Resubmissions
01-05-2024 16:39
240501-t531made97 1001-05-2024 16:21
240501-ttl8qsba3x 1001-05-2024 14:40
240501-r2ccdsbd34 1001-05-2024 14:39
240501-r1dttsbc95 1030-04-2024 20:24
240430-y6w1xsfc4z 1030-04-2024 20:24
240430-y6wp6aha45 1030-04-2024 15:19
240430-sqffcabf92 1030-04-2024 13:53
240430-q7akbagd9s 1030-04-2024 13:27
240430-qqa5hsga4x 10Analysis
-
max time kernel
834s -
max time network
819s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-04-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
WannaCry.exe
Resource
win11-20240419-en
Errors
General
-
Target
WannaCry.exe
-
Size
3.4MB
-
MD5
84c82835a5d21bbcf75a61706d8ab549
-
SHA1
5ff465afaabcbf0150d1a3ab2c2e74f3a4426467
-
SHA256
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
-
SHA512
90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244
-
SSDEEP
98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3x:QqPe1Cxcxk3ZAEUadzR8yc4gB
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops file in Drivers directory 64 IoCs
Processes:
cmd.exedescription ioc Process File opened for modification C:\Windows\System32\drivers\HdAudio.sys cmd.exe File opened for modification C:\Windows\System32\drivers\tdi.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\pdc.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\wfplwfs.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\hwpolicy.sys cmd.exe File opened for modification C:\Windows\System32\drivers\TsUsbFlt.sys cmd.exe File opened for modification C:\Windows\System32\drivers\drmk.sys cmd.exe File opened for modification C:\Windows\System32\drivers\hvsocket.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mouclass.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mstee.sys cmd.exe File opened for modification C:\Windows\System32\drivers\NdisVirtualBus.sys cmd.exe File opened for modification C:\Windows\System32\drivers\Dumpstorport.sys cmd.exe File opened for modification C:\Windows\System32\drivers\sdstor.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\dumpsd.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\ksecpkg.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mssmbios.sys cmd.exe File opened for modification C:\Windows\System32\drivers\tpm.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\NdisVirtualBus.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\nvmedisk.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\pci.sys cmd.exe File opened for modification C:\Windows\System32\drivers\scfilter.sys cmd.exe File opened for modification C:\Windows\System32\drivers\xboxgip.sys cmd.exe File opened for modification C:\Windows\System32\drivers\MTConfig.sys cmd.exe File opened for modification C:\Windows\System32\drivers\ndistapi.sys cmd.exe File opened for modification C:\Windows\System32\drivers\bowser.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\volmgrx.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\terminpt.sys cmd.exe File opened for modification C:\Windows\System32\drivers\vdrvroot.sys cmd.exe File opened for modification C:\Windows\System32\drivers\WdmCompanionFilter.sys cmd.exe File opened for modification C:\Windows\System32\drivers\ahcache.sys cmd.exe File opened for modification C:\Windows\System32\drivers\Hsp.sys cmd.exe File opened for modification C:\Windows\System32\drivers\vhf.sys cmd.exe File opened for modification C:\Windows\System32\drivers\filetrace.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mpsdrv.sys cmd.exe File opened for modification C:\Windows\System32\drivers\clfs.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\mouhid.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\mshidumdf.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\tpm.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\vmbus.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\afd.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\IndirectKmd.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\hidi2c.sys cmd.exe File opened for modification C:\Windows\System32\drivers\UMDF\EhStorPwdDrv.dll cmd.exe File opened for modification C:\Windows\System32\drivers\UMDF\Microsoft.Bluetooth.Profiles.HidOverGatt.dll cmd.exe File opened for modification C:\Windows\System32\drivers\vwifibus.sys cmd.exe File opened for modification C:\Windows\System32\drivers\gm.dls cmd.exe File opened for modification C:\Windows\System32\drivers\intelpep.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mausbip.sys cmd.exe File opened for modification C:\Windows\System32\drivers\ramdisk.sys cmd.exe File opened for modification C:\Windows\System32\drivers\SerCx.sys cmd.exe File opened for modification C:\Windows\System32\drivers\fsdepends.sys cmd.exe File opened for modification C:\Windows\System32\drivers\usbport.sys cmd.exe File opened for modification C:\Windows\System32\drivers\rspndr.sys cmd.exe File opened for modification C:\Windows\System32\drivers\CAD.sys cmd.exe File opened for modification C:\Windows\System32\drivers\exfat.sys cmd.exe File opened for modification C:\Windows\System32\drivers\hidir.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mshidkmdf.sys cmd.exe File opened for modification C:\Windows\System32\drivers\nvmedisk.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\ndis.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\pcw.sys cmd.exe File opened for modification C:\Windows\System32\drivers\wanarp.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\processr.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\devauthe.sys cmd.exe File opened for modification C:\Windows\System32\drivers\NDKPerf.sys cmd.exe -
Manipulates Digital Signatures 2 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
Processes:
cmd.exedescription ioc Process File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\pwrshsip.dll cmd.exe File opened for modification C:\Windows\System32\wintrust.dll cmd.exe -
Possible privilege escalation attempt 2 IoCs
Processes:
icacls.exetakeown.exepid Process 2984 icacls.exe 2880 takeown.exe -
Drops startup file 2 IoCs
Processes:
WannaCry.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SD59F5.tmp WannaCry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SD5A0B.tmp WannaCry.exe -
Executes dropped EXE 61 IoCs
Processes:
taskdl.exe@[email protected]@[email protected]taskhsvc.exetaskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exepid Process 3348 taskdl.exe 3364 @[email protected] 4192 @[email protected] 2984 taskhsvc.exe 6024 taskdl.exe 6044 taskse.exe 6052 @[email protected] 5660 taskdl.exe 5668 taskse.exe 5648 @[email protected] 4856 taskse.exe 2372 @[email protected] 2208 taskdl.exe 1532 taskse.exe 4576 @[email protected] 2216 taskdl.exe 1876 taskse.exe 1308 @[email protected] 748 taskdl.exe 3088 taskse.exe 6036 @[email protected] 3868 taskdl.exe 4972 taskse.exe 1492 @[email protected] 1996 taskdl.exe 5744 taskse.exe 3128 @[email protected] 5848 taskdl.exe 1532 taskse.exe 2156 @[email protected] 4696 taskdl.exe 1492 taskse.exe 5404 @[email protected] 5984 taskdl.exe 4624 taskse.exe 4696 @[email protected] 232 taskdl.exe 4204 taskse.exe 4656 @[email protected] 3752 taskdl.exe 4888 taskse.exe 5812 @[email protected] 6132 taskdl.exe 4164 taskse.exe 2288 @[email protected] 5008 taskdl.exe 5000 taskse.exe 2800 @[email protected] 3996 taskdl.exe 3920 taskse.exe 5952 @[email protected] 2488 taskdl.exe 2584 taskse.exe 4224 @[email protected] 4676 taskdl.exe 3684 taskse.exe 5012 @[email protected] 3268 taskdl.exe 5812 taskse.exe 3208 @[email protected] 5924 taskdl.exe -
Loads dropped DLL 7 IoCs
Processes:
taskhsvc.exepid Process 2984 taskhsvc.exe 2984 taskhsvc.exe 2984 taskhsvc.exe 2984 taskhsvc.exe 2984 taskhsvc.exe 2984 taskhsvc.exe 2984 taskhsvc.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
icacls.exetakeown.exepid Process 2984 icacls.exe 2880 takeown.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
Processes:
OneDrive.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx\ = "{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" OneDrive.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 64 IoCs
Processes:
OneDrive.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{389510b7-9e58-40d7-98bf-60b911cb0ea9}\LocalServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}\InprocServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{A3CA1CF4-5F3E-4AC0-91B9-0D3716E1EAC3}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe /cci /client=Personal" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}\InprocServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\amd64\\FileSyncShell64.dll" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}\InprocServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileSyncShell.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileCoAuthLib.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{6bb93b4e-44d8-40e2-bd97-42dbcf18a40f}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe /cci" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileSyncShell.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{7AFDFDDB-F914-11E4-8377-6C3BE50D980C}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileSyncShell.dll" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}\LocalServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}\InprocServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileCoAuth.exe" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{9AA2F32D-362A-42D9-9328-24A483E2CCC3}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\amd64\\FileSyncShell64.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}\InprocServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}\LocalServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileCoAuth.exe" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\InProcServer32\ThreadingModel = "Both" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\amd64\\FileCoAuthLib64.dll" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{6bb93b4e-44d8-40e2-bd97-42dbcf18a40f}\LocalServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\amd64\\FileSyncShell64.