Analysis
-
max time kernel
1800s -
max time network
1800s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-07-2024 14:46
Behavioral task
behavioral1
Sample
MyCode.exe
Resource
win11-20240704-en
General
-
Target
MyCode.exe
-
Size
39KB
-
MD5
70289b7819fa6c4843f3dbf868f89f48
-
SHA1
2f7a6cd6e8ad0ca190acaf7ccf613183044a0587
-
SHA256
ebfcca4ca03a8a89a73501632e23383d274a8cea686bed4359153d863652dd2e
-
SHA512
cea9a878a1e109e80d2e2493d5bd2ac062a89987b67305b4dd3dff2b06f57c6b2a4f80d8be965276e85101a1d36df071c5e9add4940e18a2ae3d454b245210e4
-
SSDEEP
768:BPv2tlOzFKuGCuuJ/5c/lpfFWPJ92yF6dOMhHjhC:BGroIrCuuJefFe92W6dOMFA
Malware Config
Extracted
xworm
5.0
127.0.0.1:24920
6.tcp.eu.ngrok.io:24920
4.tcp.eu.ngrok.io:24920
5.tcp.eu.ngrok.io:24920
0.tcp.eu.ngrok.io:24920
20.ip.gl.ply.gg:24920
qp0SiG21yxPKVpTy
-
Install_directory
%AppData%
-
install_file
Upgrade.exe
Extracted
C:\Users\Admin\Downloads\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/5084-823-0x00000000007C0000-0x00000000007CE000-memory.dmp disable_win_def -
CryptoLocker
Ransomware family with multiple variants.
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/5084-1-0x0000000000090000-0x00000000000A0000-memory.dmp family_xworm behavioral1/files/0x000200000002a9a4-344.dat family_xworm -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection powershell.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5084 created 688 5084 MyCode.exe 7 -
Wannacry
WannaCry is a ransomware cryptoworm.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2848 powershell.exe 456 powershell.exe 3460 powershell.exe 748 powershell.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SD420.tmp WannaCrypt0r.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Upgrade.lnk MyCode.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Upgrade.lnk MyCode.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SD419.tmp WannaCrypt0r.exe -
Executes dropped EXE 64 IoCs
pid Process 628 MyCode.bat 3320 $uckyLocker.exe 5884 ChilledWindows.exe 4684 CryptoLocker.exe 2052 {34184A33-0407-212E-3320-09040709E2C2}.exe 6112 {34184A33-0407-212E-3320-09040709E2C2}.exe 5488 YouAreAnIdiot.exe 3808 WannaCrypt0r.exe 4884 taskdl.exe 1704 @[email protected] 1188 @[email protected] 5876 taskhsvc.exe 2544 taskdl.exe 6000 taskse.exe 5388 @[email protected] 1192 WinLocker.exe 5736 taskdl.exe 3724 taskse.exe 3480 @[email protected] 5124 taskse.exe 3068 @[email protected] 3212 taskdl.exe 1692 taskse.exe 3580 @[email protected] 6076 taskdl.exe 3588 dobrota.exe 220 dobrota.exe 1756 mbr.exe 6072 erroricons.exe 1660 INVERS.exe 4924 crazywarningicons.exe 2220 crazyinvers.exe 1080 erroriconscursor.exe 2732 toonel.exe 5288 taskse.exe 404 @[email protected] 5996 taskdl.exe 1980 taskse.exe 4856 @[email protected] 4396 taskdl.exe 3732 taskse.exe 5372 @[email protected] 3988 taskdl.exe 4376 taskse.exe 5664 @[email protected] 5976 taskdl.exe 5144 taskse.exe 5584 @[email protected] 1964 taskdl.exe 5408 taskse.exe 5748 @[email protected] 5324 taskdl.exe 2952 taskse.exe 1656 @[email protected] 5484 taskdl.exe 5900 taskse.exe 6076 @[email protected] 1268 taskdl.exe 3316 taskse.exe 5656 @[email protected] 868 taskdl.exe 3576 taskse.exe 5952 @[email protected] 5892 taskdl.exe -
Loads dropped DLL 6 IoCs
pid Process 5876 taskhsvc.exe 5876 taskhsvc.exe 5876 taskhsvc.exe 5876 taskhsvc.exe 5876 taskhsvc.exe 5876 taskhsvc.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4244 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Windows\CurrentVersion\Run\Upgrade = "C:\\Users\\Admin\\AppData\\Roaming\\Upgrade.exe" MyCode.exe Set value (str) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\flezefyfgw626 = "\"C:\\Users\\Admin\\Downloads\\tasksche.exe\"" reg.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini LogonUI.exe -
Enumerates connected drives 3 TTPs 55 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: WScript.exe File opened (read-only) \??\R: WScript.exe File opened (read-only) \??\S: WScript.exe File opened (read-only) \??\W: WScript.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\U: ChilledWindows.exe File opened (read-only) \??\I: WScript.exe File opened (read-only) \??\P: ChilledWindows.exe File opened (read-only) \??\H: WScript.exe File opened (read-only) \??\Q: WScript.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\A: ChilledWindows.exe File opened (read-only) \??\Q: ChilledWindows.exe File opened (read-only) \??\L: WScript.exe File opened (read-only) \??\B: ChilledWindows.exe File opened (read-only) \??\T: ChilledWindows.exe File opened (read-only) \??\Z: WScript.exe File opened (read-only) \??\P: WScript.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\B: WScript.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\K: ChilledWindows.exe File opened (read-only) \??\U: WScript.exe File opened (read-only) \??\A: WScript.exe File opened (read-only) \??\J: WScript.exe File opened (read-only) \??\K: WScript.exe File opened (read-only) \??\N: WScript.exe File opened (read-only) \??\M: ChilledWindows.exe File opened (read-only) \??\W: ChilledWindows.exe File opened (read-only) \??\Z: ChilledWindows.exe File opened (read-only) \??\G: WScript.exe File opened (read-only) \??\R: ChilledWindows.exe File opened (read-only) \??\X: ChilledWindows.exe File opened (read-only) \??\J: ChilledWindows.exe File opened (read-only) \??\N: ChilledWindows.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\G: ChilledWindows.exe File opened (read-only) \??\T: WScript.exe File opened (read-only) \??\D: MyCode.exe File opened (read-only) \??\M: WScript.exe File opened (read-only) \??\V: ChilledWindows.exe File opened (read-only) \??\X: WScript.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\S: ChilledWindows.exe File opened (read-only) \??\Y: ChilledWindows.exe File opened (read-only) \??\E: WScript.exe File opened (read-only) \??\I: ChilledWindows.exe File opened (read-only) \??\O: ChilledWindows.exe File opened (read-only) \??\Y: WScript.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\L: ChilledWindows.exe File opened (read-only) \??\V: WScript.exe File opened (read-only) \??\E: ChilledWindows.exe File opened (read-only) \??\H: ChilledWindows.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 43 IoCs
flow ioc 503 4.tcp.eu.ngrok.io 678 4.tcp.eu.ngrok.io 761 6.tcp.eu.ngrok.io 807 4.tcp.eu.ngrok.io 720 4.tcp.eu.ngrok.io 799 6.tcp.eu.ngrok.io 439 5.tcp.eu.ngrok.io 476 6.tcp.eu.ngrok.io 534 6.tcp.eu.ngrok.io 670 6.tcp.eu.ngrok.io 703 6.tcp.eu.ngrok.io 425 0.tcp.eu.ngrok.io 444 6.tcp.eu.ngrok.io 544 4.tcp.eu.ngrok.io 1 6.tcp.eu.ngrok.io 46 4.tcp.eu.ngrok.io 71 raw.githubusercontent.com 204 raw.githubusercontent.com 364 4.tcp.eu.ngrok.io 552 0.tcp.eu.ngrok.io 1 5.tcp.eu.ngrok.io 455 4.tcp.eu.ngrok.io 577 4.tcp.eu.ngrok.io 685 5.tcp.eu.ngrok.io 731 0.tcp.eu.ngrok.io 742 0.tcp.eu.ngrok.io 46 raw.githubusercontent.com 376 6.tcp.eu.ngrok.io 389 5.tcp.eu.ngrok.io 482 5.tcp.eu.ngrok.io 608 0.tcp.eu.ngrok.io 429 4.tcp.eu.ngrok.io 451 0.tcp.eu.ngrok.io 487 4.tcp.eu.ngrok.io 541 0.tcp.eu.ngrok.io 766 4.tcp.eu.ngrok.io 726 5.tcp.eu.ngrok.io 381 0.tcp.eu.ngrok.io 403 6.tcp.eu.ngrok.io 428 0.tcp.eu.ngrok.io 557 5.tcp.eu.ngrok.io 631 6.tcp.eu.ngrok.io 68 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 mbr.exe -
Sets desktop wallpaper using registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Control Panel\Desktop\Wallpaper = "0" $uckyLocker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" WannaCrypt0r.exe Set value (str) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File created C:\Windows\INF\netsstpa.PNF explorer.exe File created C:\Windows\INF\netrasa.PNF explorer.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2820 sc.exe 1368 sc.exe 3972 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2688 5488 WerFault.exe 216 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe -
Kills process with taskkill 3 IoCs
pid Process 3440 taskkill.exe 4020 taskkill.exe 3412 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch explorer.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{1498f2d4-0000-0000-0000-d01200000000} LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{1498f2d4-0000-0000-0000-d01200000000}\MaxCapacity = "14116" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133647508538155675" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{1498f2d4-0000-0000-0000-d01200000000}\NukeOnDelete = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214FC-0000-0000-C000-000000000046} 0xFFFF = 010000000000000057ded19ab6cfda01 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "66" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\system32\shell32.dll,-50176 = "File Operation" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "7" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1042" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "13166" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1075" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "13166" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133645952507523673" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1042" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1749" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1042" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "8313" SearchHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2141" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1075" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1042" SearchHost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3637012076-1497690007-2831451688-1000\{D95B73A0-8F33-44D6-AE7D-09A48E73036F} explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1042" SearchHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\PastIconsStream = 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 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2141" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 140000000700000001000100060000001400000050003a005c00480066007200650066005c004e0071007a00760061005c00510062006a006100790062006e00710066005c004a00760061005900620070007800720065002e0072006b007200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000e80707004a007600610059006200700078007200650020007600660020004e00700067007600690072002000280035007a0029000a005100620068006f007900720020005000790076007000780020006700620020004600680066006300720061007100200073006200650020003100750000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000000000000000000000000000000000000000000000000000000000029ea3c88b5cfda010000000000000000000000004a007600610059006200700078007200650020007600660020004e00700067007600690072002000280035007a0029000a005100620068006f007900720020005000790076007000780020006700620020004600680066006300720061007100200073006200650020003100750000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000050003a005c00480066007200650066005c004e0071007a00760061005c004e006300630051006e0067006e005c005900620070006e0079005c005a00760070006500620066006200730067005c00420061007200510065007600690072005c00420061007200510065007600690072002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50100000000000000000000e8070700420061007200510065007600690072000a0041006200670020006600760074006100720071002000760061000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000e7a606e49ceda0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff75ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff81ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff82ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff83ae2078e323294282c1e41cb67d5b9c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1042" SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "13318" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "15540" SearchHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3637012076-1497690007-2831451688-1000\{C8A9500D-700C-48E9-B8A6-E5946C0B0CA7} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1042" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1749" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "15540" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1075" SearchHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\windows.immersivecontrolpanel_cw5n1h2txyewy\ApplicationFrame\windows.immersivecontrolpanel_cw5n1h2txyewy!m = f401000040010000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "13166" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "15540" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-3637012076-1497690007-2831451688-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 220 reg.exe -
NTFS ADS 19 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe\:SmartScreen:$DATA CryptoLocker.exe File created C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe\:Zone.Identifier:$DATA CryptoLocker.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 591028.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\YouAreAnIdiot.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 70995.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 967856.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 251811.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\CryptoLocker.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\dobrota.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\WannaCrypt0r.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 562893.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 188493.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\$uckyLocker.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 9448.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\WannaCryPlus.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\ChilledWindows.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\MyCode.bat:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 621980.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\WinLocker.exe:Zone.Identifier msedge.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1104 explorer.exe 1104 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2848 powershell.exe 2848 powershell.exe 456 powershell.exe 456 powershell.exe 3460 powershell.exe 3460 powershell.exe 748 powershell.exe 748 powershell.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe 5084 MyCode.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 5084 MyCode.exe 1104 explorer.exe 4408 msedge.exe 4220 explorer.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 648 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 35 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5084 MyCode.exe Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeDebugPrivilege 3460 powershell.exe Token: SeDebugPrivilege 748 powershell.exe Token: SeDebugPrivilege 5084 MyCode.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe Token: SeShutdownPrivilege 3880 chrome.exe Token: SeCreatePagefilePrivilege 3880 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 5084 MyCode.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 4048 explorer.exe 4048 explorer.exe 4048 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3880 chrome.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 4048 explorer.exe 4048 explorer.exe 4048 explorer.exe 4048 explorer.exe 4048 explorer.exe 4048 explorer.exe 4048 explorer.exe 4048 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 5084 MyCode.exe 3060 explorer.exe 1964 SearchHost.exe 2236 StartMenuExperienceHost.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 4648 SearchHost.exe 4564 StartMenuExperienceHost.exe 1104 explorer.exe 1104 explorer.exe 4616 OpenWith.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 5096 identity_helper.exe 4408 msedge.exe 1104 explorer.exe 4408 msedge.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 4684 CryptoLocker.exe 2052 {34184A33-0407-212E-3320-09040709E2C2}.exe 6112 {34184A33-0407-212E-3320-09040709E2C2}.exe 1104 explorer.exe 1104 explorer.exe 1104 explorer.exe 3808 WannaCrypt0r.exe 1704 @[email protected] 1704 @[email protected] 1704 @[email protected] 1188 @[email protected] 1188 @[email protected] 1188 @[email protected] 5876 taskhsvc.exe 5388 @[email protected] 5388 @[email protected] 5388 @[email protected] 3480 @[email protected] 3480 @[email protected] 1104 explorer.exe 6096 MiniSearchHost.exe 3068 @[email protected] 3068 @[email protected] 3580 @[email protected] 3580 @[email protected] 3588 dobrota.exe 1104 explorer.exe 220 dobrota.exe 1756 mbr.exe 6072 erroricons.exe 1660 INVERS.exe 4924 crazywarningicons.exe 2220 crazyinvers.exe 2732 toonel.exe 1080 erroriconscursor.exe 404 @[email protected] 404 @[email protected] 4856 @[email protected] 4856 @[email protected] -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5084 wrote to memory of 2848 5084 MyCode.exe 79 PID 5084 wrote to memory of 2848 5084 MyCode.exe 79 PID 5084 wrote to memory of 456 5084 MyCode.exe 81 PID 5084 wrote to memory of 456 5084 MyCode.exe 81 PID 5084 wrote to memory of 3460 5084 MyCode.exe 83 PID 5084 wrote to memory of 3460 5084 MyCode.exe 83 PID 5084 wrote to memory of 748 5084 MyCode.exe 85 PID 5084 wrote to memory of 748 5084 MyCode.exe 85 PID 3880 wrote to memory of 2372 3880 chrome.exe 96 PID 3880 wrote to memory of 2372 3880 chrome.exe 96 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3368 3880 chrome.exe 97 PID 3880 wrote to memory of 3636 3880 chrome.exe 98 PID 3880 wrote to memory of 3636 3880 chrome.exe 98 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 PID 3880 wrote to memory of 660 3880 chrome.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3388 attrib.exe 5136 attrib.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:688
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}2⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies data under HKEY_USERS
PID:2256 -
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend3⤵
- Launches sc.exe
PID:1368
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"3⤵PID:4828
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵PID:3912
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" stop windefend3⤵PID:4048
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE3⤵
- Launches sc.exe
PID:3972
-
-
-
C:\Users\Admin\AppData\Local\Temp\MyCode.exe"C:\Users\Admin\AppData\Local\Temp\MyCode.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\MyCode.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MyCode.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Upgrade.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Upgrade.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM explorer.exe2⤵
- Kills process with taskkill
PID:3412
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3060
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM explorer.exe2⤵
- Kills process with taskkill
PID:3440
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4048
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM explorer.exe2⤵
- Kills process with taskkill
PID:4020
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1104
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:4124
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:4260
-
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend2⤵
