Analysis
-
max time kernel
1200s -
max time network
1200s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-02-2024 18:44
Static task
static1
Behavioral task
behavioral1
Sample
crashed_by_vohr.mp3
Resource
win10v2004-20240221-en
General
-
Target
crashed_by_vohr.mp3
-
Size
9.3MB
-
MD5
0d813790b342f04e991a7f07487d39c7
-
SHA1
b3b73c636113390813ed338e83530120b5d0b9cd
-
SHA256
ad15869dd2adda745da583f9c1038ffdb127d7a2bab682b82c9858fd64c32301
-
SHA512
49b666e7dbed2903a544e04a2a1499537293fb09410d6391fd0f4b9d421880211930988e6aaaa5a99f2ccfd13cd8f7c6237270b34a7dd4fffe33bc13c252cc6c
-
SSDEEP
196608:OHK+1paMFx7zrfwVsZ1ZfjqkKIdPhvy/dxP:5+14MFx7HfhXfxdTKHP
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot5687152406:AAFin_LYFhJGLydMgYheeUDec-2orew51aM/sendMessage?chat_id=2024893777
Extracted
asyncrat
1.0.7
def
37.18.62.18:8060
era2312swe12-1213rsgdkms23
-
delay
1
-
install
true
-
install_file
CCXProcess.exe
-
install_folder
%Temp%
Signatures
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 12 IoCs
pid Process 3184 DiscordSetup.exe 2312 Update.exe 1928 win-xworm-builder.exe 1200 wsappx.exe 6108 XHVNC-Client.exe 5660 XHVNC-Client.exe 3968 XHVNC-Client.exe 5564 XHVNC-Client.exe 5792 XHVNC-Client.exe 5936 XHVNC-Client.exe 4092 XHVNC-Client.exe 2520 XHVNC-Client.exe -
Loads dropped DLL 1 IoCs
pid Process 4880 XHVNC.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/4880-2546-0x0000000006410000-0x0000000006634000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Windows\CurrentVersion\Run\XHVNC-Client = "C:\\Users\\Admin\\Downloads\\XWorm-Rat-Remote-Administration-Tool--main\\XWorm-Rat-Remote-Administration-Tool--main\\XHVNC-Client.exe" XHVNC-Client.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Windows\CurrentVersion\Run\XHVNC-Client = "C:\\Users\\Admin\\Downloads\\XWorm-Rat-Remote-Administration-Tool--main\\XWorm-Rat-Remote-Administration-Tool--main\\XHVNC-Client.exe" XHVNC-Client.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Windows\CurrentVersion\Run\XHVNC-Client = "C:\\Users\\Admin\\Downloads\\XWorm-Rat-Remote-Administration-Tool--main\\XWorm-Rat-Remote-Administration-Tool--main\\XHVNC-Client.exe" XHVNC-Client.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Windows\CurrentVersion\Run\XHVNC-Client = "C:\\Users\\Admin\\Downloads\\XWorm-Rat-Remote-Administration-Tool--main\\XWorm-Rat-Remote-Administration-Tool--main\\XHVNC-Client.exe" XHVNC-Client.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Windows\CurrentVersion\Run\XHVNC-Client = "C:\\Users\\Admin\\Downloads\\XWorm-Rat-Remote-Administration-Tool--main\\XWorm-Rat-Remote-Administration-Tool--main\\XHVNC-Client.exe" XHVNC-Client.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Windows\CurrentVersion\Run\XHVNC-Client = "C:\\Users\\Admin\\Downloads\\XWorm-Rat-Remote-Administration-Tool--main\\XWorm-Rat-Remote-Administration-Tool--main\\XHVNC-Client.exe" XHVNC-Client.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Windows\CurrentVersion\Run\XHVNC-Client = "C:\\Users\\Admin\\Downloads\\XWorm-Rat-Remote-Administration-Tool--main\\XWorm-Rat-Remote-Administration-Tool--main\\XHVNC-Client.exe" XHVNC-Client.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Windows\CurrentVersion\Run\XHVNC-Client = "C:\\Users\\Admin\\Downloads\\XWorm-Rat-Remote-Administration-Tool--main\\XWorm-Rat-Remote-Administration-Tool--main\\XHVNC-Client.exe" XHVNC-Client.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\Q: unregmp2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 discord.com 65 discord.com -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 6108 set thread context of 2268 6108 XHVNC-Client.exe 206 PID 5660 set thread context of 5900 5660 XHVNC-Client.exe 214 PID 3968 set thread context of 2848 3968 XHVNC-Client.exe 219 PID 5564 set thread context of 5840 5564 XHVNC-Client.exe 226 PID 5936 set thread context of 4476 5936 XHVNC-Client.exe 234 PID 4092 set thread context of 5684 4092 XHVNC-Client.exe 243 PID 2520 set thread context of 3908 2520 XHVNC-Client.exe 248 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 22 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3840 schtasks.exe 4072 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2828 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4256 tasklist.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133533606394584755" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 60 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\.log\ = "log_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\log_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\log_auto_file\shell\edit OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" XHVNC.exe Set value (data) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\PastIconsStream = 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 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4181651180-3163410697-3990547336-1000\{CFDA1762-59E4-4D05-8AD6-849B014568E4} msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 140000000700000001000100050000001400000050003a005c00480066007200650066005c004e0071007a00760061005c004e006300630051006e0067006e005c005900620070006e0079005c005a00760070006500620066006200730067005c00420061007200510065007600690072005c00420061007200510065007600690072002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50100000000000000000000e8070200420061007200510065007600690072000a0041006200670020006600760074006100720071002000760061000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000009528a324c164da0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff75ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff81ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff82ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff83ae2078e323294282c1e41cb67d5b9c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\1 XHVNC.exe Set value (data) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings DiscordSetup.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\.log OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4181651180-3163410697-3990547336-1000\{E53BA4BA-68DF-4D4B-8DF1-4FE9ACF66778} explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\log_auto_file\shell\edit\command\ = "\"C:\\Program Files\\Microsoft Office\\root\\Office16\\Winword.exe\" /n \"%1\"" OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} XHVNC.exe Set value (data) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 XHVNC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\log_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 XHVNC.exe Set value (int) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133529918330571229" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" XHVNC.exe Set value (data) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 XHVNC.