Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
68s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
VSCodeUserSetup-x64-1.86.0.exe
Resource
win7-20240903-en
General
-
Target
VSCodeUserSetup-x64-1.86.0.exe
-
Size
94.4MB
-
MD5
4c3a5cab0164b05f9bf77549c83066d4
-
SHA1
7fd6f58e9c629c3308658db2b7cb2e67ab9d2a97
-
SHA256
92c90f5c54bd19371717e70cdbe8ca156891f25ed64d6ee48aa4da56dfac84d2
-
SHA512
675a56c4b256d2e3c0c727790bfeb2b51a85a27740e9007f1c2dd49b220e102a93b6918c80d9a8ceac43dcd83ba92b5369e1d77945943bef478672c6b769fde6
-
SSDEEP
1572864:C6LgFjUmE2OFsIDZUJq10eR9gVvYMTIMuMNSSsLZbVUFDghJkeNXKumsJgEqNsps:CggGUOSf3PVvOMutnUFchJkGX3gdNks
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2888 icacls.exe -
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Code.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation VSCodeUserSetup-x64-1.86.0.tmp Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Code.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Code.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Code.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Code.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Code.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Code.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Code.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 17 IoCs
pid Process 4564 VSCodeUserSetup-x64-1.86.0.tmp 388 Code.exe 5068 Code.exe 3680 Code.exe 5044 Code.exe 1660 Code.exe 2112 Code.exe 1204 Code.exe 4740 Code.exe 732 Code.exe 1552 Code.exe 1096 Code.exe 3988 Code.exe 3092 Code.exe 4556 Code.exe 4888 Code.exe 5496 code-tunnel.exe -
Loads dropped DLL 37 IoCs
pid Process 388 Code.exe 5068 Code.exe 3680 Code.exe 388 Code.exe 5068 Code.exe 5068 Code.exe 5068 Code.exe 5068 Code.exe 388 Code.exe 388 Code.exe 5044 Code.exe 1660 Code.exe 388 Code.exe 388 Code.exe 388 Code.exe 388 Code.exe 2112 Code.exe 5044 Code.exe 1204 Code.exe 4740 Code.exe 5044 Code.exe 732 Code.exe 1204 Code.exe 1204 Code.exe 1204 Code.exe 1204 Code.exe 1552 Code.exe 1096 Code.exe 3988 Code.exe 3092 Code.exe 4888 Code.exe 4556 Code.exe 1096 Code.exe 3988 Code.exe 4888 Code.exe 4556 Code.exe 388 Code.exe -
pid Process 3568 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VSCodeUserSetup-x64-1.86.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VSCodeUserSetup-x64-1.86.0.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString Code.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 Code.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Code.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Code.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Code.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Code.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz Code.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.rb\OpenWithProgids\VSCode.rb VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.scss\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\resources\\app\\resources\\win32\\sass.ico" VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Drive\shell\VSCode\command VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.hbs\AppUserModelID = "Microsoft.VisualStudioCode" VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.jscsrc\shell\open VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.mli\shell VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.pl6\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\resources\\app\\resources\\win32\\default.ico" VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.tsx\shell VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.bash VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.cls\shell\open VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.wxl\shell VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.bash_profile VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.config VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.fs\ = "F# Source File" VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.h++ VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.jsp\ = "Java Server Pages Source File" VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.jsp\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\resources\\app\\resources\\win32\\html.ico" VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.less\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\resources\\app\\resources\\win32\\less.ico" VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.md\DefaultIcon VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.csproj\AppUserModelID = "Microsoft.VisualStudioCode" VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.eyml\shell\open\command VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.xhtml\shell\open VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.mdown VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.pm VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.csv\ = "Comma Separated Values Source File" VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.jav VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.dtd\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\resources\\app\\resources\\win32\\xml.ico" VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.mdwn\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\resources\\app\\resources\\win32\\markdown.ico" VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.mjs VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.pl6\OpenWithProgids VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.bash_logout\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\Code.exe\" \"%1\"" VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.coffee\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\Code.exe\" \"%1\"" VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.config\shell\open\command VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.cs\shell\open\Icon = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\Code.exe\"" VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.md\OpenWithProgids VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.php\shell VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.txt\shell\open VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\*\shell VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.bowerrc\ = "Bower RC Source File" VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.clojure\DefaultIcon VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.clojure\shell VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.hxx\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\Code.exe\" \"%1\"" VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.pl6\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\Code.exe\" \"%1\"" VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.pp\shell\open\Icon = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\Code.exe\"" VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\vscode\URL Protocol Code.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.c++ VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.cljs VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.mkdn VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.plist\shell VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.cc VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.m\DefaultIcon VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.psd1\shell VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.cljs\shell\open\Icon = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\Code.exe\"" VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.eyml\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\resources\\app\\resources\\win32\\yaml.ico" VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.cpp VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.jshtm VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.makefile\DefaultIcon VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.rprofile\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\resources\\app\\resources\\win32\\shell.ico" VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.vue\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\Code.exe\" \"%1\"" VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.ipynb\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\resources\\app\\resources\\win32\\default.ico" VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.java\shell\open\Icon = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\Code.exe\"" VSCodeUserSetup-x64-1.86.0.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\VSCode.handlebars\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Microsoft VS Code\\resources\\app\\resources\\win32\\default.ico" VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\.pm6 VSCodeUserSetup-x64-1.86.0.tmp Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Applications\Code.exe\shell\open VSCodeUserSetup-x64-1.86.0.tmp -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3568 powershell.exe 3568 powershell.exe 4564 VSCodeUserSetup-x64-1.86.0.tmp 4564 VSCodeUserSetup-x64-1.86.0.tmp -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 3568 powershell.exe Token: SeShutdownPrivilege 388 Code.exe Token: SeCreatePagefilePrivilege 388 Code.exe Token: SeShutdownPrivilege 388 Code.exe Token: SeCreatePagefilePrivilege 388 Code.exe Token: SeShutdownPrivilege 388 Code.exe Token: SeCreatePagefilePrivilege 388 Code.exe Token: SeShutdownPrivilege 