- Launches sc.exe
PID:2820
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"2⤵PID:4204
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups2⤵PID:4024
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller2⤵PID:4716
-
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start lsass2⤵PID:4264
-
-
C:\Windows\SYSTEM32\CMD.EXE"CMD.EXE"2⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Zusyaku/Malware-Collection-Part-22⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SetWindowsHookEx
PID:4408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9ab2e3cb8,0x7ff9ab2e3cc8,0x7ff9ab2e3cd83⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1888 /prefetch:23⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:33⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:83⤵PID:5552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:13⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:13⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3956 /prefetch:83⤵PID:6004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:83⤵
- Suspicious use of SetWindowsHookEx
PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:13⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:13⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:13⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:13⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6012 /prefetch:83⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:83⤵
- NTFS ADS
PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:13⤵PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6720 /prefetch:83⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6740 /prefetch:83⤵
- NTFS ADS
PID:4644
-
-
C:\Users\Admin\Downloads\$uckyLocker.exe"C:\Users\Admin\Downloads\$uckyLocker.exe"3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4732 /prefetch:23⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:13⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6572 /prefetch:83⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4112 /prefetch:83⤵
- NTFS ADS
PID:5264
-
-
C:\Users\Admin\Downloads\ChilledWindows.exe"C:\Users\Admin\Downloads\ChilledWindows.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6656 /prefetch:13⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5368 /prefetch:83⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:83⤵
- NTFS ADS
PID:1392
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"3⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:4684 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Downloads\CryptoLocker.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000002345⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6112
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6600 /prefetch:13⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1320 /prefetch:83⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6664 /prefetch:83⤵
- NTFS ADS
PID:4912
-
-
C:\Users\Admin\Downloads\YouAreAnIdiot.exe"C:\Users\Admin\Downloads\YouAreAnIdiot.exe"3⤵
- Executes dropped EXE
PID:5488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5488 -s 12284⤵
- Program crash
PID:2688
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2624 /prefetch:13⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6712 /prefetch:83⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3816 /prefetch:83⤵
- NTFS ADS
PID:1692
-
-
C:\Users\Admin\Downloads\WannaCrypt0r.exe"C:\Users\Admin\Downloads\WannaCrypt0r.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx
PID:3808 -
C:\Windows\SysWOW64\attrib.exeattrib +h .4⤵
- Views/modifies file attributes
PID:3388
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q4⤵
- Modifies file permissions
PID:4244
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:4884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 19301720277955.bat4⤵PID:3604
-
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs5⤵PID:2380
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE4⤵
- Views/modifies file attributes
PID:5136
-
-
C:\Users\Admin\Downloads\@[email protected]PID:1704
-
C:\Users\Admin\Downloads\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:5876
-
-
-
C:\Windows\SysWOW64\cmd.exePID:1520
-
C:\Users\Admin\Downloads\@[email protected]PID:1188
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet6⤵PID:3480
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete7⤵PID:5192
-
-
-
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:2544
-
-
C:\Users\Admin\Downloads\taskse.exePID:6000
-
-
C:\Users\Admin\Downloads\@[email protected]4⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx
PID:5388
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "flezefyfgw626" /t REG_SZ /d "\"C:\Users\Admin\Downloads\tasksche.exe\"" /f4⤵PID:5832
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "flezefyfgw626" /t REG_SZ /d "\"C:\Users\Admin\Downloads\tasksche.exe\"" /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:220
-
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:5736
-
-
C:\Users\Admin\Downloads\taskse.exePID:3724
-
-
C:\Users\Admin\Downloads\@[email protected]PID:3480
-
-
C:\Users\Admin\Downloads\taskse.exePID:5124
-
-
C:\Users\Admin\Downloads\@[email protected]PID:3068
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:3212
-
-
C:\Users\Admin\Downloads\taskse.exePID:1692
-
-
C:\Users\Admin\Downloads\@[email protected]PID:3580
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:6076
-
-
C:\Users\Admin\Downloads\taskse.exePID:5288
-
-
C:\Users\Admin\Downloads\@[email protected]PID:404
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:5996
-
-
C:\Users\Admin\Downloads\taskse.exePID:1980
-
-
C:\Users\Admin\Downloads\@[email protected]PID:4856
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:4396
-
-
C:\Users\Admin\Downloads\taskse.exePID:3732
-
-
C:\Users\Admin\Downloads\@[email protected]PID:5372
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:3988
-
-
C:\Users\Admin\Downloads\taskse.exePID:4376
-
-
C:\Users\Admin\Downloads\@[email protected]PID:5664
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:5976
-
-
C:\Users\Admin\Downloads\taskse.exePID:5144
-
-
C:\Users\Admin\Downloads\@[email protected]PID:5584
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:1964
-
-
C:\Users\Admin\Downloads\taskse.exePID:5408
-
-
C:\Users\Admin\Downloads\@[email protected]PID:5748
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:5324
-
-
C:\Users\Admin\Downloads\taskse.exePID:2952
-
-
C:\Users\Admin\Downloads\@[email protected]PID:1656
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:5484
-
-
C:\Users\Admin\Downloads\taskse.exePID:5900
-
-
C:\Users\Admin\Downloads\@[email protected]PID:6076
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:1268
-
-
C:\Users\Admin\Downloads\taskse.exePID:3316
-
-
C:\Users\Admin\Downloads\@[email protected]PID:5656
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:868
-
-
C:\Users\Admin\Downloads\taskse.exePID:3576
-
-
C:\Users\Admin\Downloads\@[email protected]PID:5952
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵
- Executes dropped EXE
PID:5892
-
-
C:\Users\Admin\Downloads\taskse.exePID:4752
-
-
C:\Users\Admin\Downloads\@[email protected]PID:6068
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:4884
-
-
C:\Users\Admin\Downloads\taskse.exePID:948
-
-
C:\Users\Admin\Downloads\@[email protected]PID:416
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:1152
-
-
C:\Users\Admin\Downloads\taskse.exePID:2284
-
-
C:\Users\Admin\Downloads\@[email protected]PID:5796
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:1664
-
-
C:\Users\Admin\Downloads\taskse.exePID:5964
-
-
C:\Users\Admin\Downloads\@[email protected]PID:2172
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:4696
-
-
C:\Users\Admin\Downloads\taskse.exePID:756
-
-
C:\Users\Admin\Downloads\@[email protected]PID:4732
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:5696
-
-
C:\Users\Admin\Downloads\taskse.exePID:5392
-
-
C:\Users\Admin\Downloads\@[email protected]PID:988
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:4044
-
-
C:\Users\Admin\Downloads\taskse.exePID:4696
-
-
C:\Users\Admin\Downloads\@[email protected]PID:4440
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:3348
-
-
C:\Users\Admin\Downloads\taskse.exePID:3668
-
-
C:\Users\Admin\Downloads\@[email protected]PID:5056
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:5580
-
-
C:\Users\Admin\Downloads\taskse.exePID:2384
-
-
C:\Users\Admin\Downloads\@[email protected]PID:5136
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:3412
-
-
C:\Users\Admin\Downloads\taskse.exePID:5332
-
-
C:\Users\Admin\Downloads\@[email protected]PID:1652
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:5156
-
-
C:\Users\Admin\Downloads\taskse.exePID:2592
-
-
C:\Users\Admin\Downloads\@[email protected]PID:3824
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:2612
-
-
C:\Users\Admin\Downloads\taskse.exePID:3564
-
-
C:\Users\Admin\Downloads\@[email protected]PID:5832
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:1704
-
-
C:\Users\Admin\Downloads\taskse.exePID:1320
-
-
C:\Users\Admin\Downloads\@[email protected]PID:4692
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:5856
-
-
C:\Users\Admin\Downloads\taskse.exePID:3720
-
-
C:\Users\Admin\Downloads\@[email protected]PID:4484
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:5712
-
-
C:\Users\Admin\Downloads\taskse.exePID:2584
-
-
C:\Users\Admin\Downloads\@[email protected]PID:428
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:5036
-
-