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings Conhost.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\log_auto_file\shell\edit\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\1\0 XHVNC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\log_auto_file\shell\edit\ = "@C:\\Program Files\\Microsoft Office\\root\\VFS\\ProgramFilesCommonX64\\Microsoft Shared\\Office16\\oregres.dll,-1" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" XHVNC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff XHVNC.exe Set value (int) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" XHVNC.exe Set value (int) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" XHVNC.exe Set value (int) \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" XHVNC.exe -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 279359.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\DiscordSetup.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main.zip:Zone.Identifier msedge.exe -
Suspicious behavior: AddClipboardFormatListener 8 IoCs
pid Process 712 Winword.exe 712 Winword.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 1412 chrome.exe 1412 chrome.exe 8 msedge.exe 8 msedge.exe 2136 msedge.exe 2136 msedge.exe 4436 identity_helper.exe 4436 identity_helper.exe 4460 msedge.exe 4460 msedge.exe 3488 msedge.exe 3488 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 3904 msedge.exe 3904 msedge.exe 3936 msedge.exe 3936 msedge.exe 1200 wsappx.exe 1200 wsappx.exe 1200 wsappx.exe 1200 wsappx.exe 2512 chrome.exe 2512 chrome.exe 6108 XHVNC-Client.exe 6108 XHVNC-Client.exe 5660 XHVNC-Client.exe 5660 XHVNC-Client.exe 5660 XHVNC-Client.exe 5660 XHVNC-Client.exe 5660 XHVNC-Client.exe 3968 XHVNC-Client.exe 3968 XHVNC-Client.exe 3968 XHVNC-Client.exe 3968 XHVNC-Client.exe 3968 XHVNC-Client.exe 5564 XHVNC-Client.exe 5564 XHVNC-Client.exe 5564 XHVNC-Client.exe 5792 XHVNC-Client.exe 5792 XHVNC-Client.exe 5792 XHVNC-Client.exe 5676 chrome.exe 5676 chrome.exe 5936 XHVNC-Client.exe 5936 XHVNC-Client.exe 5936 XHVNC-Client.exe 4092 XHVNC-Client.exe 4092 XHVNC-Client.exe 4092 XHVNC-Client.exe 2520 XHVNC-Client.exe 2520 XHVNC-Client.exe 2520 XHVNC-Client.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3384 OpenWith.exe 4880 XHVNC.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 44 IoCs
pid Process 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 872 unregmp2.exe Token: SeCreatePagefilePrivilege 872 unregmp2.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 2512 chrome.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of SetWindowsHookEx 39 IoCs
pid Process 3384 OpenWith.exe 3384 OpenWith.exe 3384 OpenWith.exe 3384 OpenWith.exe 3384 OpenWith.exe 3384 OpenWith.exe 3384 OpenWith.exe 3384 OpenWith.exe 3384 OpenWith.exe 3384 OpenWith.exe 3384 OpenWith.exe 3384 OpenWith.exe 3384 OpenWith.exe 712 Winword.exe 712 Winword.exe 712 Winword.exe 712 Winword.exe 712 Winword.exe 712 Winword.exe 712 Winword.exe 712 Winword.exe 712 Winword.exe 1200 wsappx.exe 4880 XHVNC.exe 4880 XHVNC.exe 4880 XHVNC.exe 5288 StartMenuExperienceHost.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe 5124 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1244 wrote to memory of 784 1244 wmplayer.exe 81 PID 1244 wrote to memory of 784 1244 wmplayer.exe 81 PID 1244 wrote to memory of 784 1244 wmplayer.exe 81 PID 1244 wrote to memory of 2540 1244 wmplayer.exe 82 PID 1244 wrote to memory of 2540 1244 wmplayer.exe 82 PID 1244 wrote to memory of 2540 1244 wmplayer.exe 82 PID 2540 wrote to memory of 872 2540 unregmp2.exe 83 PID 2540 wrote to memory of 872 2540 unregmp2.exe 83 PID 1412 wrote to memory of 2756 1412 chrome.exe 89 PID 1412 wrote to memory of 2756 1412 chrome.exe 89 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4820 1412 chrome.exe 92 PID 1412 wrote to memory of 4476 1412 chrome.exe 91 PID 1412 wrote to memory of 4476 1412 chrome.exe 91 PID 1412 wrote to memory of 132 1412 chrome.exe 95 PID 1412 wrote to memory of 132 1412 chrome.exe 95 PID 1412 wrote to memory of 132 1412 chrome.exe 95 PID 1412 wrote to memory of 132 1412 chrome.exe 95 PID 1412 wrote to memory of 132 1412 chrome.exe 95 PID 1412 wrote to memory of 132 1412 chrome.exe 95 PID 1412 wrote to memory of 132 1412 chrome.exe 95 PID 1412 wrote to memory of 132 1412 chrome.exe 95 PID 1412 wrote to memory of 132 1412 chrome.exe 95 PID 1412 wrote to memory of 132 1412 chrome.exe 95 PID 1412 wrote to memory of 132 1412 chrome.exe 95 PID 1412 wrote to memory of 132 1412 chrome.exe 95 PID 1412 wrote to memory of 132 1412 chrome.exe 95 PID 1412 wrote to memory of 132 1412 chrome.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\crashed_by_vohr.mp3"1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\crashed_by_vohr.mp3"2⤵PID:784
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xe0,0x10c,0x7ffa3dca9758,0x7ffa3dca9768,0x7ffa3dca97782⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1880,i,5917118466495905536,15200063793750304070,131072 /prefetch:82⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1580 --field-trial-handle=1880,i,5917118466495905536,15200063793750304070,131072 /prefetch:22⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1880,i,5917118466495905536,15200063793750304070,131072 /prefetch:12⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3164 --field-trial-handle=1880,i,5917118466495905536,15200063793750304070,131072 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1880,i,5917118466495905536,15200063793750304070,131072 /prefetch:82⤵PID:132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4508 --field-trial-handle=1880,i,5917118466495905536,15200063793750304070,131072 /prefetch:12⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1880,i,5917118466495905536,15200063793750304070,131072 /prefetch:82⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1880,i,5917118466495905536,15200063793750304070,131072 /prefetch:82⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4976 --field-trial-handle=1880,i,5917118466495905536,15200063793750304070,131072 /prefetch:82⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4824 --field-trial-handle=1880,i,5917118466495905536,15200063793750304070,131072 /prefetch:12⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:8 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa3de23cb8,0x7ffa3de23cc8,0x7ffa3de23cd82⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5468 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5752 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4604 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6436 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6372 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2940 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7112 /prefetch:82⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6652 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7444 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6676 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Users\Admin\Downloads\DiscordSetup.exe"C:\Users\Admin\Downloads\DiscordSetup.exe"2⤵