5044 Code.exe Token: SeCreatePagefilePrivilege 5044 Code.exe Token: SeShutdownPrivilege 388 Code.exe Token: SeCreatePagefilePrivilege 388 Code.exe Token: SeShutdownPrivilege 5044 Code.exe Token: SeCreatePagefilePrivilege 5044 Code.exe Token: SeShutdownPrivilege 388 Code.exe Token: SeCreatePagefilePrivilege 388 Code.exe Token: SeShutdownPrivilege 5044 Code.exe Token: SeCreatePagefilePrivilege 5044 Code.exe Token: SeShutdownPrivilege 388 Code.exe Token: SeCreatePagefilePrivilege 388 Code.exe Token: SeShutdownPrivilege 5044 Code.exe Token: SeCreatePagefilePrivilege 5044 Code.exe Token: SeShutdownPrivilege 388 Code.exe Token: SeCreatePagefilePrivilege 388 Code.exe Token: SeShutdownPrivilege 5044 Code.exe Token: SeCreatePagefilePrivilege 5044 Code.exe Token: SeShutdownPrivilege 388 Code.exe Token: SeCreatePagefilePrivilege 388 Code.exe Token: SeShutdownPrivilege 5044 Code.exe Token: SeCreatePagefilePrivilege 5044 Code.exe Token: SeShutdownPrivilege 388 Code.exe Token: SeCreatePagefilePrivilege 388 Code.exe Token: SeShutdownPrivilege 5044 Code.exe Token: SeCreatePagefilePrivilege 5044 Code.exe Token: SeShutdownPrivilege 388 Code.exe Token: SeCreatePagefilePrivilege 388 Code.exe Token: SeShutdownPrivilege 388 Code.exe Token: SeCreatePagefilePrivilege 388 Code.exe Token: SeShutdownPrivilege 388 Code.exe Token: SeCreatePagefilePrivilege 388 Code.exe Token: SeShutdownPrivilege 388 Code.exe Token: SeCreatePagefilePrivilege 388 Code.exe Token: SeShutdownPrivilege 388 Code.exe Token: SeCreatePagefilePrivilege 388 Code.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4564 VSCodeUserSetup-x64-1.86.0.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 4564 2980 VSCodeUserSetup-x64-1.86.0.exe 82 PID 2980 wrote to memory of 4564 2980 VSCodeUserSetup-x64-1.86.0.exe 82 PID 2980 wrote to memory of 4564 2980 VSCodeUserSetup-x64-1.86.0.exe 82 PID 4564 wrote to memory of 3568 4564 VSCodeUserSetup-x64-1.86.0.tmp 91 PID 4564 wrote to memory of 3568 4564 VSCodeUserSetup-x64-1.86.0.tmp 91 PID 4564 wrote to memory of 3568 4564 VSCodeUserSetup-x64-1.86.0.tmp 91 PID 4564 wrote to memory of 2888 4564 VSCodeUserSetup-x64-1.86.0.tmp 94 PID 4564 wrote to memory of 2888 4564 VSCodeUserSetup-x64-1.86.0.tmp 94 PID 4564 wrote to memory of 388 4564 VSCodeUserSetup-x64-1.86.0.tmp 97 PID 4564 wrote to memory of 388 4564 VSCodeUserSetup-x64-1.86.0.tmp 97 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 5068 388 Code.exe 98 PID 388 wrote to memory of 3680 388 Code.exe 99 PID 388 wrote to memory of 3680 388 Code.exe 99 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102 PID 388 wrote to memory of 1660 388 Code.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\VSCodeUserSetup-x64-1.86.0.exe"C:\Users\Admin\AppData\Local\Temp\VSCodeUserSetup-x64-1.86.0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\is-6SFSM.tmp\VSCodeUserSetup-x64-1.86.0.tmp"C:\Users\Admin\AppData\Local\Temp\is-6SFSM.tmp\VSCodeUserSetup-x64-1.86.0.tmp" /SL5="$50278,97934396,828416,C:\Users\Admin\AppData\Local\Temp\VSCodeUserSetup-x64-1.86.0.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Get-WmiObject Win32_Process | Where-Object { $_.ExecutablePath -eq 'C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\bin\code-tunnel.exe' } | Select @{Name='Id'; Expression={$_.ProcessId}} | Stop-Process -Force"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" "C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code" /inheritancelevel:r /grant:r "*S-1-5-18:(OI)(CI)F" /grant:r "*S-1-5-32-544:(OI)(CI)F" /grant:r "*S-1-5-11:(OI)(CI)RX" /grant:r "*S-1-5-32-545:(OI)(CI)RX" /grant:r "*S-1-3-0:(OI)(CI)F" /grant:r "Admin:(OI)(CI)F"3⤵
- Modifies file permissions
PID:2888
-
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Code" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1632 --field-trial-handle=1640,i,6038514523271905932,9204771364819912622,262144 --disable-features=CalculateNativeWinOcclusion,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5068
-
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Code" --standard-schemes=vscode-webview,vscode-file --enable-sandbox --secure-schemes=vscode-webview,vscode-file --cors-schemes=vscode-webview,vscode-file --fetch-schemes=vscode-webview,vscode-file --service-worker-schemes=vscode-webview --code-cache-schemes=vscode-webview,vscode-file --mojo-platform-channel-handle=1892 --field-trial-handle=1640,i,6038514523271905932,9204771364819912622,262144 --disable-features=CalculateNativeWinOcclusion,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3680
-