C:\Users\Admin\Downloads\taskse.exePID:3680
-
-
C:\Users\Admin\Downloads\@[email protected]PID:4636
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:5796
-
-
C:\Users\Admin\Downloads\taskse.exePID:5340
-
-
C:\Users\Admin\Downloads\@[email protected]PID:5244
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:5524
-
-
C:\Users\Admin\Downloads\taskse.exePID:944
-
-
C:\Users\Admin\Downloads\@[email protected]PID:3732
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:6136
-
-
C:\Users\Admin\Downloads\taskse.exePID:2292
-
-
C:\Users\Admin\Downloads\@[email protected]PID:1924
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:4920
-
-
C:\Users\Admin\Downloads\taskse.exePID:4260
-
-
C:\Users\Admin\Downloads\@[email protected]PID:1796
-
-
C:\Users\Admin\Downloads\taskdl.exetaskdl.exe4⤵PID:6100
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:13⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6696 /prefetch:13⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:13⤵PID:5824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:13⤵PID:6084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3740 /prefetch:83⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5104 /prefetch:83⤵
- Modifies registry class
PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2640 /prefetch:13⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:13⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6808 /prefetch:13⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7400 /prefetch:13⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1400 /prefetch:83⤵PID:5712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7304 /prefetch:13⤵PID:5868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1780 /prefetch:83⤵
- NTFS ADS
PID:4920
-
-
C:\Users\Admin\Downloads\WinLocker.exe"C:\Users\Admin\Downloads\WinLocker.exe"3⤵
- Executes dropped EXE
PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1264 /prefetch:13⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7580 /prefetch:83⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1872,13537266113389224318,13201219139530715548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7528 /prefetch:83⤵
- NTFS ADS
PID:4856
-
-
C:\Users\Admin\Downloads\dobrota.exe"C:\Users\Admin\Downloads\dobrota.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3588 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\1681.tmp\1682.bat C:\Users\Admin\Downloads\dobrota.exe"4⤵PID:712
-
-
-
C:\Users\Admin\Downloads\dobrota.exe"C:\Users\Admin\Downloads\dobrota.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:220 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\368D.tmp\368E.bat C:\Users\Admin\Downloads\dobrota.exe"4⤵PID:5756
-
C:\Users\Admin\AppData\Local\Temp\368D.tmp\mbr.exembr.exe5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\368D.tmp\sound.vbs"5⤵
- Enumerates connected drives
PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\368D.tmp\erroricons.exeerroricons.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6072
-
-
C:\Users\Admin\AppData\Local\Temp\368D.tmp\INVERS.exeINVERS.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\368D.tmp\crazywarningicons.execrazywarningicons.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\368D.tmp\crazyinvers.execrazyinvers.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\368D.tmp\erroriconscursor.exeerroriconscursor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\368D.tmp\toonel.exetoonel.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\368D.tmp\messages2.vbs"5⤵PID:1332
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\368D.tmp\messages.vbs"5⤵PID:5320
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:5000
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff99f53ab58,0x7ff99f53ab68,0x7ff99f53ab782⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1508 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:22⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:82⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2200 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:82⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:12⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:12⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4144 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:12⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:82⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:82⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4704 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4668 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4244 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:12⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4580 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:12⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4836 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:12⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4280 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2728 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:82⤵
- NTFS ADS
PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2728 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:82⤵PID:1440
-
-
C:\Users\Admin\Downloads\MyCode.bat"C:\Users\Admin\Downloads\MyCode.bat"2⤵
- Executes dropped EXE
PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:22⤵PID:196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4896 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:12⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4884 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:12⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5248 --field-trial-handle=1808,i,1385936444929221399,14176874472667683708,131072 /prefetch:12⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2268
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004E01⤵PID:4268
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1964
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2236
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:5072
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4648
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4564
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:4336
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:1400
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:5480
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:196
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004E01⤵PID:5352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5488 -ip 54881⤵PID:2948
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:6048
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:6096
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:4220
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3664
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
PID:4820
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa396d055 /state1:0x41c64e6d1⤵
- Drops desktop.ini file(s)
- Modifies data under HKEY_USERS
PID:3472
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
6Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\@[email protected]
Filesize585B
MD577385d864728e2f38583ee02d8a31e8a
SHA1f1dea50e7fb50216df62e6543c1dcd73dbcaf290
SHA25637ab5194b1bdb75b827eb30ac65b0d080f11f0737e036602a6755ff642346b2b
SHA5125dbd6e9eaa2f9e41c2dabd2bd8812702300847f5bac15476feb8fa5cddb0075643fac94ddf420805e1b4b9db3342354011a822e38ea861091f7d94d48e328908
-
C:\ProgramData\Microsoft\Windows\SystemData\S-1-5-21-3637012076-1497690007-2831451688-1000\ReadOnly\LockScreen_O\LockScreen___1280_0720_notdimmed.jpg
Filesize342KB
MD5e84a0a813a05527f4b3a10c021ba43af
SHA11fcc4a9ca994659b336b0352904fc2f041854248
SHA2568d81f404eaf0d540d0ff8556ece11755726521f672f4bd31a9d132a8f2d73c8c
SHA51234d834f798dd1b7076558337f401069c1d2badfde4605b847269725457683c823ae8fd16107c612d779a27b5c9aa20add4afdfdf598ab1eb7274c7db17285cfc
-
C:\ProgramData\Microsoft\Windows\SystemData\S-1-5-21-3637012076-1497690007-2831451688-1000\ReadOnly\LockScreen_Z\LockScreen___1280_0720_notdimmed.jpg
Filesize62KB
MD56cb7e9f13c79d1dd975a8aa005ab0256
SHA1eac7fc28cc13ac1e9c85f828215cd61f0c698ae3
SHA256af2537d470fddbeda270c965b8dbdf7e9ccf480ed2f525012e2f1035112a6d67
SHA5123a40359d8e4cc8792be78a022dc04daed5c1cc55d78fe9cf3e061ea5587baa15023ce2152238f5be5cc5124cd468f220cf9dab54344d93edd3dfcd400b24469d
-
Filesize
39KB
MD570289b7819fa6c4843f3dbf868f89f48
SHA12f7a6cd6e8ad0ca190acaf7ccf613183044a0587
SHA256ebfcca4ca03a8a89a73501632e23383d274a8cea686bed4359153d863652dd2e
SHA512cea9a878a1e109e80d2e2493d5bd2ac062a89987b67305b4dd3dff2b06f57c6b2a4f80d8be965276e85101a1d36df071c5e9add4940e18a2ae3d454b245210e4
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
19KB
MD5e0ed2d8c4a6bf4cb48c380730fefccbf
SHA16f3cfe4534113a98d8998b0323c000a3af25abde
SHA256d42f3497c975a5948f24c2ce541d9e7f5d833b41c72ff56dc941dac479fabb4b
SHA5125030719d91ecf0a4d874671b109caa7164b0f3ec9f15571b4feff2bc27b653aedb516468cf1974fb9cd8acf8dddce320372b82670ec4255057cf686b1080715b
-
Filesize
280B
MD511834855f4df08e99815bc6137be5475
SHA1502d6d954d956c0c5026aea4bd6de75aa2842867
SHA256026e575372c77e4d8b3561543d0848a9fbfea21aaf62803632a3e38941e8bdf3
SHA5126be6fc433c2f78073bf583208f824e4374a6e76462e150ad8521dff8cc788324a8510ee9e48ef6d6b485234101559c79fb0a17fac22208c12da24386610147af
-
Filesize
1008B
MD50f362b8eed6dd288d15ada52b8ba3491
SHA15987c420ee45a93cefc10083534d974a99f3b7c8
SHA256cea767b398e0c0c66e719f4a7830d81438912daf458834fcd3b3066fa7f05843
SHA512eaaaa4912b7b8c9b7be8ae570d338c7458705a5292e1cc397e9c33795c82facf5ef4386c8b61daa60e2ca5140affd74c04ecb42f18ef2b83d24daaf4245e48ee
-
