Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
801s -
max time network
812s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2024, 14:31
Behavioral task
behavioral1
Sample
2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe
-
Size
294KB
-
MD5
f637065576c46fdf526f6156a06a8102
-
SHA1
208f7d972d29f58c6c18a58242d7764d6969c838
-
SHA256
b08d4f13f88946dbc97537569f4516ddf832c36d4636501abbad24f505904222
-
SHA512
9a194f4661dd716770c45bcb90052b1cc8aa90b3593bae4ddad75193a04c397a7f8ca7d03559dbba9167b90fdf31a9ce6a8d6697773809ca444e36a546eb078a
-
SSDEEP
6144:Rr9W1lNCM2n08o/2mWwEzg+0c+BMCfAXtMcOpXaLbik+:olNJ2n08o/2XwE0+fuMCfAdMcOpXubib
Malware Config
Extracted
C:\Users\Admin\Documents\read_it.txt
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 4 IoCs
resource yara_rule behavioral1/memory/4808-0-0x0000000000D60000-0x0000000000DB0000-memory.dmp family_chaos behavioral1/files/0x000700000002320f-6.dat family_chaos behavioral1/files/0x0009000000023396-1278.dat family_chaos behavioral1/memory/3064-1308-0x0000000000B90000-0x0000000000C1E000-memory.dmp family_chaos -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2976 bcdedit.exe 672 bcdedit.exe -
pid Process 800 wbadmin.exe -
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation runner.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.mezc Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\read_it.txt Decrypter.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runner.url Decrypter.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runner.url runner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini runner.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\read_it.txt runner.exe -
Executes dropped EXE 3 IoCs
pid Process 4416 runner.exe 3064 Chaos Ransomware Builder v4.exe 3832 Decrypter.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 36 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini runner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini runner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini runner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini runner.exe File opened for modification C:\Users\Admin\Documents\desktop.ini runner.exe File opened for modification C:\Users\Admin\Videos\desktop.ini runner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini runner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini explorer.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini runner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini runner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini runner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini runner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini runner.exe File opened for modification C:\Users\Public\Videos\desktop.ini runner.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini runner.exe File opened for modification C:\Users\Admin\Music\desktop.ini runner.exe File opened for modification C:\Users\Public\Music\desktop.ini runner.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini runner.exe File opened for modification C:\Users\Admin\Searches\desktop.ini runner.exe File opened for modification C:\Users\Public\Desktop\desktop.ini runner.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-513485977-2495024337-1260977654-1000\desktop.ini runner.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini runner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini runner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini runner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini runner.exe File opened for modification C:\Users\Public\Documents\desktop.ini runner.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-513485977-2495024337-1260977654-1000\desktop.ini explorer.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini runner.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini runner.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini runner.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini runner.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini runner.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini runner.exe File opened for modification C:\Users\Public\Pictures\desktop.ini runner.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini runner.exe File opened for modification C:\Users\Admin\Links\desktop.ini runner.exe -
Enumerates connected drives 3 TTPs 34 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 182 raw.githubusercontent.com 183 raw.githubusercontent.com 184 raw.githubusercontent.com 185 raw.githubusercontent.com -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ds9limpvd.jpg" runner.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xd8ezj5pc.jpg" Decrypter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1212 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\TypedURLs taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-513485977-2495024337-1260977654-1000\{30D12FF7-E869-4A29-BAC6-F6DEDF433932} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 14000000070000000100010008000000140000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b0072000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c100000000000002000000e80703004100720067006a00620065007800200033000a005600610067007200650061007200670020006e0070007000720066006600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002200000074ae2078e323294282c1e41cb67d5b9c0000000000000000000000008a67a7de7983da0100000000000000000000000000000d20feb05a007600700065006200660062007300670020004a0076006100710062006a006600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000640000000000000002000000e80703004600630072006e0078007200650066003a002000360037002500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000002300000073ae2078e323294282c1e41cb67d5b9c000000000000000000000000715b37de7983da0100000000000000000000000000000d20feb05a007600700065006200660062007300670020004a0076006100710062006a006600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000007b0031004e005000310034005200370037002d0030003200520037002d0034005200350051002d004f003700340034002d00320052004f0031004e00520035003100390038004f0037007d005c0047006e00660078007a00740065002e0072006b007200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e807030050004300480020003800310025000d000a005a0072007a00620065006c0020003600360025000d000a00510076006600780020003300390025000d000a004100720067006a00620065007800200030002500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000024000000000000000000000000000000000000000000000000000000000000009dd3d1e07983da0100000000000000000000000047006e006600780020005a006e0061006e00740072006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000050003a005c00480066007200650066005c004e0071007a00760061005c004e006300630051006e0067006e005c005900620070006e0079005c005a00760070006500620066006200730067005c00420061007200510065007600690072005c00420061007200510065007600690072002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50100000000000000000000e8070200420061007200510065007600690072000a0041006200670020006600760074006100720071002000760061000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000001bc116f2bd68da01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d0000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e80702000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000075ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e80702000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000081ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e80702000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000082ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e80702000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000083ae2078e323294282c1e41cb67d5b9c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-513485977-2495024337-1260977654-1000\{93B281E8-6E83-4644-BB67-0211279640E5} explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \Registry\User\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\Chaos Ransomware Builder v4.exe:Zone.Identifier firefox.