- Executes dropped EXE
- Modifies registry class
PID:3184 -
C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe"C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe" --install .3⤵
- Executes dropped EXE
PID:2312
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7332 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7412 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1956 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6616 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7564 /prefetch:12⤵PID:240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6892 /prefetch:82⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7380 /prefetch:12⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1880,9645834034718357249,15484750075739989887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5028
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3384 -
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\AppData\Local\SquirrelTemp\SquirrelSetup.log"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:712
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004C4 0x00000000000004E01⤵PID:5024
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2988
-
C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XWorm-RAT-V2.1-builder.exe"C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XWorm-RAT-V2.1-builder.exe"1⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\win-xworm-builder.exe"C:\Users\Admin\AppData\Local\Temp\win-xworm-builder.exe"2⤵
- Executes dropped EXE
PID:1928 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "wsappx" /tr "C:\Users\Static\wsappx.exe"3⤵
- Creates scheduled task(s)
PID:3840
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpA86E.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpA86E.tmp.bat3⤵PID:4696
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1928"4⤵
- Enumerates processes with tasklist
PID:4256
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:4276
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:2828
-
-
C:\Users\Static\wsappx.exe"wsappx.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1200 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "wsappx" /tr "C:\Users\Static\wsappx.exe"5⤵
- Creates scheduled task(s)
PID:4072
-
-
-
-
-
C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XWormUI.exe"C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XWormUI.exe"1⤵PID:3980
-
C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC.exe"C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4880
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:2512 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa3dca9758,0x7ffa3dca9768,0x7ffa3dca97782⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1572 --field-trial-handle=1836,i,10112709719749548955,5884611622168668754,131072 /prefetch:22⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1836,i,10112709719749548955,5884611622168668754,131072 /prefetch:12⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3188 --field-trial-handle=1836,i,10112709719749548955,5884611622168668754,131072 /prefetch:12⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1836,i,10112709719749548955,5884611622168668754,131072 /prefetch:82⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1836,i,10112709719749548955,5884611622168668754,131072 /prefetch:82⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4492 --field-trial-handle=1836,i,10112709719749548955,5884611622168668754,131072 /prefetch:12⤵PID:3488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 --field-trial-handle=1836,i,10112709719749548955,5884611622168668754,131072 /prefetch:82⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5032 --field-trial-handle=1836,i,10112709719749548955,5884611622168668754,131072 /prefetch:82⤵PID:5212
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:5260
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff70b237688,0x7ff70b237698,0x7ff70b2376a83⤵PID:5292
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1836,i,10112709719749548955,5884611622168668754,131072 /prefetch:82⤵PID:5268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5220 --field-trial-handle=1836,i,10112709719749548955,5884611622168668754,131072 /prefetch:12⤵PID:5400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4020 --field-trial-handle=1836,i,10112709719749548955,5884611622168668754,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 --field-trial-handle=1836,i,10112709719749548955,5884611622168668754,131072 /prefetch:82⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1080
-
C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:6108 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5124
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 8ZTP7J 89.149.23.59 8000 D6EZ832⤵PID:2268
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5288
-
C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5660 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:2484
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 8ZTP7J 89.149.23.59 8000 D6EZ832⤵PID:5840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 8ZTP7J 89.149.23.59 8000 D6EZ832⤵PID:5900
-
-
C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3968 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies registry class
PID:3932
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 8ZTP7J 89.149.23.59 8000 D6EZ832⤵PID:2848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 8ZTP7J 89.149.23.59 8000 D6EZ832⤵PID:1544
-
-
C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5564 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies registry class
PID:2308
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 8ZTP7J 89.149.23.59 8000 D6EZ832⤵PID:5840
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Modifies registry class
PID:2484
-
-
-
C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5792
-
C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5936 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies registry class
PID:5624
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 8ZTP7J 89.149.23.59 8000 D6EZ832⤵PID:4476
-
-
C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4092 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies registry class
PID:924
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 8ZTP7J 89.149.23.59 8000 D6EZ832⤵PID:5684