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Code" --standard-schemes=vscode-webview,vscode-file --enable-sandbox --secure-schemes=vscode-webview,vscode-file --cors-schemes=vscode-webview,vscode-file --fetch-schemes=vscode-webview,vscode-file --service-worker-schemes=vscode-webview --code-cache-schemes=vscode-webview,vscode-file --app-user-model-id=Microsoft.VisualStudioCode --app-path="C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app" --enable-sandbox --enable-blink-features=HighlightAPI --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2988 --field-trial-handle=1640,i,6038514523271905932,9204771364819912622,262144 --disable-features=CalculateNativeWinOcclusion,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --vscode-window-config=vscode:4a2fbf92-7e3f-48f9-a770-cf6819c3ece6 /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1660
-
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Code" --standard-schemes=vscode-webview,vscode-file --enable-sandbox --secure-schemes=vscode-webview,vscode-file --cors-schemes=vscode-webview,vscode-file --fetch-schemes=vscode-webview,vscode-file --service-worker-schemes=vscode-webview --code-cache-schemes=vscode-webview,vscode-file --app-user-model-id=Microsoft.VisualStudioCode --app-path="C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app" --enable-sandbox --enable-blink-features=HighlightAPI --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3540 --field-trial-handle=1640,i,6038514523271905932,9204771364819912622,262144 --disable-features=CalculateNativeWinOcclusion,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --vscode-window-config=vscode:bcc2bcba-a77c-449b-812b-deedd99d4dc8 /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:732
-
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe" --type=utility --utility-sub-type=node.mojom.NodeService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Code" --standard-schemes=vscode-webview,vscode-file --enable-sandbox --secure-schemes=vscode-webview,vscode-file --cors-schemes=vscode-webview,vscode-file --fetch-schemes=vscode-webview,vscode-file --service-worker-schemes=vscode-webview --code-cache-schemes=vscode-webview,vscode-file --mojo-platform-channel-handle=3976 --field-trial-handle=1640,i,6038514523271905932,9204771364819912622,262144 --disable-features=CalculateNativeWinOcclusion,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:84⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1552 -
\??\c:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\bin\code-tunnel.exe"c:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\bin\code-tunnel.exe" tunnel status5⤵
- Executes dropped EXE
PID:5496
-
-
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe" --type=utility --utility-sub-type=node.mojom.NodeService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Code" --standard-schemes=vscode-webview,vscode-file --enable-sandbox --secure-schemes=vscode-webview,vscode-file --cors-schemes=vscode-webview,vscode-file --fetch-schemes=vscode-webview,vscode-file --service-worker-schemes=vscode-webview --code-cache-schemes=vscode-webview,vscode-file --mojo-platform-channel-handle=4016 --field-trial-handle=1640,i,6038514523271905932,9204771364819912622,262144 --disable-features=CalculateNativeWinOcclusion,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1096
-
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe" --type=utility --utility-sub-type=node.mojom.NodeService --lang=en-US --service-sandbox-type=none --dns-result-order=ipv4first --inspect-port=0 --user-data-dir="C:\Users\Admin\AppData\Roaming\Code" --standard-schemes=vscode-webview,vscode-file --enable-sandbox --secure-schemes=vscode-webview,vscode-file --cors-schemes=vscode-webview,vscode-file --fetch-schemes=vscode-webview,vscode-file --service-worker-schemes=vscode-webview --code-cache-schemes=vscode-webview,vscode-file --mojo-platform-channel-handle=4208 --field-trial-handle=1640,i,6038514523271905932,9204771364819912622,262144 --disable-features=CalculateNativeWinOcclusion,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:84⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wsl.exe -l -q"4⤵PID:4392
-
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Code" --standard-schemes=vscode-webview,vscode-file --enable-sandbox --secure-schemes=vscode-webview,vscode-file --cors-schemes=vscode-webview,vscode-file --fetch-schemes=vscode-webview,vscode-file --service-worker-schemes=vscode-webview --code-cache-schemes=vscode-webview,vscode-file --app-user-model-id=Microsoft.VisualStudioCode --app-path="C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app" --enable-sandbox --enable-blink-features=HighlightAPI --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4804 --field-trial-handle=1640,i,6038514523271905932,9204771364819912622,262144 --disable-features=CalculateNativeWinOcclusion,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --vscode-window-config=vscode:4a2fbf92-7e3f-48f9-a770-cf6819c3ece6 /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3092