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1764 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4416 runner.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 4416 runner.exe 3064 Chaos Ransomware Builder v4.exe 3064 Chaos Ransomware Builder v4.exe 3064 Chaos Ransomware Builder v4.exe 3064 Chaos Ransomware Builder v4.exe 3064 Chaos Ransomware Builder v4.exe 3064 Chaos Ransomware Builder v4.exe 3064 Chaos Ransomware Builder v4.exe 3064 Chaos Ransomware Builder v4.exe 3064 Chaos Ransomware Builder v4.exe 3064 Chaos Ransomware Builder v4.exe 3064 Chaos Ransomware Builder v4.exe 3064 Chaos Ransomware Builder v4.exe 3064 Chaos Ransomware Builder v4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1492 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe Token: SeDebugPrivilege 4416 runner.exe Token: SeBackupPrivilege 3800 vssvc.exe Token: SeRestorePrivilege 3800 vssvc.exe Token: SeAuditPrivilege 3800 vssvc.exe Token: SeIncreaseQuotaPrivilege 3172 WMIC.exe Token: SeSecurityPrivilege 3172 WMIC.exe Token: SeTakeOwnershipPrivilege 3172 WMIC.exe Token: SeLoadDriverPrivilege 3172 WMIC.exe Token: SeSystemProfilePrivilege 3172 WMIC.exe Token: SeSystemtimePrivilege 3172 WMIC.exe Token: SeProfSingleProcessPrivilege 3172 WMIC.exe Token: SeIncBasePriorityPrivilege 3172 WMIC.exe Token: SeCreatePagefilePrivilege 3172 WMIC.exe Token: SeBackupPrivilege 3172 WMIC.exe Token: SeRestorePrivilege 3172 WMIC.exe Token: SeShutdownPrivilege 3172 WMIC.exe Token: SeDebugPrivilege 3172 WMIC.exe Token: SeSystemEnvironmentPrivilege 3172 WMIC.exe Token: SeRemoteShutdownPrivilege 3172 WMIC.exe Token: SeUndockPrivilege 3172 WMIC.exe Token: SeManageVolumePrivilege 3172 WMIC.exe Token: 33 3172 WMIC.exe Token: 34 3172 WMIC.exe Token: 35 3172 WMIC.exe Token: 36 3172 WMIC.exe Token: SeIncreaseQuotaPrivilege 3172 WMIC.exe Token: SeSecurityPrivilege 3172 WMIC.exe Token: SeTakeOwnershipPrivilege 3172 WMIC.exe Token: SeLoadDriverPrivilege 3172 WMIC.exe Token: SeSystemProfilePrivilege 3172 WMIC.exe Token: SeSystemtimePrivilege 3172 WMIC.exe Token: SeProfSingleProcessPrivilege 3172 WMIC.exe Token: SeIncBasePriorityPrivilege 3172 WMIC.exe Token: SeCreatePagefilePrivilege 3172 WMIC.exe Token: SeBackupPrivilege 3172 WMIC.exe Token: SeRestorePrivilege 3172 WMIC.exe Token: SeShutdownPrivilege 3172 WMIC.exe Token: SeDebugPrivilege 3172 WMIC.exe Token: SeSystemEnvironmentPrivilege 3172 WMIC.exe Token: SeRemoteShutdownPrivilege 3172 WMIC.exe Token: SeUndockPrivilege 3172 WMIC.exe Token: SeManageVolumePrivilege 3172 WMIC.exe Token: 33 3172 WMIC.exe Token: 34 3172 WMIC.exe Token: 35 3172 WMIC.exe Token: 36 3172 WMIC.exe Token: SeBackupPrivilege 4384 wbengine.exe Token: SeRestorePrivilege 4384 wbengine.exe Token: SeSecurityPrivilege 4384 wbengine.exe Token: SeDebugPrivilege 1588 firefox.exe Token: SeDebugPrivilege 1588 firefox.exe Token: SeDebugPrivilege 1588 firefox.exe Token: SeDebugPrivilege 1588 firefox.exe Token: SeDebugPrivilege 1588 firefox.exe Token: SeDebugPrivilege 1588 firefox.exe Token: SeDebugPrivilege 3064 Chaos Ransomware Builder v4.exe Token: SeDebugPrivilege 1588 firefox.exe Token: SeDebugPrivilege 3832 Decrypter.exe Token: SeDebugPrivilege 1492 taskmgr.exe Token: SeSystemProfilePrivilege 1492 taskmgr.exe Token: SeCreateGlobalPrivilege 1492 taskmgr.exe Token: SeShutdownPrivilege 3644 explorer.exe Token: SeCreatePagefilePrivilege 3644 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1492 taskmgr.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4296 OpenWith.exe 3988 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 4428 OpenWith.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 2676 OpenWith.exe 4500 StartMenuExperienceHost.exe 752 StartMenuExperienceHost.exe 3652 StartMenuExperienceHost.exe 3592 SearchApp.exe 380 StartMenuExperienceHost.exe 1956 SearchApp.exe 1864 StartMenuExperienceHost.exe 3692 StartMenuExperienceHost.exe 1424 SearchApp.exe 3208 StartMenuExperienceHost.exe 3292 StartMenuExperienceHost.exe 1396 SearchApp.exe 556 StartMenuExperienceHost.exe 4284 SearchApp.exe 1440 StartMenuExperienceHost.exe 592 SearchApp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4416 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 87 PID 4808 wrote to memory of 4416 4808 2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe 87 PID 4416 wrote to memory of 1960 4416 runner.exe 95 PID 4416 wrote to memory of 1960 4416 runner.exe 95 PID 1960 wrote to memory of 1212 1960 cmd.exe 97 PID 1960 wrote to memory of 1212 1960 cmd.exe 97 PID 1960 wrote to memory of 3172 1960 cmd.exe 100 PID 1960 wrote to memory of 3172 1960 cmd.exe 100 PID 4416 wrote to memory of 3932 4416 runner.exe 101 PID 4416 wrote to memory of 3932 4416 runner.exe 101 PID 3932 wrote to memory of 2976 3932 cmd.exe 103 PID 3932 wrote to memory of 2976 3932 cmd.exe 103 PID 3932 wrote to memory of 672 3932 cmd.exe 104 PID 3932 wrote to memory of 672 3932 cmd.exe 104 PID 4416 wrote to memory of 3040 4416 runner.exe 105 PID 4416 wrote to memory of 3040 4416 runner.exe 105 PID 3040 wrote to memory of 800 3040 cmd.exe 107 PID 3040 wrote to memory of 800 3040 cmd.exe 107 PID 4416 wrote to memory of 1764 4416 runner.exe 113 PID 4416 wrote to memory of 1764 4416 runner.exe 113 PID 4428 wrote to memory of 628 4428 OpenWith.exe 119 PID 4428 wrote to memory of 628 4428 OpenWith.exe 119 PID 628 wrote to memory of 1588 628 firefox.exe 121 PID 628 wrote to memory of 1588 628 firefox.exe 121 PID 628 wrote to memory of 1588 628 firefox.exe 121 PID 628 wrote to memory of 1588 628 firefox.exe 121 PID 628 wrote to memory of 1588 628 firefox.exe 121 PID 628 wrote to memory of 1588 628 firefox.exe 121 PID 628 wrote to memory of 1588 628 firefox.exe 121 PID 628 wrote to memory of 1588 628 firefox.exe 121 PID 628 wrote to memory of 1588 628 firefox.exe 121 PID 628 wrote to memory of 1588 628 firefox.exe 121 PID 628 wrote to memory of 1588 628 firefox.exe 121 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 PID 1588 wrote to memory of 1048 1588 firefox.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-20_f637065576c46fdf526f6156a06a8102_wannacry.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Roaming\runner.exe"C:\Users\Admin\AppData\Roaming\runner.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1212
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:2976
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:800