-
-
C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"C:\Users\Admin\Downloads\XWorm-Rat-Remote-Administration-Tool--main\XWorm-Rat-Remote-Administration-Tool--main\XHVNC-Client.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies registry class
PID:5396
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 8ZTP7J 89.149.23.59 8000 D6EZ832⤵PID:3908
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD50b7c0cd12f869468a1823c6a027bcf04
SHA18af8ac6c0831736ac82c5f16aea4e07de8443267
SHA256c62f02122f173dd57358058c5a74cc91785b2807049146306063773b72ba12b5
SHA512953467e3477f8289f86829ae4a12a78a5bcacae93181ca9db53f44e75f6d6a0bf74e919f17cf2f5e75f76f6a4a81be28ea6b3c8191e4c26aad852d50095da0c7
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
168B
MD52d3b6b3a1d432ca622b34febc8db1f04
SHA1408f7f8557eba8e978c907bbfab70646a6eb5b7a
SHA2562ca0940fce7ec27e675ebd0b2d8b904c9ec29607a022f90eda9cd34c5b0dc45f
SHA5127c7afd2caa136b02f792df6b986244e3d5ab65ac21eb85e2e6ae5c672596ecbf8c31be106c93ca08ce9d1ba831c714d6cfbda564308cb095bba075a9a0a8ef42
-
Filesize
168B
MD509715453f6512f73b6d818067ad5a0c4
SHA117f275342b413ba42d61aa75fe6c0a557b677b96
SHA256469ba66c864a2c6adc60fb1d071f290708bdaffb90f944e3f0f6207a36e70423
SHA512573d512f694fb018139d747dc1465b286471e9505d985df069167cf2ae5b22b15e2911936460e4941f8d41561d11a215922d949b89ba724c6d818759469ba061
-
Filesize
168B
MD535f6e02c3d2675ad45ecdd0e5a1401e9
SHA17997343e1d8a86947c4f9f01f687b1c76056fed6
SHA25619fc48da35d9334a85cda718dad78c275d17caa9ea6e0eff5dbbae3951a8a053
SHA5125e6be84dcb5ea8dd46d1cf34ed80716f3e406f0c431b67a3de24b572e1f9a17d151880eaea680339c56721313a0a9ae5ed37d48efa07ad303f663cef9761c9c3
-
Filesize
1KB
MD55eb341336129b71230a6ab23ba82d1b9
SHA1ebd7f0ea14a067d4b2061aa6b67195de6d602b0c
SHA256f159bd9f120dccdb6656063218207cf212999d9b8fb60a27ed927eb23e30a3c2
SHA51243a02b43c12d2d00f14afae8927afb43676e1bd3ce5e0208feab4a4f6a728512e0074f8c8056464c30b2ab5fd1f1d2f7c32ef9fd57d9d6dbd978b6ff4fe52c50
-
Filesize
1KB
MD56b56166d04793ff891e5969208e95df6
SHA1a1e47d109947ffcf1939e54c05b053f414e7f057
SHA256687b8d807bb74782d876cceb28615cb32f379e4b6b194492e13e156ef26d8e74
SHA5126905a51936315124f22cbf553ae70f485f2c580f985e0db582d483f76fb12193cee18a16e2b9b6245ec718a5ed0e0cf4f40e6a095d0e159548c03e30cd6c92d7
-
Filesize
2KB
MD5612ebd6311fb3a68d3f41259fedfa842
SHA16d468a3b29ac321eadf76c81588dea0824092132
SHA256b30a8b2fa0f21a1b76754450e4c39b063715834b157a722803acd55f5346fff4
SHA5128a4e2b063640c95f783c0a5c48d182177b56ad608ae8213a43dc54544a87d37d2501c8dc3eefbf04c9ffbe931340809a6077f16c91be41a838d03e538694e65f
-
Filesize
371B
MD50045e74dc461ee045c66d783be40f323
SHA1b9981c80bcca6fb4e0a4bea2784e3621db81c7be
SHA256c70dcd2c5c5a0fe4c64a03f43b533b30e68971bd23d2541924077e9f427755da
SHA512ac651ca5a68e74d36ba8b364448f349b6a624057d42f50ada79012d98b27af38934d7cf5c1198a534ddd3ae79ef89da1a3d386c620b842836926b1be93ce15a0
-
Filesize
371B
MD59283db4e5bf394b5999a0a27d01c8ed3
SHA1369a59eed39f772d96ad9eb6310d6af23b44baa9
SHA256ca8b5d1971b58e3277ae443ee61d8cd948bce196ddb793f7666c29b70b7b2bfc
SHA512053dcf29759fed8f501eeed4349598e74fa27ad2b70b3e363e202e0aed89371c6d722a7b8444b335783b776a9884aae051930b5de8f55461b130c47cf1356e24
-
Filesize
6KB
MD5d8d7a771055c3f7f7e8adbb257516292
SHA11aa8ea3df70953e10fd18007a120e141b6265f88
SHA256595a3b2cd811598e0ec4990523bfb3f149cbdcdc2c2a38394a553ff1c0e5070b
SHA512ec2c3292c298904589cc83fa6b81d0028b1cb326edd9a180310a2d2ba097b881535903f63cd7e42ff60f8b299b8776f12a6afda4959252237a41a3fe67ad6b10
-
Filesize
6KB
MD57af66bdcc3ff92a42e332bc45c9cb2cf
SHA1a8385aba2a4243b56a1863254acf96d3a9f932d9
SHA2567dedb4a143e2987ee45c6bc03720225857713769e394a32865eb1c959f32dea0
SHA51248e6d905825a2a7187e618affade929197414bbf917e0eb8805f903780c95e1e13f26c454dc375ee3747f235e8bbcee74e2d5245ec1062264d9fcf2144090a4f
-
Filesize
6KB
MD5cbe97fdc410f6b332c0f4d9e6f04ac43
SHA166271e9a557bc8516a5b4d27abf14813348629f1
SHA256fafbd4016e53bd87c56efa153d2a5e19b1d826478f71dcf457e0510fe3af5184
SHA5128265da3fcad9b411dd9bcb65b373ad5334dbe3b979712353990cb4bd03d8d4a574dce3f1ffdc0e1555654182d5985b6623d117daccd032d893b908a35da90b93
-
Filesize
7KB
MD5ecc7f69296358605ee8ade9a0d8c59df
SHA1510684bc321a39babe7c4466280cefe3749e9c5b
SHA2560d22e093a6d77fa6b5d450f741d34c4adedf97f5afffbd08eda243e331fed71f
SHA512d6b5133618622c0ceb439f7d4bfc0551b1095e1f5444c9c41db71c3716cd0d24326388f0d46a85e996ed4971b8364602238670391340dabcb7ff56b9531a0f61
-
Filesize
6KB
MD58611f925d03dd5805500b31e620d83f4
SHA1e03018ccfcbc03c1f7de602bde704b6afcdc687a
SHA256b50d96af8a47dfc8175e688ead931682ba38b9b7ef90fe84f54c60d6349b97df
SHA51278ec35d6a378380c40fc6e7f045ee958522117f2764f93eddea642014e62e90b0815e5f63def8824722bc8f82f1a2491e3a4ef5bdd6094f53f68efe9a543832d
-
Filesize
15KB
MD5962e51326a7c2420dc04723df4211bf3
SHA11d08aca91c122740896191adf649ccc6444a23d3
SHA256a1f2b732a0c28b18412eb1c5c1525a699c90974e8644851f584924125c57ad56
SHA5121beee06e63064fa47626af5ddbaadff515368c1e2259d21b3b5d517face754bb6a4a16eedf6451d38624828b949480ae2f549f6a6484cda58170ebe9517b9760
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a442e657-0e85-4473-9871-bd2fa8179db3.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
257KB
MD56f6cd2fb0a19736467c3e56ff0d76c35
SHA16b8e761d85234efa2da11226831b7b8fb43dba65
SHA2566e03217830a46ffdf0b4c13face82478bd347a7d8989c7bdb5889c180c00532b
SHA512484179879300592e5d2aa16cf3475de54ed191b139ce9d57926e6415d04b66c399ce437e0428aca7fec3c2c5cb01f486197cbb421bdefe0860e5c1db260aa2f8
-
Filesize
257KB
MD57b942845a8b7450b8530278ae68e7d57
SHA1ffa5db1a9ba4581eb9108e0fd8da97147cd990f0
SHA2568f0f5b66c6f7477e4732bf99717a0f37157e4749ff6da47253597fe4afaaea36
SHA512679c7b0a5a1dcdce45cd110a6f5e5a46624a5a6d8691ae71b18497d4d2140b757faf2cb6a9a78d8f2950f879fae07eb91c049af3e808155ec764f9bc613e1f38
-
Filesize
131KB
MD578f7fd06bd6148d7f6d6094aac121d2a
SHA11faff5a8a326a8053708507fd828cf1ef3756d78
SHA2561a85b29c4fcfe26ef9d9febca382c12be1547be54a09702a837fc903cc3c74f4
SHA5122121f831d9575b8d1c686b33e016cb111b6d65eaa2c1a84cc65f11c0a449030ad57a4e504ea7b974fdf8228db02497ae8c19a7cc8544abc6019ea8e9111a65a9
-
Filesize
131KB
MD522d3fb0c361fed6ea8c665ddf87f7d8c
SHA132730067027f7cb784cb0fde25cf1fc298f3b859
SHA256119340c4d58cf354cef10d3938030d25c14e6989d0e4615ff1a8e76d1a2ca656
SHA512ded25601b3f150c7fba9ac14960ecdb3fa871c9cdb8f4e585400b61bab9a3bcd8bd4834378cff2d34ef9bdccf3f0bf3a3029c4ee5407f931878ef120b9e85f30
-
Filesize
90KB
MD52c62e03baaef33821818e0261c0441bf
SHA10f08d7a1b82fc7b1c50d395bd69f85218c31df82
SHA2566797345d9502701b07631a9f90ac734160c0efb592629c095016c76a4207bb59
SHA512ac221d77e5e0399206de99e0a2e9b03aa323ca29d43661965ef8f86f065de30f7e221bccd22bd4137b42ebe7cfdfa38c81f67d190f25f94f83b51e497037fba0
-
Filesize
90KB
MD50c076e7a2d1bb54352b05aa599b79fbd