-
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe" --type=utility --utility-sub-type=node.mojom.NodeService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Code" --standard-schemes=vscode-webview,vscode-file --enable-sandbox --secure-schemes=vscode-webview,vscode-file --cors-schemes=vscode-webview,vscode-file --fetch-schemes=vscode-webview,vscode-file --service-worker-schemes=vscode-webview --code-cache-schemes=vscode-webview,vscode-file --mojo-platform-channel-handle=4132 --field-trial-handle=1640,i,6038514523271905932,9204771364819912622,262144 --disable-features=CalculateNativeWinOcclusion,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4888
-
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe" --type=utility --utility-sub-type=node.mojom.NodeService --lang=en-US --service-sandbox-type=none --dns-result-order=ipv4first --inspect-port=0 --user-data-dir="C:\Users\Admin\AppData\Roaming\Code" --standard-schemes=vscode-webview,vscode-file --enable-sandbox --secure-schemes=vscode-webview,vscode-file --cors-schemes=vscode-webview,vscode-file --fetch-schemes=vscode-webview,vscode-file --service-worker-schemes=vscode-webview --code-cache-schemes=vscode-webview,vscode-file --mojo-platform-channel-handle=4776 --field-trial-handle=1640,i,6038514523271905932,9204771364819912622,262144 --disable-features=CalculateNativeWinOcclusion,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:84⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wsl.exe -l -q"4⤵PID:116
-
-
-
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5044 -
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\Code /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\Code\Crashpad --url=appcenter://code?aid=a4e3233c-699c-46ec-b4f4-9c2a77254662&uid=e1998457-75bf-408d-9d19-37495c399388&iid=e1998457-75bf-408d-9d19-37495c399388&sid=e1998457-75bf-408d-9d19-37495c399388 --annotation=_companyName=Microsoft --annotation=_productName=VSCode --annotation=_version=1.86.0 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=27.2.3 --initial-client-data=0x3f0,0x3f4,0x3f8,0x3ec,0x3fc,0x7ff6be5a1c00,0x7ff6be5a1c10,0x7ff6be5a1c202⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2112
-
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Code" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1740 --field-trial-handle=1744,i,7137584632793453214,12378265333134164923,262144 --disable-features=CalculateNativeWinOcclusion,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1204
-
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe"C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\Code.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Code" --standard-schemes=vscode-webview,vscode-file --enable-sandbox --secure-schemes=vscode-webview,vscode-file --cors-schemes=vscode-webview,vscode-file --fetch-schemes=vscode-webview,vscode-file --service-worker-schemes=vscode-webview --code-cache-schemes=vscode-webview,vscode-file --mojo-platform-channel-handle=1932 --field-trial-handle=1744,i,7137584632793453214,12378265333134164923,262144 --disable-features=CalculateNativeWinOcclusion,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
798B
MD5ec4b9f746d45fe19fbfdf7d22704eaa1
SHA13dea4ae271bc7b0a1a6de493c943162f0608f3d7
SHA2560cd492694a9dd8b9d664adb4a25f4e06bf1b9722b42fc1fd3c6759a1029ee367
SHA512addefa66adddae2ed70372945d2a2560ee88585d353a7bdad10d4714727403aef878f61d70ec6bf516e153131283fb102c30a9526d93844297642b00a60024f0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
132KB
MD5a0e681fdd4613e0fff6fb8bf33a00ef1
SHA16789bacfe0b244ab6872bd3acc1e92030276011e
SHA25686f6b8ffa8788603a433d425a4bc3c4031e5d394762fd53257b0d4b1cfb2ffa2
SHA5126f6a1a8bfe3d33f3fa5f6134dac7cd8c017e38e5e2a75a93a958addbb17a601c5707d99a2af67e52c0a3d5206142209703701cd3fab44e0323a4553caee86196
-
Filesize
190KB
MD5c37bd7a6b677a37313b7ecc4ff01b6f5
SHA179db970c44347bd3566cefb6cabd1995e8e173df
SHA2568c1ae81d19fd6323a02eb460e075e2f25aba322bc7d46f2e6edb1c4600e6537a
SHA512a7b07133fa05593b102a0e5e5788b29488cb74656c5ee25de897c2ba2b2a7b05c0663ade74a003f7d6df2134d0b75f0ad25e15e9c9e0969e9453b7fc40b9f8bb
-
Filesize
4.7MB
MD5eef5f2e8d8f6e29a31b85fdebd0b86e7
SHA1313d5cf2f057282e378a737046649555770a34bd
SHA256f61d4b8abbd8985334b3ee2a12dc1edd977bef5e43a6bb74fd8cb33f36e9722e
SHA512d738a2b0a8c5ed5bd6a76898a59a850597078d9fb86aa31172080a57ad4ad01e9a65c652a05c5197c556cd8858b3bb65d0b727cb992d4ff49615a247faf5cc41
-
Filesize
2.4MB
MD5bb40c608bea400f7245d5deabe4ac938
SHA167d936063627622a5272a98efe61564e0d5637be
SHA256be5196a1a24810115cd02719c05a08b03e31d205af9ba0c32f6e7386ca0759c0