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt3⤵
- Opens file in notepad (likely ransom note)
PID:1764
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3800
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:4100
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:4548
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4296
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3988
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Firefox.lnk.81hn"2⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Firefox.lnk.81hn"3⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.0.223054113\1534354081" -parentBuildID 20221007134813 -prefsHandle 1388 -prefMapHandle 1996 -prefsLen 18084 -prefMapSize 231738 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0ffff60c-c087-4f72-bd5a-28444d287583} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 1760 2deb1af2958 socket4⤵
- Checks processor information in registry
PID:1048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.1.1165186538\1323858480" -parentBuildID 20221007134813 -prefsHandle 2424 -prefMapHandle 2420 -prefsLen 18674 -prefMapSize 231738 -appDir "C:\Program Files\Mozilla Firefox\browser" - {575efc0a-d08d-4513-ab5f-8d1d3b21bb44} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 2456 2deb2d59258 gpu4⤵PID:1368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.2.1192558102\168794695" -childID 1 -isForBrowser -prefsHandle 3124 -prefMapHandle 3120 -prefsLen 20415 -prefMapSize 231738 -jsInitHandle 1264 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f87ebfe1-84db-4e43-8656-e8d0588a6070} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 3136 2deb5879c58 tab4⤵PID:4184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.3.1912350470\725889173" -childID 2 -isForBrowser -prefsHandle 2620 -prefMapHandle 1248 -prefsLen 20570 -prefMapSize 231738 -jsInitHandle 1264 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {90d855b8-12af-4a35-8965-5ce56921d1e9} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 2624 2dea6273058 tab4⤵PID:2408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.4.44046207\457231502" -childID 3 -isForBrowser -prefsHandle 3500 -prefMapHandle 2744 -prefsLen 20648 -prefMapSize 231738 -jsInitHandle 1264 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c91b8db-6970-40b6-8fe7-bc791b2bc1af} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 3040 2deb6f38358 tab4⤵PID:4068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.5.203945407\566329072" -parentBuildID 20221007134813 -prefsHandle 3500 -prefMapHandle 4196 -prefsLen 20689 -prefMapSize 231738 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8cfb6b0c-bbe2-4818-9c6d-d1a8a0247979} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 4116 2deb70ec558 rdd4⤵PID:1640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.6.212866498\1851291608" -childID 4 -isForBrowser -prefsHandle 3280 -prefMapHandle 4568 -prefsLen 26290 -prefMapSize 231738 -jsInitHandle 1264 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c4510ac-fec7-41b1-b8c3-ef244e61c34d} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 3264 2deb89f3d58 tab4⤵PID:1760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.7.1364593552\906640434" -childID 5 -isForBrowser -prefsHandle 5056 -prefMapHandle 4800 -prefsLen 27675 -prefMapSize 231738 -jsInitHandle 1264 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {217deecc-df4f-4a68-9595-d4c1ba4386b1} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 1936 2deb9710a58 tab4⤵PID:1504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.8.1841423813\257314775" -childID 6 -isForBrowser -prefsHandle 4856 -prefMapHandle 4920 -prefsLen 27675 -prefMapSize 231738 -jsInitHandle 1264 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {23284982-fe2d-466c-920a-48898700d643} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 5196 2deb9d86358 tab4⤵PID:1056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.9.706813424\1258314027" -childID 7 -isForBrowser -prefsHandle 4564 -prefMapHandle 4776 -prefsLen 28123 -prefMapSize 231738 -jsInitHandle 1264 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9062685d-5f7f-4890-82d1-fbab01a8a9f0} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 4772 2deb96fbb58 tab4⤵PID:4376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.10.1241014444\1471762181" -childID 8 -isForBrowser -prefsHandle 2940 -prefMapHandle 4692 -prefsLen 28445 -prefMapSize 231738 -jsInitHandle 1264 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d19bad8-a971-47b5-ab2a-1e6e35e4d701} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 3824 2deb569fb58 tab4⤵PID:3752
-
-
C:\Users\Admin\Downloads\Chaos Ransomware Builder v4.exe"C:\Users\Admin\Downloads\Chaos Ransomware Builder v4.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.11.1749931117\532077568" -childID 9 -isForBrowser -prefsHandle 3676 -prefMapHandle 4784 -prefsLen 28494 -prefMapSize 231738 -jsInitHandle 1264 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccf99330-280c-4702-8adf-1009329a34d5} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 6388 2dea626c558 tab4⤵PID:2036
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2676 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\File Explorer.lnk.0ece"2⤵PID:2524
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\File Explorer.lnk.0ece"3⤵
- Checks processor information in registry
PID:2980
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" shell:::{52205fd8-5dfb-447d-801a-d0b52f2e83e1}1⤵PID:3532
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5088
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2520
-
C:\Users\Admin\Downloads\123-decrypter\Decrypter.exe"C:\Users\Admin\Downloads\123-decrypter\Decrypter.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1492 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-
C:\Windows\system32\sfc.exe"C:\Windows\system32\sfc.exe" /scannow2⤵PID:4212
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.bing.com/search?q=b-zayo.exe b-zayo.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8695d46f8,0x7ff8695d4708,0x7ff8695d47182⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4780 /prefetch:82⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,13045583560811821032,12560795572917721909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:4512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4500
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:4672
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:752
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops desktop.ini file(s)
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:4804
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3652
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3592
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
PID:4544
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:380
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1956
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:3328
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:1864
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:3888
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3692
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1424