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileSyncShell.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{7AFDFDDB-F914-11E4-8377-6C3BE50D980C}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}\InprocServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileCoAuth.exe" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\amd64\\FileSyncShell64.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\InProcServer32\ThreadingModel = "Both" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}\InprocServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{9AA2F32D-362A-42D9-9328-24A483E2CCC3}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileCoAuth.exe" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileCoAuth.exe" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileCoAuth.exe" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{5999E1EE-711E-48D2-9884-851A709F543D}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileSyncShell.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\amd64\\FileSyncShell64.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileSyncShell.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{2e7c0a19-0438-41e9-81e3-3ad3d64f55ba}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe /cci /client=Personal" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}\LocalServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}\InprocServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileCoAuth.exe" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileSyncShell.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}\InprocServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\InProcServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe /cci /client=Personal" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{A3CA1CF4-5F3E-4AC0-91B9-0D3716E1EAC3}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileCoAuth.exe" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\LocalServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}\LocalServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}\LocalServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}\InprocServer32 OneDrive.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qqzdgoxbuofjdhb870 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\tasksche.exe\"" reg.exe -
Drops file in System32 directory 64 IoCs
Processes:
cmd.exedescription ioc Process File opened for modification C:\Windows\System32\en-US\dhcpcsvc.dll.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\FXSUTILITY.dll.mui cmd.exe File opened for modification C:\Windows\System32\ja-jp\sysclass.dll.mui cmd.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Wdac\MSFT_OdbcPerfCounterTask_v1.0.cdxml cmd.exe File opened for modification C:\Windows\System32\DriverStore\fr-FR\kdnic.inf_loc cmd.exe File opened for modification C:\Windows\System32\DriverStore\ja-JP\b57nd60a.inf_loc cmd.exe File opened for modification C:\Windows\System32\ja-jp\WinSAT.exe.mui cmd.exe File opened for modification C:\Windows\System32\rasctrs.dll cmd.exe File opened for modification C:\Windows\System32\uk-UA\Windows.Data.Activities.dll.mui cmd.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_ArchiveResource\es-ES\MSFT_ArchiveResource.schema.mfl cmd.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_RoleResource\es-ES\MSFT_RoleResource.schema.mfl cmd.exe File opened for modification C:\Windows\System32\WindowsUpdateElevatedInstaller.exe cmd.exe File opened for modification C:\Windows\System32\DriverStore\it-IT\netavpna.inf_loc cmd.exe File opened for modification C:\Windows\System32\DriverStore\en-US\rtucx21x64.inf_loc cmd.exe File opened for modification C:\Windows\System32\DriverStore\es-ES\scunknown.inf_loc cmd.exe File opened for modification C:\Windows\System32\DriverStore\ja-JP\gameport.inf_loc cmd.exe File opened for modification C:\Windows\System32\fr-FR\MoNotificationUx.exe.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\Themes.SsfDownload.ScheduledTask.dll.mui cmd.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.Windows.Bcd.Cmdlets\en\Microsoft.Windows.Bcd.Resources.dll cmd.exe File opened for modification C:\Windows\System32\de-DE\Windows.Networking.dll.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\WalletService.dll.mui cmd.exe File opened for modification C:\Windows\System32\wbem\cli.mof cmd.exe File opened for modification C:\Windows\System32\es-ES\uxtheme.dll.mui cmd.exe File opened for modification C:\Windows\System32\de-DE\comctl32.dll.mui cmd.exe File opened for modification C:\Windows\System32\de-DE\dwminit.dll.mui cmd.exe File opened for modification C:\Windows\System32\de-DE\smartscreen.exe.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\PRNMS0~1.INF\prnms009.PNF cmd.exe File opened for modification C:\Windows\System32\DriverStore\ja-JP\NdisImPlatform.inf_loc cmd.exe File opened for modification C:\Windows\System32\es-ES\svsvc.dll.mui cmd.exe File opened for modification C:\Windows\System32\wbem\en-US\iscsiprf.mfl cmd.exe File opened for modification C:\Windows\System32\BrokerLib.dll cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\btampm.inf_amd64_1d979ad4405f0bea\BtaMPM.sys cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ksfilter.inf_amd64_d8f4d2dbd92f9d94\ksfilter.inf cmd.exe File opened for modification C:\Windows\System32\en-US\msg.exe.mui cmd.exe File opened for modification C:\Windows\System32\migwiz\dlmanifests\Rights-Management-Client-v1-API-DL.man cmd.exe File opened for modification C:\Windows\System32\mshtmler.dll cmd.exe File opened for modification C:\Windows\System32\umpowmi.dll cmd.exe File opened for modification C:\Windows\System32\wininitext.dll cmd.exe File opened for modification C:\Windows\System32\de-DE\getuname.dll.mui cmd.exe File opened for modification C:\Windows\System32\en-US\microsoft-windows-hal-events.dll.mui cmd.exe File opened for modification C:\Windows\System32\it-IT\Dism.exe.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\NTPRIN~4.INF\ntprint.cat cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\HELLOF~2.INF\FaceDetectorResources.dll cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\hpsamd.inf_amd64_0784fd3ef0d7ec93\hpsamd.inf cmd.exe File opened for modification C:\Windows\System32\es-ES\CertEnroll.dll.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\dot3api.dll.mui cmd.exe File opened for modification C:\Windows\System32\ja-jp\Windows.Networking.BackgroundTransfer.ContentPrefetchTask.dll.mui cmd.exe File opened for modification C:\Windows\System32\de-DE\msxml3r.dll.mui cmd.exe File opened for modification C:\Windows\System32\downlevel\API-MS-Win-Core-Kernel32-Private-L1-1-1.dll cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\c_fsquotamgmt.inf_amd64_9205d32800f02b4c\c_fsquotamgmt.inf cmd.exe File opened for modification C:\Windows\System32\en-US\ResetEngOnline.dll.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\dxgmms2.sys.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\odbcad32.exe.mui cmd.exe File opened for modification C:\Windows\System32\de-DE\dafpos.dll.mui cmd.exe File opened for modification C:\Windows\System32\en-US\comp.exe.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\powercpl.dll.mui cmd.exe File opened for modification C:\Windows\System32\sysprint.sep cmd.exe File opened for modification C:\Windows\System32\wbem\vds.mof cmd.exe File opened for modification C:\Windows\System32\DriverStore\it-IT\btampm.inf_loc cmd.exe File opened for modification C:\Windows\System32\dpapimig.exe cmd.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PKI\pki.psd1 cmd.exe File opened for modification C:\Windows\System32\dmprocessxmlfiltered.dll cmd.exe File opened for modification C:\Windows\System32\DriverStore\ja-JP\netbxnda.inf_loc cmd.exe File opened for modification C:\Windows\System32\it-IT\TokenBroker.dll.mui cmd.exe -
Modifies termsrv.dll 1 TTPs 1 IoCs
Commonly used to allow simultaneous RDP sessions.
Processes:
cmd.exedescription ioc Process File opened for modification C:\Windows\System32\termsrv.dll cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 6 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" WannaCry.exe -
Drops file in Windows directory 1 IoCs
Processes:
chrome.exedescription ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Taskmgr.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exeOneDrive.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 OneDrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz OneDrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid Process 1524 tasklist.exe 5680 tasklist.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 7 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 736 taskkill.exe 3476 taskkill.exe 4988 taskkill.exe 2272 taskkill.exe 5512 taskkill.exe 5492 taskkill.exe 1780 taskkill.exe -
Processes:
OneDrive.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION OneDrive.exe Set value (int) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\OneDrive.exe = "11000" OneDrive.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133589823002233429" chrome.exe -
Modifies registry class 64 IoCs
Processes:
OneDrive.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{0f872661-c863-47a4-863f-c065c182858a}\TypeLib\ = "{909A6CCD-6810-46C4-89DF-05BE7EB61E6C}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{2692D1F2-2C7C-4AE0-8E73-8F37736C912D}\TypeLib\ = "{909A6CCD-6810-46C4-89DF-05BE7EB61E6C}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{02C98E2C-6C9F-49F8-9B57-3A6E1AA09A67}\TypeLib\Version = "1.0" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{fac14b75-7862-4ceb-be41-f53945a61c17}\ProxyStubClsid32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\IE.AssocFile.URL\shellex\ContextMenuHandlers\ FileSyncEx\ = "{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\ProgID OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\FileSyncClient.AutoPlayHandler\CurVer OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{da82e55e-fa2f-45b3-aec3-e7294106ef52}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{3A4E62AE-45D9-41D5-85F5-A45B77AB44E5} OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{fac14b75-7862-4ceb-be41-f53945a61c17}\ProxyStubClsid32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E} OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{B05D37A9-03A2-45CF-8850-F660DF0CBF07} OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{944903E8-B03F-43A0-8341-872200D2DA9C} OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{AEEBAD4E-3E0A-415B-9B94-19C499CD7B6A}\ = "IClientPolicySettingsEvents" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{AEEBAD4E-3E0A-415B-9B94-19C499CD7B6A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileSyncShell.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{6A821279-AB49-48F8-9A27-F6C59B4FF024}\ProxyStubClsid32\ = "{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\FileSyncClient.FileSyncClient\CLSID OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\FileSyncClient.FileSyncClient\CurVer\ = "FileSyncClient.FileSyncClient.1" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{5999E1EE-711E-48D2-9884-851A709F543D}\ProgID\ = "FileSyncClient.AutoPlayHandler.1" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{e9de26a1-51b2-47b4-b1bf-c87059cc02a7}\ProxyStubClsid32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{31508CC7-9BC7-494B-9D0F-7B1C7F144182}\ProxyStubClsid32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{869BDA08-7ACF-42B8-91AE-4D8D597C0B33} OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\TypeLib\{082D3FEC-D0D0-4DF6-A988-053FECE7B884}\1.0\ = "SyncEngineStorageProviderHandlerLibrary 1.0 Type Library" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{a7126d4c-f492-4eb9-8a2a-f673dbdd3334}\ = "IContentProvider" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{7AFDFDDB-F914-11E4-8377-6C3BE50D980C} OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{389510b7-9e58-40d7-98bf-60b911cb0ea9}\LocalServer32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{6bb93b4e-44d8-40e2-bd97-42dbcf18a40f}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\SyncEngineStorageProviderHandlerProxy.SyncEngineStorageProviderHandlerProxy.1\CLSID\ = "{A3CA1CF4-5F3E-4AC0-91B9-0D3716E1EAC3}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{5d65dd0d-81bf-4ff4-aeea-6effb445cb3f}\TypeLib\Version = "1.0" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{d8c80ebb-099c-4208-afa3-fbc4d11f8a3c}\TypeLib OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{B54E7079-90C9-4C62-A6B8-B2834C33A04A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{2EB31403-EBE0-41EA-AE91-A1953104EA55}\ProxyStubClsid32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{389510b7-9e58-40d7-98bf-60b911cb0ea9}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileCoAuth.exe" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{1b7aed4f-fcaf-4da4-8795-c03e635d8edc}\ = "IIsMappingValidCallback" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{8B9F14F4-9559-4A3F-B7D0-312E992B6D98} OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{AEEBAD4E-3E0A-415B-9B94-19C499CD7B6A}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC}\ProgID\ = "FileSyncClient.FileSyncClient.1" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC}\TypeLib\ = "{909A6CCD-6810-46C4-89DF-05BE7EB61E6C}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{9D613F8A-B30E-4938-8490-CB5677701EBF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{0f872661-c863-47a4-863f-c065c182858a}\TypeLib\Version = "1.0" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{944903E8-B03F-43A0-8341-872200D2DA9C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{2EB31403-EBE0-41EA-AE91-A1953104EA55}\TypeLib OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\FileSyncShell.dll" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{31508CC7-9BC7-494B-9D0F-7B1C7F144182}\TypeLib\ = "{C9F3F6BB-3172-4CD8-9EB7-37C9BE601C87}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\TypeLib\{C9F3F6BB-3172-4CD8-9EB7-37C9BE601C87}\1.0\FLAGS OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\ProgID\ = "SyncEngineFileInfoProvider.SyncEngineFileInfoProvider.1" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{869BDA08-7ACF-42B8-91AE-4D8D597C0B33}\ = "ISyncEngineBandwidthLimiter" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{8D3F8F15-1DE1-4662-BF93-762EABE988B2}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{f0440f4e-4884-4a8F-8a45-ba89c00f96f2}\ = "IUnmapLibraryCallback" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{C2FE84F5-E036-4A07-950C-9BFD3EAB983A} OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\18.151.0729.0013\\amd64\\FileSyncShell64.dll" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\BannerNotificationHandler.BannerNotificationHandler\CLSID OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{5d65dd0d-81bf-4ff4-aeea-6effb445cb3f}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{8B9F14F4-9559-4A3F-B7D0-312E992B6D98}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{049FED7E-C3EA-4B66-9D92-10E8085D60FB}\ProxyStubClsid32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\Interface\{B05D37A9-03A2-45CF-8850-F660DF0CBF07}\ = "IOneDriveInfoProvider" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\WOW6432Node\CLSID\{2e7c0a19-0438-41e9-81e3-3ad3d64f55ba}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{8D3F8F15-1DE1-4662-BF93-762EABE988B2}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{C2FE84F5-E036-4A07-950C-9BFD3EAB983A}\TypeLib\Version = "1.0" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{8B9F14F4-9559-4A3F-B7D0-312E992B6D98}\TypeLib\Version = "1.0" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000_Classes\Interface\{9E1CD0DF-72E7-4284-9598-342C0A46F96B}\TypeLib OneDrive.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
OneDrive.exepid Process 5592 OneDrive.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskhsvc.exechrome.exechrome.exeTaskmgr.exepid Process 2984 taskhsvc.exe 2984 taskhsvc.exe 2984 taskhsvc.exe 2984 taskhsvc.exe 2984 taskhsvc.exe 2984 taskhsvc.exe 4912 chrome.exe 4912 chrome.exe 5432 chrome.exe 5432 chrome.exe 5432 chrome.exe 5432 chrome.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
@[email protected]Taskmgr.exepid Process 6052 @[email protected] 5788 Taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exepid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
firefox.exeWMIC.exevssvc.exechrome.exetaskse.exedescription pid Process Token: SeDebugPrivilege 1180 firefox.exe Token: SeDebugPrivilege 1180 firefox.exe Token: SeIncreaseQuotaPrivilege 1612 WMIC.exe Token: SeSecurityPrivilege 1612 WMIC.exe Token: SeTakeOwnershipPrivilege 1612 WMIC.exe Token: SeLoadDriverPrivilege 1612 WMIC.exe Token: SeSystemProfilePrivilege 1612 WMIC.exe Token: SeSystemtimePrivilege 1612 WMIC.exe Token: SeProfSingleProcessPrivilege 1612 WMIC.exe Token: SeIncBasePriorityPrivilege 1612 WMIC.exe Token: SeCreatePagefilePrivilege 1612 WMIC.exe Token: SeBackupPrivilege 1612 WMIC.exe Token: SeRestorePrivilege 1612 WMIC.exe Token: SeShutdownPrivilege 1612 WMIC.exe Token: SeDebugPrivilege 1612 WMIC.exe Token: SeSystemEnvironmentPrivilege 1612 WMIC.exe Token: SeRemoteShutdownPrivilege 1612 WMIC.exe Token: SeUndockPrivilege 1612 WMIC.exe Token: SeManageVolumePrivilege 1612 WMIC.exe Token: 33 1612 WMIC.exe Token: 34 1612 WMIC.exe Token: 35 1612 WMIC.exe Token: 36 1612 WMIC.exe Token: SeIncreaseQuotaPrivilege 1612 WMIC.exe Token: SeSecurityPrivilege 1612 WMIC.exe Token: SeTakeOwnershipPrivilege 1612 WMIC.exe Token: SeLoadDriverPrivilege 1612 WMIC.exe Token: SeSystemProfilePrivilege 1612 WMIC.exe Token: SeSystemtimePrivilege 1612 WMIC.exe Token: SeProfSingleProcessPrivilege 1612 WMIC.exe Token: SeIncBasePriorityPrivilege 1612 WMIC.exe Token: SeCreatePagefilePrivilege 1612 WMIC.exe Token: SeBackupPrivilege 1612 WMIC.exe Token: SeRestorePrivilege 1612 WMIC.exe Token: SeShutdownPrivilege 1612 WMIC.exe Token: SeDebugPrivilege 1612 WMIC.exe Token: SeSystemEnvironmentPrivilege 1612 WMIC.exe Token: SeRemoteShutdownPrivilege 1612 WMIC.exe Token: SeUndockPrivilege 1612 WMIC.exe Token: SeManageVolumePrivilege 1612 WMIC.exe Token: 33 1612 WMIC.exe Token: 34 1612 WMIC.exe Token: 35 1612 WMIC.exe Token: 36 1612 WMIC.exe Token: SeBackupPrivilege 4444 vssvc.exe Token: SeRestorePrivilege 4444 vssvc.exe Token: SeAuditPrivilege 4444 vssvc.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeTcbPrivilege 6044 taskse.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeTcbPrivilege 6044 taskse.exe Token: SeShutdownPrivilege 4912 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
firefox.exechrome.exeTaskmgr.exepid Process 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 1180 firefox.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 5788 Taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exeTaskmgr.exepid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe 5788 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
Processes:
@[email protected]@[email protected]firefox.exe@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]MiniSearchHost.exe@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]OneDrive.exepid Process 3364 @[email protected] 4192 @[email protected] 3364 @[email protected] 4192 @[email protected] 1180 firefox.exe 6052 @[email protected] 6052 @[email protected] 5648 @[email protected] 2372 @[email protected] 4576 @[email protected] 1308 @[email protected] 6036 @[email protected] 1492 @[email protected] 3128 @[email protected] 2156 @[email protected] 5404 @[email protected] 4696 @[email protected] 4656 @[email protected] 5812 @[email protected] 4592 MiniSearchHost.exe 2288 @[email protected] 2800 @[email protected] 5952 @[email protected] 5952 @[email protected] 4224 @[email protected] 4224 @[email protected] 5012 @[email protected] 5012 @[email protected] 3208 @[email protected] 3208 @[email protected] 5592 OneDrive.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
description pid Process procid_target PID 3716 wrote to memory of 1804 3716 WannaCry.exe 80 PID 3716 wrote to memory of 1804 3716 WannaCry.exe 80 PID 3716 wrote to memory of 1804 3716 WannaCry.exe 80 PID 3716 wrote to memory of 2984 3716 WannaCry.exe 81 PID 3716 wrote to memory of 2984 3716 WannaCry.exe 81 PID 3716 wrote to memory of 2984 3716 WannaCry.exe 81 PID 3716 wrote to memory of 3348 3716 WannaCry.exe 85 PID 3716 wrote to memory of 3348 3716 WannaCry.exe 85 PID 3716 wrote to memory of 3348 3716 WannaCry.exe 85 PID 3716 wrote to memory of 3728 3716 WannaCry.exe 86 PID 3716 wrote to memory of 3728 3716 WannaCry.exe 86 PID 3716 wrote to memory of 3728 3716 WannaCry.exe 86 PID 3728 wrote to memory of 2148 3728 cmd.exe 88 PID 3728 wrote to memory of 2148 3728 cmd.exe 88 PID 3728 wrote to memory of 2148 3728 cmd.exe 88 PID 3716 wrote to memory of 1160 3716 WannaCry.exe 89 PID 3716 wrote to memory of 1160 3716 WannaCry.exe 89 PID 3716 wrote to memory of 1160 3716 WannaCry.exe 89 PID 3716 wrote to memory of 3364 3716 WannaCry.exe 92 PID 3716 wrote to memory of 3364 3716 WannaCry.exe 92 PID 3716 wrote to memory of 3364 3716 WannaCry.exe 92 PID 3716 wrote to memory of 5004 3716 WannaCry.exe 93 PID 3716 wrote to memory of 5004 3716 WannaCry.exe 93 PID 3716 wrote to memory of 5004 3716 WannaCry.exe 93 PID 5004 wrote to memory of 4192 5004 cmd.exe 95 PID 5004 wrote to memory of 4192 5004 cmd.exe 95 PID 5004 wrote to memory of 4192 5004 cmd.exe 95 PID 3364 wrote to memory of 2984 3364 @[email protected] 97 PID 3364 wrote to memory of 2984 3364 @[email protected] 97 PID 3364 wrote to memory of 2984 3364 @[email protected] 97 PID 4848 wrote to memory of 1180 4848 firefox.exe 102 PID 4848 wrote to memory of 1180 4848 firefox.exe 102 PID 4848 wrote to memory of 1180 4848 firefox.exe 102 PID 4848 wrote to memory of 1180 4848 firefox.exe 102 PID 4848 wrote to memory of 1180 4848 firefox.exe 102 PID 4848 wrote to memory of 1180 4848 firefox.exe 102 PID 4848 wrote to memory of 1180 4848 firefox.exe 102 PID 4848 wrote to memory of 1180 4848 firefox.exe 102 PID 4848 wrote to memory of 1180 4848 firefox.exe 102 PID 4848 wrote to memory of 1180 4848 firefox.exe 102 PID 4848 wrote to memory of 1180 4848 firefox.exe 102 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 PID 1180 wrote to memory of 2404 1180 firefox.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid Process 1804 attrib.exe 1160 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WannaCry.exe"C:\Users\Admin\AppData\Local\Temp\WannaCry.exe"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- Views/modifies file attributes
PID:1804
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 251641714508673.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs3⤵PID:2148
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE2⤵
- Views/modifies file attributes
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.exePID:5004
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:4192
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵PID:4808
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:6024
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6044
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:6052
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "qqzdgoxbuofjdhb870" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\tasksche.exe\"" /f2⤵PID:6060
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "qqzdgoxbuofjdhb870" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\tasksche.exe\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:6116
-
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5660
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:5668
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:5648
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:748
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:3088
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:6036
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:4972
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:5744
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5848
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:5404
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5984
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:232
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:4204
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3752
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:5812
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:6132
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:3920
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx
PID:5952
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx
PID:4224
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:3684
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx
PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3268
-
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:5812
-
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx
PID:3208
-
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1948 -parentBuildID 20240401114208 -prefsHandle 1876 -prefMapHandle 1868 -prefsLen 25459 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {444dfea5-8cf2-4921-823e-991384cee778} 1180 "\\.\pipe\gecko-crash-server-pipe.1180" gpu3⤵PID:2404
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2348 -parentBuildID 20240401114208 -prefsHandle 2340 -prefMapHandle 2336 -prefsLen 25495 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b28fc55d-ffb1-4fb0-b649-749fcab3d0c4} 1180 "\\.\pipe\gecko-crash-server-pipe.1180" socket3⤵PID:2456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3004 -childID 1 -isForBrowser -prefsHandle 2996 -prefMapHandle 2916 -prefsLen 25636 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8064e848-8bf9-4b00-bef9-78cdb5d3bce9} 1180 "\\.\pipe\gecko-crash-server-pipe.1180" tab3⤵PID:1868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1440 -childID 2 -isForBrowser -prefsHandle 3580 -prefMapHandle 3380 -prefsLen 30869 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8936909b-d94a-45c1-81f8-7bc5430c7e15} 1180 "\\.\pipe\gecko-crash-server-pipe.1180" tab3⤵PID:4584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4760 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4784 -prefMapHandle 4780 -prefsLen 30869 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {edf665b6-9dfe-4051-a38d-1891f83426b6} 1180 "\\.\pipe\gecko-crash-server-pipe.1180" utility3⤵
- Checks processor information in registry
PID:2756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5196 -childID 3 -isForBrowser -prefsHandle 5188 -prefMapHandle 5184 -prefsLen 26990 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a834bf4-34b9-4bf7-944f-3dcdd7415bb4} 1180 "\\.\pipe\gecko-crash-server-pipe.1180" tab3⤵PID:1624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5404 -childID 4 -isForBrowser -prefsHandle 5324 -prefMapHandle 5328 -prefsLen 26990 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7db67712-9664-4784-8e76-396b7a5bb2e5} 1180 "\\.\pipe\gecko-crash-server-pipe.1180" tab3⤵PID:2704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5532 -childID 5 -isForBrowser -prefsHandle 5608 -prefMapHandle 5604 -prefsLen 26990 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a94c9cd0-ce09-4a00-8b4a-8333898d022e} 1180 "\\.\pipe\gecko-crash-server-pipe.1180" tab3⤵PID:1708
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3adbcc40,0x7ffe3adbcc4c,0x7ffe3adbcc582⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1728,i,6644248410462700231,10917058003093932052,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1724 /prefetch:22⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2104,i,6644248410462700231,10917058003093932052,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2100 /prefetch:32⤵PID:5128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,6644248410462700231,10917058003093932052,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2196 /prefetch:82⤵PID:5144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,6644248410462700231,10917058003093932052,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:5376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,6644248410462700231,10917058003093932052,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3784,i,6644248410462700231,10917058003093932052,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:5672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4628,i,6644248410462700231,10917058003093932052,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4724 /prefetch:82⤵PID:5844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4756,i,6644248410462700231,10917058003093932052,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4424,i,6644248410462700231,10917058003093932052,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4444,i,6644248410462700231,10917058003093932052,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5148,i,6644248410462700231,10917058003093932052,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3300,i,6644248410462700231,10917058003093932052,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4412 /prefetch:12⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:5504
