fb18aa7370058d52884a
SHA51243308237829473392f5009c382e908b656c0495bcac421321bfcf457bce6cbd68419cafa52f7121060d304835a2012f1b62f7c44fe13824003141eaffe6cfb90