Filesize
1008B
MD5ab2b371be1d9a29a5a1e1c9022ffbde9
SHA174ede59e0db7ad8ee16b74c6f0a1b7ae8d30c2db
SHA256cc613959b4ee68aca01aa999e267e408e9bc2da12c98193ed204be18537ef0df
SHA51224a73ebbbe0b12ad10c3ad7734158db3832ddb091a7b5818409c67977b65740ab950dfd8e21afad735fcc08cb179cef2a95e59ef861a1679cd8c8e458be80881
-
Filesize
888B
MD5160e5ae8733f4c2569f8c6d870e20dfc
SHA1a6a17220e2261a002dd4ee3e4cd287aee9b52e8c
SHA25654709a6cd8f8ea6309000b042511d530cf26e3b01f6a32e6cc39e2c12967eacb
SHA512518f389f193cd51ef25e17ef90e95cee19e7b9cf543cc8636849be67d3ccef0da3c8e575641eadf9cde22f00cc97a4e040b8bca895f7a04db315070525c118f1
-
Filesize
1008B
MD5b586590f0b6d8b9569805dea75d31374
SHA1313d4764a95df81f41a00cf67a1ef897c5e20522
SHA256bead2db04750888058beff7618dc0e4b51ff7e512eb51feadcdaefcd043dcdce
SHA5121bbdf9d47c38bc71c90c35af3b3e0281aec4be901f1183aa415410048409d615319fa420316a9108cd4d03ac210b90b6241f216e2b4bcf85295d59e0c9fd6849
-
Filesize
1008B
MD5ec569f3cd68d660bf53d3290a5c974f4
SHA13d87b86817a95872127ca8cfbcb63e4798b2663e
SHA256a9a867feadd73e9b30f62bd16a6f5739ee2c729d36770a2f16f680bb5ed03b10
SHA512592a6640d83407be086497a8b9d8f8bddfaa91862360dfc71e939d1c477004fc5ce19f010484a536258708d4df42287bbc3e766a2a5aa54d6309e4a93fbec478
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_download.oxy.st_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_oxy.st_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
5KB
MD5c9c89b236eaa95d369db2c466a069d42
SHA1e223baf75d023f488acddb9e14c30001e491b0f3
SHA2563a54e25d9e557785d3b1c1e87dcd4f142957cc808bfa4cf27d8d130f39614f77
SHA5125def9eb1e64dafbc684285eb2e7ca8608e3941d773bcd53f9b02e74c652a8ede88ce785c3ef061a615bedb7e295ff3f54e6f7184720b236bc86b3fff5f1e9c89
-
Filesize
4KB
MD5296a8d131b9db9eb217fc5194ed7c843
SHA1ae4420400cba78d8e1becf9b80caeaad60651411
SHA2560e6b0eebccddd749de63ac9dd104846b7e65d3facf5aaa26f722b15f661cbbf0
SHA512e6429b31988c4aa5da2308294f34c1f537980550d9f019ea4aaaf43ab7ca5a429937d47d00e9c105c2b1e5e1b5375cc5cf20988935340501796a2c02f7b5a33d
-
Filesize
4KB
MD51614e418fde24e3f9023d203d70cfbca
SHA13ec01f19c3c8855b28bcf5a817caf3c170791620
SHA25614d4dc2aa6177833e46ad5a3b412d5fec03b7f42facd7cc148c2f9d53deb858c
SHA51220903e7628d59335da87badc76973702cd4fdbf97624deb7ca6d593e04c8082ab12ec59bae72fdf08cbd7a3d5ee0d2d4494aec19d1d76d541b35d8bb34ca5254
-
Filesize
4KB
MD5c0973766f84f8de9f9d3c4e2d3dd6b1f
SHA19777ff6acce113158c8dfbe3ecf4d95998745131
SHA256ba5e65de2999648133a49a9f13d897b17bd523c9a9fd0000e6bf490990a0f3bd
SHA512a5a521ccfd405b2c9907525ae2b31c21c0a2fb92c951161707fd1761e44792580413cadb0f129535efc14d1b780857beb1b97e715cd08cecf6a0b380df369240
-
Filesize
5KB
MD5c22877ac0b98442e7eb9c3d0d24fdb78
SHA197b7d8813d25b7b7af00d9e7c3e51440f6828008
SHA2565f88fded5c3737a720085410acaaab3d09e127affe0387b04749647a76210787
SHA512fdf7ee13bb092293b617ded473bd0b2ee5b3b39be966d2cbc5d8e568b92aa500b4460527d5ce486a82fca04d4fd0af5bddf0e5658289f046b41cad7a9b590d16
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD574e1d2ac0c8eb4b1ff38311c634d4762
SHA12e23957bec9108948d31fbf5ebe3a225a74de02f
SHA25628aac4f8a3f8065d0559ddd48cf02aed3a934fb23a251bab6027c57fb943dc35
SHA512e9e10c65bd0ac4db6d185b7475f58486846aac160bcaa1396ea315a7d5a31bf513fc3a0b746eca9fdc53ca1bc422fb400430d23f8602f4f2d5997ba9b7bbb393
-
Filesize
2KB
MD5ca72fcca364617aba0fefe8ef194194f
SHA19db58c9e77b2680eedc3dfdb5eddedeadcbd2ccf
SHA2562c7d20f41eef7763cae20ffcd86c801534a030c564b8419efa64261580ec8c60
SHA512bef0bb667ec4f8692e1bcff3f7b23a94a268b9f362f62f93f6dc75e7c17731d45880624603afb8c2f49f45d51dafa8f9731cf60beb2efed970feb43571873c60
-
Filesize
2KB
MD51730af8bb7cff3dbf2876a644bae59db
SHA11922afc9db3dc131dc0b365d7c645a7e9ddbb960
SHA25635f90ee5493bd05ce391a5407ac1c0ce317aec51d80c563b6711e276c9af1ad7
SHA512b73c5ec8afe1fe67655167e2a48afc2ce6239b69003329e04a7ec233b61a7cd651a83cdd1347a362c3ea21b0e19701295f7a71090a05330e72d23f11d482b52b
-
Filesize
354B
MD5ae07e26cec43686a2d94bda28e9271bc
SHA10fa665962e003df96c1beed0628c37cc5425b321
SHA25645ba03470a8d8f193db7f5c99db3265be2b74f4ecd149282e03de264bea1524b
SHA51242477942faef79c3c198140c00d9e652e36fde79047841f9869f460d2b8a3a3de96574e4545f2bd939f0fb3012a0924eeb5489167780f91b23ce6de284605709
-
Filesize
2KB
MD5e7497a3360b7e7235e1e954f20217421
SHA168107a10617f1126ac7aef7ae307d4893e094bc6
SHA2561625b79273305d8dbcfe1d751fcd58d9d20454565c0ebff8c9ffdf6e0f293703
SHA51200348b230c3666a71262e9a5dfc5f66cb47278b1663ee11b1a38123c49e4899c69600bb842ccf17a4fb41d6265ef83592ab4df4ffd6c8c5178ea4b411e52803d
-
Filesize
6KB
MD54415cbdc3b679f5744fa31c596ae256c
SHA173106e54e7c36342fb0de1c57196908441be3735
SHA2561ad45c155221c665b5fe0fafb13f2273109e2b1185d5cb00c883d89ae135c643
SHA512f2bc5f7d6862dfb264314f89cc051bb454bb6489e9e1bc4bb5024d076a36c77cfb5efd034e8390801f6024556f7bc0f0c06391943c24cc810e4f280e6bb05fbb
-
Filesize
6KB
MD5764cf4ba352c80b26f44ef0dfac1904c
SHA19fbf2c41b6a895eaaa476df22f5f9830da0674d4
SHA256c315954456dc2aedce9f36eb37426f9e55a5498991d38f9782e058d762551a30
SHA51264083a713012ecb17ce5b589dca161bb726529c91c3fc105cd79002f19f0b4186614b09afa02802fb49ed2090e0b1a74250889d56128dcaafd488eb6f5714d81
-
Filesize
7KB
MD5d3183abfa4ec87a051e8fa29f48808d7
SHA117f58cd3f2dd41d9b6eb84bc23c7c161d22d1045
SHA25694c10ef51e59a65ceb7c8a5221e75b68ebea439e351bc9746d81356106a45456
SHA512e5098c11501f032fafae5c44ee91fea5d9c0316a6d317422a732387fbc1162289706868138438deb45171a9b051de47302e93a6b718bbed899dd6875a2bb625c
-
Filesize
7KB
MD5857a21c30d1bcaed398355bb8d4ae99a
SHA107ef6a408035c23b2e0e7efaaf06f26057f4552e
SHA2561efc0d5b8b7df32de547e0e108367b4e8a48b7cca064853b04cb0eb7e1971c87
SHA5122b17dc89da1107551d621bee6c37ec18356a0079ba64ad655993a8d1dd2e196bf10b97fdbbbc5ca20a504c008a72f08ff765ab74004f2faa9a7cdc899683fcaa
-
Filesize
7KB
MD5a338568191c0b1ca9badbef0220ae0cb
SHA17f85eb6c96d1f483debcf33eb4b90d471d16b7ed
SHA2565750b7cb2e010b61f4331deaec977d608441bbf9c4923a75cf3bdd1192fc205c
SHA5120ef8bdb737be40cf564299da66df6a5d63380ffadd8ba85bf2a62a8d724311921f6c04227c9120fa2981d6ada76dbcea860f24525364567774173ef51db95da9
-
Filesize
7KB
MD56bf09521af51bc03c7a776f59e1ca946
SHA101b6830e7a6baaebe03d010fbee8127f79d46161
SHA2562123e657f47bc60d2fbca0cd71cfd43eabf617394ec8ef0bdcc64ccd7ab2fa1a
SHA51252efa781f822f0bc98217b550edf9e3973e9ee29dda3dfe1bc28c24a1e731198f3486988b99fbf05ae66fd7a48b009587086fec11aefb3d1e56ce30fe37e9774
-
Filesize
7KB
MD5f62e84d745559202ad250fda4da13fe4
SHA1a57bafc05c474b529febfb1299cfa98db97915e6
SHA25678af568b6e6ccfae0686fe6fac010ffab84a1a34b575b73b2819648afe6e0a84
SHA5126709a0709e4919c6be24a620cf8b6b1db8a7aa8357529da6c1964040bb36cd0c8faaad0299a9a661dbd2e768bd986d509e391a10664151c7446a629981df9380
-
Filesize
6KB
MD59152a52405690c5f12d5b44496a0315a
SHA16840a5c5127ff3f80f38eee97b6312df677e8b39
SHA2567ce857e6d901208eec0e35eb6e11dc635b65499491b5f3d0f28e8350375976d1
SHA512ff9252fbfe66541bead9face64d20800cb962143bd8fddaf26fe325f9c2c82634b7b517139253bda4e5e31ef4d6f6c699e2d8ed18560906f27f52f64192e4f0d
-
Filesize
285KB
MD51ef1dba3948fd28b626a38cc905a246b
SHA13f70e4367a18d8546b84908b43558971dd7789eb
SHA25693adf693e38517d7f7e9ec348325c620a7a482358c9b4ddd630e1f0086dc2adb
SHA512ad888a1e76a11fabcaf235af6c21723cfba161b7b717805c624640065adb151c712922ae096ffd7044921cafbb7228d776412a77651fa4fdab1f6547c5790c08
-
Filesize
285KB
MD545667cd80a1f9c7f7b881d2f7ca3e934
SHA117d71e84e930fec16f7b41f087664a90923048f3
SHA25605de6dfc1bba495048c261e1f69c1ea6ba32beed4d45ac4a61dd746b5824ed18
SHA512db8bce5d465a95f20b3a6acf9c1d5b35c12059f7df7d154a00c93e298199a39711a72b77f9d888a35b2d2b25c91ca442241b7c347682171509a7f3f58e24fb98
-
Filesize
285KB
MD5f8aedad02975cb0f246f24a1b1a576cb
SHA18825d7b798e61d3fd87d4b63d3a2d382fdb60727
SHA256bc390da51bb6f2a9eac21a7c621c475d3170afbc3fbcf4196650328c066c9816
SHA51250df1987821043d6794d69cf0267237c9fd0a8647d65089da6d224e8e9a3d8a4679bae68304d570285a85d373620987226e8c727e5490028fe35e44eb01ce323
-
Filesize
98KB
MD525f97b29af2f95863c3a9ff956ae8340
SHA1f143d029fc9616b9eb3c621992b5114abdb38e53
SHA25653dd887fb3146cc7d2de110d209d3179f6442098b9d3dcb107c6f005e494ad56
SHA512089f5e46d11784ff051d0c2f1c7aa9198ead49733b51010494a196b42d5c7409e87668cb341726ead72770c6c27686e2a163694cd00a0a9df9e6478279953bea
-
Filesize
83KB
MD52ef3a17f8b025d6cecd4e096be4d2d1d
SHA110f6860ffccc5cfb2277f0a77ede1f4e3725c478
SHA2562dc28a940a192ea343d1e0e2c1c043a1778315c15071e9cf35cb3bc15c150e0b
SHA512b5f685e4acf7d234855f6d30288433a37e646a744180eb8061e1a675740e7545f24a888587ece06630a1f1adf67695fedce8190b71f23fe44911c1be48a6f9cb
-
Filesize
2KB
MD5437395ef86850fbff98c12dff89eb621
SHA19cec41e230fa9839de1e5c42b7dbc8b31df0d69c
SHA2569c39f3e1ee674a289926fddddfc5549740c488686ec6513f53848a225c192ba6
SHA512bc669893f5c97e80a62fc3d15383ed7c62ffc86bc986401735903019bb96a5f13e4d0f6356baa2021267503a4eb62681e58e28fcff435350e83aa425fa76cd64
-
Filesize
152B
MD53f42f939f0a7c91eef0187527bc7babc
SHA166d141ee21ab2de3a37f1d92e327aa184d828fd5
SHA25664a131bb18bd4844b4ea4b6bc84727c638b94523be764dad0b1407394c457c6d
SHA51218d62cb1f7d7229c37432e83f2356c865099caa9d43f716b465e8624d9288b1a3024bba84a1e83f6721c31a71eecdadf4118848ce4a63bf1230be4e16ead4178
-
Filesize
152B
MD5b297afa13018b3e24efaf2b905677172
SHA16d6d01d9b35901af0f4976d0819bab393e920f98
SHA256e810acf7bb28b7577c33ad7b22b3b849858e45e9c16ba316b0ba945ef48337dc
SHA51272dc4db9a40e9e0947c2d58835a75077d65f1f1939463aad5a81368be891890d8d19d1d9df858c957b5a43998ef6100b29710231496636cabc66a1e3a1cc6c2c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD51270b806641a6eecb88897dd24437a1a
SHA1c17057c62728cae9657bdf378bc9cced502abae4
SHA25671b336b778060853d20f032d22c266c30f2ffb1852f316f9f1b0be1c20ce7cbb