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5908
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:5652
-
C:\Windows\system32\NOTEPAD.EXEPID:428
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4592
-
C:\Windows\System32\cmdl32.exe"C:\Windows\System32\cmdl32.exe"1⤵PID:3576
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Drops file in System32 directory
- Modifies termsrv.dll
PID:5504 -
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
PID:5680
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im2⤵
- Kills process with taskkill
PID:736
-
-
C:\Windows\system32\taskkill.exePID:3476
-
-
C:\Windows\system32\taskkill.exePID:4988
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
PID:1524
-
-
C:\Windows\system32\taskkill.exePID:2272
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im WannaCry.exe2⤵
- Kills process with taskkill
PID:5512
-
-
C:\Windows\system32\taskkill.exePID:5492
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System322⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2880
-
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5788
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"1⤵
- Modifies system executable filetype association
- Registers COM server for autorun
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5592
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:1396
-
C:\Windows\system32\taskkill.exetaskkill /f /im svchost.exe2⤵
- Kills process with taskkill
PID:1780
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\83be7c5f-975a-47f5-9584-8a0057123da5.tmp
Filesize9KB
MD5f3a90f35be99173f3c2f3588c5fd7dce
SHA111556b392649db36807dd9c9bf5c3575479a59cd
SHA25638a052a26430622120756b27bd5dd4d5c3d0952eda90ed00623b7238a0ce429a
SHA5125361b1c09ae230c44f4f93e2002298ed550938f793dbcb0272a83fc1745eb47939e3a5d5c9d146c995580aae7b272544719e6acf9885c515dac79bdaf4500e88
-
Filesize
649B
MD54d4ca22e1a2a704b0b10eabbf7791d5a
SHA1c9695670b04eb0f1744ba823f1c0c825cd9ed550
SHA256b1ef32995bab84b708709e3ac967f0f511e92cb68d9527b5c20febcc60459efc
SHA51298398724c9816569a1cc6ed3e95725d36cd1227f944051d43f6c4e584378b860b90e0b9e422d5a64f0d5dad8556cdd6620d2a2e2296e94d20b5e134cfba8140a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5f9985d96c946ec4fd02999beabeb32c6
SHA1b5677affff20a57d93680b0a547c338fc1467e3a
SHA2565e6c02de39c7faa1cf934091d70a5194eb0918a088518f1257bf827e8159697a
SHA51210df8f18f4328add2f0aa6ff59ed01ec518772272290ca653bbfb288e6799dc7a396d8dc5af355223c1ebb97bb93a785fbd1c34c22f63f392bea9a3b41763ed7
-
Filesize
9KB
MD592f65e887c68a9b8139c70e424ac243f
SHA1cac83d6387d5b324033c0f5df96419457c0ff8ba
SHA25697c916cc05fd7fd6fddd498fc4d5eed207328ffa118ab19413d562d8435db342
SHA5126e07db8bb7b496a01252b62e197c0c481fb1283b0880fb1309cdc810ba8002218fdbc317c13d146775bc9e94fa9871ad5ee6e1ecf8f2ff92a32e9d3f2663bbd0
-
Filesize
9KB
MD551fc9a302b1dc38a75de0e30d540c76d
SHA188a214314ed4f493a1eed71cd336dce446ca070e
SHA256a565d34cea22beb02c9d5a2ad3f15f824c1942e7e5d66388e9ac47dd7cc9053a
SHA51234df3242c5d3e2fe3e84bc07a7f19d69ead1198b584cb9315afc3ea26e4557ede906438177f3d446f3710c85b59246e959b51b24b3fac99e04874a1ae717cc86
-
Filesize
9KB
MD5351188f2ee31b56800bcc0443d8fb72a
SHA138db16519e5a69355d94da2df971e862dfdad5a4
SHA256111ff983e05838585f594872a34aa739a80e3bc82c92216eec06b4be14d70e51
SHA512f75e0c972b692a8ec012e10522929b209f028638883da5b5a38c1717760f17afb255965c5d96df9b6c1c5a5217b793fc2e60ba02d2f450d0125ab9424dda4d3c
-
Filesize
9KB
MD57af9a7b7660c756fe7976242fe58fd0a
SHA131f0874e6f3060b159a8a1ea23d4a8ba8e5d99b7
SHA2561185ac2a81a6c3abb48e0abe6d8cf0d9b430f075e5a4cf6650a5bd3cce4012e7
SHA512f58656ca9874d04b78c178ddc4e69f5aa09085ba48242a71a6bc12197fceff20bfcd6e53442b321fed35084cb119e772a95cc8bcec96cd266337d306b207fbfb
-
Filesize
9KB
MD52dd98243942bb093b04e88d7a94d0b9e
SHA162131e84d59fb65ca1fa6978579e1aa47a5fe9f4
SHA2566ad10f21867b4ec5b4e34247eaa39a5e3d9ed0fb01962b9fc8b9505d69ec3221
SHA5129d1719f27ac92506d9a7271477d99d0fcafd9889ab9e6c354d73c14910caad3f6ee63eb7f8cf049696373d9ab0a75b61c810168b64092e779e05d17bb23218e8
-
Filesize
9KB
MD58cb43093955155a451a77062b476feeb
SHA1d56e07664e6562d700c8e515ee380e3a9a16f7c5
SHA2561e9534946c44d6b617a5b2095157f59ceda5efb93ea7efd926d3fa579f713f01
SHA5126ac13d0b612d5816d9787ed4d60fed34a6ec54b36bd97b89db427f5412558a3325f1f2a130ef860670940513822d9cdcbe77193b6b2dceecd3d3b8aee8a5f65c
-
Filesize
9KB
MD585085c555d8c448ff339fb16da31b87e
SHA1feada0f612b6c73f3b2be694aa7f0535d0716c04
SHA2566493a264da97338feb3b81e02bd16a13ba2f022f970ae1a45043e14cf43c5479
SHA51227108f9a30ff6306603a96054287397b9906d946259ce4b19f3babd3544a3d979820e11f9caaa1fdc2e70103a66423ddd36c69494ce22d766e0f7541e5ac88fa
-
Filesize
9KB
MD5cb3df430c0c832d3c44669f88669cacb
SHA1713bb80ae7760674a94c551164a0c445594cf73d
SHA256139f8f46c42d13c3307da0b3fd8db6206ab879bc1cfccb644153a67fb462cefb
SHA512bb19b566d86ccc2c30f0f9d41ca06c97b56da4bf9f42417518c21f6a1fdac4e52ffc24f685e33b18892103432ddf80531bbe858df92b2b6e26cd7dd7ee97b6e6
-
Filesize
9KB
MD52ebfa5e46635d605ac91e17a4b7cceba
SHA12a1af45aa9b44a5aa644cdee37c845851679ae3d
SHA256ac44ea3cdab8d8d108bbb3509eb9259efb0bdf5bf128b3faa8ad93f0c80d2bc6
SHA512abe5ace0b4fe666204ea80824854aeba033b397326d31990c8f576304d9ee7bb61a4b24c6ebeaa7bc987858a8fafe9431ff2f2d7785ba0f3115fe9c61c44812c
-
Filesize
9KB
MD57dbacc37976da029c36e8fcb0ee8cd7e
SHA1d1064111acfa7d337a5a1765cc0625ee676a6388
SHA2569eda6d12cf2c0711d921976bd84ad69e0a168f33e77802279e73de621edea3ef
SHA51264e9eac22d1e3a91a92016cda56a9c13dc007d0e6ac5e122f283972883810be24838ddaebfdc5cc359bf5df7d8d184eda446ce03e482da2546aeac8fcb708a15
-
Filesize
9KB
MD5e9a800e9fb682bac3f12e0f19007db2c
SHA199d1301669b8695ecceff2aa4ce144f1f01e688e
SHA256ac8223edbc9add9612369f18d95e12fec71c8b917ce3e13ee1be1149e07d2739
SHA5126799ce762acfcb172b451bce04327ff7846216b7f7cdc4d580e4ea4e406e4ee53af148a0f18c8c4e3b01c927b46c54232d94801d0ef248454d190c6c410bef24
-
Filesize
9KB
MD5ccb8a503657171c1b2932adcd01835ff
SHA192881539cc133a532edcbd3007eb6219dd56b39a
SHA25652213c9813db7d57633f7e58b71b204e1ba1d2bd9e9e01b9ca671f6b7df1dcd2
SHA51205be04a35e99fa610dbbe102772a29545480989f298bd73f21604bf65442bde9ebe153e150ad0ea0d643ecdc4a33955ff2a7f5ff34d3da7f034712fb7413a952
-
Filesize
9KB
MD5e4199ebbb8a2503fddbe46b9b86fc5b8
SHA14accc18c652afabd3f1fe129b6680e53051748cf
SHA25615870be72ccb98c979adf91144236f30de5e8510044cb480d7729fbfcd9060ef
SHA512ca037997a435303ee31e922936f5191b9b8e8cf7c1de8414336da7ce9e9ab1bfe8dd26ae6a57a6298f2841f4c3b535d70b1bf3870fee64b6b690ac42c30fce94
-
Filesize
9KB
MD55085cbe27ed0379b7d4ec37d7ed798f0
SHA10e6a5e2c4424a12adaab1f3a6329fd6a52ff059c
SHA2567b17ebca651cb3b1088b0b39287c813c37715ba96715d87358710e517264af6c
SHA51284da255f6536569a2cda2af18a8683d468aad8e283d57af94eb9d6eb4d3115d558ff41848e34ffc923d1187e479aeb1dba2a5a27180b2513c34a43a9d68e840f
-
Filesize
9KB
MD550653f3a183118dd891f79d321cb348a
SHA1a5e76bfcea70034a286ecce0b8d727f32fbbb084
SHA2564ef6a8ebf7a69b8951ded45a50d5f4949d719c7b57a3ada83dacba6d48671d77
SHA5127e61314a5d9488d5002c730f107e750b8fe962aa02198fc7d0b957ea17a3e63ba08194d7853bbff13dc2d5a8f227a2ccdc0648d12b829c8fee925d208c5ace83
-
Filesize
9KB
MD5a058035daf3e9bc79e656a9791902c18
SHA1a198462cf4cd9dab4a2526bace2ce3136529343c
SHA25691ab6bd8c0084cb71cbec9cd8c22c914e2c77e949796416d5dee471b92f7a241
SHA512e3b4dc0fd3bb8c226892e6846bb5ca76be203f67e45706b68b8d4e26274355e393bd7b44d246d6a3aa46d46facf4c1e4a7abdb8837b0c5ea181fb8492fc6bcf0
-
Filesize
9KB
MD5aaecce81452dad80258df5fffa04c318
SHA1f5e9edf5f62c286068645e864682d05bc49edae2
SHA2561a2fcbf8fa08769046d42d01fdff2278e6e72a220cb585ca87fe9113dc5fcae5
SHA512aea1aa5238da1f93c008759c6877f4ab245ef7b778426a12011dc73ce9171cf043e7aa6324a22de6062dce0290a7f7a381e5bbf02ec2706271ef975ff6b07330
-
Filesize
9KB
MD5fcbe1a78d7916734cc375569177459a0
SHA19478d488657bbebe47dbb170ba498d9af359bb8a
SHA256c3d68fd70893d358432a811d745b8086994316cba5498b411434bfb07368ef87
SHA512a8c22c96cc009e6412a049980a09a7f17af6920384a57b727645289e476c9466b103ebe82af993e392a1f829d7f7e73198a59addb274cb8348e2e5840871dd28
-
Filesize
9KB
MD524c9579e2517c8d8e42ecdfc460d5138
SHA17b547b97753237dc05b71d8e49be1f5cf377249e
SHA2568970f13295713ab396620834908503e571ddfd64097ae0c02c2e50d3e1a83ed8
SHA512cc6333e3ad380cc9658ac6b097aa270fd7076af0551b9a9da8fc3218396e28daf75cc999d5c44e5c6513b7167ebb2c5e402d5d745b0188802e564bc9b27194d0
-
Filesize
9KB
MD55a2ba43d58079cc3e8bc413b5ae666a0
SHA1b3ae4370bc758d4020210c394f135c0a1759ab79
SHA2567ffa4d3606b8ae27266a4becce74df4676a082bd61a580c57c85eb5f156db4d1
SHA5126796eb9ffa9da00a98cb64b6ca5f81f9b5d9e7f8180f25f98a7905a60896607077992a13a8e6747b0fcc0694ccc98cfadef64a493925826031224d997d389a63
-
Filesize
9KB
MD5b3391df000fd8d353fb605a94501d544
SHA11cb009634137ae625db724a9e71dad63942de529
SHA256479530b700faee84aad16cbba6a256b7e88ea83c38772545eb6de5066195ccce
SHA512261db2acbf5bb882f8a7d995d669cfb13ccaaec68a93b51dee500d024ff051fcefa3d1dbab7323bb0e370bf90d7532076b8f532b442f1cb75a4dece32bb6543b
-
Filesize
8KB
MD5bf9aa8b49f424239353fc9b24f3e7caa
SHA11f0054636dcd89a804c43bfc2184aa7ce68f67f7
SHA256b187fa3a63c0fbfad2ebdce51c7a4ecc86705f57f290fbc49c0128b4ffc453b8
SHA5123f5eccc52b538f6256c249726cbcf40993bbd6deebd19513bf2fd71f8910ac1f2dd8c6869a0decde7186a60a8027ca9834c1c48908178ccef146c0a47232b321
-
Filesize
9KB
MD506dc5730d17b0ce85d8f4299c69b397e
SHA1f7c291b1385f62fcddfa0abccbbff8698cc3a610
SHA2566d14792e32f720768d0dcd97a101bdd14c82d9ad90602bb605b5d5eccdc697fd
SHA512478e648c41a34523d050c3e9c389f79a76bc34fe236527503483c5f302213659019b1a06c3763fb57a4a8732a80538ff5a516db400665bea515c5842638b18c6
-
Filesize
9KB
MD590486e504bac04eb37e382c21180a9b6
SHA1e2eff72f19faae7f60431e3b333d22aa2cc6fbcd
SHA256cd378319186501c16b34103b8cfe88d0e0bd9882cc491d07398641365ed36c45
SHA512762078cd65e234b93ce4ba3e7eb9fc295d555795265e98494fb2eafc80e4e8b1960b3a224305aa1bf15b8073b1f84b90806ded18df9b70e1ac6a5593d2c4021a
-
Filesize
9KB