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:3508
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3208
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:3744
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3292
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1396
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
PID:1664
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:556
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4284
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:4168
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1440
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:592
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:64
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3868
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2352
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:3940
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4588
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
PID:4276
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4784
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2796
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:732
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2608
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:3964
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:2464
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2568
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
PID:3756
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:1756
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:1116
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
PID:740
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:996 -
C:\Users\Admin\Downloads\Decrypter.exe"C:\Users\Admin\Downloads\Decrypter.exe"2⤵PID:3880
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3628
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:276
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2344
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:4840
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2168
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:3200
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:3892
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3088
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\update-config.json
Filesize102B
MD57d1d7e1db5d8d862de24415d9ec9aca4
SHA1f4cdc5511c299005e775dc602e611b9c67a97c78
SHA256ffad3b0fb11fc38ea243bf3f73e27a6034860709b39bf251ef3eca53d4c3afda
SHA5121688c6725a3607c7b80dfcd6a8bea787f31c21e3368b31cb84635b727675f426b969899a378bd960bd3f27866023163b5460e7c681ae1fcb62f7829b03456477
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
198KB
MD5cda68ffa26095220a82ae0a7eaea5f57
SHA1e892d887688790ddd8f0594607b539fc6baa9e40
SHA256f9db7dd5930be2a5c8b4f545a361d51ed9c38e56bd3957650a3f8dbdf9c547fb
SHA51284c8b0a4f78d8f3797dedf13e833280e6b968b7aeb2c5479211f1ff0b0ba8d3c12e8ab71a89ed128387818e05e335e8b9280a49f1dc775bd090a6114644aaf62
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD59d9d93ee384a3592d00815c1cb72e2eb
SHA17903128ac0f841a02af6245353327fa0916483ac
SHA256773dde382a1cfbbfc2acfe4c6dc70861c5d6bc5bfe17b9767f757e3b0530d075
SHA512b80d4ef3e97a39ae190eac5bf37f068d1435a592ea55d2b249d0c27af0dc12d5ae7dfafabb07e0f6e7308707e0aee8ef18ae64baaa13d158392db16f3ef2883e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5a2e8dc9a6a27185614a20ffa95638aa1
SHA1b9da27757b0990f4029a2547f5ba759b6c082b7c
SHA256e8b9b44315218e167b6fcfdde4683c5238b572f331159087634ccba9764c79ec
SHA512c10f45daaa020b66c9e0afe7fb468046221e92bafbbf4b7d485df517263782cbf398939c204d58e6764316179beb3e66ae457f30e47521ca144c709c83e08fd5
-
Filesize
2KB
MD5b0f4f1c5f0b3e327e42c929e0547d3d2
SHA1afa3ca89852d703b961c50665544fe07b3a5131f
SHA2566833966ce554333c294b3ee41cb73a31db22237c6313ba4c73d91d8734234f6f
SHA512c2ad0db0d591f25f0923136470194af2f756305e2b16dfce0067872713476abd4c6b56b4e7e95fd587e5aa4745935ed34d0a6fedc0600d793fa4c4b0b9a7043c
-
Filesize
6KB
MD5a2888c0c96b068fb03e94a08875b1914
SHA152c9d3c80ca5baaf2e7fa5d039965c202c82e5c9
SHA25658693805f6d9e071f201cad2f0e44ec770e8536c388c0909cc56d083fa8ee45b
SHA5124a72515e084d949418c887b4a270762c39e9b1dae2813b7a172a3c64f3a0ef733978139a88cab0bdb8858da3ceef96a715caa9a5630975475663fd607f4d7100
-
Filesize
7KB
MD58dc05983d7a8d8149bc2be5a4330a4fd
SHA199b477f6a6391fced01fba1c738a77c4888f14d4
SHA256ce70bf4f7fed80220625b8e3992c40e8320d9aa75952939722e8b5ef6569cdd5
SHA51293206a97aadb7c70ddcbb390f1de286e26fc2fea3c6ea9ddafdc0882689a2a6e3d1b6207c3f0dbbbccafaeeb9f787ea797826ec53a77322e0fd4f5a48b567d26
-
Filesize
7KB
MD55c61ba8af77277c7e674805da386c8e8
SHA1538531e0e5eb8068bdaeac552a0e1b948362f45a
SHA25697fe96817426814cb76b93d351e72df7fcb04dc124105f9f8dbfb74d54077657
SHA5129296f98fc2bcbed7505b6e1ed512c374cdd6d6e50560133580d121099c038f0f96c1fbf4b5d30676836c59d5f5515ad553beef90297c46864633752f5e048b00
-
Filesize
6KB
MD5a9d4f815fb906d3463b23dafd5bee7f1
SHA18b281da5539ef3360193039b6f0f849f3bca8e2f
SHA25622cbf26fe8051e46c4d782255bbfaa8a8313f44a6201cdedc5d184fe7d5d41de
SHA512da35fa48e8956c76f96159b19d8a89e606d9fbaf9a0a60608757f7ee212198645a4cdbb8e98c6fb8d30edddfb1bae5b0de164b4c5041de2b1a05be3fc8a413dd
-
Filesize
870B
MD58d6cd7da3070ebadee68f739d8600571
SHA198cc26d3be85dcfac4c42b9060aa68172a334f31
SHA256531858b7004ef5cc38bcdb0ce44e850eaa02ef79db00b1a37c274f55f542992f
SHA512453c2b1bdb57c6916a60e68eb73f098a3c464778f91e1aa62f908d9ccdd705600fe8ab957ac0ecd4529810138c50cd87d6715b327930738b9ec3ff1b0b30ad3d
-
Filesize
870B
MD5eaea18f54a2fc0f3dd264e0ed2140faa
SHA1cef97411c162da41f03637348f3972a0167b8909
SHA256374992de0c6892a157e45f82fa84f5cfbc0f9e3d01f69aeb50a1d4643c58fe26
SHA512a918a0874649d7dfd8d113f6d501bd35cf0e9dbaac6bf9075d534d09bb032ae1f81cfbe0cbde5de4411700d78a17edc5525ee800f198056a82786356e727d9da
-
Filesize
536B
MD582343c656c534013ef0e0d7717da911d
SHA13cccca05e4b2be7d449eecadac210e02f43cfbd9
SHA256fee2707ac0484d8e5746771a798b2def41b1b2cb5985765d93f04bbafd00f1ab
SHA512f735085f583d557a6b14ef162ead5189111e0e3534d7145bdc6c7bc6935ba2f44229b42a2e8d3403c6084a8c7f8f4de9e39a25464059b31562d24266bb1e11ad
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54ca12dd02ff061cda612843f2b90ed0c
SHA10c43bda53f2d2cbf36d134c9f1d97fa48f8f02ab
SHA2565451d7b2ad8aad7f0f595b3e832ab169330b7ff295887d040de62e71ba6a012e
SHA512775dcc035fa41323fbdc4cb5ec8d9d76fb7408459d60aa33f7274a23ecc3d18ec523a9ee9bd4bfd6819b640acbf06a3e4fbe7ad80090710c2fbe71337816affc
-
Filesize
11KB
MD57719ddfd413b463110713b14ccea3052
SHA17ff8861a85855db99d084a539a85992dda262681
SHA256de32c5f02b154a488065f8e9d4191159b3325201b41017b83092b683cfd93a46
SHA51230232239a6dc881d7c03ef8680f1144adb398d9011e1821b3be3c7792ccd13d14777941ec75a4919ff4faac384db592b6950c5bfaac3b08144bfa3484c243d17
-
Filesize
10KB
MD593789956ad2d8678fff9ce007d994010
SHA1ffc1b4742dfb665e51fad18deedc2ce54f5577ae
SHA256bf054c03e554ff0f248bf3ba75b333d3ef81d865a41a0777d21dbd3c4671a848
SHA51200e380c5b8c42814ea719ba1d9e1a510e67ff1c0f61a7b3b38970734b17e6eeab802975cdf1645ea3ad61ffd7d13ae71011cedf4e337129d8cc52241299df023
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\704ehe1l.default-release\cache2\entries\AF81D9CE90528EFC662762A4A288917CE6CB1128
Filesize60KB
