Analysis
-
max time kernel
548s -
max time network
553s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 18:18
Behavioral task
behavioral1
Sample
XWorm-5.6-main (1).zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XWorm-5.6-main (1).zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
XWorm-5.6-main/Xworm V5.6.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
XWorm-5.6-main/Xworm V5.6.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
XWorm-5.6-main/Xworm V5.6.exe
-
Size
14.9MB
-
MD5
56ccb739926a725e78a7acf9af52c4bb
-
SHA1
5b01b90137871c3c8f0d04f510c4d56b23932cbc
-
SHA256
90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405
-
SHA512
2fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1
-
SSDEEP
196608:P4/BAe1d4ihvy85JhhYc3BSL1kehn4inje:PuyIhhkRka4i
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
181.215.176.83:7000
16lTzwFXfkBVHjDN
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral4/files/0x0007000000023e34-580.dat family_xworm behavioral4/files/0x0007000000023e3b-669.dat family_xworm behavioral4/memory/1872-671-0x0000000000440000-0x000000000044E000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 1 IoCs
pid Process 1872 XClient.exe -
Uses the VBS compiler for execution 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 70 whatismyipaddress.com 72 whatismyipaddress.com 73 whatismyipaddress.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XBackground.bmp" XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Xworm V5.6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "206" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe -
Modifies registry class 57 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Xworm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "2" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 14002e8005398e082303024b98265d99428e115f0000 Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" Xworm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" Xworm V5.6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0000000001000000ffffffff Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Xworm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" Xworm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Downloads" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Xworm V5.6.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 4776 msedge.exe 4776 msedge.exe 2956 msedge.exe 2956 msedge.exe 3248 identity_helper.exe 3248 identity_helper.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 7044 msedge.exe 7044 msedge.exe 1672 msedge.exe 1672 msedge.exe 2216 identity_helper.exe 2216 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2832 Xworm V5.6.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 44 IoCs
pid Process 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 368 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 368 AUDIODG.EXE Token: SeDebugPrivilege 1872 XClient.exe Token: SeManageVolumePrivilege 5444 svchost.exe -
Suspicious use of FindShellTrayWindow 57 IoCs
pid Process 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2832 Xworm V5.6.exe 2956 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 2832 Xworm V5.6.exe 1672 msedge.exe -
Suspicious use of SendNotifyMessage 53 IoCs
pid Process 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2832 Xworm V5.6.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2956 msedge.exe 2832 Xworm V5.6.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 2832 Xworm V5.6.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2832 Xworm V5.6.exe 4504 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2956 wrote to memory of 892 2956 msedge.exe 115 PID 2956 wrote to memory of 892 2956 msedge.exe 115 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4492 2956 msedge.exe 116 PID 2956 wrote to memory of 4776 2956 msedge.exe 117 PID 2956 wrote to memory of 4776 2956 msedge.exe 117 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118 PID 2956 wrote to memory of 4996 2956 msedge.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main\Xworm V5.6.exe"C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main\Xworm V5.6.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2832 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\4vvrg25c\4vvrg25c.cmdline"2⤵PID:1644
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4FC7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc36DA442D49684142AD5098A4DA232AF4.TMP"3⤵PID:1240
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4352
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a0 0x4981⤵
- Suspicious use of AdjustPrivilegeToken