MD5fd50df1ee9150b1fe48954d25db74342
SHA1fa0f4202979b1f861cc602733947e474792f8996
SHA256ec64424badef3cf58730441f100bb3aa79d0ea9d6f55bd1ab440e0b429d4f413
SHA51253793c369258b902fe06e82e10958529fa6d523ec611943682c34730154ce094cb29fa394354e6ba0a68039c0166a7e150be4fa7a4d7df49e8a2530979b7197d
-
Filesize
9KB
MD5c7dd17305e670112c4f11a9ec9ad1d70
SHA12c7e5d5c50b9b6eb421aa4e6b905be65dabad470
SHA2569569e3ea0427068e04e0a67276c9ac938661b3b48878a5221fed2d7ddb23a183
SHA512eb08dd58513f3a5fa81dffae0671e6a0c3d147c800f78753983348496f47d5483b0d80f7949a58879ef8362739fa287941415897e04cc3838fd60b0503487862
-
Filesize
9KB
MD560fbd8337a85f13ef3373dae3ef190e0
SHA11b357c1f992c962d0f6b84940d8a2b69b8fb1ede
SHA2567d8458bf2079ec699ea233e8fc9baecf499d061a264cfcdcefae626ce14baf97
SHA51254a5fc1025f03954d100f292400c593c599999c738fbd28a80040f983d3593697fa11d69ae08335bd56a5d0201532214e0b2dca00dc1ac16096d0dfe17a03a05
-
Filesize
9KB
MD5717bcdc95a8c3127d120a8f4f4facc26
SHA102a2c1fedc7c629125ba3760f19e1915f119fbba
SHA2565e4af2f005fcbad592039dc3797be9b1fb7d7e5de0c481711206be7eac1181b8
SHA512797b6a31cf77c340a673e836af1284e09db877d3d87edaeedb72ee0ce1d7274952e23de6c45848caf93d15752d8f17517e944819d851c162569d4d6014bdae1b
-
Filesize
9KB
MD5015ef66f7e47d22a13877a751a9ea979
SHA161323069e70ab8c9eecec81ec5a281041edd7dab
SHA2566ce6eeb5e118c8a90c37fc5e707532cceca7e67c2e3d2b8278795564766672f5
SHA51240810638b41af27b8d9878cbd9fd886b8d2d99a6ce3971c327ccc51dd8f7a99bec8c738a3367d04cd32e9af0e9201151ade075417aa2b1c3091c34e8e21c1512
-
Filesize
9KB
MD50b9dd11837881a885b41a5bbc80131ef
SHA1c448999c78650f6dac7e5df4dae5c7735ddcef0e
SHA2561a3dfb8e667c6460029196813b722f768628db90439a2b6859507d6c3b3f5637
SHA5128bae9e8417ff0133e602802473616b313efd62213d143a84781536485d760ac31e35277f348a86e47939367d5407da1637cfa7781defc316948a181659c163f6
-
Filesize
9KB
MD585efe55fa0dceb6b88046bb84abd9c83
SHA1bacf4c4d4accbe492316dc546be93c997a74aa52
SHA2568322e831b21adc6c1c6537217dfe5c2b6b58453fba016e58459371231442ce07
SHA51288f11c7e02de3ad04fde9a6618a0fa1913f27aae75b7318d0c19a36ee190989f9d002806dafe2e31d76ae5c02430488d0529985051b12c0862aab35ef296a757
-
Filesize
9KB
MD57ea9bd0935fc9b21c9707a84311b9344
SHA10540fea62b097cc5a28997622b2979116dc11796
SHA2566f107f0388fe7f6be678be1c87029d5452fedec9308a008d867ee48a8d4e1413
SHA512fd9a28d63dafc92e6de5b033316bd5c7327277a14900ca23ceab4fa157d1f550eeb26b3c5b220050bc56bc5381836cf1a572c6604c6b98f2573984b4fdb601ad
-
Filesize
9KB
MD51761960417960b99685fdb99701417c7
SHA1ec1440b5864e35ffe4dac4c28fb65c7358cbc548
SHA256f9fb38dc1dc2c8219dee11c849d1f832596d8d5de253f0d1fd4dfc055b82018f
SHA5127fa2cfe09cfcee0b29749a57574730fc2229b82b956c41136c0e45686f34455a58a37dd00743d4ee2f81d3c5e6e939615d49f471350a503d993029dbc1fa79ab
-
Filesize
9KB
MD5e4a35b33d456971919a33774b09580fe
SHA1b4da681d29343a7c319fe0509d68f2bbc75cff8e
SHA256cda1927798874ec00b49d937424a3557a0f6732111deb5810bc343af94305855
SHA51200892bfb10138b99019ace0030d13f8c4c81f01b3a84c41d4bf9cf4d466f5a87e1673ee0813a8472106b415ceb56035ce58394f633f9e88f34569f2ab717dee9
-
Filesize
9KB
MD5fa80ee1ca6b9b8458302e86446df2e1f
SHA1f386250f3d374735b6bd934e26e1e5f7911ea710
SHA25661b633bed04679b5535cda8715460b0285e4face8beb356b42b6f32256d727da
SHA5129bfa2325c746f4a0eb540482ed3b6f04aed39521a3f4b0b79a27ce6891c038b025ac8dfdd249c5e11a5af6d6207b1ab4af5c2783a694cb4a091bf4fc6eddd8f5
-
Filesize
9KB
MD521afad61d84c0035bf937ad69de9c1cf
SHA1ef48555cf3c618dbf5e87afb8dc9f51fb91f5aac
SHA256cfcf63e7e6c8844a0bc7ddca4dd41a90a94880c43783f5d26e7d6414a36dc3e6
SHA512c289e9dc9b30014ecbf4d8c3a5bace4f0b045b849deea66ba3ebe188d44fa1602b3171bd54fcd67d5435c00eabb05c0b0c821ba40d660064f1deaf22e1633ea3
-
Filesize
9KB
MD5d0d6d894367022fe00f8b842d3a4bf90
SHA1bb5116db6a863cfb649912fa298d1c66b23b7e5a
SHA25608d63e963d90ff2c07d8ff03353c8d179a04b61a026853e8fe5828f94659e629
SHA5122bfe797f09d719d463b427b2929969900ca44d255e00562fcce0a7b021a5e9f6e3e514b734ef09cb0c186f585025f2658582e11de10226c5f4bd5f8dbedaa52f
-
Filesize
9KB
MD53007692ded13aec119076a5e363bf423
SHA155d448a1c983094908c5c3de8cf1e4bb11515ab5
SHA2568dc24e1d4a58b8076c2c56041724de20b7b9d47f1547f783ceb0bdc2cd04cfad
SHA5123378742ecc3f28842089cf63aaff4d1a508042cf0944779f2331c36e59cbecbb23ec07f5c3a0b1be4ef78966b1a90d30c8f06ce11da85a19fdf47591c1bbf454
-
Filesize
9KB
MD5c8fa55abd2964406e98e8d1ad454dd2f
SHA11a77c1441eab8af87c6c6d8f36f5c1ce917e8a10
SHA256803047043ea1f57a7bbc5cdedd7f037edb5868aa43f93df1dcfd7060a07bb871
SHA51299334dd40323e7d3e97c5cdef05f1f37657f858ef5aae47ac6bb6216d6a6b116fde30a3c819b2df1c07048effc11d8c18821945e90493f32b837d2fc0ea2e398
-
Filesize
9KB
MD5017ac2946d794f919e002823e28d550b
SHA1d54190109c09721bddf0db66ca27614d01381283
SHA256c7411083884d19bc3edd4583ed6114b4dbcaf19a24712481ab78c71493506d93
SHA5129de7a5870cf0303a41eb76e75bd62fa178716d8fada6f43f9c9f554ffacb96be3271de20097ce72e5ed956c148bc9925098af99f4ff721cfdfc437eab587bc9e
-
Filesize
9KB
MD5563a7834e3d6e0e517baed543972a5e3
SHA194cc1247f7fe8dfe3d0d2acd633120546d9f5231
SHA2566757779f66f5b95672b07ed4eb951a264016466048d3d18f13c7af58dc8b9929
SHA512556f0cc94f9826ec4a83bdfff30d592dfa60b0348bb881923e91f5879498fd70c2c246d26db01c62475d0f389cee7616155f255fc8f2b5451f8dbfae1272ac17
-
Filesize
9KB
MD5a90cd2c8b1374efca90b55cc07f668e8
SHA1bb7213cf9c5acd55c2be13a60c5f1c3dbeb09ee8
SHA256d24aebc40e24faf3c675a627217248b611e4cd98ad299600774a52c9bdbe00a1
SHA512819497fb8f826cc161b061941237463dfd4ee38402f39cebca136dd0075fc4c35aaf5bc03aebfa8ad0ec5b68fb0e86fae46e7718284a78a8ac78b413daa2736e
-
Filesize
9KB
MD5bde328f67f6697aed5243c3e27072383
SHA1c9e6b7347440933f72fcc39e645f5a68c0bbf7f5
SHA2569112b77855bd819ec63c8c3c32005a6eda5226038e84522b3963dd33fd13cd19
SHA512e05f3072f62e3c1df73977588b2f1bebdcf700b732a973ae31acce0ece53b5c365343e67cf438f7acccc48c69a61d13da6e8941033432f422c3a389ed7a4aec3
-
Filesize
9KB
MD5b136b81e95672a8f649606ddfa7e5174
SHA1c74d11d4e79d5a70a8f09f1f5640672eb2d00fe2
SHA256cb91fc0633942aa94cccbbb391d35e0e3213360fdd8491ed7221e3bfad5a9231
SHA512d7846870bf5315cc581bf7334284e582bb041d1e66c054a1cfd58fccd5aab81e1ac7e2ff97effdf58b01c9658a258ab2ad0302f1ea96e6d0f7a59b82d5095934
-
Filesize
9KB
MD55dbc7492716d8073eb55f7d39553472b
SHA1cca0e42b1aa59bf94381e881d6d0c30bc9bf9cae
SHA256d0b487b69dcb7a0cb75f1cbb0bafb3ffcf5dcb31145e5eea7dc1009c493d6d3c
SHA512a8b248f5c70d9842b1ddef1d17dae35e1822b72b961b28a116ac16b9b20019d2b68e3a62302cb972f4934f02bc501da88f9ba23f08284ba33c8c7635b8917059
-
Filesize
9KB
MD5bc02b65cbeecb13063218ca3ef6cd16d
SHA1428e355cdf9463ce4fd1fda0878c9e0c5e426632
SHA256416955134d59f11fa24f512cc3d144fae6c28031eac5634ab2372ae393c3effe
SHA512de63758165ddf7864d9f64a6fb51cd36b7e6958495f0219f532133741155d717676520c27b0c3460d6e036f37623870b446b82164c9be09f402aedcb1bf9270c
-
Filesize
9KB
MD514a12ed07d73f18c8f07a05bcc05e81f
SHA13b10a157ac0b4bfbcee98e63f6cc6ddaba546717
SHA256f185e2642bae355fb8205db7d996b14e0daf79fa7b45814b9ff0baa76d210c41
SHA512cc927d61d1432ebf353a767617be0b617edeb51efdebc9c3d96243a65f777fced39c1e5f3ad4479a8ed9ed7f9b9d51b98ef29898b8bae138be80a0d03b37f46d
-
Filesize
9KB
MD5bbe2a5bb708a902707cc9e6146401b6f
SHA160094a76c67fe26d39d7e2774544e5af217d43fe
SHA256c83dde78c5a37db523517eb528060ea9af5bbda4a152ffe097ef592e1ead2782
SHA51217133e5645c72e3a86b5015083310caabf6b55bcba770fb35bb6415099c80790d850aafd7e437403dd4bc98cfa32c33ecf36d4f5e41199db134f173c5d1128ac
-
Filesize
9KB
MD51f91cadaa89d58b7e1cf7f19388a813a
SHA1c27644468fec0ef8d49f944070d08785243d3303
SHA256df86ae8bbaa170f81bc272c387cd336d04c9d2ad1cb66b98fc432580a80036ef
SHA5125702691f1f163082f3c7ff74defb72bb2c9908c03648e8e0e2792ca94516cf68c82a36212953a132a080c5b32c03f02e420a176289cfc780c27dc22488321639
-
Filesize
9KB
MD559b52997f9cd6f504210a1006f62d2e2
SHA14698aa731f0c66bad574e63f4fe5014c9277c277
SHA256e04c41b795dfec136278251fe2d13642e0ad5622eff22b790964c7319aca050d
SHA5129b90b43717b5a81e726a5369cca2d2e5bd7b421507a102a8c4505d503408fd75584932f42d8522de6cbdf9d3ef9a83094e1ae13210edbebe86ace7b29086a9c8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\eb36a384-8a63-4bc3-86af-09a862ce00e4.tmp
Filesize9KB
MD50481eb723a88b01b5db685430f3d87b7
SHA11a022034697bd16ca78dc84dc1c4e29e83e0b898
SHA25613fb91ddedf3f7ea2d8c554667448c24f62120345ae3fe4dcadef48df1625124
SHA512dbcb768dd42df139aeb698b718d1089e4380d6a7017a8a12097e0b5e354d1a27424ce8af37a134435a4f12ffbf8b8b19c2f3130b383a643b7be7a5e0019922a9
-
Filesize
77KB
MD57a96ea92103a27a3bdb6431b9a99b47d
SHA17d0a9fc9206e49fb58933e30b109ae29d347f798
SHA256de768a2085953c8f97553a2fd844218a9fc4f18835adecc2725c3038f6f52a80
SHA512889b1610f11807bf67aeff12579d91b784fb35c0da95affb86984fd2275584c57a58b4a4fafb6eca9121e89db94f2c721ae40c735d54e8d071b91e0166ae383e
-
Filesize
77KB
MD50c8a1a93f22c6890c6123d00bd82f6be
SHA1479ce5dd6b3fe89fa545f25bad95c4a5728a7d68
SHA256ed6837072cd0dc564d27ab9bd0c0320bbd35e5323548fb4c02b0fea430de82aa
SHA5124ff05091d8ba227ede3a377af7d8bba8505522ee6ed7a67e9919950f8e46dba72bced4343e9bb3ed1972f8cd25820c92ccfe6669eafe47db937fc7c80ce44949
-
Filesize
77KB
MD58d5d61c10fa19976ec9451bdd222abed
SHA11ab50cbce48c37abc0deb1a23752326069e320f9
SHA2565e33031266ab48647b3ff08d6e584bb31bbd110ae138e3eae9fabd38e5f11296
SHA51239959409255fc91e05ed0902ef202a7ebb68e5110a76adaf8db9c3fe8d32c16362fb81f7e2ec0bdb900dc78f61e0f80a7b6b4929ff57e13146b07badc5d712da
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\le59fmg0.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD5169f20690c580af84fb017174ceda4b5
SHA1aa967f1477b5d23ab5150fbe44475acb297e04ac
SHA2569a0c88ae9fbc6edd6ff5ac1ab34d7745ac233c4ac01e7f3ae7edd03936497d3a
SHA512bd7a412a7a80d6fb4c13be7f7444dc08dbebd9c0da3cbc87cc20b6ba6e83e7946ad4238dfa6f841eee374dafa13430724f2ebeb7ff6f927931c773771b3c37a6
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5188e513ebbdb02e7447e280fcf7c004a
SHA15f355f09d4d47dd56eb1b661dd84acc22538597d
SHA256191198b73d7476d1efb0c6b961de29a5c94f718542252a50677563495bddf82e
SHA512b7a6544550ab316ad8e6aab7028a89fe8fd5fdfae3fed5862adc0a220a48794b00be28365d94fb5d11e914e6a27b14988ffe41411961bb54e9e35878109008e8