SHA18c1b5915b86521b2061c47f9d2a711c05a17a149
SHA256abfb678d46916a46e53bc9b11e3e670523c35cc227e6d75bc9afc62dd6456bb1
SHA51289c692bc206c4eadbe61bd3392092192d1c410e1ba9f756329665fe1095d8e114cc8434ac27aa057b9d69e5fbab5b5026a1d0b08287e7424ade5681a53a68073
-
Filesize
264KB
MD513af10e05c7f6fb8eed2e3f940315ffd
SHA1dd0872098af2a2c66cbb71c7cf70e50da80d7d61
SHA256df7f3dfc1d0d3660720b0604aaaf544f10e6de783168d122713d5cb0ac78a9fe
SHA51217f9149c7e499e26c3c053e5735552f2c725f59cf5f73e57588362e8c38aa294cfa35e20cfa1fca93e556a8e7a2333bf048fb447f5098a2589a8b5d9d568173a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
152B
MD50e10a8550dceecf34b33a98b85d5fa0b
SHA1357ed761cbff74e7f3f75cd15074b4f7f3bcdce0
SHA2565694744f7e6c49068383af6569df880eed386f56062933708c8716f4221cac61
SHA512fe6815e41c7643ddb7755cc542d478814f47acea5339df0b5265d9969d02c59ece6fc61150c6c75de3f4f59b052bc2a4f58a14caa3675daeb67955b4dc416d3a
-
Filesize
152B
MD53b1e59e67b947d63336fe9c8a1a5cebc
SHA15dc7146555c05d8eb1c9680b1b5c98537dd19b91
SHA2567fccd8c81f41a2684315ad9c86ef0861ecf1f2bf5d13050f760f52aef9b4a263
SHA5122d9b8f574f7f669c109f7e0d9714b84798e07966341a0200baac01ed5939b611c7ff75bf1978fe06e37e813df277b092ba68051fae9ba997fd529962e2e5d7b0
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
69KB
MD5a127a49f49671771565e01d883a5e4fa
SHA109ec098e238b34c09406628c6bee1b81472fc003
SHA2563f208f049ffaf4a7ed808bf0ff759ce7986c177f476b380d0076fd1f5482fca6
SHA51261b54222e54e7ab8743a2d6ca3c36768a7b2cf22d5689a3309dee9974b1f804533720ea9de2d3beab44853d565a94f1bc0e60b9382997abcf03945219f98d734
-
Filesize
30KB
MD5452cee87a193d291cf0394c0a8f961c9
SHA15ed43fad7737f776e85433d7fe7aa70d37eb4606
SHA2566c31786e9b268be9d7e56b3e519845551550a8b0df4d3f55fbaf947378446c61
SHA512355afabaa3be9194b4d47800be51e0ccecd9a857364fa57063b0866ee7595d33def0aed28eff297e582d16978e1ffb61921f3ee723e7c5e940dd48197b472500
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
88KB
MD5b38fbbd0b5c8e8b4452b33d6f85df7dc
SHA1386ba241790252df01a6a028b3238de2f995a559
SHA256b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd
SHA512546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16
-
Filesize
1.1MB
MD5eeb2da3dfe4dbfa17c25b4eb9319f982
SHA130a738a3f477b3655645873a98838424fabc8e21
SHA256fbfee0384218b2d1ec02a67a3406c0f02194d5ce42471945fbaed8d03eaf13f3
SHA512d014c72b432231b5253947d78b280c50eac93ab89a616db2e25ead807cab79d4cb88ffe49a2337efb9624f98e0d63b4834ab96f0d940654fc000868a845084fe
-
Filesize
33KB
MD53cd0f2f60ab620c7be0c2c3dbf2cda97
SHA147fad82bfa9a32d578c0c84aed2840c55bd27bfb
SHA25629a3b99e23b07099e1d2a3c0b4cff458a2eba2519f4654c26cf22d03f149e36b
SHA512ef6e3bbd7e03be8e514936bcb0b5a59b4cf4e677ad24d6d2dfca8c1ec95f134ae37f2042d8bf9a0e343b68bff98a0fd748503f35d5e9d42cdaa1dc283dec89fb
-
Filesize
75KB
MD5cf989be758e8dab43e0a5bc0798c71e0
SHA197537516ffd3621ffdd0219ede2a0771a9d1e01d
SHA256beeca69af7bea038faf8f688bf2f10fda22dee6d9d9429306d379a7a4be0c615
SHA512f8a88edb6bcd029ad02cba25cae57fdf9bbc7fa17c26e7d03f09040eb0559bc27bd4db11025706190ae548363a1d3b3f95519b9740e562bb9531c4d51e3ca2b7
-
Filesize
105KB
MD524cab279a1b1479cd2848b4cf4db97d8
SHA1c59c889167dfa25ea85e0ab5b93db29270cd9a3a
SHA2562feef54f715ea3e6192ec7a9d30e910044968a41d8fe91fc9b1b469ad574df51
SHA512d1ec7ed765e5ec1b5e095a917437ddcd783ad01a1d6025f1125906617afc24e1d3a9cd702616d18c4231e5ffe60e5326a8dee855db42bc417568283c310e5c10
-
Filesize
155KB
MD565b00bec774c969842aceb3199fbe254
SHA1bd464411b9578497f081a5f8b6c04180b6ee0f0a
SHA256d604e67e9d16b6b3d2f10687a36ec00597c48288fa60bfa957bd3ca78eadceda
SHA5120c89ad2ca25ecd9058e42ed477bf6cd1512859c7ac63701206a82f2591b2878acc7f9354b6a23245fd186ca9b3c809cf7700c0e3e43f469c37580d8531d3beac
-
Filesize
109KB
MD5bb3fc9718561b34e8ab4e7b60bf19da6
SHA161c958bedf93d543622351633d91ad9dda838723
SHA256d6ea500b6752094a4c340d4f5ed01afdca1925006077560d9a3f56054cd8d141
SHA51297da30e9a0d14e6f9151539b77b2216e0f6b6cc4742f075077f9ff92f46f8b97e82f020c562625261eaa01bcf810ce81c0b7b71340ac566aef1bef5a07dac63e
-
Filesize
40KB
MD53051c1e179d84292d3f84a1a0a112c80
SHA1c11a63236373abfe574f2935a0e7024688b71ccb
SHA256992cbdc768319cbd64c1ec740134deccbb990d29d7dccd5ecd5c49672fa98ea3
SHA512df64e0f8c59b50bcffb523b6eab8fabf5f0c5c3d1abbfc6aa4831b4f6ce008320c66121dcedd124533867a9d5de83c424c5e9390bf0a95c8e641af6de74dabff
-
Filesize
53KB
MD568f0a51fa86985999964ee43de12cdd5
SHA1bbfc7666be00c560b7394fa0b82b864237a99d8c
SHA256f230c691e1525fac0191e2f4a1db36046306eb7d19808b7bf8227b7ed75e5a0f
SHA5123049b9bd4160bfa702f2e2b6c1714c960d2c422e3481d3b6dd7006e65aa5075eed1dc9b8a2337e0501e9a7780a38718d298b2415cf30ec9e115a9360df5fa2a7
-
Filesize
30KB
MD53ad5f392b7021b34b28bb8ba7e4e74fd
SHA10f2117970c6694380ad5957eece0d004eaf520bf
SHA25699e2448e52a1b3a638a7455dcda4452a267e7dd8efa0406e41547aea14409e9c
SHA512f60bf0c8cbf2b184f255e49f5f39c44921f6098ace6a6e7aaea26a42ffd29d0a2d7a77b2abdaa294550bc74ae3438a5fb7a981c562c399a42608857171161c54
-
Filesize
106KB
MD54eea01e22f421ce082cb210d0f806eef
SHA13ff509ccd8ce5db1877227e800053b8cf94a7c24
SHA2568c735544e463345ad56a4666c9b68d1390b9eb889828282ef9be52c93c35aa80
SHA51296ec7c9ccc9968c09fb4ec2b02f85dd9731749a500caf4b2fafbf3b81af70487934d0808d71d92c1f7fec7005a81cde9555e528683ac75248cf20506181d2005
-
Filesize
221KB
MD52403e46fac859098756ce617fefa07f0
SHA1fa7fae8270fcee0aa075c1fc8cbcb0b4b1a07ece
SHA256b3b4327fc1a5b55371aace2c88c05d838e5d05642926aaf70ca72722609d0957
SHA51209b3d47e61d32d6fd4a4fc3fa113c91e4ec70c123587d2fb801cf447f3c509e07079eb6a9d8c2093987e8413ff6da6b49239f038e427b9b1c27bfb92bd4fe34f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5cca473b8a46b1adf07bcf90df96089f8
SHA19eb9cf9241805110b67e4777b5c2b26cbd250074
SHA2566be3c05be8f212f70de13aa09738f640ad287e3dab9c4282847b859e993613a6
SHA5127d911d5b386763cfecfff39741bd69bc64290f420645b31a1d9805993793bc20f3fb1017fa144d417dde17e72303f4341f7397a45d328c9ccc5b9090ab76059e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD596e4e818f29f40cea1f17ac9c91f45eb
SHA1d35896d317b555933e14ce128359306c3d581fb2
SHA2561a23c704b0a043defb0c8a2bb9360003ce17de9d06030f26e4fd9a10be8f76f0
SHA51275cddc29bd5a9b39babc7eb9228a6f3b5828dfa49051ec65e4ed040dfa5dad4c6ddd3352f087a717936116d4f8408fb2670e93291513a97f43124c786792a6ca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize7KB
MD5dd1532b7e617eb7f22bd459958c4ff79
SHA1ebf55ab10817589d711f5c8792bbb575bc26060f
SHA2568ce57974a37506b7a07c05e01f1e3fe1e526b72c044dcf7124b9d79e5525370e
SHA51288a9d77b7cfcc6a5ca24396d297975efb426efe692176ebabaf509d7136ba8f985e384f698b852c8674e3517af5752641f1564b57491b5f9f94da352732268a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize7KB
MD5b89db345265eccd1d93017ff1994363b
SHA1557466df4d1dec96a3df10c90843f48c2e17b4d7
SHA256f75127ef9e98ebc3b04bf9d4f90b36271f233ce84cb13ae2fc792e5d6899dc2e