SHA512ac0331c8ab9d9bc495b03cc3d88984e396baac3e7889ac2cff8c4374d029c261bcd66b61ce6c577fc97303fe3b9c7eb1bdbcf4e6f9adbfa9268055fb1bedc8ec
-
Filesize
10.2MB
MD5e0f1ad85c0933ecce2e003a2c59ae726
SHA1a8539fc5a233558edfa264a34f7af6187c3f0d4f
SHA256f5170aa2b388d23bebf98784dd488a9bcb741470384a6a9a8d7a2638d768defb
SHA512714ed5ae44dfa4812081b8de42401197c235a4fa05206597f4c7b4170dd37e8360cc75d176399b735c9aec200f5b7d5c81c07b9ab58cbca8dc08861c6814fb28
-
Filesize
497KB
MD5dfe2efb48b3b4af69b235c0d42700026
SHA1bd594023f265dbeb3fa72a88c02428ee7f54c754
SHA25632cdf7e18030dfb6595eafa486a75bc7dc0c9bca786683260f1a7f7f9ca8e198
SHA5124c387f652b5af99ee699e45fe0f641649643578960a9cf67cf2ceddb57ce334739abae6f4578c115f708846a5e52e9a232e1c9c8b874aa9367b1feb999e26d91
-
Filesize
7.3MB
MD5f004231dcb11291291f31ef85c0b358c
SHA14cfc0b6e3bef68b9aa3c225648b515331bb4e986
SHA256db21772aca37f61da9ed5e10fba720af08f651acda0086160ddbfe5730dbee1c
SHA512511bcefe5debdca62faf4be01314e7ebac6b9d236087e18bd42799cdce0baf8f18a91f354199d05834adee534ae17aa98199e3b61757c5085789b7c6dc2377a5
-
Filesize
405KB
MD5807e696d8e9c2f2b9c496d2ee8597765
SHA1b3dfc5c31d31eba4027c22b46b1c16620cb1db47
SHA25651c83234f1092346c044d2414c3f66f7b907ac5a0043ac6e0553d1e952e8b887
SHA512ce1b18093eafa36ee87c7eaf12e6fed6eccb1b604df77ff027fcaf85013d21a481b33f971a16f2a17d8012cbd20b31b25c3a608be2765b7272c9aceb480db373
-
Filesize
5.1MB
MD5d1601eb2b32d9be1dff034abc9d3b470
SHA16a71196a97f31483311d9b8f3df50aa93828bc9f
SHA2564b539fa01e0ec37d9dc01795bf085952e228d52e9e8e3b3b54504f6d3273a3cb
SHA51219b1db74f5a3c900e07076ae6d29c8549980a7feef9e0ceb4c2c96da85b4a6f43da903c16f27eff6fdb64ce09a5a11f7d5ad049b1315138a680e98252fec8984
-
Filesize
179KB
MD5575506a8774d119bc036fc34a0a3b08a
SHA187864ccab15ab97a8698c1bdaa7db88d7a8dbcdf
SHA256a8e9fd8d817925e0457587f9252dfd977bf17a4155a7ea67bf230d3283036a79
SHA51239f515f5f7da39fd6e026cc3f7bbb269a60c635a51338073cf752352635936834280a68c1deb46fdfb263293716bafdc31ef569663175b0bea6385acbc36e24c
-
Filesize
11.6MB
MD56652ed9b6276f492bcaf93a60b296275
SHA1eb45a80cab5c06aaa37d1b62202c045fd17804b3
SHA256d5411f7b9004da1d86c7143f41e47fd4b9e5539f539b14ec8bded87b0930f5f9
SHA5122c64091ccb8d2ef7922caae60d3d59b5ef32e8a9e9cd76a1ab802c8e1b38047c1dea5ef68a0566e422655414d3dfb3c65cb48c82a5f107ca2f0ec6716461157d
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\node_modules.asar.unpacked\@vscode\policy-watcher\build\Release\vscode-policy-watcher.node
Filesize165KB
MD524ba152abe6477cbd76150c937b24c4f
SHA18b4d416a854cf15d1ae40bd7c53bacf427cafd88
SHA2566e8ec6c8955b3fae650b36c78314f4958e03f7f70c1039d5929a47443ce232e6
SHA512c0d12b72351b51514c37b33701dc723217404afe6a9257dda9f7b083f8c3d4b87a583c933d0c7e8f9ffcd027f7ac2f52f507467402cd3843d23402cd7b9f4a26
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\node_modules.asar.unpacked\@vscode\spdlog\build\Release\spdlog.node
Filesize557KB
MD511434746adf7a77120c3a71ee5208ea1
SHA166a49695ebd7da3b3dca11b5c3042e9b6c6ad088
SHA25683f4736769f730b05c0a1d74ce3a5ebe836b1abf4ab640504816813abe599f93
SHA5129c0ea97b2664166266bbf95c7128468badaba6099bcd90175589e902418544ef3978c36f9f831bcc8d3b323cefac2c33c7f2cca2fabf7ff5e497fb80c0be302c
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\node_modules.asar.unpacked\@vscode\sqlite3\build\Release\vscode-sqlite3.node
Filesize1.6MB
MD5ea39b3f0c18253b0b54bb5f125c61659
SHA145508048d28c5c9225ffbc2081d44748af624c0c
SHA2562d3ab51a1f63b901595484c2d5f5f287e5d4b8d5372128bd7a6ffc15b733a4e1
SHA5126ec2b406a32363f92e924686e055bdf1738a5a187c9a118914afc2de93f2668b33abfe2bf0c5a5041014b2c1f61fdf37d1ab9bc041924553ef4b7a109f84fc28
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\node_modules.asar.unpacked\@vscode\windows-mutex\build\Release\CreateMutex.node
Filesize168KB
MD58133a0f689ca11ddf6731342178e0f3b
SHA1841bb8297f1761282ab996200c0fbe60ad8ea75f
SHA256d1822337d5a6642b9434a1735bbe7f5f1f0091603b6eeba04d7889d61802859f
SHA512ac11f0d16ebcdf1ab08c80a2a4f48d92968b7e5c23a6f0cb32f9ee146852fcb5e97f28273d1f3616334531651f6b31d17afd71db3640480df6533175b86d84df
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\node_modules.asar.unpacked\@vscode\windows-registry\build\Release\winregistry.node
Filesize124KB
MD53c8860770c9aa12be9d6db3c8fdaf59c
SHA14839d60a5886a84d89d5ff1e388604eab53bb5ce
SHA256650cbb9ccae1bbacf6b3d1a9d3a224ffa1f594d08d5e692e066bbdf8bf709e88
SHA512a7fc59ca6cea8944e499e431af051e73154c152636cd4bae552b860302bd040417dee10ba2e27d1a205fd0cce315191d5ea1cd864a19e2e50cdbd65b7cf03e24
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\node_modules.asar.unpacked\native-is-elevated\build\Release\iselevated.node
Filesize118KB
MD532d5dff82e36b940d9aa9550a86414ce
SHA1c5de9888936cc0a7695fd7be4c15db5bea75e040
SHA2567deca4a06e60202b4495937d68f9710ac37bfc35af7c7111f62970ba1c0617e9