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5ca2881aff2401ea7b92a8dd8fa880aef
SHA19f64205bcecde6eaafdb61e50b4e95eb6e98b78d
SHA256e006e798ac0006c1c0df12ff278fc0c7662cefb13785efc1f664573a1493cb25
SHA51209a3d5a2fac0f3d65b1b1ecb4f295131b6e79f6eccbd20924d1361e39636d5cf7b09dedf3874013d80696947e999eb29be04bb9f90722235e450b0b419b12df8
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SettingsCache.txt
Filesize846KB
MD5766f5efd9efca73b6dfd0fb3d648639f
SHA171928a29c3affb9715d92542ef4cf3472e7931fe
SHA2569111e9a5093f97e15510bf3d3dc36fd4a736981215f79540454ce86893993fdc
SHA5121d4bb423d9cc9037f6974a389ff304e5b9fbd4bfd013a09d4ceeff3fd2a87ad81fe84b2ee880023984978391daf11540f353d391f35a4236b241ccced13a3434
-
Filesize
136B
MD50ed9b567e535728c8fff762489ef9671
SHA120730abe71f21297ce17b98f8bdb58e0d133b663
SHA256b14cdec937162ed3b758a932b9f9173fed5c1e545663d0adf9c6021a0081c2c6
SHA512f3126e1a06816f53a73f4e650bf984109aeec18dffa1e182bbc4f0c4f188ed5b1f4f7978bad8b6554ef871a0c2fe8546f665c571eaee5e7a9bdf416190434bb0
-
Filesize
340B
MD53867f2ec82a7d77c9ffefb1aac8b7903
SHA106fccf19b9c498b5afa2b35da00e3ab28d56f785
SHA2564e25c23aa5babc853889d3e1e79bb01ca7650837b250314a8d50f2e2c4b6730f
SHA512b413994e5b9f0ecb956055c7befff14845b56bb658fd8280d3213fdfa175ff76bc56e082174f2475fdf2d1f9eff618ebfd80ee2b67c091eaf1fd9c94697da5aa
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]
Filesize933B
MD57e6b6da7c61fcb66f3f30166871def5b
SHA100f699cf9bbc0308f6e101283eca15a7c566d4f9
SHA2564a25d98c121bb3bd5b54e0b6a5348f7b09966bffeec30776e5a731813f05d49e
SHA512e5a56137f325904e0c7de1d0df38745f733652214f0cdb6ef173fa0743a334f95bed274df79469e270c9208e6bdc2e6251ef0cdd81af20fa1897929663e2c7d3
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]
Filesize1KB
MD55650d8d700e2eb8cdac8960b21165536
SHA15d50f17a707e243257d31b5e6301a8e7a9d8a5ed
SHA256bbc6f81141309afb9e8d45c06609209e3d636dbccea8eccf79d6f3ac2c359de1
SHA5121d97acab3e133c429e894c20c49dd1b907baf8f060b804d42f86f03552907e64b79ca19543e5e0652e148f1250cb7281ccd48bb9632ac8eb2e20d0c18b7f8884
-
Filesize
3.0MB
MD56ed47014c3bb259874d673fb3eaedc85
SHA1c9b29ba7e8a97729c46143cc59332d7a7e9c1ad8
SHA25658be53d5012b3f45c1ca6f4897bece4773efbe1ccbf0be460061c183ee14ca19
SHA5123bc462d21bc762f6eec3d23bb57e2baf532807ab8b46fab1fe38a841e5fde81ed446e5305a78ad0d513d85419e6ec8c4b54985da1d6b198acb793230aeecd93e
-
Filesize
694KB
MD5a12c2040f6fddd34e7acb42f18dd6bdc
SHA1d7db49f1a9870a4f52e1f31812938fdea89e9444
SHA256bd70ba598316980833f78b05f7eeaef3e0f811a7c64196bf80901d155cb647c1
SHA512fbe0970bcdfaa23af624daad9917a030d8f0b10d38d3e9c7808a9fbc02912ee9daed293dbdea87aa90dc74470bc9b89cb6f2fe002393ecda7b565307ffb7ec00
-
Filesize
702KB
MD590f50a285efa5dd9c7fddce786bdef25
SHA154213da21542e11d656bb65db724105afe8be688
SHA25677a250e81fdaf9a075b1244a9434c30bf449012c9b647b265fa81a7b0db2513f
SHA512746422be51031cfa44dd9a6f3569306c34bbe8abf9d2bd1df139d9c938d0cba095c0e05222fd08c8b6deaebef5d3f87569b08fb3261a2d123d983517fb9f43ae
-
Filesize
510KB
MD573d4823075762ee2837950726baa2af9
SHA1ebce3532ed94ad1df43696632ab8cf8da8b9e221
SHA2569aeccf88253d4557a90793e22414868053caaab325842c0d7acb0365e88cd53b
SHA5128f4a65bd35ed69f331769aaf7505f76dd3c64f3fa05cf01d83431ec93a7b1331f3c818ac7008e65b6f1278d7e365ed5940c8c6b8502e77595e112f1faca558b5
-
Filesize
90KB
MD578581e243e2b41b17452da8d0b5b2a48
SHA1eaefb59c31cf07e60a98af48c5348759586a61bb
SHA256f28caebe9bc6aa5a72635acb4f0e24500494e306d8e8b2279e7930981281683f
SHA512332098113ce3f75cb20dc6e09f0d7ba03f13f5e26512d9f3bee3042c51fbb01a5e4426c5e9a5308f7f805b084efc94c28fc9426ce73ab8dfee16ab39b3efe02a
-
Filesize
3.0MB
MD5fe7eb54691ad6e6af77f8a9a0b6de26d
SHA153912d33bec3375153b7e4e68b78d66dab62671a
SHA256e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb
SHA5128ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f
-
Filesize
105KB
MD5fb072e9f69afdb57179f59b512f828a4
SHA1fe71b70173e46ee4e3796db9139f77dc32d2f846
SHA25666d653397cbb2dbb397eb8421218e2c126b359a3b0decc0f31e297df099e1383
SHA5129d157fece0dc18afe30097d9c4178ae147cc9d465a6f1d35778e1bff1efca4734dd096e95d35faea32da8d8b4560382338ba9c6c40f29047f1cc0954b27c64f8
-
Filesize
1.4MB
MD5c17170262312f3be7027bc2ca825bf0c
SHA1f19eceda82973239a1fdc5826bce7691e5dcb4fb
SHA256d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa
SHA512c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c
-
Filesize
780B
MD593f33b83f1f263e2419006d6026e7bc1
SHA11a4b36c56430a56af2e0ecabd754bf00067ce488
SHA256ef0ed0b717d1b956eb6c42ba1f4fd2283cf7c8416bed0afd1e8805ee0502f2b4
SHA51245bdd1a9a3118ee4d3469ee65a7a8fdb0f9315ca417821db058028ffb0ed145209f975232a9e64aba1c02b9664c854232221eb041d09231c330ae510f638afac
-
Filesize
219B
MD582a1fc4089755cb0b5a498ffdd52f20f
SHA10a8c0da8ef0354f37241e2901cf82ec9ce6474aa
SHA2567fbdc49f4b4ba21949eca0b16c534b4882da97e94e5ca131cec1629e60439dfa
SHA5121573a0c7333accef2695efefe1b57cba8f8d66a0061c24420ee0a183343a9a319995267d306ee85084c95580f9855bcdf9dee559b28a200b27fc3cc353315e78
-
Filesize
46KB
MD595673b0f968c0f55b32204361940d184
SHA181e427d15a1a826b93e91c3d2fa65221c8ca9cff
SHA25640b37e7b80cf678d7dd302aaf41b88135ade6ddf44d89bdba19cf171564444bd
SHA5127601f1883edbb4150a9dc17084012323b3bfa66f6d19d3d0355cf82b6a1c9dce475d758da18b6d17a8b321bf6fca20915224dbaedcb3f4d16abfaf7a5fc21b92
-
Filesize
53KB
MD50252d45ca21c8e43c9742285c48e91ad
SHA15c14551d2736eef3a1c1970cc492206e531703c1
SHA256845d0e178aeebd6c7e2a2e9697b2bf6cf02028c50c288b3ba88fe2918ea2834a
SHA5121bfcf6c0e7c977d777f12bd20ac347630999c4d99bd706b40de7ff8f2f52e02560d68093142cc93722095657807a1480ce3fb6a2e000c488550548c497998755
-
Filesize
77KB
MD52efc3690d67cd073a9406a25005f7cea
SHA152c07f98870eabace6ec370b7eb562751e8067e9
SHA2565c7f6ad1ec4bc2c8e2c9c126633215daba7de731ac8b12be10ca157417c97f3a
SHA5120766c58e64d9cda5328e00b86f8482316e944aa2c26523a3c37289e22c34be4b70937033bebdb217f675e40db9fecdce0a0d516f9065a170e28286c2d218487c
-
Filesize
38KB
MD517194003fa70ce477326ce2f6deeb270
SHA1e325988f68d327743926ea317abb9882f347fa73
SHA2563f33734b2d34cce83936ce99c3494cd845f1d2c02d7f6da31d42dfc1ca15a171
SHA512dcf4ccf0b352a8b271827b3b8e181f7d6502ca0f8c9dda3dc6e53441bb4ae6e77b49c9c947cc3ede0bf323f09140a0c068a907f3c23ea2a8495d1ad96820051c
-
Filesize
39KB
MD5537efeecdfa94cc421e58fd82a58ba9e
SHA13609456e16bc16ba447979f3aa69221290ec17d0
SHA2565afa4753afa048c6d6c39327ce674f27f5f6e5d3f2a060b7a8aed61725481150
SHA512e007786ffa09ccd5a24e5c6504c8de444929a2faaafad3712367c05615b7e1b0fbf7fbfff7028ed3f832ce226957390d8bf54308870e9ed597948a838da1137b
-
Filesize
36KB
MD52c5a3b81d5c4715b7bea01033367fcb5
SHA1b548b45da8463e17199daafd34c23591f94e82cd
SHA256a75bb44284b9db8d702692f84909a7e23f21141866adf3db888042e9109a1cb6
SHA512490c5a892fac801b853c348477b1140755d4c53ca05726ac19d3649af4285c93523393a3667e209c71c80ac06ffd809f62dd69ae65012dcb00445d032f1277b3
-
Filesize
36KB
MD57a8d499407c6a647c03c4471a67eaad7
SHA1d573b6ac8e7e04a05cbbd6b7f6a9842f371d343b
SHA2562c95bef914da6c50d7bdedec601e589fbb4fda24c4863a7260f4f72bd025799c
SHA512608ef3ff0a517fe1e70ff41aeb277821565c5a9bee5103aa5e45c68d4763fce507c2a34d810f4cd242d163181f8341d9a69e93fe32aded6fbc7f544c55743f12
-
Filesize
36KB
MD5fe68c2dc0d2419b38f44d83f2fcf232e
SHA16c6e49949957215aa2f3dfb72207d249adf36283
SHA25626fd072fda6e12f8c2d3292086ef0390785efa2c556e2a88bd4673102af703e5
SHA512941fa0a1f6a5756ed54260994db6158a7ebeb9e18b5c8ca2f6530c579bc4455918df0b38c609f501ca466b3cc067b40e4b861ad6513373b483b36338ae20a810
-
Filesize
36KB
MD508b9e69b57e4c9b966664f8e1c27ab09
SHA12da1025bbbfb3cd308070765fc0893a48e5a85fa
SHA256d8489f8c16318e524b45de8b35d7e2c3cd8ed4821c136f12f5ef3c9fc3321324
SHA512966b5ed68be6b5ccd46e0de1fa868cfe5432d9bf82e1e2f6eb99b2aef3c92f88d96f4f4eec5e16381b9c6db80a68071e7124ca1474d664bdd77e1817ec600cb4
-
Filesize
37KB
MD535c2f97eea8819b1caebd23fee732d8f
SHA1e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA2561adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf
-
Filesize
37KB
MD54e57113a6bf6b88fdd32782a4a381274
SHA10fccbc91f0f94453d91670c6794f71348711061d
SHA2569bd38110e6523547aed50617ddc77d0920d408faeed2b7a21ab163fda22177bc
SHA5124f1918a12269c654d44e9d394bc209ef0bc32242be8833a2fba437b879125177e149f56f2fb0c302330dec328139b34982c04b3fefb045612b6cc9f83ec85aa9
-
Filesize
36KB
MD53d59bbb5553fe03a89f817819540f469
SHA126781d4b06ff704800b463d0f1fca3afd923a9fe
SHA2562adc900fafa9938d85ce53cb793271f37af40cf499bcc454f44975db533f0b61
SHA51295719ae80589f71209bb3cb953276538040e7111b994d757b0a24283aefe27aadbbe9eef3f1f823ce4cabc1090946d4a2a558607ac6cac6faca5971529b34dac
-
Filesize
47KB
MD5fb4e8718fea95bb7479727fde80cb424
SHA11088c7653cba385fe994e9ae34a6595898f20aeb
SHA256e13cc9b13aa5074dc45d50379eceb17ee39a0c2531ab617d93800fe236758ca9
SHA51224db377af1569e4e2b2ebccec42564cea95a30f1ff43bcaf25a692f99567e027bcef4aacef008ec5f64ea2eef0c04be88d2b30bcadabb3919b5f45a6633940cb
-
Filesize
36KB
MD53788f91c694dfc48e12417ce93356b0f
SHA1eb3b87f7f654b604daf3484da9e02ca6c4ea98b7
SHA25623e5e738aad10fb8ef89aa0285269aff728070080158fd3e7792fe9ed47c51f4
SHA512b7dd9e6dc7c2d023ff958caf132f0544c76fae3b2d8e49753257676cc541735807b4befdf483bcae94c2dcde3c878c783b4a89dca0fecbc78f5bbf7c356f35cd
-
Filesize
36KB
MD530a200f78498990095b36f574b6e8690
SHA1c4b1b3c087bd12b063e98bca464cd05f3f7b7882
SHA25649f2c739e7d9745c0834dc817a71bf6676ccc24a4c28dcddf8844093aab3df07
SHA512c0da2aae82c397f6943a0a7b838f60eeef8f57192c5f498f2ecf05db824cfeb6d6ca830bf3715da7ee400aa8362bd64dc835298f3f0085ae7a744e6e6c690511
-
Filesize
79KB
MD5b77e1221f7ecd0b5d696cb66cda1609e
SHA151eb7a254a33d05edf188ded653005dc82de8a46
SHA2567e491e7b48d6e34f916624c1cda9f024e86fcbec56acda35e27fa99d530d017e
SHA512f435fd67954787e6b87460db026759410fbd25b2f6ea758118749c113a50192446861a114358443a129be817020b50f21d27b1ebd3d22c7be62082e8b45223fc
-
Filesize
89KB
MD56735cb43fe44832b061eeb3f5956b099
SHA1d636daf64d524f81367ea92fdafa3726c909bee1
SHA256552aa0f82f37c9601114974228d4fc54f7434fe3ae7a276ef1ae98a0f608f1d0