SHA51212e2874942ad02f4920b455777e0693c1b61816149adb7b35573288955152a79600809d68ad9c3b4bf78cc181b7f5557e8e0b53bab5f36945a0cfc42f503ac9c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD559f8da7ce713e0f2de1a52d4ea15b316
SHA1db1b5f3438099d05c95e61a39267dd3ec867fd81
SHA2560523751f202ebe5782033922bb9a98c828659d30b8f13426e0ebb7341bc80c7f
SHA512425da6ab71be5dee63a9e33fce4eb62044b2af2c93762579a3e6d57e56a3cdc2429973ce6e95714477c843ad9d223896d78a295b1deacc4cace1ecb632fef55e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize9KB
MD59187117854a7c7d78d4d69339e1e05e3
SHA1dc8f1dd7ebe36d1eba6914ea5e978830367729a5
SHA2562ce6f34c457638774a306fab8affc127ceba3ae79d4d0e6e6a9aa963d201da6c
SHA5122717ff56daf47dbe06d5604689197501504f3262b33bc078b72b528b7d002da130787193c13f18a0f9296eb07a2c6a07d4ff98774383082fa69d0ef40523ff84
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize7KB
MD52ce823bd0d119f2651063c8a14af9d79
SHA1ba7d01c432bdf4c51fab6882f1a1818676ec74c0
SHA2565529643b405c11088c724280ecb805c62b00ae3fca791c619cb6248024faea84
SHA512f31bb33e3b1ae8a710bd299fb9deb3629f773f835110f7ced6bc4a2c554e9ae3b4cd796d1f4e3ec17817fd1e4e60617568308b9c7e2782331f1a489c16d69193
-
Filesize
3KB
MD53201841491ad6b830ba56d1870ce82e3
SHA17edc9b0781f71046e0657358692f50ee45a6a192
SHA256d533b974fa7e26b853cef5eea47206e68795e3fd83e8091fcc6ffa00c9ee139c
SHA512faf7731418b314b592df3d91d2c13a92b68555d058106a093ce7d964dd39b6ad5da713e18801714b98a87238cbd2d3da831c3ee42f0e5b175549ffb5a3c9c83f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5ea246581ea349de7a1d49d0c80937a5c
SHA1560012a8202c4540bd88fc5b8a84ed55213f7a08
SHA256f8be91be43a306331677a72ae7ca85f0fffa1ec6d2fa83d83b2d1553da9f93ea
SHA5123bbe999833dce9ca3bbca8407504f058708c16223714bf3e125b5d63c2666623c175e71aa1aba73a7b24624d6c08dc434715c04d7fb996254e6e7f20a82e3d38
-
Filesize
3KB
MD5e83c751fb76e6e8eda08cee9c7908341
SHA1a370a32c70829b8aa8f6f5a288ad50850a3770c1
SHA25626a59a6d74f3b433038becd051959aa400e9ee5ff668dd8f6f87cbd4858ce22d
SHA5125dd9042568039c08e9fe1e78315c8c07899bf8bbe0025a31af6c6cf145cdccab158d33449277710c9a4512dcd17a55a3a5780b3b907c703b0484d53a1bd01e4d
-
Filesize
3KB
MD5e301a9fea43e73e1ebabc7b0d85e499c
SHA1c29e3f09155382b585387a03bef8e3c45b6c8617
SHA2560343f1f30b4f80668f61ad1f58699b4edbbcb7aa9423c9d2ca0481a123010c5c
SHA512c87e380878052d34184b6c6d83b5f36a61d6aa60f7be58e1a8702514fa89e0eb461dc8b926b289a7b22bd7d1e446d94060a75f87f4efd2144da25f24665bdfec
-
Filesize
4KB
MD576b6c1610c7757c42aa050d684724b62
SHA1dffc318719678c4829cd0f4a039d75d9cf62a88c
SHA256f96d8db86572c855a1d6413e12491f9e30a0d2cf4bca2c00425b3dc5a5dba750
SHA51262403bd13014157f5dd7d1f7ddd4da1063e03c1908b31a4f888c6c4f17c5da44b7e9d555dcc2ec0a178fde9da2cb06663e5cb15fe68be12863fd16996af3e0d8
-
Filesize
7KB
MD5f52036724fe9ab57ae585e6d532b5a3d
SHA1f0dedeff30276c25cdf8ff259f33c6b8bac858a1
SHA256f6277e772207642cbadd4c0fa19c0024657cc9585689626f27d882c117f86e3b
SHA512b49cd6268a76ad6226aa1588d693ca1ef2a2ad276cb0ee0b45e8a1353e598b1da4e6ab6a55fbc366c531dd5a6a85178d3cc0416a92af82b1b021753ce32fb6e0
-
Filesize
8KB
MD5eeb7c1a3f1a8132e5e6e3cf2c12307a9
SHA18825941d6d7e46bd4db523fab47caf6db4c02098
SHA2569b4fb1760fc4ce0bd7a2a330aa51c034f9ba61fa47b0eaaccb242ce4682db57b
SHA512f40687058bc5bca2e9fa77e8727f334bf4d4085289c143b84b8902b6c55909fe113064f28d1fb31afa19bb0bf9b0002b9c3691fc50cad4b398d1480932aac802
-
Filesize
8KB
MD53b95eb6bd8673357539a48c87cdb29dd
SHA17bbafc3ab4b137c19a1f6936bf39e4d0d712bb0b
SHA2569fdd53efa185b58cba703f4c085aeedf5f5d9fd31ba5b3fc9e261b2420d9b169
SHA51295ae8d27e07b9db6f6033a842ed408f8e276226f4a7407dacafcee8f73471e00bbfae78a1022e0fbccc8bd3a097a706160e61d6eb7435fba75fe004ac7955f29
-
Filesize
6KB
MD5ad62978c594a1fd3ea8d5754bddb2f3a
SHA1c11b68110c35d045998999c77d24d908e2fe5a9e
SHA25600585397ae11508a9cdaf8270619498d6c54f0d4683bbd9453e3f0b9b3d5abaa
SHA5128e1d2e07e850e81d23dac0c7a089c2ea9c5ca8c3a6fa14bfcc1b4685e035d156519b78f9fd7387cfbdf4384144910b50e90037b41f2b888ec233903036ad76de
-
Filesize
7KB
MD5122ba7bf6521d4f757f96b5ffdef3559
SHA1817250526cdd22f715c6e74cd36dcba119fa0a64
SHA2560e18d6d8b4e7ad20fc2d67aa004c4beb87b7fe3f61c112c7e24ea122008a147b
SHA512929c93df603be66c2c9950d7d00b2e098965b0a34b65348988fda36e6171b7a8badaddc23a49774b5b3ae2c9120a049154b3d6945cc120e2a3d71743408db9ad
-
Filesize
7KB
MD55789cf8db3c04ab29bbc6887666e30da
SHA1227e04de9684dff85bfec7711bd8262c51528dfd
SHA25627710eeab3ef4cae5459f3ea5d4270ba20f29ef4c3e63506198198937f872fca
SHA512c9ff00896ed7541d5cf18119d2cc445b3b4872b69ad7ec976ad377863c171c8057b01592ad9002aa21a6cf631a2276d5c79e276665d8e4b4195d5aead3185dbd
-
Filesize
7KB
MD5dd0798a946832deb482d6a636c196f5e
SHA13c23ca9d0bec8f720cdccb18badbb9c71188e2f7
SHA256f70442114166e5089fea4975f20b0550415859a788e15ffbc83af68a103f9da7
SHA5124704b5612fc6fe3c03293a7e39e1cc73c6796f2e600195b6bebd35af20802a04541151de7ebe65ed8f5c8cdfde23b48eea7b00411e3461d93964a8fdd4f9650c
-
Filesize
8KB
MD5e5c7eb66457679143016b28b06b02097
SHA167f4c8d4925aa5b664d35b4d389a6b10e1d2ad1d
SHA25662355d9423c658910a4e4822d366d93905e0285af4e6e749b8a042313b8050af
SHA5128fbfad3e572b61bbb3b4c05e6def38a25e69c73c905330c5a37f8c17bb77ce63f3f497cdc527fbc237a657a11677850c6565cdad9d8cde908d5bde3e3e3a73d5
-
Filesize
8KB
MD5b5c0870836402c69abbf048457db8ccb
SHA17740b3788bb4089836e801d7e4e523eea8cb8af9
SHA256392a3c3fda255f0c3344f9708209166f626003a848f00bde4146fb28cc99440b
SHA512c3d2db6a16cdd34c939adfd1d199a56b76e3416a28137869991b01dd36d011cc7b501614af3d9ecfce53438c0dd7759b70ac1a2da24e0d601653ac89ba8c01c2
-
Filesize
8KB
MD5d453e8f202dae26ceb998cd884e71f65
SHA123ea863e8e6e0b9201baf219572f18c0450ed2d7
SHA2568f086f6d9ecb93014a6bc29c4fc37d7708fe06328505c01384980dd14f6c3b83
SHA512780c406a3943a4d2a52da766af31443f261a3c82857332e58cf0afe175b3cb26753e95c9161465138c9e945767bfaf9b759a11dbb9858d6cd3c870fed95d3bfb
-
Filesize
7KB
MD51066bacb0cb23fbf6631228cc4d1e2db
SHA13dfba9722fc2b3009517bebc47d1837295fa49e0
SHA2564b18321dc1bcb5d694c369ca4bc0f8387b7d7c312c397304f87aaa184e5b1288
SHA51287b2a139e7ec91da417d82fef6faceda35b7e433ba2d0eaa5afa4093615b191a18aeb2c27664750497a358165b5ef0c88662a60e4c0760dea850ed280509192a
-
Filesize
8KB
MD52b832100dae959909853705b987817a6
SHA113e15aff3d63ae9ab5d30d0506def5a3677fddd9
SHA25619b8f7975a9a067a784a5aa2cfcdfc726551215e38d1188610fc95b33dd7fa20
SHA51213f1f88d1c9043472a07416b7ca95cdac25fd906af09e4cf045369c54a59fce1af2aa2b155bc994fa439d47f4507923ddf8a33c040538ce2e58a758b98f9aba8
-
Filesize
8KB
MD58117764c8b3b29beddd67f25511f9ee0
SHA1a432954d896f2982aa7329d3a6f7edd6293985cc
SHA2564caf254110ce060e8c4f0c5b948b8e728fca7b99ef77a587e42f8e2a10e48f9a
SHA5123749c954b2ccc6e5a56ce3faff3df7a27bd8653ac4837dbdda944240ffbe2df4f11d97734a83284ec794b26b07212754c1c2fc2df4fa8d4568eed7233ec2245a
-
Filesize
7KB
MD5862afbe1912f9a22b3e59ef1fe49699f
SHA19d4861a09f9c9a374f9e7fca7b60608c746b0b7e