SHA5124bf25b3e3acef077c63545bd6cedaeb0fd50367eda198322ae6255228e601025a13cfe5303b29f9bb2f6624ca018b143c521c23c3875602273ea84c836617238
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\node_modules.asar.unpacked\native-keymap\build\Release\keymapping.node
Filesize170KB
MD5bf442282c09e452b47a9b50da5aa3dc4
SHA182a9cdf8903da2ec0413e1a151a5ac03910d18af
SHA256ea03d5c5283427937f6fef910e64494cd6f03f853e3a89bf58038fee1ce96987
SHA512b79f37ce455ffa75c4dd7d32bda9f9fd7804d15d4b6e61ab9b0940d158c59847b21735ae3d238ab937244df5a2d21e03ca0711081e90474ccf73005e3447398d
-
Filesize
53KB
MD5567df288f2fcb8c9820ce4bd6c04ac2b
SHA11b0d15b6b003823a4815f14caaf470ae95e331e7
SHA25673d6c9ce531b2a04dec230ce74de3467ac240a61c93564653b53e3876a8689ac
SHA512ea5a73d813146910b519507eda422d1e7ab65f9f9d9f277089920699896d737a3364b3243dc671442b6bab640f676e2e6c45298f608d152222dd47349547f6c1
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\out\vs\code\electron-main\main.js
Filesize885KB
MD5aaa1559f66d587e100c09b210968165c
SHA11b3187132cef96d004bc5e954ae3a52e7f3e0841
SHA256c9c99dbfa35aea5a680c9fadd4922cfd5532dc94e7b2c4680bfad7049adae71f
SHA5126b7d6b2c8759fe322d9bfd077f164c711bee751e929d9106fa0e2a72a170eba70320d689014e919e617056675b5e2c5e2116af8ee84d0a99fcca503bc210f048
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\out\vs\code\electron-main\main.nls.js
Filesize22KB
MD50998da46d19d2748502f5fd31368ff08
SHA1e8e97df425228dedf7a6dbe7a203766aa2a21f4d
SHA2560003288214b9f16c3cddf91886c2bdd03e28547d293400400569a6cd0522895c
SHA5121277176d65148504bae83659d39792f538b24a6857c565da3708a00cb2e5fd2c8397888b5d2ca64eab89c7b167385c3506d08567b7abe1555c88b8cb35c77051
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\out\vs\code\electron-sandbox\workbench\workbench.html
Filesize1KB
MD5758fc1e6066d814b937747d70fadd2d0
SHA1bf94b3bbe56c113236a0bd4f5214e5f4e63a95e7
SHA25630e1df1ecb88f822f89cfc320108ee14202316898d7a9faf72f8cbd2c2c395bc
SHA51206a91dce84c3125fd47e88d119cd4249de1d3ff9557a246a4748629f00986d6f13ab22a6a2c9f2aa0529ba07b4379af03e171c26c5d681a773fc13b5e90e127e
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\out\vs\code\electron-sandbox\workbench\workbench.js
Filesize42KB
MD5ee7b3ebc9c58fb3cfc578ff8f4528843
SHA16eedf436f60eaf876b09fdbab98b9c0e124e48dc
SHA256d4df6c22790d03a50854d3c4e1dfea0e13f552be7846b130106b4ddb23d981b4
SHA51261966e2b027114bddd9b410b5c637d52791883560c8a0007b794d9137cf58ee402ef41fc32d1ea7521edab619631ac5fbfdd6eef0a8e434816589566c0a6d76b
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\out\vs\workbench\workbench.desktop.main.css
Filesize621KB
MD515f3d320ef0df0f38f1eadf5e76b3a71
SHA1c5b56aaa9594824c96d5910fd1cd4c2a887adae1
SHA25635356d1d7cf399705b122fe0406e7eeff350d404ce31c02a97f5dbfa82bd2de2
SHA5127aa7059cbe5e05df9a976fc75bb652b39b31b202b53b47418cb68491ef3e7ed67ac805896481a71d9d21c2ba542a63f1e41b5f7d0b25b33405c784c376827de9
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\out\vs\workbench\workbench.desktop.main.js
Filesize10.0MB
MD571b29bb32aafd8ed3abddc6a68b08c40
SHA15f1ed0ed1162e23972cda0bd984f74b53d230384
SHA2564431e3bc09e36561b4a36e708a1c7cffa08563576fa16edea245ed7e25544a3e
SHA51299b74e7dd943e5e28e44381385fbe8969a6abfd68cdef000aff9d44c315f7c9c2a9b393444e8511a579acedb1e04e46bdcd338c1d5f2123718682c5689db546d
-
C:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\out\vs\workbench\workbench.desktop.main.nls.js
Filesize605KB
MD51580feeb38c8142bc9f70b84ca17355c
SHA16fa9903b08809191dcac7e6a589cf633b17ab018
SHA256f737511b47f34130cdb11eb87fd808ae4921ef456fc7bac9cf39f26646f2c443
SHA5129c6c86df0023d20c7767c4b7a51c6b782415d13115b376e791fc8184735adae5aae13155db618e56a5ab6d286c9b948d976908177a17b2977dc2f87e3b95fb9e
-
Filesize
9KB
MD50a09b6f0be00fd39ec435c5fb0d4a61f
SHA1ad9d0d019e4512b6627ad1c899680acfea9f5c15
SHA25673cc3b04da10c05074b014e8b5df88331cce1b049ae850d7f6dd2612e11e7465
SHA512bd72a3a57682a6a739f72ea4f36157aba73a9b760e539bae09c0dc06fb05ddc0c1b6d87561a0676d88a6e58126c080193b9df6a7ea29fb0af0ecbd34454f9149
-
Filesize
52KB
MD51ab9b7f054e56a678b0903dad4f6ed67
SHA11cd4ff7bcb09bead9a04aa14fae87edc579554f2
SHA256626e65c9e6dd7917ade00bde992ac19d7cac49ef3e157cf8e0009840f6a72c08
SHA512ca282af53cfe182d8434582911d7f59a4d09f4547f14e9470cca6bbc56195373c8f69d55a636746d712914819aac9681a3a913b2a84d84d34ee55cf021816452
-
Filesize
611KB
MD5c888aa7c2d1e7cd35a4389875e0e5224
SHA13933ba3765305e6bca6b5d21b612b4f298a777f5
SHA256af3c29a83e8ddbd359c8800ba4271780258cd2461ae795d2defb6ed1b02cad26
SHA512ade89280958aa38403b9f5eeb14915490294d168509f9438d5b19193990dbeb3660bc9af3295416679089deb1c86742b4aa52138a59fee8daf69d173f1ab0698
-
Filesize
5.0MB
MD529cb752601c6bf96cc9f6f4e295935d1
SHA149b74038056a1c44e322cb2831319dd57c07ac86