SHA5123ba1e20a61ad591ad34ef0c7dbcb6a357abce2045a2bb0f3caf166b89b1aabf8103375ec666273011df100c3331fb3e9ad29a3d081b57c1145ab078744d1cbf1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5525b58261915f7e62606eb180f7a0e35
SHA141d6b07dc11a47c01cf3a584dabf679e53374fab
SHA25668118b623250dc6f37b8a8b3e24fb735c5df3f7e7fb5e873847b6568b62a4c4b
SHA512bdf144fd7f5cf3ce995cdc744ee67065d6a60326d5fbad88c149232d47bfa2c9b3ff88b0453349640dd131f45bad6b6dcd75ab8b8afa5889d11d08c224ac2f09
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD53b1ea0841dcc168b9d4792bcc8a20de1
SHA166c0c2b89719622ebe628912b03e83728a4aef4c
SHA2568a0995a55dd1b90fde60aff6f7af457ed90c70d83482a40c855c62d0a711a7a8
SHA51206536f3a25395dce99126bdeea322fe8ae5b7407fe9bd47d213f5b2b2ea882e85ff7af0066faab8a9a94c8c2a9fdf497b10fdde8ad283f215c9da14f671b2b9e
-
Filesize
579B
MD5ed5f4213c17629776cd75510648fc019
SHA1ebfa685dca9b7c920cd5ad521c03e4ad0ce435b9
SHA256e969795f0e63ec8a35cdf34d5bc43867ca0825bebfed9734943e69b34ed2ad87
SHA51271bcc166ae5a48f7a79aa5de7ecc7e10dce22c39240ca9ffe9d0f9340f40fc2a2429529cfee8b2b5d7082efe94921fa7df3454852d5313ff4093bfdffc189627
-
Filesize
796B
MD5b9ed58251c513d99e2d0ccc3bd4a0cae
SHA16ebec89982f01caffb87e04d5712672fc71f9616
SHA2561450d6a6092245dcbe358439e37cdc01a31ce17021e92e8b7013cae39ec3fd23
SHA5129fe796f84d38ced33f816ec35d448f209a76bdd7287d6d7951b84e3eaf10ac3fd64ec8f563320f8996cdc03ac87601911cfad18a14161df055d5749439b9ab6a
-
Filesize
5KB
MD5d4310245f025a6ff4d4a5a5c6301ffbd
SHA18e2a900581b83a09b6d3ad14e13699ea05f18999
SHA256f2276f2352fba827b08023ee1073ae21ac7f9a8c79a3d33cf325d22f771d5e8f
SHA51205773a47a41c3641bc3a36f9030cbe3f345349be2fd16f6b76c1bde3753f3fe135643be2cb2962e7f6dda8fa27d85d60ced9f85fe0388f4c4541c81f9c8c3990
-
Filesize
6KB
MD593819318aede99d5d6feb453088481b5
SHA1f6c35f321acd074f77f56f85a221416e89b47831
SHA256e910d9548386326f4ebe9dc2c247f905bcb329d362402d2053d021723598bd31
SHA512e5fb053d505532c798e1afd9f058e6597bed4e66b66ee2ebfc9074e7ada9302505e5ca91a131a1d3d5244342d0eabb7fad9e54a1af12a39889fd7221016392ab
-
Filesize
6KB
MD50693bbb4ac5c40883a2ef3c824c96e07
SHA13a99b19e1bb85383622e8783abc9574c35772141
SHA256ec061123bdd6bc0d31cc464f474c5a995be4529a8ff3e5a6d57d62c05a5a4624
SHA512a81cca81a15e828ba4edd61d696c32cbb484069b4bbf6093fddd5e065a2868317f9b8c77a6483a0891d40126f7ea3c4f34c1a2ad8752155e245e397b2e1308dd
-
Filesize
6KB
MD5a8de41894413c46af8c5321bca2386b4
SHA11e915b7c5ee269f2bd1cf7398acdc1f1bd70b0ab
SHA25695187801fc2d66d8b0f2b4b834d1f160eaf9b95e75eac36e83ea8361241fa8fa
SHA512b1d2e315ce1f1d0842b2a25740d263fd7ae79602c9ed1bcfacf1ba50206dacbe051fed3271d977e5df4ef4b39463931eb9ebe4a69afa190d035f61569c695605
-
Filesize
7KB
MD5c45b8d9c981e3ae04979829657aead80
SHA1dcc5540fea85fa82ed6624d4cd05422dc8519e6b
SHA2561a27812b60114e2ee8a290942f0606ba224aeb3a88093198bfbe7f1f241563a4
SHA512ab9f66a3a726917736955e6203e172c154c66468a57d6eaac46e94d69cf246c4cf325fc808a8e80d0a228d11581dc73fc9d4415ad717798f72c61ee8db578b1d
-
Filesize
7KB
MD5990c72caaa71090979b0d5c791be2743
SHA1037a02455711456c2ae4736f60b4a57d256a5aab
SHA256fef3548243d2ab0d6dcf82e8db118e173e4b9d452f6c4ed561cc8658a7d8f2db
SHA512abf7aaa083d1923e81b025ef2743eab1b9f11055387a4d174910b5278e80d9ca25148aaceb0275ca5d45ed8b68ccec6b4766777c82d9b07cb1fbf2a93cd7cf39
-
Filesize
6KB
MD571b10bc47636a837fed628d60a7df4a3
SHA1ffb533c182e150dc1f69ecc30cb664dda9bbadaf
SHA256e4af6c18d33eab2d6b5ba3cacf3633485440b45bdad9ac73907a88b41c605dcc
SHA5127caa5ad612fd7e593984e2bb12873536875e7aa777c510993ba2f03ecf50d1573befb815972a54d24bd56ad698b5ec04e4b6ffd607eff6389c2f3603f1639bd2
-
Filesize
6KB
MD5cad21e92a39630395615aebb0298c923
SHA11038124efa07de616b4b83dc5a50592e6013eb0d
SHA2563db37431fe20ebe7364eed1f67861199216d482c121cb9693a2791a6279f4254
SHA512fd394e9c6924a169ea2c7ea7e9e28d4c42935d9a0aaf6f4959ed12f064ce1fd0687d8e2f8268ec307c4fbb050e601dd0e0c6ee4ddcd6a68950be751869e177e2
-
Filesize
1KB
MD56b92a39aca4751886a3e4773dc465296
SHA14681a24fe23a26557ea6a1a1f62f5492cca45693
SHA2564be16ed569fb184d2aa3599fa5847e95992f0b9b06d9f5833a06122acdd01609
SHA512b1852653cf40911c34bdc1094f636c5d8fc0cb3c64418ef6d8e52710f1762b920177df8dbc37ff2d61207503b41ab8d0f5fc703a865fada6321862717fa80452
-
Filesize
1KB
MD576bba66f3716e7cbc81794297d89746c
SHA1e1af153b74e4ca05de79b7332deee1a37f1e1b5c
SHA256a3403efe2a9285cef262e322950937f56f29597356e365c845e1c46e5aec999d
SHA512b4a13ad743d04db17692c7da2e78d939b328673fd08d43f03e14fc323b6aad58d3116e82a318759ca214581e73defc733972a250548f608bc90d94231da82d1b
-
Filesize
1KB
MD5af93b8dc92d2a9ae9ca7135b49dd21b8
SHA18fec2666dd01090a305a97f390e34ab2228b8ce9
SHA2563e78b0af57a9b100c9beb6640e70ae1c9e96266045d88617e0c5ba209ac6199a
SHA5120885d362f05cde32f65654e5a55023cf2c1a68a85d27a33f729c9df6fdd5dba3b116319db1b1c90cd96cd191a100f52b5006f264d7b3f2217cb94f12b5b93215
-
Filesize
1KB
MD52f855065350b972f48a5860252f09878
SHA139b3246165e0c9e78a6f665f55ccf3de707ad142
SHA25659ae3d5485d72829936c0bbd72b126f5ade7af04ff4949ad93e4e66dc3952711
SHA5121eaa0cca4074d81df31e9ba7e2de183e56e64d0b8019770105d61fab4177f88e72fb3e25c9bd971a1ab994c2110e1ffea44db3c0a243fc8822f7e4509d92d21b
-
Filesize
1KB
MD58872597c3c4cece7865b933ac5483f8f
SHA1f63647b81f9a8a306dc5bdf1d708f6afbc0db6c3
SHA2562e7662eb49713b5227be3d7b55740ce1759930cb9e10119348347a3b27582eca
SHA51220d33d9cc43d953c2399a80d5572c8cb7d166e9c2e83e49ef3d8a732b64773d7df2111948d01512bda71f2d3488e1e455fc117ac3b5bd34c5bd396988c31adef
-
Filesize
1KB
MD5133d25f31fcf6bd6a0bc98c364b830ee
SHA12c9969836d81c7cf3075448a247014f2942135f3
SHA256d139d4729204b03a9385a751ad030d08ea5eb69a54740336672cd8ad474cfa48
SHA512dc0eebaa95fc65a4def799f460edf0e8d36e841f8d3d2c93ad94b4cede1e07c50dee3875377ef83d6315619637df8c2101fbc0c6f7e0919a201f39e388083cc3
-
Filesize
1KB
MD5ec36206761415c54a42057fce03ff54a
SHA164be2ca711a073bebc53068afcdaa58a981d7949
SHA256ca27b6f31a555a6b19b4fabdeaa9331ddb20dd24ac98c9a96d28c58294cbb4a9
SHA5124bb58b0062742c4a1650c0a4767bb1657ef4f7c5b103e984ac2019f9f14472b9b0c7b9b0ca0e905ce25cf29538b23a0b1f471707434fc515f5552c50dc9acae8
-
Filesize
1KB
MD57ac18fed501732fc2d9a24fa94366706
SHA1abb9c08e1dd98eebd2405081580224461ab387c7
SHA256120382189f618f8787186e366624588c2dae35a876a789dfef023e023d926e4d
SHA51211012f262380960539c52a435748ab2f236952c35ed0d428530888d8771a2ff8e46f1aae60b882ed8da496df7c0dfdd2e500b9e2ddcb1dd124743899bb66f438
-
Filesize
874B
MD531757e59d1882a93a22fc9f565966ebb
SHA1a04f37c8d05d01e5cc9791a3e5ed04f1dc229cb5
SHA256e071217606d45d05a1cfa78de6f17da479e82665d270bb7ccda5c490dc0fa65a
SHA5128e9f2e040646107aa7be8948eb90763b2a0eeac6d1ee314339fd977aa6708c2111f8b6c5bdea0708f66ef1d5509144e4ef0720df6bc32c3877a79b83b7d6dda8
-
Filesize
1KB
MD5e1f98bb7f364466a37110cbf6bba71aa
SHA15a7f10c3c2a2b025ac13014f1b9e9c1771e8c250
SHA256e37b4039b9e969a8075142fc7705e9e639c0a271c743b63e77eaf4d42c0363e8
SHA512fbfae1101529708abe641dd4c2fafaca3d5a5b1f9cbc02b5a4963cfd2c750102d7b42933ca07bcaa31f5732a9181a5a1808fb7b998906449a5e177440ece54b0
-
Filesize
1KB
MD5a3c033de0e0eca8489eb4c932cb32963
SHA1d5b7fcf38eade7a254feaaf4b2f6781b3af5d859
SHA2568b7dc3b3aeed692a302fe039d83e3082423f0c7ee36dedc1b301c3c012da2524
SHA51251a68609c6e69435c9edab5c97492e89dd79590ae83a40501bb513820b2332a8ca496184eeb4b81801557ad55ce501563bfe401d557cb91f967f7a73c2ea950b
-
Filesize
1KB
MD58540059cd2790d5d61e447e1babf9052
SHA13ea924b604207e4f22c35248f53e06fe78ee1180
SHA256ddcf970e24dc5bc50c721561df5dd28857b36b3eb655f6df3e3455818a498f2e
SHA5120c81aa288cc9835a3c22b90919e8f2f258862c06e216043d85d2aa3f8e08927b56cafe523dbcdd401dfcf466d80c754f01ffa51743ec9322f124a71ec0064e4b
-
Filesize
1KB
MD5390fa0c0c2e3e8f2ebff0e5f401d00ab
SHA170c435345578982a9cd9837bfac4f2c66c736020
SHA256aa2cffad43ac4252e6c2a0b19e06cefc81e852d79ce75a1407466486110b6e17
SHA5127ddd20b03dcda06cc1ab58926f77a1324e7d07713aa00e005b8fda7f7748cca6e15b1c15979bf7961cf3d7167a43d808363d59003a38fd66fe3ad5bab74e60c3
-
Filesize
1KB
MD5d191cb47356507117dd3e3f1e3c47188
SHA10742ce2eef81ef966b3b4e705295337fe8a1cb20
SHA256262748ebb738ee9262dd11529831fd39fa68253f9ce0337bbd50aa9c71d0734a
SHA512e013270a05e1d65efd8bedb9d7ac42a34e8c6ba4468eaf9ab8ae9d35f034d2bfefa732c5eac147777e440c425a7b55a021e7b77c1b059f4e12341589b6944efc
-
Filesize
1KB
MD57702a606e078d6fbc43e449814110260
SHA175bb0f255276e0a7a466ec047ae2bc9d2f39781c
SHA256362d404baeeba0178539b4782b8f6ddfe66ebd05b683327f1efaab78edb97144
SHA51266d394f6f613b7f077f29f9a0d14f1f8a9bea18ecbe9b5f757a2312b2bcfb650b9cf72c25193ac31f602a8645c051598fc4d5fe74f35ee0921471776e47e8588
-
Filesize
1KB
MD5f73f15a3e1ecd512ab09276fbec23bf8
SHA16c6c69569076def57807b4a364fa149775e27834
SHA256f38dce17a09736065aef623b8bcd07d37981d5ceef4f07e8947d0b0bfc84fd7f
SHA512dcaa42dbb34b000cbd3c06dae1a070481a3f63daf4911701fa56b57bd7523e077598bd7458119fc290d1690a42e0fd02a00a44b664fa91ac4b4597effe8d10cc
-
Filesize
1KB
MD5e7cb9c795174c60e9c9234873974c411
SHA184582cf4cbdd2cd2c933d44dfa96b748592e3127
SHA256c197f2411f3bafb9543c1ec28429afc16e8f6d1a4ae32ab009089d5e8ad03ef0
SHA512e509feceac4c6023dd7a82c490243e9a63a0422d8d39a6770a6eb579dea426c7bb566af4cfc512a69fa225c7603b8ff164fe02e9ccfb6b64ea1251e8312754db
-
Filesize
1KB
MD57e98cf2490ed4c74c1fd76f3bc7f6209
SHA155a2c69f1dc630345e3e73ab3004323876f4f096
SHA2563839795d706ed72cf6fb5bccb03e2b1bde1ae2cf7f7c67b1bf7930616f36e8af
SHA512cc9a1dbca04a20a7891460a670ac3219bd21f6a279246b0629eab573b7dc0ab9361a7dab93524be7766b59970ac1c3e9a3bf960994d8de54c2fe37ae66721d9f
-
Filesize
1KB
MD5aad69d5476905bfdcc4e31b48c7b1ef7
SHA115591f389b867ac409b3bb5a2fed9aba106c16ea
SHA2565023a24756823453be7400d0881c8af368e7457df9365341adc6c09888152cef
SHA512e44c1cb6c7e525522418fb8c05158aa484f9dd1469f669cf8dc3b831e62a846288ceb064392980964debcefe5e4a7f5535d2a237bb852fd34748d0a0c4730beb
-
Filesize
1KB
MD566a7c4e5e3b049b85b590e4f8352bf25