SHA256164ee40618d04914e8380d9b01af9217f73861de578aca6626905881501bddcf
SHA512922c173cb6a724a5f90cb24bf0221175c71d37589bf992c481bd2b7c70ed7043a03750f4ae2b07c380b7648669fd03fbc2f8467a8d812e8eb03ee74e14d787b9
-
Filesize
6KB
MD5f1986c064786c73a1c1f57baa81e37c7
SHA178543647f464c07d5eea53143a2a898258697c79
SHA2560dbe1301da65d34e9bb99d52ee0fdf4a9a78baff4d8bfc3228d94561920b766c
SHA512ac0f84b4a54d74efe6eb9b851632023643659e19c46dd2f1140f050d23e5abac0ef38f2232471d28f8c20b68488cf52607f7d0fdbee771820c7c8a306d0af4a2
-
Filesize
705B
MD5aceaf4bf55eec73094728e72df9f4909
SHA1f7e4c650be25f7d464badce8c7a2b222613327c5
SHA256043dfc5cf21f01af5ac0ec183071fd76d06aba1cc940715b4ae854400efc903d
SHA512e84cd34407baabd7dd0fde8e4bc535629b89096098adca4f52618cdb44f274f6da9f1148fd958001bcda1bf6a6ac1a168b397bcc5fa0042c3680fb04b677b278
-
Filesize
705B
MD5a99981a118318de1fba21c1aa12eecf3
SHA17f976c4704eb2474d679f6c408a5110ce3ffd467
SHA256a73bbbb3c3fd57f2b151db2208285f6900daeb7d792a69b057d4a757d9ab8abd
SHA5127331342db9e4a5ca0effdc912d9d4e113aef89aa08e7a16b69eb2192fe3d7285718336a9296c8e09e31c7e4b94feaa0b60b73adf72d14a43901d74c98babcce9
-
Filesize
1KB
MD59b08df5f67783eec7c7ff583db0eb906
SHA110fdc943c4030e34c62cf558fdd0774e1876a3e0
SHA2567c49edec974a615b142220a4832b23fd4d062da21f7645ce9e1e97cb60ffe2b4
SHA512f04ca21909f41f6cf28ec362160b83e25fd7820314f9db16339a1d424e5520272aa3ae970e9213694bbc545544bd4c1af0aa1e8223472168d368cc64aa79bb7e
-
Filesize
2KB
MD5f334b1aa5402eed6d3b46508191d42ae
SHA141890aad2890898ec97f2d527031f2cc33ddb37c
SHA25603b7d6ab7ae73dc224f5d27bf9d07545dcd8a882bb437f2f94f5f57d0b8e339b
SHA5122699dbda70326280a3d48e6c80c72daec8f09e5e53aa2c08694b9dd9b03a93735cfa528f8f2c62595489b32d0388dd0e2d5d9dafeebf3f208d8623974dd2f46a
-
Filesize
3KB
MD530983bbcb9257ae747d98c8fa5752b2a
SHA19a04e96dd775bf4290cf72ecb6a91d29e61c712b
SHA256b3bc35b777739ea24ce8f3273ee753c123617263a43b786468be05f1ad7bac62
SHA512f6fd1be788f25ea5651bd02a338311a77445ac2f071839b2b1144284530b7550eb02a722b59a194299b6d72f2adae92a8af6f45bfe439d3626cbc54215504870
-
Filesize
4KB
MD5f51c6e6369ee1a03565f4686c8e87686
SHA1e55f73dd656adcc54dc7085190e56789a991fe09
SHA256e25c1e39af55accaa1b9fd379d7ccc363ab2c20f7666ab8d9f76897ff85a2bb1
SHA512609cf582dfa2f9e9d535ecfaf8627cacce4f695a57cf6fabe407429b1e59f1620392c3f0a7bbffffe40aaa9cc30aeba7249228cd704eae367d0504e74a5a8590
-
Filesize
4KB
MD5335c328a894fd66848402033aa7978cd
SHA1137af11fbe5440dc7b67f149692993f4bc03173b
SHA256e0e97a37fe1c010cf644e066a653f5a663ce4c95eab2f9804f6fb4ee7be7b0ef
SHA512f0c50d72c94eef9e3e69af16e9b9b693ca1684589cfeffdd1abffbe0ebf25179822a0ce5c07a08c8a5641aa471fe672c34a07a8d1e67859f439705448183e9ac
-
Filesize
2KB
MD58b37929c0324d9b13fd2ad25abd8bd5b
SHA18e51c43b0e97a82396472ef362d4fa09c83cd0fc
SHA256a667611d843878e3d00d6a54375d60d0521d4177c7c2015200ef045f95332e94
SHA512d936b7822f76639eb7e938fc2ce65bd01625c4fee5008f34ae4bd2e7c3d1cc74c30c919d5b91276a206222a62672257a7e3fe56603850cdc477ffe42efedeb52
-
Filesize
705B
MD52e9e34c6dd29e6aea4379071ee75ea3a
SHA14ade5fa9775262c155110b2f763902e4c12568aa
SHA25682aaa58ec7d78d68907a4d647b22884e4435ed0ddba7bb3a2b94c011ecce2eb6
SHA512c1573bc27c552011000a99e02abe39fc26d5dfaba336853c7b2d267b2c91b226f57c56704a93ccd691aad196f136a90f4f3ea9f5566f300ca27647c84bb65860
-
Filesize
705B
MD5a6349723c2757554efabfc56b615329c
SHA1e2cf19908a9a5182ce8a4c5efab659da666037b2
SHA256b89a5f7e8bfe324e7d842b77055bd6256873386a5110e586217d80b6f7727d7b
SHA5124b4b3a9395539df9ad40be36d99826e52fc3e57e77d38cd507c0e80aec5510f7c7eb332fcf35f690b773b7155e5a22b0befc4b806a7242a9f8fa90261be11ba3
-
Filesize
705B
MD58db2c862799589ddc4ad37edf199ec4a
SHA1d71502dcc33a5b6cce088321ea2abdf9f825fd1c
SHA2560f4a012dcbf7a88898ad1324e8478a708d48dea5d71c2fe67efcf2f77d0cd868
SHA512c966e9158b7e5d9ce0ee1e21e6b51610e28b44f3dde51a4d738b48d925472ade5bfe392c2aa7519e4010c5b4f714f82e4a401057c5da7ccaa4c8136452eb67ec
-
Filesize
705B
MD54e8d742ef6b4a79c94542092c2075424
SHA1b3fc3bb80619bedb9db01a3f7068138da67a7496
SHA256aa8870639ff8765bbfcdf1bac69ce39fb9c7384644027e1b8c87ed92839ba907
SHA512fe402cbea030e3189c9597a50a226f52a25bdd2f8a2241e050067a40cf8e5ee449977517a03c4bf971288586d2166cbe212ea2b4ce150c75b4e50fd5a2b96807
-
Filesize
1KB
MD583f978f6a08a91cd88461f17dd47960f
SHA1e20a7f57f4bcfdb89a5a5d03a4c275b33665e772
SHA25643261b66e91a4971ce794aec19b482858fbdac1236055df163e25d0533fe7cd3
SHA5123f769d5549b8d21868285e7af6bf06a72f9b76a23a1227a6f8b68e04ac0f61d4a3d7948de59d57d885f7785452459d84eecde54c041059c73272ae8e10bec0c9
-
Filesize
1KB
MD55ceef5e40e675bad4c6c8206aa2ff4cf
SHA1a9903fba67c92936b3631592909ce124f82f3d1d
SHA256f5e34e84ea3ee0497c4eac3f3e54c5ec6d59c29555e02d78215a7fd59a15edcc
SHA512e04faf202752e4bf550721f9cd8d060db9581e23f22bb0f9c01e700f7314e81bcac77913cc4cdaf36c310a50ee613ffe7fd7b7bff86c116a96082b517fe2e9ae
-
Filesize
1KB
MD59f5c130b202b210a5549c0df900eb2de
SHA1e435c7795e87a592374dc96cf0ea357d616fb75f
SHA25622baa828f8e1c31e061b04f7a45a3dc279002e61f5e5a3191af3b903cc05b183
SHA512a0723d967e8bc07ca01340ed7550565740c83fbec8cd9ae858c368d5be537b3ad7b97c8dd3ecd2a20f74a6bb73dec3fcd8a76ee1803688ca2d1c3d1d89254078
-
Filesize
2KB
MD5a572c7f6353ece1a76a83ad6e0165a2b
SHA197d2e62c72899e94dbc17ab6215515c7b317b4d0
SHA256e594d39c66f65f98063e525e5d857b86c493f1d40ed16994a21fb036a461e30a
SHA512529c1eef9d06438aa016339b99f49d703dc5b7f10819eed25872a69edd1042c055cfc14459f4429636a5ccf7f9996210f4378d2518dfce9e1cea5fb48a8f9737
-
Filesize
4KB
MD58224f025b420dd9473b694037185c3cb
SHA1e1105e581febe45ae4e898e1d07a6f5551a83bd1
SHA2562d591b30119edbc5e35c451e2c6d7a414f9bcbc8e720b8f24cdf96672836350b
SHA5123c3594d8fe75fc0bd39a4e2442393da8d8ea8c25aacad3fa2f0c9d2cab17bbe266c43ed9a2b2b96d91eb4ca7f88f665861656342e66e22c9adef96e7b7fde845
-
Filesize
705B
MD58f68f0984b652436ccef5befb2a0462a
SHA19d7fae72df92861471f88e9a1ee13fca79a39e74
SHA256b80414b0a66cfd830315ca890e3e212acf1042bf5e2bb040076689df12402e21
SHA512ab2c163808bd1d72a755eeff8b18236c434bf16377ac81b24739074013efabd892c4a3de2fc55706d52051507dd4757527be1083b4cfb3b8ad0963b9949f18e4
-
Filesize
1KB
MD5f3cf3002d66c0d715420e08e24e7c3c6
SHA17798227970d458c005e21983eb64d36a9bc92117
SHA25675f236765e98d58b947f61a0054c2b451b1385d07ee1113fb2818c1fa32aede1
SHA512fc04aae89f62109273ea7118721c55e601665ab77e494d16244434a613bb0ab866fed1886c505945fcbc391e466711f3d579d95fa62c278b52c67d7df8dc298d
-
Filesize
1KB
MD5d7a6a9f1fa96460c58e9fe65a20c85f0
SHA10a6c7e4628581158d8d907805c1eb55a2966efdd
SHA256d682674b377ae3208314fb49b9a21a3fddfc249ac2814bcdcbdf8a5f793de982
SHA51260650e2c01aff5c41db417f3de40cf3439d07217bc79b59b4daf3fef1ba3fd54139afa029426d6805942d027abe7306338d8d74b042555c9141711a99723706f
-
Filesize
2KB
MD5d40fa8fd66ddb0252f2b667f2fe20b48
SHA19c87390dd32391d5a177385a57a8bdb38dce4814
SHA25673dee43a9610c665bf10026042ea2bb30ea540bd96e6286199bbd07d595b66af