SHA256f32831c7c9febb2e277e722dd126c4a200c2c1dc79dd5858f8b7e792412f2ffe
SHA51254bd46c5bb7a1bd7c7400f1a1c7b8b684779a783655cdcee636855253a119e61262d4e6976c24e7d7e99ffa1258cc89d337655c49e5e0d48fc52502dadd0e640
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.5MB
MD5757763ef4eb5887c45a1aa191fdba38e
SHA13c3f50f65fb053bb8303c89f6e61632d92d53331
SHA25612c400f294ff89e2850efe37fa27036b26957507c97b60fc14527c34f3d065a9
SHA5123cc62903033e450bfdc4e9e29a59b5d8aaf3363bd4c80ec0b3c504e724bad383ce0dae9518d73e9151819030fb8cad96a8bcc30166e8338113051482be9baf35
-
C:\Users\Admin\AppData\Roaming\Code\CachedProfilesData\__default__profile__\extensions.builtin.cache
Filesize760KB
MD521709a52cb3cb7c6a697daf818b29a47
SHA1166f3daec53831ebcacc4512c7c00f5b88dda0de
SHA2566e0615c35a449f92743fe5e003cecf6a7f4b1300f72b5a985c5fc3dccccf1b87
SHA512bc55f34c83d1a754b924f73ce64a49be95967b963c91e933975f68f9f400ade2a688acad2992146457d028f8c82ba724397dfa920444a6c754952d7f3553b529
-
Filesize
434B
MD512fcde566a96c441167d7d48037cc22f
SHA1e06522a4eb4f52821a881451f7db90f4822848b8
SHA256e32220c783e3337dbd82346ab6ed4be4ca05c44cdcdde2feddefe1e8494f9775
SHA512f35c07faa855d5de217f86d2cff147fd8eefc85b0e928cc2e5efa15a2c6f7d2a730b0c302146ea0cb76bb5f987342edf2375d743fb5542f09cd91586ef9c08ce
-
Filesize
59B
MD578bfcecb05ed1904edce3b60cb5c7e62
SHA1bf77a7461de9d41d12aa88fba056ba758793d9ce
SHA256c257f929cff0e4380bf08d9f36f310753f7b1ccb5cb2ab811b52760dd8cb9572
SHA5122420dff6eb853f5e1856cdab99561a896ea0743fcff3e04b37cb87eddf063770608a30c6ffb0319e5d353b0132c5f8135b7082488e425666b2c22b753a6a4d73
-
Filesize
36KB
MD525363adc3c9d98bad1a33d0792405cbf
SHA1d06e343087d86ef1a06f7479d81b26c90a60b5c3
SHA2566e019b8b9e389216d5bdf1f2fe63f41ef98e71da101f2a6be04f41cc5954532d
SHA512cf7eee35d0e00945af221bec531e8bf06c08880da00bd103fa561bc069d7c6f955cba3c1c152a4884601e5a670b7487d39b4ae9a4d554ed8c14f129a74e555f7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
Filesize
172B
MD5c75c19e02f4cd28970abc6590c916c67
SHA1316f580e859556c359b6d40ba7fac630597b8502
SHA2565d818be1e0e819c2c882a6123457f2dad1197f97da6b3069f76d389c642577b5
SHA5120a728d6fccd7eb8ffeaf8d85d8d77e6ba7b6410070a7a3c9309fb376c30b5de674e2485af483b72c5d923af268a92b1fb8ae4279657cd658fe91b15c6a8b774e
-
Filesize
1KB
MD5bbccb046f58a77d22a74ab925da9277b
SHA1ba5d54bcdcbc4957b344682cf78c76ef32602e8b
SHA2566c86d385ac4a9986da6bd020e87f054a686acec8fc91052f49eecaa7a822fc8d
SHA512d3b25dbd54dff18bab5c03ec3a848b3d97fc7f2a6c85dd684cf91e1977e77ad895e3cb89baac3dcd4ed1c776fcaf26ecba1dfe00f8f2b0ce4775d94955d4ce03
-
Filesize
587B
MD5ce988ab1cfa2d3f3eff113fa4120bd06
SHA1531b4793af5a38c5e7ca721a88d6b89eeb81cd45
SHA256bbc558266f9ae8471081e38266fe48e9e1f8cd76452bf0fb9dc8243ea400ef16
SHA5129b5b3b53a30841962efff69bf0fa150db5895c18a144259fd0a6ef5ce433c8294a60ddeab4eb359479ce72caa85000945963ea3fae5c214b75c7753f7d90f685
-
Filesize
1KB
MD5164004a979f10d8ef376872fa1ecbd8b
SHA1c7ec270bcc49dac444702c8d7241da8a1d6129d5
SHA25612f1041b7bf7de7f1c622537b5979cb25afec0959f0bbff3cc4a8079059aad86
SHA5125ea3c4508f5f7cc36a5c22a07c3e173c04b5f8ec29504e77300073388187227e5b9a625de8f48c2956ef547fdf7d158fbebc370a09d0906ac20d47065f20fcc0
-
Filesize
2KB
MD55aabe922520e4b495bf60e495cdc2f73
SHA16344467aa9c5bc0b5cc42d597cfe1ddd95144b44
SHA2568b30845a843722e34035dc39a3b5314691510ae567846b4238431bd59e69df34
SHA512acecea96f49a3e3b38b12aaf34298ccbbf5ed227ae6d142167d8cea451520596a999a207b567a96d2427e23895da2dad69d4c642824a962c4ab685fa344d1973
-
Filesize
2KB
MD575c817965ccee7e897a45d0fc4d56983
SHA1769a4af7c37c898689b4c2d696b65b5e5e43ac40
SHA2567ecd3748cd1eca5c01bdc7b0d4b2b325955c5d16132a9bd0e90fedc95b826f10
SHA5123fefe75fee87b1b59de1068a0e1f0e78f08dabcbdacd9e6e32d064ef0f8eb18d4ff8258f3db18d751d4d20c2ec9fbcdf74224eef008d8786e2af4ce216c54dc5
-
Filesize
57B
MD558127c59cb9e1da127904c341d15372b
SHA162445484661d8036ce9788baeaba31d204e9a5fc
SHA256be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de
SHA5128d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a
-
Filesize
36B
MD58b2d6d45e08b605f28d14be2c5f08c3c
SHA14bb0d8eac4ae84705fe90550d3a718c7fa0d63a7
SHA256d3de436fb5bf09b52653e1626a98589b56bd7497ee1604ad14c2806209b7b4b4
SHA5121303fb0f6e66293af2174d4410bb57e474dbbeaf4f9e8c0a2faf1cc224fed6e18d928082ce6d30177b1e0979a1225309b880e3f0e6674c8f5d0f475cd0933288
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
\??\c:\Users\Admin\AppData\Local\Programs\Microsoft VS Code\resources\app\out\vs\base\parts\sandbox\electron-sandbox\preload.js
Filesize2KB
MD53f3a05eb3226a993d56e7f754aa834fa
SHA1a2903712dc14ccf3f2865ab859e696179765166f
SHA2567dc77fbeda86138b9eceef57fae7287665b84c9fa985f977697f8a9789f72472
SHA512bd2c591913e48cefbd406bffe00912f2bf7a4e1f6f5a3b08ecf1aa194c0c50906fd4080ecc624f58a9bc8acb3e182f45b27ce1eb9ff03500a8ec98a4ca17fe1d