Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1NoxusMod.jar
windows10-1703-x64
7NoxusMod.jar
windows10-2004-x64
7NoxusMod.jar
windows11-21h2-x64
7NoxusMod.jar
android-13-x64
NoxusMod.jar
macos-10.15-amd64
4NoxusMod.jar
ubuntu-18.04-amd64
NoxusMod.jar
debian-9-armhf
NoxusMod.jar
debian-9-mips
NoxusMod.jar
debian-9-mipsel
Analysis
-
max time kernel
174s -
max time network
191s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
27/05/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
NoxusMod.jar
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
NoxusMod.jar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
NoxusMod.jar
Resource
win11-20240508-en
Behavioral task
behavioral4
Sample
NoxusMod.jar
Resource
android-33-x64-arm64-20240514-en
Behavioral task
behavioral5
Sample
NoxusMod.jar
Resource
macos-20240410-en
Behavioral task
behavioral6
Sample
NoxusMod.jar
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral7
Sample
NoxusMod.jar
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral8
Sample
NoxusMod.jar
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral9
Sample
NoxusMod.jar
Resource
debian9-mipsel-20240418-en
General
-
Target
NoxusMod.jar
-
Size
1.4MB
-
MD5
462734450a265e297b3a3e8ebad04f25
-
SHA1
da384ae6cf08f161f7ec2bbfbd1e8598c88a7de6
-
SHA256
1179aeeafbdaeb7b6ffbc070551c440eb7dfe9786d50dc5beb415bb2f17eded4
-
SHA512
7494ee564de93139b90a4a909a3cfbf8229683f54799698b616ac9fb192f45a1667b7832eef71fb7af87fb490900c7796c2d18e1c242ce4ba10de780b4270d3f
-
SSDEEP
24576:VO+tNLEsGPiCnvnbIcDWsBCTh0z1xwRIRyzVVo719mthe5cW2RegoH9ru0:VO+wpLbbWslfZ2EXmtheyMbK0
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4564 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1716809710058.tmp" reg.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\LowRegistry\Shell Extensions\Cached PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\LowRegistry PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\LowRegistry\Shell Extensions PaintStudio.View.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content PaintStudio.View.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix PaintStudio.View.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "51200" PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache PaintStudio.View.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" PaintStudio.View.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" PaintStudio.View.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" PaintStudio.View.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" PaintStudio.View.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1732 PaintStudio.View.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
pid Process 2884 mspaint.exe 2884 mspaint.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 5044 unregmp2.exe Token: SeCreatePagefilePrivilege 5044 unregmp2.exe Token: SeShutdownPrivilege 3132 wmplayer.exe Token: SeCreatePagefilePrivilege 3132 wmplayer.exe Token: SeDebugPrivilege 1732 PaintStudio.View.exe Token: SeDebugPrivilege 1732 PaintStudio.View.exe Token: SeDebugPrivilege 1732 PaintStudio.View.exe Token: SeDebugPrivilege 2424 taskmgr.exe Token: SeSystemProfilePrivilege 2424 taskmgr.exe Token: SeCreateGlobalPrivilege 2424 taskmgr.exe Token: 33 2424 taskmgr.exe Token: SeIncBasePriorityPrivilege 2424 taskmgr.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 3132 wmplayer.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe 2424 taskmgr.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4700 java.exe 4700 java.exe 4700 java.exe 4700 java.exe 2884 mspaint.exe 1732 PaintStudio.View.exe 1732 PaintStudio.View.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4700 wrote to memory of 4564 4700 java.exe 75 PID 4700 wrote to memory of 4564 4700 java.exe 75 PID 4700 wrote to memory of 1264 4700 java.exe 77 PID 4700 wrote to memory of 1264 4700 java.exe 77 PID 4700 wrote to memory of 4792 4700 java.exe 79 PID 4700 wrote to memory of 4792 4700 java.exe 79 PID 4792 wrote to memory of 3352 4792 cmd.exe 81 PID 4792 wrote to memory of 3352 4792 cmd.exe 81 PID 1824 wrote to memory of 1448 1824 wmplayer.exe 83 PID 1824 wrote to memory of 1448 1824 wmplayer.exe 83 PID 1824 wrote to memory of 1448 1824 wmplayer.exe 83 PID 1824 wrote to memory of 1496 1824 wmplayer.exe 84 PID 1824 wrote to memory of 1496 1824 wmplayer.exe 84 PID 1824 wrote to memory of 1496 1824 wmplayer.exe 84 PID 1496 wrote to memory of 5044 1496 unregmp2.exe 85 PID 1496 wrote to memory of 5044 1496 unregmp2.exe 85 PID 1448 wrote to memory of 3132 1448 setup_wm.exe 86 PID 1448 wrote to memory of 3132 1448 setup_wm.exe 86 PID 1448 wrote to memory of 3132 1448 setup_wm.exe 86 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1264 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\NoxusMod.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4564