SHA512a2f822ebb6ec211f019015ee27796501f5b2809818ec77bd117f8bf0cab5bf7a6c79986e31c13da3ca0cedd584c016bdd13697e58869d9ca9f43224031f75fc5
-
Filesize
2KB
MD5767469442062d27484de4a7eb4cd7e3c
SHA10e2dd9fa27df5145e5c0a0ed509cd05a461fcb38
SHA256d96b1aa7c79949590b81c66f76c2e1086b7a12f70998907daae6d9043d35845e
SHA51290847656b64bdff1630565166e444cb92527ad09438dc930be8af1df1f2486db7e3e94393169fd55d91882b6bf0c0ebb0b70edb107843d2c2c961b4aa374635c
-
Filesize
3KB
MD50e1503f46e8848f7e6f9ec8f1e5e7e57
SHA1eae909a06de82139e3fbc1666b3713500362c802
SHA25685beab5b7edcc29983935e32cf2ab64ae6c07878cdf46f6efef22e77538f3a62
SHA51222ef13af44945bb441887dd6d883efa3b76012c660bef9a1823d44e02c1c63c2d70f90eaebfac4a5d5085fc183919861e58d178c3bfb7c2c9fd2a04af12f8ecf
-
Filesize
2KB
MD54e4acf5214a469859b43b62c9722e9e3
SHA187f31d12f492f23460ad647d7307d8cf6aa2898d
SHA256cc5486a411fb77d2d1084e889b8b585d8a87de0c5a9c7604d722a118812143d6
SHA51239bf2bad1c52abe3d01d370d283b34670b52807ed6824d9f3cdedcfa1b412a481645520d9fd9e227d23fdf7d120650dee8ceddfb83696ac68008d7f909fcd565
-
Filesize
3KB
MD588a1b03cd436709295d19254ab2abc5e
SHA1b83a7f056b3d88c9534447480cb7c5e6df30ca38
SHA25635889d16fbfa243c05b49179dabcf16707d615c9308933d9452b05d82f57219d
SHA51228e696430224246bd4daeb2c3c4ad0bbf7b95e0e0662b2d31cacdf13f8ce3ce3f20ef02b4c86598662c6deccf2d15f3d53ac427a3f0c60c93bef606b2aacc8c6
-
Filesize
705B
MD5a461181f002a8b24fd37ee508073adfc
SHA1be1be65e731d4fa0a194005a1cf8c6a2b7b45253
SHA25629caf4d39668d83711cbe3e2ad64de0e54ef497c6e218d42c5a77b26bf295b4b
SHA512952785b9e53631adc22c41d3e75e5bcca4d2e539e1a5ddf33f209b435451312d019e41963bae8f5178fb061fca6e47c4a44887f657ab27e907d412c5cbfee6eb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59db2e4fee707b2deaa95ac41bc2dc4e4
SHA1d9c00b11112e417a6f1717e78da545baf9dd3b15
SHA256e79c333e5cb7f7dd2fe0d91d804ff1faa1070f8d4db5b555cfc24c9ddd9229c1
SHA51271677ffe9ca643592447294b467a463b55398359e7127390a06aed8cf90c793ba15b3e5981f8c397e5717aeb08c8423f2613399372168ed0af01912cf21b6524
-
Filesize
12KB
MD567de84a2a1111c9494c63a12c1921511
SHA1ccc566557d1ae2fa5dfe673eb00786bdaacd6325
SHA25635435bbcc9e7b0e5d8f34ebca5f74f1464d698e6330c6fef39a52cf45f79d37d
SHA5122878343814570c122803cb215c38e4c2a2b6561d9c979c371042ae405aa51d51ec2964b4ab7fc70091b3cd3006b6bb3f6a83f968e646d190342056a24016e55d
-
Filesize
12KB
MD547111d5150506567d4f59157b0c8c64c
SHA132ef092e9b6264d1c3bb037dac1bd55c75e294a0
SHA256e07bc3d0d0f7d392468c24db922199d47b75ba8ae9b469352bab654fd3ba4a72
SHA512e6a5141b1ff326a9fcf19b8e132f7cf6e389ee1cac15b50a141486b02b14a38ece27e870b25f2caa56d3c9512d97be35145b2469f87e8cf8b6abde88543243d3
-
Filesize
12KB
MD55ab5b0971898b5d537af644e928972a3
SHA1fe6ae0e284f5d6d22778ab7ba349135df406ba3a
SHA256b1cc39cb759083593a9bc9f70df3ca3e851db6ddbdd09c0995ab7fc064662942
SHA512b66ca1d1a7a7b2cb515776e6f642985f580ab86a12c7958db15672002290d773f42fc067e2f5457760b065b090a763c5eb80435bb3d7f63a931cca19dbeda44b
-
Filesize
64KB
MD5066f6e5acfff197d12b550ef7d452d41
SHA1aaa8cfa5a56519594490d069f31a42a15ca515a2
SHA256cac3a8354c7766b4ce0900bf4d8097bf372ec405a6af4bba63a6d92132932a30
SHA51221c3985bdc883b7c0fcdfb660a577eb03870943d9e812a24726158b6c06cc36b00425fdeafddcb099fddd1488173280563f7241c9589e69d04d1eb1b5daa786b
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
2.4MB
MD5a67be8b2a81c7dc633dae022b70d5971
SHA1fe2422e97eaae7cae861938d5113ceeb08b74482
SHA25678fe5d5cf1b8bf6b97c826ba8917557767efc724d54552530e2fbd23de5afec5
SHA512cf8046ac9cef8f177572e97e128e0aa1d4c6897be97c9b7ad65687badb929233f5223b28e01068c1c1e5bfa0a6a49a4dc5b93eab6dd0bcd53769e8374572f29d
-
Filesize
80B
MD5e9918809775d58624595598e49b57dbd
SHA1d4e170c0fb629d2835e17bfefaefca66628184ca
SHA25604e4b3bd71dac9838240c0ddcc37c69024d06d9780f6180b9617c6272647ebc1
SHA5126ab392981d0806d41d1b991ea97be5b4a218997ef3646ee4528969660baa5bc70365d392640c6bcb9492c0fe5456b062e334c42e6884bf6ab37df372f7f79048
-
Filesize
11KB
MD55109c49c79edd8dacb1ebc9f6ca4b93c
SHA16060dad8cb6475f7b962e92eec1f87498508a7c1
SHA2568a316fbdf6cfba36352e4e78ead7659350c4b3c701985cab56f01739e94e05c4
SHA512a16f5f365facdc681ed48801a4e22b92409436f41c49dfc6ce34d4d1a37ba1c9a72508d38c388b68d5787987089db939c3635df4a5dd89e68d613acda1ab320a
-
Filesize
1.5MB
MD5b761d7400d5136ee0b1a40b5a3228152
SHA1ad859361b2494f2de31a85904a076c7bd3214f5a
SHA2564e06db09b8c3769968c3d0b51d7cf7470fdba1aaf32decf49dbd923708f86ae7
SHA512a7f6919dc30ab2b3bfd2af6e544fcfcbf7bc52aa40c96136b6a3c9707d14d1116a3f7e72bc334d465bc7dab7df8fe824e7fe74937830b3540e4fa38896c5bc10
-
Filesize
94KB
MD514ff402962ad21b78ae0b4c43cd1f194
SHA1f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b
-
Filesize
793KB
MD5835d21dc5baa96f1ce1bf6b66d92d637
SHA1e0fb2a01a9859f0d2c983b3850c76f8512817e2d
SHA256e67f2b34ef647d59eb8ebd4a88f85dc072346ca5c275cba1ee2307b80a560319
SHA512747a9b6cde0207c722a62904a2c8708188f7c9e65e94cf55667e90096f1d1852e145061bd8e764bf30aaca0fb0f4355668feccc951041af735677c4c644aba87
-
Filesize
1KB
MD5c5ddee40aca45e94345603b882f94e97
SHA11c926b101e967f83fc915bab896857f048c67adc
SHA256e23c722fe996b58abeb415fc04fb1c3b0cef447a799234b4ea3b2aa5c7f72a6c
SHA51292006490953d41f81cb108f612666c1f38ffbac630e7c5993a6efb4b554102c30526cf3f9fb57dea3ce44c70931b4072f9416f7d34bee0227723e8bde94b09eb
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize12KB
MD5cf76126c934628af974cbb9ed1333270
SHA1b80bae6c5f4285a1d29701569770582001fb1f74
SHA256124cf3f9f712d909fba62e5fc91a92c9c5ced8e32f83f060df27f94a45cad342
SHA5123ce2999b22d93a6baa96c31c34293b384ab48f30b38232abf0012001bb940caa4c45088935f5ec773ccbdca633f62c3bf02fc5056b142aa9869c9b1d09207efa
-
Filesize
71.3MB
MD5f1ed29a940ac23463ee9edd6d946ba9b
SHA1f5f55818d570604da8765c90df2f9e1e7fc09d70
SHA256197e7a2575c942a5eec96e60ea56ef90bd35fc3e639c099b4a7f65f5138cc2c2
SHA512218193b6613c31419a36a82a46d14aa97a90b39c2a8d8a70847228154a8a36d1809781f279c1681239b890a4747c934417c8aace6ec0491d68764bf7228a15a7
-
Filesize
80.9MB
MD57d5211de924721afdc545cdc4c806268
SHA1724070006ef6daeecd02b0976b8250f8294544b9
SHA2565b76683adea8e641f0af1c0184fc7c3d7f7ae257d746b924a499914ff030b97e
SHA5123c2f0e8023d6741bba5890849ef4a7ccdaa6eb76f268bb046f78d8fe5769f8ea18e4b2aad6a56ad23b8373122b051871c53e029ff7d8154269c40edf64fd91e4
-
Filesize
42.4MB
MD55e6e858975abc22e11fcf8390ef9884e
SHA13f438bae8722d96548c5137f4209a1e0c0488f05
SHA25631d8c05ed5b605a35657d064680de8d30df064c10f5108b124a6470e06262d24
SHA512affde833cd3defb755acddbd9291d72c8f94bd9cba3dcf93612d670ca59751a5e996376c1deadf06fbca3977f8db23919cebc5dcc95df46ce8ceb9058d87eadb
-
Filesize
5.0MB
MD5ed997c518b1affa39a5db6d5e1e38874
SHA1d0355de864604e0ba04d4d79753ee926b197f9cf
SHA2568a7d20fb5bc7ef8b02ab6e11ef78ebc0a31ba5376bd97d40fe5d1da521324556
SHA51250699cdd035c48e431102c703d7855dc85caa6feb7a7b34bdb23c7ccc298dbcc3ab261690c3dfb078451d3e299a0b037351edcbf54e79b6edaaacbf30ec68cb7