PID:368
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd7fe346f8,0x7ffd7fe34708,0x7ffd7fe347182⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵PID:180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3652 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:5284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:5620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:12⤵PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:5144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4364 /prefetch:12⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:5820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:5828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6532 /prefetch:12⤵PID:5800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6656 /prefetch:12⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6784 /prefetch:12⤵PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6796 /prefetch:12⤵PID:5840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7048 /prefetch:12⤵PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7060 /prefetch:12⤵PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7196 /prefetch:12⤵PID:5868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8004 /prefetch:12⤵PID:5432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8072 /prefetch:12⤵PID:5508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3708 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8596 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8700 /prefetch:12⤵PID:5612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8936 /prefetch:12⤵PID:6368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7672 /prefetch:12⤵PID:6616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7976 /prefetch:12⤵PID:7132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9504 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7516 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1304 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=8820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,265564589438609279,2207760810733508066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8748 /prefetch:12⤵PID:6756
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6404
-
C:\Users\Admin\Downloads\XClient.exe"C:\Users\Admin\Downloads\XClient.exe"1⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
PID:1872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffd7fe346f8,0x7ffd7fe34708,0x7ffd7fe347183⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,11817428141056750772,2343009606298442614,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:23⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,11817428141056750772,2343009606298442614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:7044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,11817428141056750772,2343009606298442614,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:83⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11817428141056750772,2343009606298442614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:13⤵PID:6736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11817428141056750772,2343009606298442614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:13⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,11817428141056750772,2343009606298442614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:83⤵PID:6912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,11817428141056750772,2343009606298442614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11817428141056750772,2343009606298442614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:13⤵PID:5652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11817428141056750772,2343009606298442614,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:13⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11817428141056750772,2343009606298442614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:13⤵PID:6288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,11817428141056750772,2343009606298442614,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:13⤵PID:4908
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3676
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5444
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3801855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD55680a79a91b032a88077fb7b3e1007e9
SHA19d5d4ee3097538cbcad4308630d3b65ea57c8ef2
SHA25610c11118f526b7a3c4ef3cd05a35a22d2a018721fec9c940feaa5a44365e759a
SHA512238be730a39e1b15f07a3391e4fcefa5e542a4f66b77d426b3e018b4ed2542199d43b0eaf46c8ad551cdcc3f2dfdf29157b06236fad81dc565c4b84ca4ae3250