SHA51260272801909dbba21578b22c49f6b0ba8cd0070f116476ff35b3ac8347b987790e4cc0334724244c4b13415a246e77a577230029e4561ae6f04a598c3f536c7e
-
Filesize
40KB
MD5c33afb4ecc04ee1bcc6975bea49abe40
SHA1fbea4f170507cde02b839527ef50b7ec74b4821f
SHA256a0356696877f2d94d645ae2df6ce6b370bd5c0d6db3d36def44e714525de0536
SHA5120d435f0836f61a5ff55b78c02fa47b191e5807a79d8a6e991f3115743df2141b3db42ba8bdad9ad259e12f5800828e9e72d7c94a6a5259312a447d669b03ec44
-
Filesize
36KB
MD5ff70cc7c00951084175d12128ce02399
SHA175ad3b1ad4fb14813882d88e952208c648f1fd18
SHA256cb5da96b3dfcf4394713623dbf3831b2a0b8be63987f563e1c32edeb74cb6c3a
SHA512f01df3256d49325e5ec49fd265aa3f176020c8ffec60eb1d828c75a3fa18ff8634e1de824d77dfdd833768acff1f547303104620c70066a2708654a07ef22e19
-
Filesize
38KB
MD5e79d7f2833a9c2e2553c7fe04a1b63f4
SHA13d9f56d2381b8fe16042aa7c4feb1b33f2baebff
SHA256519ad66009a6c127400c6c09e079903223bd82ecc18ad71b8e5cd79f5f9c053e
SHA512e0159c753491cac7606a7250f332e87bc6b14876bc7a1cf5625fa56ab4f09c485f7b231dd52e4ff0f5f3c29862afb1124c0efd0741613eb97a83cbe2668af5de
-
Filesize
37KB
MD5fa948f7d8dfb21ceddd6794f2d56b44f
SHA1ca915fbe020caa88dd776d89632d7866f660fc7a
SHA256bd9f4b3aedf4f81f37ec0a028aabcb0e9a900e6b4de04e9271c8db81432e2a66
SHA5120d211bfb0ae953081dca00cd07f8c908c174fd6c47a8001fadc614203f0e55d9fbb7fa9b87c735d57101341ab36af443918ee00737ed4c19ace0a2b85497f41a
-
Filesize
50KB
MD5313e0ececd24f4fa1504118a11bc7986
SHA1e1b9ae804c7fb1d27f39db18dc0647bb04e75e9d
SHA25670c0f32ed379ae899e5ac975e20bbbacd295cf7cd50c36174d2602420c770ac1
SHA512c7500363c61baf8b77fce796d750f8f5e6886ff0a10f81c3240ea3ad4e5f101b597490dea8ab6bd9193457d35d8fd579fce1b88a1c8d85ebe96c66d909630730
-
Filesize
46KB
MD5452615db2336d60af7e2057481e4cab5
SHA1442e31f6556b3d7de6eb85fbac3d2957b7f5eac6
SHA25602932052fafe97e6acaaf9f391738a3a826f5434b1a013abbfa7a6c1ade1e078
SHA5127613dc329abe7a3f32164c9a6b660f209a84b774ab9c008bf6503c76255b30ea9a743a6dc49a8de8df0bcb9aea5a33f7408ba27848d9562583ff51991910911f
-
Filesize
40KB
MD5c911aba4ab1da6c28cf86338ab2ab6cc
SHA1fee0fd58b8efe76077620d8abc7500dbfef7c5b0
SHA256e64178e339c8e10eac17a236a67b892d0447eb67b1dcd149763dad6fd9f72729
SHA5123491ed285a091a123a1a6d61aafbb8d5621ccc9e045a237a2f9c2cf6049e7420eb96ef30fdcea856b50454436e2ec468770f8d585752d73fafd676c4ef5e800a
-
Filesize
36KB
MD58d61648d34cba8ae9d1e2a219019add1
SHA12091e42fc17a0cc2f235650f7aad87abf8ba22c2
SHA25672f20024b2f69b45a1391f0a6474e9f6349625ce329f5444aec7401fe31f8de1
SHA51268489c33ba89edfe2e3aebaacf8ef848d2ea88dcbef9609c258662605e02d12cfa4ffdc1d266fc5878488e296d2848b2cb0bbd45f1e86ef959bab6162d284079
-
Filesize
37KB
MD5c7a19984eb9f37198652eaf2fd1ee25c
SHA106eafed025cf8c4d76966bf382ab0c5e1bd6a0ae
SHA256146f61db72297c9c0facffd560487f8d6a2846ecec92ecc7db19c8d618dbc3a4
SHA51243dd159f9c2eac147cbff1dda83f6a83dd0c59d2d7acac35ba8b407a04ec9a1110a6a8737535d060d100ede1cb75078cf742c383948c9d4037ef459d150f6020
-
Filesize
41KB
MD5531ba6b1a5460fc9446946f91cc8c94b
SHA1cc56978681bd546fd82d87926b5d9905c92a5803
SHA2566db650836d64350bbde2ab324407b8e474fc041098c41ecac6fd77d632a36415
SHA512ef25c3cf4343df85954114f59933c7cc8107266c8bcac3b5ea7718eb74dbee8ca8a02da39057e6ef26b64f1dfccd720dd3bf473f5ae340ba56941e87d6b796c9
-
Filesize
91KB
MD58419be28a0dcec3f55823620922b00fa
SHA12e4791f9cdfca8abf345d606f313d22b36c46b92
SHA2561f21838b244c80f8bed6f6977aa8a557b419cf22ba35b1fd4bf0f98989c5bdf8
SHA5128fca77e54480aea3c0c7a705263ed8fb83c58974f5f0f62f12cc97c8e0506ba2cdb59b70e59e9a6c44dd7cde6adeeec35b494d31a6a146ff5ba7006136ab9386
-
Filesize
864B
MD53e0020fc529b1c2a061016dd2469ba96
SHA1c3a91c22b63f6fe709e7c29cafb29a2ee83e6ade
SHA256402751fa49e0cb68fe052cb3db87b05e71c1d950984d339940cf6b29409f2a7c
SHA5125ca3c134201ed39d96d72911c0498bae6f98701513fd7f1dc8512819b673f0ea580510fa94ed9413ccc73da18b39903772a7cbfa3478176181cee68c896e14cf
-
Filesize
2.9MB
MD5ad4c9de7c8c40813f200ba1c2fa33083
SHA1d1af27518d455d432b62d73c6a1497d032f6120e
SHA256e18fdd912dfe5b45776e68d578c3af3547886cf1353d7086c8bee037436dff4b
SHA512115733d08e5f1a514808a20b070db7ff453fd149865f49c04365a8c6502fa1e5c3a31da3e21f688ab040f583cf1224a544aea9708ffab21405dde1c57f98e617
-
Filesize
64KB
MD55dcaac857e695a65f5c3ef1441a73a8f
SHA17b10aaeee05e7a1efb43d9f837e9356ad55c07dd
SHA25697ebce49b14c46bebc9ec2448d00e1e397123b256e2be9eba5140688e7bc0ae6
SHA51206eb5e49d19b71a99770d1b11a5bb64a54bf3352f36e39a153469e54205075c203b08128dc2317259db206ab5323bdd93aaa252a066f57fb5c52ff28deedb5e2
-
Filesize
20KB
MD54fef5e34143e646dbf9907c4374276f5
SHA147a9ad4125b6bd7c55e4e7da251e23f089407b8f
SHA2564a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79
SHA5124550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5
-
Filesize
20KB
MD58495400f199ac77853c53b5a3f278f3e
SHA1be5d6279874da315e3080b06083757aad9b32c23
SHA2562ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d
SHA5120669c524a295a049fa4629b26f89788b2a74e1840bcdc50e093a0bd40830dd1279c9597937301c0072db6ece70adee4ace67c3c8a4fb2db6deafd8f1e887abe4
-
Filesize
240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize5KB
MD5254627f1be36b6ed891d6b22eb25b24b
SHA120ae2343f8d37a02f9d95ba11aea07414f194fc5
SHA25662657414a122bd976780aa6c750658bee48eb2068b6667ee8eafc0cd5bbb3b50
SHA5127aa71aef498e9d5ad946537d2af35e21ff8f5742e41e5e52ea2a80c636d09e1d272a0bf454c53a2d9e9ae6972c5fe74a1b14d25389bce6f4fb55b7fc80c458d7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize5KB
MD540c964ad9a5ab16a3d1d7611e44bbb4f
SHA122f2e5e43f929c234b282b0eecad487f42f7518f
SHA2568fc21bd48d322fce01f18bdc52d0e3b1c58ffad9fd6159f90a7177d72e960d7f
SHA5121144199c58f33fb328b4cf764b1de32676372910971f25390bcbb843e17e5d32e39767bd46d7f2727143194d35ffe5ab95a9abffb4bcd536f310df5106ec0245
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize5KB
MD5dbb9bb085a4b5b9dbbe1debd99ba2357
SHA12b1b0d2fe1ae28eb408a00488ebc62113fd8131c
SHA256d18a2ae32eab69c5f381dbba4fca90f5b8c26f9543d40cbb49703e069d0018f6
SHA51269f689421a764582db31fb3bf65ca9c76b040eeb5ee3f673623ec86169c76d3761a8b02443793435a4b19718634f208a86506debcd358fbeb25c4d710d419aed
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\le59fmg0.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD558aa84282ca8f585665ea7412b28b772
SHA1381909389606a699d43506c61ea5c7c98191594c
SHA256eed914555ca90924dd1894f85e2c4feaecfbe19b6b3dc789dc42aad6a21a937f
SHA512ffd397bba77f66d58bce8c0fee8a7c10a8e8f2298d73b19400ac7c5730ea0c10d649313b9ee06b50c8ddd178118e2787b390b66340e67d48c27fa861a371a2ba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\le59fmg0.default-release\datareporting\glean\db\data.safe.tmp
Filesize13KB
MD5a15359210e9f849d0f1cfc01ec309c77
SHA1a57415532446e648fc56df1cf80e9335fd14388c
SHA256f9b9e8ead8e67b1ad32d04c74f530e8f14dc15244febb96c53a752a2b4a33566
SHA5129fc102368d5ad888279a1f15a104370aa66f6b6d73d2b83c105a5708df227641df0f9397d582dba76f2edf4f9de316d95a0e859db7824bb4f2ba0815afbbba33
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\le59fmg0.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD564129162a0841d0c1b3886984e47a639
SHA18b92d489af6968cddd15591af0813189da0a0ff7
SHA25651667ba9de71010ed9114438a6e7ce48bf6a6f247761f9c1b7d9cf61c148b12c
SHA51240fcd3a674df52f1bc1ea20b8833405f65eb322e37eff5b48e7d163b28ad0395ff77ceb1a68fe0ab1e24da50a0f0c7ab49f924147515136bb9f479e434f6abb9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\le59fmg0.default-release\datareporting\glean\pending_pings\646ee5ee-bc4a-4cb5-9963-2a072d41e863
Filesize671B
MD54b561d6963d7ad840bdfe3d0f8f64f8e
SHA1b91daa49779a7f5149aa4c0cca560bc89c92f665
SHA256f13de64064aca07d4afb53f28d25fe00492acc8dc4ece410459c34be26db2f61
SHA5125182aef9e0e076a2541455127236b13f3f7b63eb202417d0efefdfdd1b177ba47f15cdc3a90a974d8365e931d452b2f2e47c105408717940a83bceb655d26dad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\le59fmg0.default-release\datareporting\glean\pending_pings\ceb6c32f-1d5e-4c0b-a693-699036bda224
Filesize982B
MD518249e719471dde2719d818bbcfb56f9
SHA16771b8610fe13535d1009ea65a07f21d6ac3b04c
SHA2561767b3e536af781655ab7e3a6399e5b70d388858f73499e3d01f9fe449cd122f
SHA51289b805667d9c868316f2c0ea1774304219d5d503129ddb54886dd88e5fa3290ab2af6f50a3b1d5c8af30b1a66b33e48ca939005bd35bf1992249011f3530ca0e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\le59fmg0.default-release\datareporting\glean\pending_pings\f7d60bc4-f575-48ac-a905-84872c5b45c9
Filesize26KB
MD5d889748ea1b37c6590910e1ca90d33f4
SHA1b3ff53e6c2e77070a4b4fb9dfdb1c2d1c9bb15b9
SHA256ffeecd49194eb2f68a0c4715de645b95a429f968f42c8a17f6089d17dcbbe769
SHA5122bf711ba0e479f423ceb8610e486ed979cefa823b5057d49de1d552f235a675760b696e64cdc7a888110cfea55f39632bf5e8536beb0690106b33da33b6a0499
-
Filesize
8KB
MD52f9e7cd3c98dd0bfee4d4a530594e7f3
SHA129278d0a3d3287a14f8d771328e45473cea4b882
SHA256d1d053eb4ebc22047ff3a6530c9755e4391eb0c86366f5afb3470aa93ed99f51
SHA51215a3e004b3c8ae453228722f10ac3ab631557af41ff1bbc83e943a6ef007b95f864b02d9f334d58a9f9763efca4a43acafa0a13ed12e5f17674d98091ee786d6
-
Filesize
8KB
MD5434a9cf41c3c8eede06024e678a71a99
SHA14ba73ee25ad38540e0e9be4b89fc14ea844b6130
SHA2562d8a3f0856a2135dbe290789c8255e320dc683859c5b149408f5a9d729bee189
SHA5127c6a7176e3c16476ef26e8aef4caff426c794186bd22c3619098080d2a821bae6ba549c971ac6734f2cb47ee710253d7e406d4cabb1e46f7f816cacc9c43d652
-
Filesize
8KB
MD557936c745db9ba7f7d6e85d06e6b7895
SHA1611a041ad499e1dda9228c46fded31229c9e50b6
SHA256db322d5988d1eaebebbc5b4e0abc64dfed4ad2bf6a98a93d8ea50b6c17db7fa2
SHA512a0cf6f0c0b293cb4d20111ef58b0ff5947e5450fbd94df427e394bf2119b5143077011bedb0a6b951491888cf9cca593817dd2eecd021b185d131c08b39b6516
-
Filesize
9KB
MD508be3c238c13bed9785eb0b934a60382
SHA146f59e732bba4b582421491e7c44cb640a8c5e6c
SHA256702a6cf94a570384c3e97408d1e6f0d9bbe203ed2fa765c471ff2d9b0f7ca788
SHA512373ffc112b85ec20f72b5f67a2ba6f227104a1ff8d3bb971cbaedb4e6e93d82905ccbc9eca526046777f39c7db5f3aad569b33b52d8a1f96ec4886570ebbf2aa
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e