MD5a99a402a53b2fd90b3038af632649dcb
SHA12f7be6a5c110a323a847154775fb47e3bdcbf894
SHA256ee387c95aee090c5d664c8f692d96232ccb86020c858708c0a9e6ac3c2349ced
SHA512d6c6557a4d0e135f89f929b75249f788062e937fa5f982f138a95cc90d005f4d95c074621fbe190f76dc40a919726c69bc72fae3b25deb42d50d2215f58f4ca6
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\SL9YLD9N\microsoft.windows[1].xml
Filesize97B
MD5bb7934efe1e99dde2a4be53178ce8fd7
SHA149e6b2f364b597c34832d1878259d5eb671f21a4
SHA25611904522eefd80ce753b37f72e745a251ea2a9bd65cbccbc8993944280db3426
SHA51223ae797546cd1b9884c23e593c371e99ec872b54d5f0856729137ad78507e6e120de7bc75aa7dd7c7556217a628bcf8824175ea0982d6c3236cd22b15455c1d6
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\https___docs_oracle_com_javase_8_docs
Filesize36KB
MD58aaad0f4eb7d3c65f81c6e6b496ba889
SHA1231237a501b9433c292991e4ec200b25c1589050
SHA256813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1
SHA5121a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{D65231B0-B2F1-4857-A4CE-A8E7C6EA7D27}_WindowsPowerShell_v1_0_PowerShell_ISE_exe
Filesize36KB
MD53ccc6610ecf9eb036fc50fda1f781d21
SHA1de7db115b3bd1b926ae0b2a795e7d0feac621851
SHA2562192613bbcf96dd824a813b59c598c486ea713a05c82fb1184eb955bc3b84839
SHA512aa3a6d68415fc17695a8dc35271617834a84b3485af974cf34f2ff2a065ab6217db4a19e08abd22330dea9d9a44963e0aa70feda061db2ca6c0c29b2f4c6ca42
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\File Explorer.lnk.0ece
Filesize756B
MD5944c00ac38adda49420a586e94ba7d05
SHA159ab909cbb4cc755b9717bd9df10bbc6f0ee81e3
SHA256d20fe80391bed47a886bdd43472d919009e9fa811be90473b840b00236d4df41
SHA5121e2a3fa94434524d94863c8fe43e8a6d1ab7c6b9424e25899f5cac7a5cd9e3d909c8b6cf09c6ecb5a083ea98c3191f0ba338ec00822526fb3d113e3d1c09b9fe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Firefox.lnk.81hn
Filesize1KB
MD598f73bc615258854386ef3b25a7ef9ad
SHA1b708b66dea8f2961c3bfcf6d29896b9b4bcc60dd
SHA2561a729a7a1d1b244beb9422db45ab6792a07658790326adf88c820079218ae9e1
SHA512835f6d95b939839069bbb6d4b5a61f6f7a64467a8c52988e1779061c396e9c07dc53577cd82632dfa3b4041e6eb8848886f3b6ab39cd5c27ad55e4099c534b81
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize10KB
MD5c574eb3553ea4cb91dd8e14200b44724
SHA1ac84cb50378baa88382b231905dcc9752b6c4ebb
SHA256823a8692543c6d6569bdb912b7dc6407e6656c3dde1e424db02ddb1d45d2cbd1
SHA512005e9d3729bf898f5d6445eb4a088388e3e6c0f2594de5573e11efed719dfccc81ee14ed1e96f41d8160fd2e4a7fae6c987c64455f190aeb9835abd5be8b6899
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize19KB
MD517ea484bef242ac7d22e3c4a4c05de61
SHA16630dbcb12863fa9c4ba1764ad31708a2fc0166d
SHA256dd6bfe14c2ff4a41e72219c5b0bee6213c4f2cb2b4762d9d732a8c506c003e9f
SHA51230e13ae4971c5306d8066e9622f59b85d046ad69c0b3e75fec14a1c2f6233817cc83626819adde83454430873a54ad75eaff81d4e6449d54a7253850ab9bfc8f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize20KB
MD55b1e7c07ecc7c6e65a2f1b0827e69b71
SHA1a825e66e289543ae1c3c0c0d100e9bcaef926aa8
SHA2566924016a75af9b3ae400db0886c7a12fde25710087fabc1d80068de7aa7c38a1
SHA5124f5e379fe21fac851c9d5ad9aebbe1cd8dc3f996dfcce1952f7374fe5044d17ae709d832ca852b8c67bdc7daaabbd6fcd0083658adaf8e80c4b6658a1839520e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\datareporting\glean\db\data.safe.bin
Filesize1KB
MD5c31fe48f93a191673fc541cc56e47cac
SHA1b7954504f92f0aaa67d24455198d3b9d89f26a14
SHA256216d51c77d87573a4619d3c509d5c4426c5b2901caeb433344ba2b904fef781b
SHA5120bd6eb2771479fbc18ac451c61d60d26d7317fe0d8a1d610a14a0c91d1fd183cf10a9e59ad6ac1876158e06ccfa5b1205f7307d7f7c7c5cb04fbe9a681007f89
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD557d2f70bd4e40cf8d6e466bcd62544e2
SHA14171602b8b846c2e264fc9cd0202fa60a85dbdba
SHA256d9aa7ddd51cd110fd37e37894651d138b4ff3ed198b9512e1ba071b99e929603
SHA5122e2838e66c90505aa1dcf60b4f211b6f01a78fa3cadcc82cee363da2dcf012dcb669d8e2e6d140cd90779686588ab4d0ed7450092c6e6defe76f819e393aa6c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\datareporting\glean\pending_pings\23e49051-35d5-46aa-9624-b7c9282eed6a
Filesize587B
MD5393e7d39218cd48d48afdee2ad686478
SHA1d9b9f58c30ee24ce7dab42d9588befeeab234bb7
SHA2567d2f24c98317e50d0127ceeb2b458b773faec5de54967bdd1ebe152b883f3b0d
SHA5122f589392c8542d336e3158d5d820096c242f4b71c157d15cf354d7041dbd8f085bb0645f7d1f4cb1fa373db870e65a5077184475659a8749b575f27f285f5b6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\datareporting\glean\pending_pings\4f013c8f-264b-46ad-b306-b7ef068b0a9c
Filesize1KB
MD5390025f695fb31babdd0e65024f8d760
SHA1c0e32494542bb6e5fababf278598d9e5b28ded61
SHA2561a1932a8ac02db1f01112f3692ddb5b48f71eab9ade7bcf6c6782cb06f3ca992
SHA512bb680a0b0d240ed672172b0ce21dbec32ef7d9021c22b4eca8035c25e47bbd68606bb3870b04647d00cd000826cef26952d6657658238a54ab0d6c800c7c5f09
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\datareporting\glean\pending_pings\5cdf00fa-31d5-42ab-848f-719c24a1dba2
Filesize856B
MD5e81f9687e850c8869fc4cb83575df982
SHA171dfb02ff75565bb23be9f8d63f66c587fef56ba
SHA2567512d8af8eea5f8abc017d61c103953d34d0b277dc5eebb2a388e6e7e25083fc
SHA5129017e81ca28959a7bde562e28934ec2e06146040e9ee717f399296a4636ef2c427ac04917a3d0fcd160257d9ae2dc796b004d99414d161b6a834d8b97269a046
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\datareporting\glean\pending_pings\d1331bf4-dbac-48ae-89da-dbb78222d083
Filesize656B
MD59a8236ba67bdfca30fd5afc3f23236c7
SHA1e7daaaf96c03e21c481a2d6464152af6eb5d4b5c
SHA256f84db1b3d6dc06effca1c28bc0c69b5dc6248e922d36b8360c019df92e4862eb
SHA51212fe7df56f78a5f303c47f5f9f4dec0eda84b33cd1b78ad8fb4a1bb23c19dd9521d2ac9ca510680f7b870bf3365d46ea1a29ec34740586c9b2e649ce31a3f343
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\extensions.json.tmp
Filesize36KB
MD575ce2fad261e60c126256f6c1851ba8e
SHA107e18d13ad71331bf8319712a481eaf00ec4605e
SHA25625e3c4d9845c35afa35b3e30e840cc5bd45a47658ed3dda77040fe9ec4e32d01
SHA51242fe8e0f6c8341a3e3ab6dc7475d3f99c4daa4ac4aae9b1cdf690e8c9b5eef1f9f5da1a4829a551b39b9cebd64c6321f97bb8e7073429d126dce8e2c2c814485
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
288KB
MD58c0904fc1adb8dd41c0f3eaad56d2150
SHA1bdeb3a42e6f8c4ae48d123b2327c7d0e29e1e066
SHA25699d9bab9006df6982949f321abacf9f5f920294f627918369662595d5fe8dd0e
SHA51227312a9d73a72cc8a612b835d1dd747ce197c33732e60c78e0aa5dd6396dc749967ccea97766cc6da03a0a60f736d9670f77130a6b4c718daae02e1c561bfa72
-
Filesize
6KB
MD50cf5b54a7aafbb63e8f687d5d6ac9fe7
SHA1c59f6fadbe247688618398f0aba97e45325f4c7e
SHA2564722243b87a6b698aca3a4c195fd1749b5d84775b728c24d559c75e6ed6a6bc2
SHA512dbed0b147958927c46a1fdb4a3ac237d73f20edac3b5dfc3ec94805477ea817bdd3860f1b963c2d25f63027318f4a80865cba9e33910b6061b41c8b0950ce708
-
Filesize
7KB
MD5cc28b1932917bf52a4e34bcc77b3ce65
SHA1d9adb93cceb580787ec105a9c328a8953eb53abf
SHA256871b025ca80b7c585d199062c92c66ab98649af54b5488c31728e43df4be985d
SHA512378f2bcdfd5d6f6a88cb65d000a20017881af16877dc73f975b202eefccbcc0cd3df0e7c310de2734e8caa15350d1ff6614f6fab7246188a579358d8b4acb155
-
Filesize
7KB
MD515011b8a528a180d2e8e42ec7b6eb0a4
SHA1c580c89717b02b25291bea36cd1d1d9bce113793
SHA2564e8e2bbb4d32d0c151930bda8c1702c2e9c89d7880ea7299783653098a116c74
SHA512ada1f1068e88799946a5f707d4434e45444eab33ed6b30a632b629803432f786988e05e9d327821b83e99369e94fb1ade6fe1fae23179081da54014622f56f43
-
Filesize