SHA1fc44bd9bb646e029971b27da3232cca7c565906e
SHA256345fc8eaa5684765a35295e028e88c90508a34ee0fd54375f804de0eb8496180
SHA5128676d25bb0631980e2d441df33923a2af19117d97480ffbc80d6a7f66d215a784bd1eb69d754868dc1f818e34f7b4376249511f8b80ad86c2cc1b6b7873f2a2e
-
Filesize
1KB
MD58e0078a332d526e5fe2039767b91a620
SHA1b531316dcf1d2520b33919ef20e75f359a741d3a
SHA256885624282af58163d7e433941df99b06aa9c5fa21fefc1d837ae8360c118fe35
SHA512d08d9a2b1f227d276867047abf6676d6fd9fd6490604c85a7a89cf47282f5665492f1b9af5ace7db2c60d1baa8f50cef451fecc0652184ab40166efe87c9197f
-
Filesize
1KB
MD5df7f916b697ae658e3ff2834a78a2f21
SHA18f55941e5b244bb660ff1d4ccbf581ab1eca22e8
SHA2568ad6fff994475b26807e681b5270e7a8b3eade1bd1552b25f81c88753cef4901
SHA51279918e4ad92fb709e12e72bd8276637b74ed524a37ec2e1eca57da2644f2f006ed0063fa329b03924466e01caa82b271068268030188668e0ea951b0e73ba86d
-
Filesize
1KB
MD5f97931be2c4a487fd14577ab492e865b
SHA154dd2867936b565bcc350c063a96f077e7699241
SHA256cb8419c9b63e987c51cbc9c8ddff0887f1214706d117690157fed7964ad091eb
SHA512336a8f01cedaeded0fe7e9d739445c41b6f3462b614d11d0917f22793737bc643e1ac8fc57b2e2fec7f7b31fd487e604fc66e0aba3bae46b6537e1237b20bd88
-
Filesize
874B
MD5aa2ba9dbf5d9040033603e245a227f4c
SHA1a87eb2879821200e72d5e5b01a83c30a190efa19
SHA256f91f034262f9b93be82f9bfc9eaa2a5de2fd7767108acff4d8ec8ec448493958
SHA51253ef86e071d10718d836ad349f34942bd64649617bdbe4fb4c0f0ddf401a3bcfe73bd2af16db593a5cfde7264fc90ab0b163c1aab79ee7b5aed3067a803abd7d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ca33cc3ec47fd86acf38de8c1e68e646
SHA10172a8601fb5dbe3a3986b95eb315fe45cdfebc5
SHA256161e595a067453d776ba1439302f6127bdc8b69b3aeb2274cd78bf9dff486a9f
SHA5120f29ee9ff25510d17fe36a9c9e7455f4089ce1e6da34e092771d7bb1fd775b8eb4dee9537e73ddd9eaecd7a82eef6a3d54395f37675fa7d00cac3601332b004e
-
Filesize
11KB
MD58c58025a32d9c9235b0c2cc22454aac1
SHA17f3709ce9117fbd324573551a1b47ec8df29b81c
SHA256953bc86aa0ac57f76f5839aea0e2d3abd5fd595c690bbde4928144d16c604882
SHA51255473e1a1a56206778acc91385a046bb8433094a783a33bdc766d948e4273594de7e65fe0003b20687d0156251daace67ff8894796672255f40e8159b4e44b29
-
Filesize
12KB
MD5d813e308632789d1b61c021b8e714bd4
SHA1abbbf6458536c7f55f6c2f2067aff8ee4d3d68f1
SHA256c784c70703b495fa5530685fbc95fe153fc925a16096b1bb1564a6bd656333b2
SHA512a70f434cfa70d648c25fb1cb6db0d5ccafd6de2ddb536c759da0123f5320bd3964d02ac8fcd6afe1924f14bc1a7e2eb521c37a6f8a9177a0a8aa5ccea61ead48
-
Filesize
12KB
MD53214bffbd331db8306ac75443094a8ef
SHA1abbb0306ad3adf093f7262a9e04c938880e902b0
SHA2565b36f9d5f157b5adce8932dfba272af5c194245bd4369cbec99e19d244c40102
SHA5123b25a944a814d3592208d29e8e02716ce9c73e39596307a5be712c5ff7fa95d6d33c6057dd7fc3d405779876cffb86c796a37d4558ae633c883cd188471d80b7
-
Filesize
12KB
MD510221588f23850a412ab16b63bd0857f
SHA108bbdc12b2371d60fadcbb34a59ba2a0b76ff00b
SHA256012026f662bc1b857ee56d9bdfe86d99c87e02ffe7e742a4d5a8c99e85fea231
SHA5125ed24500f7f17a730a1488ee537c29e60d224811dde5aad257e360115459da886191e3dc3713f5dab9c8444723ac74df5f29181242a3afd0ca6d73bb16367511
-
Filesize
12KB
MD501bf8b1253fcd4a0519a1f64efdf179a
SHA1a63b0734dc97befa68e1b54f24dd7c2405307ce4
SHA25698fbb24a6cd7a732a7ad622aeb8327470f4a5ba37fb71f80591296caf699ba18
SHA5128939ebcc5e24449a71d87c193e2941af7afb20bde500257f2504e930e6d4612485a90f77a8617ba6dcb961e37a2869d9d957b1f963b35e817d72fac65daed724
-
Filesize
12KB
MD5c7d79d1efe7841ecf6de73b644d83259
SHA14a387d0aea4c22ef7191ba2ab0485c28506c3411
SHA256b4e9e9ed1a3f34b0d12526dbec02db9473ae2da02e16dbfe895c4ac34646264e
SHA51227f6213d12cce491da44d370d4c9d62e6a11c401393253aec858539a5c5710acbcebdd447bee927650e30806bcde1afaee64315d7fea9b2f63c7eebbec3616ca
-
Filesize
12KB
MD58d14156b1d19c1b34333d09be19ba9e5
SHA1798939800e1817681fef39e1517c1c7ee71ec5f2
SHA2562b45bf700df04632ee68c3be31dc274b2993d843307e6a1f4d7759060000c3bc
SHA5129e7806b9c60b5f03407187c13da6d2c0082c3d899befb55a69caa1b3930e2cd98190163c3456f5af1dc84ff118d48fd22a0b43e85f1e23ec9825fcfd10df8fb4
-
Filesize
12KB
MD584f3c158d2c3a9139994ccf092baa6ed
SHA16bec3164d48f5bb847defceb8bc623cbbb09fd23
SHA256a9708c102533cd6fa867b0e89d97c12a75bce3a320da1b8de4a590a1d7ab5cc8
SHA5124d25f0bf1d96ded68d3b28d4ee576ea749828509271771e2de18d899e98a5987aa9c0072a73045c7e1ee0a0c76686aba5bc8a2eead03684b1af0427fb0873759
-
Filesize
12KB
MD50ed802339e4433cb5f64cb4b9c85d979
SHA1235626433a6f995f287375d321de5830c1e975e7
SHA25628bb14013f1e7c63e82a861b98d17f365745a2a73fa58e814c6728eb8824091e
SHA512ffb3ca56b2b03176d7870ebf8f1f3134917b014be602c263f9f6c8e08e6390ca5e3d12b6129a98a817ade926d091cff87a9406a4557c398cbf88a1e1ef055d07
-
Filesize
576KB
MD53bf118fdc66f985cf39841d123862335
SHA1aa14558b5fb658f8b37c1c38158d7460275c94e9
SHA256457e56f40aab539402cd43e0718bf2c0fb35edb84161a26b2125289e97c8a618
SHA512ad6494a098f478e7a040bdebd13fcb4df182cf0c9b8e6bcf8eab36dac7bbd1b37d745251e97c5332274c6898cf5e3b552ff780ee2e05ded66a2aee9240e7bca9
-
Filesize
706B
MD5f7bda1e28b567429e1387b36fd691a44
SHA1017b306d79cdaf3820a9ccedd8cab99c0921eda8
SHA256405b911415178c568cb8db3efd80114710b46c276bb7bd1a43415b0c3bc5bbe6
SHA512cb602de2cddc3c66812db0d4c385b5681bcb2944e2837ac9dd63fc4c372da8c54bc53435af8948c20c439aafc82b37641b7edf791dd4d1d6450a3104aea58014
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
14KB
MD5328927f828456f3e39c2be1b12620358
SHA1a35ddc923f2a4747b2789416040c7c9bf0693f1d
SHA2566f660f778694e4a28f753be0d75588b31dc0f961e335dfeaf0b268498e32ca1d
SHA512d09bacd490eebb2fc9dabd6ab54a90e168130304c175465e1b99da37f5ce2fa8275e81d271771494d7bc3cd99abc862a14a833f73870ca2e22d5172f1decfb3b
-
Filesize
24B
MD5419a089e66b9e18ada06c459b000cb4d
SHA1ed2108a58ba73ac18c3d2bf0d8c1890c2632b05a
SHA256c48e42e9ab4e25b92c43a7b0416d463b9ff7c69541e4623a39513bc98085f424
SHA512bbd57bea7159748e1b13b3e459e2c8691a46bdc9323afdb9dbf9d8f09511750d46a1d98c717c7adca07d79edc859e925476dd03231507f37f45775c0a79a593c
-
Filesize
1024KB
MD5a49f45509416c794ed4c41d2c885139c
SHA1a689aa5323297af23cbe3e650aeb04c42806c52b
SHA256c54a2eee9c25bb9a570e40ecb97f586d4ea22d288a7835fec18db9b67a4cd152
SHA5127a9e81a7c5dff85c1626e217d3805a20d1adc5331ccf0fdf588d17e85d168705e395d7f633ace64ee0780548ea5813892e0fbb2c016f513c0c80508b6c5fd539
-
Filesize
24B
MD5ae6fbded57f9f7d048b95468ddee47ca
SHA1c4473ea845be2fb5d28a61efd72f19d74d5fc82e
SHA256d3c9d1ff7b54b653c6a1125cac49f52070338a2dd271817bba8853e99c0f33a9
SHA512f119d5ad9162f0f5d376e03a9ea15e30658780e18dd86e81812dda8ddf59addd1daa0706b2f5486df8f17429c2c60aa05d4f041a2082fd2ec6ea8cc9469fade3
-
Filesize
1024KB
MD5c568f46d227d625bbadf92723e3894de
SHA1cfc744600e8a80afb721a85e7ed9cd352b316149
SHA256e4d5be91eced87b97f392362f0982238390a615d7d4d7b5863f4b4db0ec3c272
SHA5124524eb0cdd85d5e004768343b21830e9f539e7871093d3618de78ac8ac6178c0f699793fbc3d2a1bf59894e8fbc671832b0b8eda05cf135b820ea3598c5cf629
-
Filesize
7KB
MD55e654a5b94d8bd3712cc361adf122482
SHA11f89fee499995d781342e92250eed407e33f14a2
SHA25693013c9daba885c1283a51c5f0ea20436407770237f8b90ebd95ab60ccf26366
SHA5124827ce70cd580120360b10bee39cdd91116f1c37cb6801e92fbad78beb7c4f0bfdfde4ced7e01891f92b5c54731e5862f17d74e58a0ff87d8dd354a2bf21d32f
-
Filesize
7KB
MD5acf198318687fb9e29fbc3cf527b7b0a
SHA12fdcf00f4b4a801cbfe5ea5e8a7af68c53d07703
SHA256bcc76b3c23c7eceb89d20dd2aa10168cf354824d1ba1dbd5469911b797998014
SHA512ca20422afe0dc8019d4047ed4aa5585bd61e6e865ed85157d2f1064901cda95f9842e29d091255885813d2c4f750ad99d650513402d9591725ce3608c116da2b
-
Filesize
7KB
MD5531a8900f5cc99a5d55a7c72654785da
SHA1ff064f349da4d3e0ab366224e105023806b95d98
SHA256c7fb4313e8e6cc6dc42cab53cce98db4a2407809da4f5188441d13c4db6d5119
SHA512b7a4ca5f5bb51f51299e9337fe2567af25cafd494249f37c85928fe57fbac609952a077d243f9a5341fd84c90e332639de2f4ea9202c4a16370e5d6159c3182c
-
Filesize
7KB
MD5f3ca209718c16da1ab3089f7ed564553
SHA16588e3fb393d5e42274ff3410d0568dd7160ca56
SHA25671d7ffec0ffff2a8b5cd187c081310dfb7625cc7d572efd23c73b5fd0508d27f
SHA512fbbebea99dcadc8d7dd4a1e71c705c4fdf2354ac8583e1a3d71fb3a512a0c0ede8e800162e8d68c707b5fcdfe17d0180b8e53bbd2dd9626b974cb8529be5e8f5
-
Filesize
944B
MD55a229813bb19961125dd054b7137e8a7
SHA1467c80909ebdfac7d0d9da24528fcb23ac052548
SHA2569681554aa5cc22dd2b54fe5089f6417341c2c32915a3feadc61fc864f0742177
SHA51237a408318d49bbe01acb04e57e5222e3cec89cd063ea26e18f20095955a85324bdccd036cb6efd4705a158b327041e66d4724ba3c87d6f8fa4428a99a93d87cd
-
Filesize
944B
MD580707036df540b6657f9d443b449e3c3
SHA1b3e7d5d97274942164bf93c8c4b8a9b68713f46f
SHA2566651e5f976619cef991deef61776cf43d4c4b3d7c551dd2192b647df71586ab0
SHA51265e41e9e730fed4f7a7d3f6f35875a16948b897f87c8c70b371fd0ac7f0951814f6a75e7698665194bbc65a3665a684e7be229e7e24193b50483ae7e55eebf4f
-
Filesize
944B
MD5051a74485331f9d9f5014e58ec71566c
SHA14ed0256a84f2e95609a0b4d5c249bca624db8fe4
SHA2563f67e4ba795fd89d33e9a1fe7547e297a82ae50b8f25eedc2b33a27866b28888
SHA5121f15fd8ca727b198495ef826002c1cbcc63e98eecb2e92abff48354ae668e6c3aaf9bd3005664967ae75637bacee7e730ce36142483d08ae6a068d9ae3e0e17d
-
Filesize
944B
MD5d9cf98576a2cb3f3c61ecb945ac5c0ba
SHA131cefba9c71f6e2712ce4ff2d346634bf7b8b945
SHA256c5c85705c6d58aa00e0b67a6170fa1ae6de8b6de616d0c1e57c820d47ea5ce6f
SHA512639df2e2c19df7b00d1e0278dd838920e349f00f65c33c8594f4717e5dda275632c2e1e20b0dfa614f91ad089e93847e939c2e228bfd99e1dea5a70948feebed
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\1LE4F3JL\www.bing[1].xml
Filesize17KB
MD55949dc9ddb232a3f251e70e9dc3cb4b3
SHA1f0514a3c8f6810436efdb643586480b744557b37
SHA25661b1aa2f870b13960e69aedcd62bf6ebbc06f148f9f9c715432bdaa43589adca
SHA5124ec737d17194bc2502e284cf03fd0f1babdd5d8167374ae105021043141a03b4bff20c4c7be4a8ba5cac1158f4f5e79e71bbfd9366302498e8441922a9debcaa
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\1LE4F3JL\www.bing[1].xml