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1716809710058.tmp2⤵
- Views/modifies file attributes
PID:1264
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1716809710058.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1716809710058.tmp" /f3⤵
- Adds Run key to start application
PID:3352
-
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding2⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /Play C:\Users\Admin\Desktop\TraceDisconnect.midi3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3132
-
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\System32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s upnphost1⤵
- Drops file in Windows directory
PID:5056
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\OptimizeSearch.jpeg" /ForceBootstrapPaint3D1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2884
-
C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe"C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe" -ServerName:Microsoft.MSPaint.AppX437q68k2qc2asvaagas2prv9tjej6ja9.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1732
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2424
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD57170ced272217140294c8ca38016e132
SHA1fab71dc4cad7c26aee5a42d2ccdb0e1469dc99c1
SHA25699f9b1c0f532159bf9ae3ba0005b3741c80e98dede95456136d0534a3e7cd9cf
SHA512f06073b13eec5df587b9e9fcd285f8f4b6900fbb19141411020e98b69c600046dffe1f623b7da5ae885a0c1c240cbe948b64bcb126954a9d6f3e3bd3ad07f117
-
Filesize
64KB
MD50e807656bd86f2aef7ccf207f963973b
SHA127052af8d103d134369e356b793eb88ba873df55
SHA256c509c498682bec50142782a51785655020bea27652f46e104e07a530c2ff5162
SHA512e6c7d5e001e8322ccb1abd101d47e7f1401597518f45dd8da1d757728147262bcb3b1f96128f291e0e367c5b34026b401468e4219b27cf3c37a8d434180cd8f3
-
Filesize
1024KB
MD57dd542c83b593de839809b948b4cfc3f
SHA10ddf8297b74cf38b79760ac6d057b39b36117934
SHA2561431d1193b057a572f907c572e5cb714a113b457ab591e839fac620d7ff4ed65
SHA51224900048456ebd001c1c253b07763d6dd211cf0a5870a1282ec9ee17c8ca0418841b571e2e718c4639c9888b11c3a5614cc2968a404fd497c66f4ebb32a10406
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json
Filesize233B
MD511d090bbdc586cfbdfed6d0a14293f95
SHA107c394d63f9965b61ad0e8db27e2a3d23eed75d8
SHA2564aa86ecb72f53e1b8a828792ad7321577e3c268ec309e44230c29f53722b37fe
SHA512f7d5ba2171ff67958743adc036d369159746e862e39064c7704eb1c2336e51e0613ca3de740a6c00961f13f349f6ef74ce5d943fe8176c30475839e5a5abd2e4
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\cloudCommunitySettings.json
Filesize2KB
MD5404a3ec24e3ebf45be65e77f75990825
SHA11e05647cf0a74cedfdeabfa3e8ee33b919780a61
SHA256cc45905af3aaa62601a69c748a06a2fa48eca3b28d44d8ec18764a7e8e4c3da2
SHA512a55382b72267375821b0a229d3529ed54cef0f295f550d1e95661bafccec606aa1cd72e059d37d78e7d2927ae72e2919941251d233152f5eeb32ffdfc96023e5
-
Filesize
546B
MD5df03e65b8e082f24dab09c57bc9c6241
SHA16b0dacbf38744c9a381830e6a5dc4c71bd7cedbf
SHA256155b9c588061c71832af329fafa5678835d9153b8fbb7592195ae953d0c455ba
SHA512ef1cc8d27fbc5da5daab854c933d3914b84ee539d4d2f0126dc1a04a830c5599e39a923c80257653638b1b99b0073a7174cc164be5887181730883c752ba2f99
-
Filesize
523B
MD5d58da90d6dc51f97cb84dfbffe2b2300
SHA15f86b06b992a3146cb698a99932ead57a5ec4666
SHA25693acdb79543d9248ca3fca661f3ac287e6004e4b3dafd79d4c4070794ffbf2ad
SHA5127f1e95e5aa4c8a0e4c967135c78f22f4505f2a48bbc619924d0096bf4a94d469389b9e8488c12edacfba819517b8376546687d1145660ad1f49d8c20a744e636
-
Filesize
1KB
MD55c79cf4ad68e7f74c73f25abb925e0d6
SHA1fddbb7683bf1f9838be70ec0e79cba602714937a
SHA25626c6f86e595d7ac671660c8706ba399d84d345c243c644f32565e555ba7c9202
SHA512a316c5fc476fa3bb7a0b3283205b522daba4cc5046a40e9f7c39d60894a127349ada1b897cf6ad1a748f901474e07c323225aa0c00e707f7138bba16b7cdac0a
-
Filesize
1.4MB
MD5462734450a265e297b3a3e8ebad04f25
SHA1da384ae6cf08f161f7ec2bbfbd1e8598c88a7de6
SHA2561179aeeafbdaeb7b6ffbc070551c440eb7dfe9786d50dc5beb415bb2f17eded4
SHA5127494ee564de93139b90a4a909a3cfbf8229683f54799698b616ac9fb192f45a1667b7832eef71fb7af87fb490900c7796c2d18e1c242ce4ba10de780b4270d3f