280B
MD541d220d4783f67d2b57beec20c135229
SHA16e97765e77920b6010fac2cb4abf1e3cea106541
SHA2565d1881e74d76b95bad59439bb5c7676258a4ae6b6d853074e93b5247cf1715dc
SHA512dc30ddc4c8cfe598de5e24bc88cebbe4256fbb21a0b1db6c2ec15311053e7d8be6a93a0bcfcfd8a02543f8b9cf9b15a5840154b272a2df71d59d7dfd80984ac0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionCheckpoints.json.tmp
Filesize259B
MD5700fe59d2eb10b8cd28525fcc46bc0cc
SHA1339badf0e1eba5332bff317d7cf8a41d5860390d
SHA2564f5d849bdf4a5eeeb5da8836589e064e31c8e94129d4e55b1c69a6f98fb9f9ea
SHA5123fa1b3fd4277d5900140e013b1035cb4c72065afcc6b6a8595b43101cfe7d09e75554a877e4a01bb80b0d7a58cdcfe553c4a9ef308c5695c5e77cb0ea99bada4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionstore-backups\recovery.jsonlz4
Filesize10KB
MD5dcfd3a4f25fedfb9b64ab033bf3e4e7d
SHA1a98de4fbe8c6d974e518fbbf1c415c5e13f16a11
SHA256022ee8e94e5550a841a20015fd65a6000448c628904bc1dfa4ae1b34a3d96043
SHA512ef1b7c9bca991f705e4f0e6acc24359b5d992eed92cdab3cedc63f9101c69b02d32694078eb3cc9a80e04a4bd06428c13b74c6bbd22b0c571735cbfbacdcd61d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1004B
MD5edd22983906ea9546bb9802435c1988f
SHA1319ad578d9c409445e7c3adbffd83674b37f2d42
SHA256875162cf55a3753d5a2a97801049ef2281719085f3c7c02de1895f6c0eb93309
SHA5120ea94ffe9c2fa08a55c4a651224bbf810c63ad28b4b60fdb232a3b1c98f477816e2b3a27c3f370b2f8cadc5780e7690a616c2563e3e3fab6a6f3e6a1229d84d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD556c6539a8ed6799b83cbb8dac6c261bb
SHA1092ecfc8fe69dd1e3d1ef7941f8511fa7e0ea52a
SHA2560fc550945b0fb8bd7e34ee986f9c03a9d41c7eaf02902deceb2d187697c8e8c0
SHA512f5d40238a9cc5b1d4a07fcd02156c78ee3e72466850ca699024cff187b3fd1d5b7c1ae2c25725135c392c141e4da5b38d7e3dfd4442428e2ef9900e6c871cf24
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD584ff36f435fbe92c0c20f97bf96aa3a8
SHA1b7d975d1ad4f4e61749a884d07a5e5f3f77f22c6
SHA2567bd127d2a6b74d91c3b43ea434b1b36e840535d208eb1202a927b6bb75d55555
SHA5128b77862426163badb39121853fc9ed3039f4a67ef20bda79dd5d0732846dccc8821246ca849e04c46d76ffc950c9fff4afe88451cedcf72d4100572ed3aeb8c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD53b2b95c946984fcceae163d61daec91a
SHA198bee76ab893f700e532e25c2bb41f3b07335b54
SHA2565d9768ab2956fdcf30a18829a98f2c448bdb1d7c5d29a8d8d789b2c3066ed6fd
SHA5124bad9027e1e2003bf5ee3df80e3b2124123f86d37a4ea7ee30c12b3dbb94f51815a8da155bde1d6b0f9bfb001b5c507533fd84c12b45ff265b277a558a883f2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD53e5b3ab7906d15c6b5dd0494887d9df7
SHA113ee8e2c79bb64be7f6791d3955c1b16d0a4f8c5
SHA25684b0bd5b5a1b25c1be7972ae7e6ad932a98e330abb56ccfbc0aefc9986d6e8d9
SHA5122bcc53eec0910e66323729f3fd824da7c5bdb73579785867c82c7e6b59359516ba456e40a938b55c36664418e252b61309e991c3a2ddceb75ae5ddc324a23287
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5e97d6b4fd24d9a39e83d6587e96e694c
SHA19441287d9b8c150dc37c6d264b2074e06f5f4d66
SHA256cfe699645c3a6acfee0fbb4f0b545823cd34af18cc29a72f63672858ef81c935
SHA512e4bad1619767d7ea6bcb303992a47c7f79fc471ff00e16485f55f1528b614a869418dc2d247b7e40e5b2ff1fd7e95abcd76d74354860605776a3cea5e3e05dde
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5852e3ff5069d50c0da25d58624462b28
SHA144808c1ba9754a8d72464ce9f8a1ce32af91b08b
SHA256d5d687a0719acfd79f600389f9709bb61d2cefd79947414941ab2a5ab68d51cd
SHA5122e9de80a60fb1d7892bc78f6d0fc4c2fba9ab8a94d8407c62ee18ed764461a744904aadd48380812c7ee7751f1cfea5d9b8ce6ea7ab11849aef9b24271729a2f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionstore-backups\recovery.jsonlz4
Filesize6KB
MD56d35a90017abce38ea9e561c8b0441db
SHA12dc0ef3a066456fee4fc64dd361bc580f7af7903
SHA256baec9960a65e6608b528270cdc71c41f6dcf428e13bf113cbe26e207efc8993c
SHA512d1d80f0406fdbe16806d872e97e9481679f6522d0d6752bd74102194b3fc9ef9c1776bc3ca0cc40ca9b9d733562f0f1a6cc2e7e20d05e9726adfea6c5fcb8c6d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionstore-backups\recovery.jsonlz4
Filesize6KB
MD5c5c4605a97e972a3eef1a916cb900cd8
SHA1806fd2a29452a0c584175a34a322053c5dc31ca7
SHA256790c390fb9f573a3189ce84f1c0e6313173da540aa77522beee9ee8d3d900075
SHA51249b6b8d72863446cf67b29c76ea600bc7faadb5c6e5f45235e3d319d4c7f16ad747f674679c85530b9b6248cd35e1d4e72851bf14104e9e6bff193aa6d2ec61c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionstore-backups\recovery.jsonlz4
Filesize9KB
MD5dc535ed8ad671ac434db2a5dcc37bd36
SHA13cd2b03b2b653d5f241d235c80b58a76845ac202
SHA256ccae6646f5b9de12bc9451a677008f719c8bdcbe0daf2029b9eb043464a1bd60
SHA512729900630832faabff1350cc7d3fc136a1640c89d1c5be9d4235841ab3f36adde0339da531955f21c681ddb305f88f21f1e900f34ae2a91f8341ded0e12c1f48
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionstore-backups\recovery.jsonlz4
Filesize10KB
MD5f6840472bfa53ec7b19c89a829b63dcf
SHA18240a017ca1fe3ed56e180e67da8a197e933c991
SHA256319314cc44476f2c6fc5c2fd1aca3e4cd901f6565db3b2196d50df0d78b3a97b
SHA5120116d40481d47404cd10c315b4483ddc81c20a5feaa252a7aaca2400191244f0bedef6904f06ad1fe7a9a6bbd0a5bdcd8ca8116bb947c0567f2590011a9e6e24
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionstore-backups\recovery.jsonlz4
Filesize10KB
MD507f991fba591d5d005e6e0ba300a33df
SHA1c4922a5d51f14ee053a44a54a27b9b4acbf1955c
SHA2565c050f8f2dc354705d6f154303a23a91298b941bb379cbe3c96a8e04024e6559
SHA5121053e57475eb4817dc1ae9a4f42a8df5a932cde3141de9ecee8801b7c3aa48aafddc51030f85def3e41618d6ab6db79ba7f63f15a29378e10956993f8ef6542f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\sessionstore.jsonlz4
Filesize10KB
MD580870dadd2619875cfe48922735534a1
SHA16e33d2d005ec35b453588fda5b05a20a56d0c520
SHA256013fc4ff387859f7ed62b7005f4fcb7f4dfdfebba3b7f0cedc5462e6589d3a1c
SHA512498f4c127ee51fb33a7ef2ee026991ec5c4343ca876aeeb70e7d2d13673a55affcd24a7d7d653f3bcb38280a307ebc6735ea427207d1c0bc69e1d352be2899b7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\704ehe1l.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize48KB
MD516de9d2bfc42da2c3c1883b52aba0f98
SHA107582a9a02d1da4577e8a1479e2c19a4d05a7ebc
SHA2569bddfe755aee52060ecc347a67d64dfbe0a2ffdf63cb921441d6b4e68772682b
SHA512df5a2ca61fe0045d2cf044409e4fa9407eb0223a4780dd8e275788949fd1467dea7219b61d92a1ab801b9e82f3acefd6ae323b43151d59fa78ee105eb558ee54
-
Filesize
305B
MD51f02689925ed84c79b1e470d1a462196
SHA18100e4dde990c039ffc1b328eab58f7b240c1be6
SHA256f01f2fcefff713bccce55c1b1e068b1ee130d9789c6fa355ccded7edf332c90a
SHA512810790dee1fa7fc1342e2d80d4794fb0e2a800a5db138dda1fd6558272bf71b0f31360fc47be4fe38723c73ce4a93d16d69fdd3ad2aadd386539eeafad9ee726
-
Filesize
294KB
MD5f637065576c46fdf526f6156a06a8102
SHA1208f7d972d29f58c6c18a58242d7764d6969c838
SHA256b08d4f13f88946dbc97537569f4516ddf832c36d4636501abbad24f505904222
SHA5129a194f4661dd716770c45bcb90052b1cc8aa90b3593bae4ddad75193a04c397a7f8ca7d03559dbba9167b90fdf31a9ce6a8d6697773809ca444e36a546eb078a
-
Filesize
756B
MD58c05bae6ed312f1b1d33947218411931
SHA13bca3929e9e5cad5d9a46b01c75d258c15f5960e
SHA2564a98f51d56b479cbd68358958c18d98d156a0bd15a1c234d203c8ea1ade2e144
SHA512ac287033e6bc3b8f3df26a0928a77d946cf9221ea08d6417313f829e972f155a614376477704f4e6b70229fa7cecec1086daf87ae6be083c979ee9fe939f0038
-
Filesize
806KB
MD50edb10935a28319a202b778e2626d65a
SHA11d05457b7f9f9701de0fd2bece50530057f0872f
SHA25661f9671086464b19c11bdab5bfc692609d22f7b6988b9bbb27718a1a8091e3ec