Filesize17KB
MD531e22270a17bef586996c82d15a7af9c
SHA10c56666df5f5ddb50c2c826dbe1bc96526c1977e
SHA25632b72f0f18688c0fbe5ddbf881a6a8deaed09368d4c2a5eecff2a09b5c885f5a
SHA5121e031c447bb95bd4c19ac6fb2954fa3c747ff8efa2ef15021502c724cb8389e6463b316d97f227a7b9a1fcbd5939cc745c15d98a6f726733e4d9156d94a80b5e
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SettingsCache.txt
Filesize846KB
MD5766f5efd9efca73b6dfd0fb3d648639f
SHA171928a29c3affb9715d92542ef4cf3472e7931fe
SHA2569111e9a5093f97e15510bf3d3dc36fd4a736981215f79540454ce86893993fdc
SHA5121d4bb423d9cc9037f6974a389ff304e5b9fbd4bfd013a09d4ceeff3fd2a87ad81fe84b2ee880023984978391daf11540f353d391f35a4236b241ccced13a3434
-
C:\Users\Admin\AppData\Local\Packages\microsoftwindows.client.cbs_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\1LE4F3JL\www.bing[1].xml
Filesize2KB
MD5daa70dca291cfbdef2efe03c45bb459c
SHA1bb9887530a2dd1aeaf428a489c49d25c0f39ccc7
SHA256897df39e7a02d547bcb959529f75aa2b71130aa07e03a19b4436b88bf88b0dc8
SHA512e724a7ead9d7fe89a0de20e2a51e5df5bde4bf92cf976fac0245d0b315e381da5f4ede429baaf6fe7a5f1458ea4caf06c67998554c5a526ede4678081c4002b1
-
Filesize
2.3MB
MD55134f289dbf4abae370e3f36b637b73e
SHA1c78d3f2d00dc47da0112a74df665c7a84a8e32c3
SHA256e69c9383b5d9fe4e069ddee15797c52e9116f883ad3b1717d2519621ab2751b2
SHA5120bf61a04b93b1ba5b8a0e2d9a1c333cc4605350a4c797cc9f5f78fec698d6f4fd62d329513ed406e76a06aa6af0f00d206da723e5a33315ce8de7f68f2002cb5
-
Filesize
2.3MB
MD5a44458813e819777013eb3e644d74362
SHA12dd0616ca78e22464cf0cf68ef7915358a16f9ee
SHA25647f0e9a90d45b193e81d3e60b7a43e5a4550a07a3dd1f7c98110fde12265d999
SHA5121a4723a36f55cf696f33a7927571bda403e81ced32fda85c7cf25c8458897fb187e46bf5f80c26542725a9a7e5aa0e961fd3f3b110ae8f54b3b96b3e5dfc8215
-
Filesize
1.2MB
MD5e21bb4749a8b1b6fc26a7bcf57781836
SHA189cb0bd80d691ca650ad01551be3acefa2256ebd
SHA2560ecbb8099ed1d9a1673165d3c4c9bbde88dd9678540a98b99434ff23b9e6d82c
SHA512b0ccf421e415f94b6f0497dd041a8e7693d01d72cd577eca771d2049516f7a0c8c7221da642e5c38d5bc95a2335279d36f956314bda442b99a2d244bcc73b47b
-
Filesize
316KB
MD57f31508d95be3fe50e4e9aa646e86a12
SHA1c61b439d6e17d630728f48c09b36af2647940748
SHA256994efdb644ca1acb029dfd8d8eeba440e1cb74d93841b17f21165b9900730b15
SHA5122e2b01e84a3476b47a9c703b71ce31887e4a4fa9340780f0cbbd20601be621bf00b9619df8bec0e81b2825550150c477c5071d921104a4c6265ef2d5a9e77eda
-
Filesize
316KB
MD5135eeb256e92d261066cfd3ffd31fb3e
SHA15c275ffd2ab1359249bae8c91bebcab19a185e91
SHA256f0fe346146c30129ed6f507906c973f1a54c7d8dd8821c97e9b6edc42545699d
SHA512a3792f92b116851023620d862cac6d2b5542de41390b6b8d223074db94193f0ee6dfcc9d6588ea3e77173f73c7fdfc5f9a1e1044c597636fe275d9ff4b76a12b
-
Filesize
47KB
MD58562ed46d745dceb3cc268693ca25c83
SHA1309067f0c9703084654495a47e67f7a40824700d
SHA256ea5d21e6598d52b30e9d055bc406c6227bbadb5c493addb27b32fb16a6dcae8c
SHA51252f23e70f7ea6eab1a50a4008e563d787732f7361dfe10c48f39dae42bce023c90449c9a903733fab13c49b50f8c4fa7d4864ab26c69326aab0149c765fd677b
-
Filesize
37B
MD535fbf9bf29760b9e120b37900b3c1343
SHA18a231c37ee13e72f27a38411668fde6fef3ff5bc
SHA256e1cdab59df6508013e8b91c71043c8ecfe81b94a037706147ed19adf992539e6
SHA512d1c12b6690c6b90dda5ad3e226e30adc848b3c324f929dec373ab6c7606fbcab716c49c4446efadf14036583924f8f094491bfe8bef380fd877c00cf9feaacc6
-
Filesize
37B
MD563954d8930e517637c254f9da0749e7a
SHA127f6a13c0e9530166d62b4586c3d2bda5cb5064c
SHA256bffa14678b8c39c2fbfa54b76fbac5f750aebc8dc2954da10a55b7f1f90f351c
SHA512dd5df6b8a64523fedb5aaced7d864013d12e6930015d8fd2267b11cffe76741c3a7907814a832ff7589476a51d16e8ab0fc566f4ac0784f6a599070080c7008d
-
Filesize
216B
MD5c36c15e1f99e1c0d093b9b089b1073c5
SHA147a237639f83d8de0c2034831ff3e12a3bad7408
SHA2563d6123cae8ac645d9c9d33b0dada869a7fdd5117a2bf0f9080e4e30fe5bed736
SHA5124283b45c6483e2ed6e9741f5937bb7851e101fb4710bd687a73a77b5abcb820d2480deaee50c8e87a7f225cee2430836da75d201838e9d989e91f3c0c0c60d1f
-
Filesize
317KB
MD5a84257e64cfbd9f6c0a574af416bc0d1
SHA1245649583806d63abb1b2dc1947feccc8ce4a4bc
SHA256fe7ff85b95ec06ce0f3cb49fdfa4d36de1f08669d36d381794aaf597510afad7
SHA5126fc85ee0f8c75a25193fc4883a734704a8190253348c158b9cef4b918cffee5c8997c5248ec2bc793f66978e8cb4c5233d300d112f1d7750bc660698414865c2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
45KB
MD5b019d0ac7ca5013efbc9714eba41bd18
SHA15c91cb8314319dc24b667be28793ff017ca3d155
SHA256e4e9895d943bdb73b7a3831a01780d2e910cfc4bbe578745644793eb907d7484
SHA512f834673282dc2023cee6f3fd3424d68ac65cc0ed61e5ef65c1c7b5a805443b08c476e2aeec8a1b4a950f0ea8cf87b14d82403524595fed21829f270d908adf11
-
Filesize
18.7MB
MD557dd21d81178622a3e887a1bef7ddb39
SHA1a20c4771b44556c3818d19691f22c72170bd0271
SHA256fafa8cc806a5ed3e5b4810539593de56b9f5725579e2e8b1fe6053820ed54cc6
SHA5121550cf35398ccfc167afdb10881acd543d51bc3b4c8d41dcd65007d32696502c995036785c88bcf00aee999265a6115517bc715afedf6c1f2f310be6753265ea
-
Filesize
7B
MD54047530ecbc0170039e76fe1657bdb01
SHA132db7d5e662ebccdd1d71de285f907e3a1c68ac5
SHA25682254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750
SHA5128f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e
-
Filesize
220B
MD54d94570b8aeaa4010fbdfc1538969c6e
SHA1b5b1111d9259108b570f0790706500d7b20f3e42
SHA256b6a5002d998e98472823688e1c504f3a5f9597cd6d81271829a64a6bea2605b7
SHA512d18669aec823a4a42aa71884de6e1b61cd98947299a2aab8d48b85cc72353f4c5e15954f2715163dfaa0469106e84be919a527eaefb252d07eaaad1e0291a357
-
C:\Users\Admin\Downloads\@[email protected]
Filesize933B
MD57e6b6da7c61fcb66f3f30166871def5b
SHA100f699cf9bbc0308f6e101283eca15a7c566d4f9
SHA2564a25d98c121bb3bd5b54e0b6a5348f7b09966bffeec30776e5a731813f05d49e
SHA512e5a56137f325904e0c7de1d0df38745f733652214f0cdb6ef173fa0743a334f95bed274df79469e270c9208e6bdc2e6251ef0cdd81af20fa1897929663e2c7d3
-
C:\Users\Admin\Downloads\@[email protected]
Filesize240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
Filesize
121B
MD59d7f818150b3c032ea94f87b998be797
SHA16acbc866fabbc36cc55afa1c9136b1e57f31b31e
SHA256d45609d5e9f46542d5abe6309e7e5750297ff21edc25b962ffebca01c245347b
SHA512c0df36f75fd16ff68aab6f1a1d093f9623487510cbda8baf8e5a0ee2778e841a1c0ff9bc974d0d997f458a90e4bb34cd51323483f23e0902ef76db48f9f62f32
-
Filesize
60B
MD598bfc821dd17ceab99bf109837d5e5de
SHA1e7984a5394d76911040439bcb69ec90edbe90f27
SHA25694db7eb75ccb8e8c70986849ab0cbb8396d5109a11b829823bcbbe6b7cf347e4
SHA512975d030330acc53ab2d4222b9a3a06bf29e3b9259353755eab3bb4a6957f3b70c6f8b3e08cdaed3e1327aee42e0972b02a5ef74eff7908541e439a06aaf956d7
-
Filesize
3.0MB
MD5fe7eb54691ad6e6af77f8a9a0b6de26d
SHA153912d33bec3375153b7e4e68b78d66dab62671a
SHA256e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb
SHA5128ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f
-
Filesize
14.4MB
MD5284319d621e8f3922b4b98b7096d40ce
SHA10b1a72436ee43d769c4a36085336190077380dee
SHA25652b65693427033b003bba52a10dd9b7223d06acfc41dbe52f5d408e69a521a0d
SHA512481f7c5728c6155ce4e57f4935492597ca263103eda58781bba00b7a8dfb067aace6dc1faac4e520c58e92ca5d73d04aec88d59102be7db5386efc4129ad223b
-
Filesize
4.4MB
MD56a4853cd0584dc90067e15afb43c4962
SHA1ae59bbb123e98dc8379d08887f83d7e52b1b47fc
SHA256ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec
SHA512feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996
-
Filesize
889KB
MD5ce0228e2a753a6310aec035ab1ad629e
SHA1f60210d309dbab3f8b18972e66178aaeb5dde4b9
SHA25662739967b317458074a09555ceed2980d19e58dc4b781f8c3394dc642afec6f3
SHA512baa3f74dc21478a577c7580a92e138a3974138dc91ffbd125d337a0dea507f44635031d5d431b437c7e55afd074ae87bf6d3524021717e771ba6a76b85c1e6aa
-
Filesize
424KB
MD5e263c5b306480143855655233f76dc5a
SHA1e7dcd6c23c72209ee5aa0890372de1ce52045815
SHA2561f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69
SHA512e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113
-
Filesize
414KB
MD5c850f942ccf6e45230169cc4bd9eb5c8
SHA151c647e2b150e781bd1910cac4061a2cee1daf89
SHA25686e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f
SHA5122b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9
-
Filesize
3.4MB
MD584c82835a5d21bbcf75a61706d8ab549
SHA15ff465afaabcbf0150d1a3ab2c2e74f3a4426467
SHA256ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
SHA51290723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444
-
Filesize
5.0MB
MD530fe2f9a048d7a734c8d9233f64810ba
SHA12027a053de21bd5c783c3f823ed1d36966780ed4
SHA25655504677f82981962d85495231695d3a92aa0b31ec35a957bd9cbbef618658e3
SHA512b657b02506f768db3255293b0c86452b4dfdd30804629c323aaa9510a3b637b0906e5963179ef7d4aaedc14646f2be2b4292e6584a6c55c6ddb596cff7f20e2a
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
3.6MB
MD5698ddcaec1edcf1245807627884edf9c
SHA1c7fcbeaa2aadffaf807c096c51fb14c47003ac20
SHA256cde975f975d21edb2e5faa505205ab8a2c5a565ba1ff8585d1f0e372b2a1d78b
SHA512a2c326f0c653edcd613a3cefc8d82006e843e69afc787c870aa1b9686a20d79e5ab4e9e60b04d1970f07d88318588c1305117810e73ac620afd1fb6511394155
-
Filesize
37KB
MD535c2f97eea8819b1caebd23fee732d8f
SHA1e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA2561adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf
-
C:\Users\Default\Desktop\@[email protected]
Filesize1.4MB
MD5c17170262312f3be7027bc2ca825bf0c
SHA1f19eceda82973239a1fdc5826bce7691e5dcb4fb
SHA256d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa
SHA512c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c
-
Filesize
22KB
MD5be80e300446111aec64403d79f1273fe
SHA1826037ffd3b2a6fefafd518fcd46b874048e570a
SHA256b3c3bcc6efcde0eb14c4bed7d0a51635384a5a33f6b9c3ffd97efec28a824798
SHA512e67f7c010e3d71e2753e6a2c1b977b0acb54c0657e269baedab7d25c2e14371855d3fbe48daeb8aa5ef71c43e161f2857a695f24b736426c4c8de598e9f95459