SHA5121180759736b5a9598c502c18e8b2738399a2dc1487581d5d0d39e1ce18e9fbcd01812e6c1eef754c79c3f5f62317a4cabfc230eba87513a6a33b57b547de8fc3
-
Filesize
1.3MB
MD5935a9232640d77539cff46d2379d5c84
SHA1e8a8e3b5a5e01d0300ac43d32cc30698998adf6a
SHA2568ec4cdbf3f3340349873211f7bebc7f29725fe84b3152e43064ee977c9291b7c
SHA512c7385c49f6f01acb54e5d957d8a8547eef6527d3567fa207f8d5b5c7aa1024d579cd56be5226f180aeb1201c27c6e7be785fd668bdfdff0e760102322fe8546c
-
Filesize
1007KB
MD55f25a2301a3de0822ef35f3069fd5fd4
SHA1458ac439e897e4e464eb18b3ee81a515c4e028cc
SHA256e9763adf3f01eec20239244770200502caa3d8e4b875ee22deb94a8b98415d15
SHA512c181ae2ef97f2a405067ca5cb0c63f3bd03a4dc89f7436ce1781563442fa9edf8107f47cbcd3d607307e856df5c1145bba38ac4e01e2da7603a19314f336be87
-
Filesize
3KB
MD5f7ecb7a22a6d81c2f6b9574e0950c5e1
SHA1ee8d51f63b7e75c82b2823cab3d4fbf2af8a4140
SHA2569447e3cb6532a46c4e8a7c1b45b070f4a80604f54628c8b5e83ef80e3cdda815
SHA512045fcfc0c08975cd20a0cf253a2ddd808d4d908f4becc2fc5f48dd244f9d774a2b3df76d03e82d6cb54e920a32568261674eb0f4314ef6f703925b5f52e774e4
-
Filesize
927KB
MD55f21ffeeab932709904443168dfca26b
SHA1b53a45bb54cd17c9e617d70cd32ba70394cf719d
SHA2564a849271ec030373ad39439024e23969615c138456d986ec5a7ecdff386f5e54
SHA5125226a8bd5aa4b0e37b5eb8890473c3fa42b33e342e19e0bb0cd3e2e50b44532852283241321cfe08e550a12fa7a82d13cc85961e564b674485ba091b17b7818d
-
Filesize
1.1MB
MD5ebf58c5b82380166d56ea3af017f8a08
SHA13ac053804a00c1abe1f2eec5cf26fa7c0f55bedb
SHA2569d0b64c3520ae6023ff7f3958a420a3248d244c01764c72c07e89235cf94849f
SHA51294a70f09fb901142448094d68a94e713894695ab58c911bb81dc732268cd2cee90d280bbcdb208063a93c196ab985d10b2364f3b2c8b4fd71e2c2968042a2024
-
Filesize
725KB
MD5b909717d8bbddd584e7f7eda43c1ecc1
SHA1601193c42c36d9e78c70dbd1659c2b915f151f47
SHA256e61b80d9d66468ddb3240398d15f039e417355bfd9cb166bf4bbae8a5bf5d2cb
SHA51299de560e691a32f12c893053e36281b941d7758848bc402c319322ca4a402f3520f1f6654f39f19e3808eb99971dc86d3508b8fa4ccb982534d8ccc07a91ec40
-
Filesize
1.0MB
MD5a121b6633a68f0dd42194dd0eb70ea8d
SHA13634d6945e154a99be80eb71f94355c6cbfd707f
SHA25692ebd036c5817d1d731c5abecea79c6bcc2c09df7303b1e3033c8c74d7366004
SHA5124b1df7b370aac84d5b4cf5635e9c7a62089e2be59dfdecd52d7638612567555acaf7428a783c827f79cbc05377b280aaae33c044fbe5fb8eb6cc5fbed9f292fd
-
Filesize
765KB
MD5a2a766d44925e082e469524a0d65d633
SHA1e9becd6e771792b741d38ef4851be8ff457cbbab
SHA256e2da135940c60ba1b5e7358f9e345cccd616bd373625cd86ef8cdd19e8c79303
SHA5121a9920e42903c3e9560d7281221cbff9ee4e296ed6cb287fedcefb8b39e271ca9e8adf3465fdf6a7387aac431008206c69479e8f578d348ebca013d6c159c31c
-
Filesize
584B
MD5505e506ea81f9ed1ab55fd7da3e16892
SHA1b62b4d649c31556123f1c6cf917851f67056f45b
SHA2566d9e51ff3aff519909f1e0247a475b7dd4e56955dff74298ed0ce35256e1243c
SHA5125449131924b25d308ccade9a97943bb30bfcc947d2319ef3efb9afc61be58d0dcd79536a277b76aca14e2c6962c7956cf8dadc4317dd928f7dd2627cef8b7c7b
-
Filesize
15KB
MD5aa6fe2082407cc2ad5dbb526b1414cbf
SHA1a4d1fc45d16531474fda3c51683f15ab0bfce177
SHA256b486cacf43634b616011600c9bcf25ec30275391ad89a09b16e2edaff4a7999e
SHA512128093bf11368c1af97512c00b1ebbf75ada0f35d02c6784eb3c21177f290c61031dad801489c853878eab85236287e21910c3a1b524820d4e9fe1cf39305056
-
Filesize
2.4MB
MD54acbb3ecf51450c2f3d7a1e905768262
SHA104edff232a04c1f22d3dc559e85f397b77834e9d
SHA256cf15b822f6d9447c3db167a4f4b0516f1f56350c6a29c4a7b143b6ff2fc8cf6d
SHA512ebd5a5435fd7fa9dc6aef33eacf2ce781c881637433a02b4c8017706942a31c86113647d9b90bc32821bc86939eaaf3741248d0893b14ddd20f6d0c23023fffa
-
Filesize
1.6MB
MD51e9b8663e393e24c9630dd27d98d5ffb
SHA182d13be84d77ecd7a86e1bfea56ad380171bbdb3
SHA25659cdfe40bb43ac03735162b156ca35fce69ed169925054c10db58c1a04e53d7e
SHA51253cf346ecd7bf2d93094b236c10302f5f8dfa06ecb056bd140e15dea633d85b38e2694df824d9f353a91c68ca011f2c2fbe4b84599a7e74fe6f8814479948435
-
Filesize
2.4MB
MD563a305801ab31c44de8bd86b8c459bde
SHA121d413821933adcd86fecb1034731c30665bd504
SHA256bc1501185241fd76017e48bea4dc3d483a8208607a062190970b6fbc0176c841
SHA512cd33f1474a29d38eddf46607af3ccab7189f60021c530f77c89974d5a2c4489ab50f423b516c67cc176eb603c274bfc2a446bbd7f0a1c9f099d8d052454e4f8b
-
Filesize
15KB
MD5b9b8efd1951e1b06e1e1b14b0edc18c9
SHA1a3dc3b911d2fcd2f468d114197988a0e0ca4617e
SHA2561ddd2643da42e10821c55c1724de22c78c62948a681a8c813f0f4aaa41f0eeb9
SHA51207f291aea5329ea6e152804cdcbe1c33825720d996093f16a4f20a9e40d4d9cc1557c8da48a78d517b5cb307ce2bf1f21ddd8895cfc69d466bcee2ed1c57f188
-
Filesize
1.3MB
MD595470ea39f02adf0510dcf37cee3f481
SHA16fc05f38f0cf823687c2bb880d21ce491d7a6113
SHA2562f375279041222899502fc8e652084bc6ce2a073649461b73cc0cbb79f54cfc4
SHA512557ca91797517216240faa9b6c9a167fcb69bf258f88ec4a9765708b0c814717cf058d5e1c4cc103f5d667455296e4752da666298a29a45fbac17c9fdb0939d8
-
Filesize
8KB
MD5d25a10eb0250867327f1d9fbd8397f3d
SHA10604e22158eca570b92cce58743ec4a72d0ad326
SHA2566d3940a9f87bfd9518c4323c1388e16831a1a5c60c5bf88e1e1d57ffca159cd1
SHA51220c349d2113f543a8fdced9edd296fa33ebd996bf0ad3e3b9e93fc0d8976ad37dc1aeaa69f416201c4d3e6d942b6d3b9cc9d80fe4ca324fc1eff6b1816201515
-
Filesize
15KB
MD55bbac8c2ef9a1c1d16dd70ab04966c34
SHA1e5bfa860bb27e36748edbe1d4a1020be8481a239
SHA2561d868cc7d8328402110e469e15ec101ecc6391b85891bb68d0fa09cb3c01e398
SHA51206f9cd6f8fd7845035411d8718a14e9b180ca56125c19bff83c629652de2da16b6e28981666fbd9b5e5f3d855b07402d9d4a179a720416f537461ebb833073ba
-
Filesize
2.2MB
MD58f1244dc44a6a6d1782bac8e1de56380
SHA16ee82341f2bc24adfbe2e4dcba00d7e30c56616c
SHA256051c97d9e96ac5b81fea22ab71e15697750149b6581e6487f25e050986f0d8e2
SHA512c4b981e85b5ad772f099f27e42dc4c9b254a1dcdbd30e229be8dfbd63290d999149cdead3bc90fc75b8a8513d7a87c66129792bb7787e30143ea215cbfd17e93
-
Filesize
1.4MB
MD5d9b86aa9258f7632a736cc8e6443d9d1
SHA19b706888a8d1e7669efd00037c20e2150c54df65
SHA256eb987ff8159fee4c057297ec030533b7f2ec5500881a5b4b51f56e5a5131b4a5
SHA51207cc450c9d105467368dae3bf71ee89ee39aa2462cff362cdd501f8b71cf3a2877525e3697ffca61d01e47ce04a46049623a66d6ceb2904277c1be1d2d2eee45
-
Filesize
15KB
MD536ef1679621784330d7c4a0ba5a11d4c
SHA1587b21c9356c173c465a4df8c154352425374015
SHA256f2e0b2b04976495e2a27b0c10e3ac7cae3beae7fd907eb800ee07c0fd0fe3894
SHA51256cc9049ded9465378535368c3d755635adc6c506cbeb1b3bc59c170a60c1f28b7f6bca17a3361607a2de50228aaaabcdbfc99c6445a5ff7a6f484522773dcef
-
Filesize
1.7MB
MD5d580224789211400db12c64c59423892
SHA1a7da0ff66a7232439adda3d62bec8c2b4649a0ff
SHA25631b1e0611c7fd044b0d19c618b99cebba1b8d3ac3c69928e83d959c72c0f9958
SHA51228cc7e140af2d51620d4f5bf1e6c1a969e791e4c832cadd9b43c6a1dc2c138de54f95ac0323c8b25fd88581841d645344d479a47e1837a709b9db11450d4b1ce
-
Filesize
15KB
MD5b1bb09eeda3f6398128b91bb72abee85
SHA1776358408bd4b23be76a91ffd6f3953beb5b36c7
SHA25608cc06f2f36421d4113a75a968d3aef483ca9ed9f2993e69cb047a2d40221594
SHA51294089baaebf9b22c9168496d35373fd84e4b18f872d69a35f2f4b8236865f885fae5c437bb5f90b223a595b8d59be415873cdbfd6e24c77379ce6653538cafdc
-
Filesize
1.9MB
MD548e8fec2a3224d76b54be7f350a57d13
SHA1c2763d355858b3455a9ab73122f977b43b646696
SHA25645c1ac64447229302cbe7c03b7dcd9ee056ba2a3ecd0674d61f3820d75259846
SHA512921b7d0375844dafff81df651d41e25fb8fdc79f05d0a0fee5d85da0584ee82ed9dc45c2e27f4a2fa51dcca7100a94d38138d742c39d7c02f3e33c983cb232a0
-
Filesize
756B
MD56ce42d94f2c7e75776fcb4ab84fecc8e
SHA1572f71e036d1704b2f27955bed4adf59e8768d00
SHA2563f4776e46787f936d58d539a6aec70fb8d94af104bb74f9490a012910a6d1454
SHA51203f8596d1a1b5d8e05b77a454a7ca3efad0e20b16652ab9e72aa1a6ad4ee90ca9bb780cba0300eed822414a9c905e0bfdcebd9fe682ef6ca50c292bc9241e09f
-
Filesize
1KB
MD57e52dc42a2ec24d41406e3990ef75582
SHA13f3bf46735446cba9d6b76ee71704cdf1330dfa8
SHA256cc70ff5d6016c38e22f490120c49be9ac1509e1b0288e51d21746b8f570d690a
SHA5125e9fecb01d2ea2dc421324b718cb824c21e41360a6292ac24b3a535ec2654745fdf6f8a943cacd417a897e8e50d1ad6dd088fbbae1f4158ec2bc027d537cb70b
-
Filesize
218KB
MD597f3854d27d9f5d8f9b15818237894d5
SHA1e608608d59708ef58102a3938d9117fa864942d9
SHA256fac94a8e02f92d63cfdf1299db27e40410da46c9e86d8bb2cd4b1a0d68d5f7a2
SHA51225d840a7a6f0e88092e0f852690ed9377cf3f38e0f2c95e74f8b2ffea574d83c6154cccdbf94f1756e2bbdcdb33b5106aab946644dedc4ffaefb6bf57a866696
-
Filesize
1KB
MD5706113bf8ca16cb8e6b648df2561fca7
SHA18c8db9a11c1b168854e6b5f766b8a1015226fea0
SHA2566fe2691ddbe945c55223a67ceb0428136e1c0cb8c98f953c4ece6cdab6a3bec9
SHA5127bd46ebf9ecaabab0afa7940caef1dbeaf052027177ffeb7f81e33cdd175adeae070170a0b1f1431b2d8326fafb0afd823331aec108981140c28c1155f69df23
-
Filesize
397B
MD5798eff4584ed406d608da88f4e3a8a42
SHA13baeeccc54d5f12bad861361f9119839b88d42fc
SHA25607c18612ee204af6c6936f652b701fd105e7b2e7601df71dba9cd1012943dbb7
SHA51227e974c99fd3367d0a167e9be49ba41303c362c8f8af96d41b20ee9320d8b66db82e09f33ea39aba577c05bd56adfa2731c1567be025461f061be0f6151f38ea
-
Filesize
550KB
MD58b855e56e41a6e10d28522a20c1e0341
SHA117ea75272cfe3749c6727388fd444d2c970f9d01
SHA256f2665f89ba53abd3deb81988c0d5194992214053e77fc89b98b64a31a7504d77
SHA512eefab442b9c1be379e00c6a7de9d6d7d327ad8fd52d62a5744e104f6caa44f7147a8e74f340870f9c017980a3d8a5a86a05f76434539c01270c442a66b2af908
-
Filesize
773KB
MD574e850c1b96ea6266990060d5fbd71a2
SHA192e0ac0d0c42dfd52d1eb5838573eb92ef8620b0
SHA256ea1177ff6ba7180c2c10d54ee380865ca385f3a199b1d88ceaeb45c24cbc470d
SHA5129e15c0e22e126dabfb2a377c5add2fafe51ccfb103a5d9d2354aa7d95ac794ccbd6e6976890194a967d1a3dc2d9e373c88f1261be14b8308daf141b74127932c
-
Filesize
591KB
MD5824f974b1287293c6ade2e0b316e90e7
SHA13ece8018f0d06073e2f83f2e3152c1c914af9b8c
SHA25673f0787c040f54b8d41676428769d864a1d7fc021a642ae797ff98687fdb70aa
SHA512e36aa16aa4058f1072b4dfaf1eedc784882254fbea5e8f030b258df28ba28658b88757cf1bc9cfd5d20ae4257d810c6ec6ef49f9e7773cfe2b6f30e4bc829138
-
Filesize
614KB
MD59c2a34ced6eab8075ed6a4423ce88fec
SHA1e64c16f974f5a9b1a0cbb34a5b88989fddbd42cf
SHA25677517f47d00c15566bc1c0bd239a5345b287a0ed5fe070b37758aa2ad43efdb3
SHA5120e06760dc19f166382275e00f1d2982eb7d08aa37d54390d82695f21033dc49eb18a9347d660d6eeadcbb9c94f4780f1afb1c038a6244ab0d4d23c589d8120b2
-
Filesize
910KB
MD5e518bcc492366cbb6a2ec6fb36d2ffd6
SHA120bf1672a0e6a95a812a450a464f8f0e28e48a08
SHA256be76f4970391a67c018211fd1f819d00bbff3197475d443c4a4a8759247aa62d
SHA5125363a26af82dcd5d07be0cb543afa80bedc05405b4262a54e8b919c8f589e5016324273bfdcd962b90b081e6e9d1034baf83fe294a1fa2e1f10dbf4e54ee1e5a
-
Filesize
796KB
MD50b59ee03bea4c586ab993ec466ff537b
SHA1410bd1af58620b65d1b5aac3196d6c5cab8cce4e
SHA2562ab5729483146b572c10e628d8d18918484baba3dd1d3528650502b2af0abe8f
SHA512aa83f09c3b63bfe8f28232d04394da2e99a57f096e7e59384dbc4aefbd2dcb4dc94576c5d7987e472379aef93af4f4c4885e2eb990cc4198973ad598515860a0
-
Filesize
255KB
MD54f150630f0174b441aa2939224ff97e2
SHA11a5caa7d268ce367824641c8cdc4d718235aba59
SHA256fe82abe0a97766aa978fa3689e87318e81c0298a055b0bae97616167deb50f53
SHA512b1a9a597ff96094b5522035d383ae3dc39b14b68a5b91cfc00971bb9422b59e70b2bb6a67a64a5c0a3a0ffb56d18037cb43ae8c4a54d81c0f30a7dd03f4a51e6
-
Filesize
842KB
MD5539a245da6646978965f057c16979744
SHA103de23712dbdc6a19ce05ba4c5864511c17b6cb9
SHA2566f89dbea9a9e98b527032af933f298cef23dc51d64fc2a9b45c19cae253b573a
SHA512a69a77b01edb9fdb42d9594634420e19321c85ece06eae944e8c5e7e498a361f95b930587f061572d515f433ae269de10a5ef42747e9cf9bca754ab2c31508ce
-
Filesize
478KB
MD5e40eef6da5379cdc8512fba20b7cc298
SHA1b587e94b92e7ea5683b2b43e014c79ee1f858235
SHA256c53a72edf1b8bcf48e723156770a2a98a6d295720c790adccaea480aa908a489
SHA512a2d399dcd1d68b375f85725fb38aed512df1cba521020990b0d2193aa5bebbd207b1e22adeb942f35942cc560adb2a27a87f6ce295fe43b77f82245ea3636027
-
Filesize
887KB
MD587ebcf654f824204c74e9d8906d80191
SHA1c0f900cf59b914c43bf67637a8d9849c1e737a11
SHA25670c024a564e20759c6ff725a533e6b32c1437fea15a4b0976b04f579db7bc7a3
SHA512204b4135323ebe7fff8a2fe6569f0ee8eccb2a721048d9d1a744cf73d69e1ca7e1797cedad401e25e3ad5993e3e4d5805c391a825d37bdf237ef9883d2aa3d33
-
Filesize
387KB
MD53e4cc1472ece154b07b29b65a88e359c
SHA1583cc42dbb3104689fb363fafbf77129dc82cc25
SHA256fe5462c59f51315a24e5dc516a8e43ee3fddb35756aed3335e303cb5af8c4ce3
SHA512733bceffc8c54aec6e83861b335642e55fe7e7f269fbb95703859a7fcdda6ba5bc4152ef27f185296bda55008cedf251dfc10713914529f4368651ca8fbde2b3
-
Filesize
819KB
MD5d1cea7bc3e9fc6daeb2d7293bf8d0108
SHA16c37e0fe7c4c6876ff78e5b71f410789458f266e
SHA256ae19828dfe6b0cf1b6db199bbdf1167a91f6d76b5b29864f56527d48d936278e
SHA51275648f5fbb1804d01e818df07949ba9021a0f968200565d6bd1599c5f261db9e09e346047e6c4a27ccdcefe141d53f4e7811a3246970a479a186645e10dcd221
-
Filesize
728KB
MD5f15c385db0ae1a8fe317f67018e61f65
SHA1549f67141ea2a90b779b415f6454a38bbec46290
SHA256e6e7793a0368cc22ecb0b65cfcf3da2f9674617ede4a5587c0f0290250166359
SHA512cc484beee494e748d863e16c4c766dde30c47d289f846ebc4e13c2036e2d044040ba49f2046f374a681d3ab822794132041fa2e06501bc7151da5de8ec78c2ec
-
Filesize
584B
MD5506d14693c50f8ee46a9d1a713aa6caa
SHA18df348c1a03183d2ce001113de419adaffe6b2b0
SHA256e54260c2ca87909413a1ecb3e11d32ecdc001f4d369568c2b9af821072d885ff
SHA51210690b4b8310cba93fe4265b23ee8c39a4de55e81baaf6dcfa6f588181b9f616334ae9e52316718633c1c0ea19895119f4b30de694a427f6d17a139595222122
-
Filesize
884B
MD565b6e9955c1ea97338d8bbda78daaa28
SHA1239aab09e79ba50da9c05fdf55eb11f7bcd33309
SHA256088d7f9b5ec708e672d13dfdabbc7da257098940888c54bec1c0497512fdfb59
SHA512007428127629f915931c89e9c2dd4ab52390c31a39911d008708f5178fd281ca423aa05535c57e8f9eb87e56fd4bacadc58f2dfa790fb6f5714fcba90c570c3e
-
Filesize
1KB
MD5aae9bf7100e212f8b004f305c5aa2bc4
SHA16f8d7dd7afddddad83143a4219feb52e922b7cfa
SHA256cd2da87fb99fac55ee0523e611924f749195adffd7d2d7173b2445c91b459db5
SHA512074804c8e9a6b22183b6da39f78b9b7c27b57e2e3f9b8a3376414b14e76697eee39be9343e20a33f948d9875f3cb62e38597ab46e8264de320803ae33b780bc6
-
Filesize
884B
MD5310c2747165f72643942fa2de93683cc
SHA1ad07c6556ba0e0e79af75eaec242434a9489653b
SHA256384b3692353635f648e4918536428a4ab53fc89ce13bd5fe39f744f209490cea
SHA5125db17a2939cf3e9695e6b53efe2f888575c5649be28e3ceebcfdfd342f91bc32256e799a02e57cbaaf90793bc2e8f34959f71d9b69344521f9333f6476366293
-
Filesize
60B
MD50f89e44781cebceb8aaef14dcb0863dd
SHA1228bf523cbe7aff88074afb751f53c2536e9e161
SHA2569aa794b92ac2f733dd64e56dd70dc50bd3f2296a34cca794a9cc109f972903cc
SHA512b5d5b6fe314bd960d13cdb9f9f52bd4e8219375ac0742b7a8314e9c8ff6b7165833efa7bd36f5319d985f6810e32a26e3938453d77b27cffcae9e80856dc5a0a
-
Filesize
392B
MD576f9441cd1f204afea25942942045b48
SHA16ab57b583683c7d24d59e5a1999080da525d6fec
SHA256e80286cc5f94ade638d526068f9ce79071841ae312e4bc9c2625957f37e3e555
SHA51232b1f116b40275d348b436f36876b72f01b30a97da9d2e84bb61c310c4d225c33f4b7ed040b431821ec15f31920cdafc8234f71840e4f98d53aada0ee76fc2fa