-
Filesize
152B
MD5744f97229b32e80620d853346d83bb92
SHA16b30b09595a71bf09d0592fd807060c0f5826fdf
SHA256680013a5168def4d0f617cd15e76fadb2d7a90b8115ec8f19bf2fc1c6ca679d0
SHA51200fc9115124f41baf0429bf01a1149ae89f6209ac7ee0610c825bb3abd3b4a14dfb5217802958f9ddfceb22d3b6167d481d51949102504289785a81953abd5f2
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
89KB
MD545d2fd6401c87bf3a3cf5a20e8798e3b
SHA1da62df03485f493a356b52a67693bc4405ec3d3a
SHA2568861b608222e5f34fbe5849259f7c8030fa36e9767eabaef06b0e29f7ab60b62
SHA512514fc992169bc55a83719582cedfe9a3fdeae1f06a547272f53df75c101517c1132b2c98ddd14565f796d2286527483deaff6fde4a29bffaf990016e7c2e07ef
-
Filesize
20KB
MD5ea35549990f54b349e6508f4f4cac0e0
SHA18efdec385374e1a3b51bfd29c3cc9315e7dc2df7
SHA2564a1c17a1326271540f84968f43e9f55f936ae9085e99a6d06592a53f98aeff2f
SHA51267c956058c45810b4d06f4c3f2974c3b264289be435a06ca219df51cd51f9e25bbdf1db42c20d9f435f1689431b5106c21dff8a400ed6263a6b102dfb51ba7ea
-
Filesize
40KB
MD5230ab95d87a717be265134072eb17c25
SHA171a3d3dd6f952057ba0c6025d39c9792ff606828
SHA2563fdfeaa675697f08f1c7c0fd6b77512f4bf9465e670637e8e332e65ebb9db068
SHA5129b0636421ad14161f211e846521149ab0a7c866e77db309dba79718487835204cee3821c9f4678e48e134614be6a02421c155a34b7c9bc424012137705960b11
-
Filesize
29KB
MD5a09f67d5881508cd4c60f30ec7de28cc
SHA14cfbb11949080cc871f89fa5cd48c58634bbd4df
SHA256c92c8ae59dbc309dd351a8ced1db21cd40debabfa4f8b58795c5d03d2b859523
SHA512baf2204035284b27023600f0a8c2508af7ddd31d559da4d28c0f5acdd61e96888860e7241ea6ff43304e5f2bb6ad4d0f2bc2b04a7063db3cb8d88e669c16f414
-
Filesize
49KB
MD5c6feae4e748a1245ae1639a3f97a6e68
SHA1490ed29c7f2b485b3d5e63a245f538ef43bc3a72
SHA256a1f7ebf309a047639bd1b6bf0666f49659b8105099dc49a58e5f4e1c21025160
SHA51281825c4ab2fde4063e205bd118a099f03eae25ee8840b1bb934048dbadf0099f2c7173aa16c56769e19c8423f5dddea4599462de2ef3e7a17b8f9a5eaea4eb60
-
Filesize
22KB
MD5b4e03884b192680fcd6c1c8be21739d8
SHA13efb6252a217d66b0333ce30a50ec426adcfc3ea
SHA2560f6cb84b11c68279f56fd02daf69ee0bcf734b142b6482eedd8dc0369eb2def6
SHA512a3c128b6135e77c78ca4a365338913da57efaae9e168c9199c1da59ed620425a7cab68a8988755ed86485b0624be2fd93c7e4f414a66fe6a585ab9f1053ad21b
-
Filesize
28KB
MD56116e437102db7f52308235829676fcc
SHA10ea2039f55d66e814e0ca710703e3039c05602c5
SHA256613f0d7b3f5327be5c0862011b9b155daf6655b53b34975b3298c3575da33317
SHA512f84a4f3b858197db27303ce97a0ff94c1cfb65154db3b8b3124c469344302a0285c0b30b4e92b29d2064c3464fa33bd831fba03ff4558646fe6ab09948218a9c
-
Filesize
25KB
MD569e3969bc928209c376a24b58d61d050
SHA1e6631866ebbbce5121efd214661d527cb655a329
SHA256eea2ec284c09730e65e8ce73e6d83bfa534a28d877b025344ce2ce48afd82de7
SHA5120957ad18ad2a5bdcd0bd9a45957e336f543917ea9d001f6e3aef8634705c62b3cbf9aa45b5d6ddebea78222e343023d614f684c2f72e329232ddd1dd9ae3fb2a
-
Filesize
29KB
MD57415e11a9c9dd0322bb891def2dc652b
SHA15aec7dce8868d57fe3fb719a4549afcd54af748d
SHA256223ed0d20a0d0529e99f43d85f4c0657251ab24f8df50f2b8a50292c563c6d2f
SHA5121c08e00752549a3f907ef1f34a680bfea88991744f34d5be9620a274203fb7618633dadad449370b9bead33e5bdbcb8ec62d2087bbe74f4cbc6ea32ce8a02fc5
-
Filesize
19KB
MD5a0858c788f6613a62230f3c7d9383e36
SHA1ead4b7673e217c514d6cadbd01408f87fd2c8434
SHA2564e9903ea476714fda8ac99d6f7073fdfa6438bc1e59dab368a5f8ede4ce40b80
SHA512612d5d1f97f77f6ad280967e2f1a8f46fc49bb9aba112240a82f52d0cf07a55b3557326d64d74ebe345019cfc57df159511782c50d21c628cc0253f658ae6a08
-
Filesize
55KB
MD57563513236504ee200a75da200c348de
SHA1282bcc1d92022195fe1c69074ba4d51a27e1e305
SHA256d4c5c842f049d7400a26e3f6103437257e6a4ddbe214495c8f24d4b47ab21407
SHA5125e135fb4920bc0e6b515b3b93c8f9fb748f0b3bd4f067a6d4bb7b80d575fc2dd4a0b4a462338264c9618ec5856b4f79399fa152a8c80dd19389a36d85aba1c99
-
Filesize
68KB
MD59c2cd2552ee50a922419be45f980f0f5
SHA1e8dd83919ac239cd931d802f423561dafbf262f6
SHA256ca785ddd443450b1d263d8298c04845f56c75e938ed37a8ecc654319b313324f
SHA512998f4ab5be415fb9adcce80ceee52ef73cccf518c1d343f434d03108eb3127ea318b42d5b9587e87026cc442501c94e04ac111af5080c07d9a16e3969636f3ab
-
Filesize
168KB
MD5eb47174e4105b734fc44b9e3e2a62299
SHA130447f36769d0e564561f63788783a04342dce39
SHA25646fc12e437e378fdf9a97c44a991ac6f05946c8228beda7790f6aae1bb62b4ce
SHA51222f26cd532197706f5fe63ef7000818a02d027e1c5399383790426d412e5647fa78f974fe9f53c1999314c952426493a01c1991511ff28b7a4c13455fe8e0d9a
-
Filesize
67KB
MD505cb4b9f101e025994f9686f3999fd43
SHA17450f129ea39792645b56de215eaab1d91182fbe
SHA25607fba84e209fffc2a8eea1a88ec8c77cc92644c9050b7669b212bf1db30663b3
SHA5129fbf0e99a1f19b362d9e7e31dc0b6f0d49177cea922d9d6acbc1b5a84d1bfce40c3a07e123b5b47ed9a531befc9a2372be3393502b5f00221d74ae23fe80efeb
-
Filesize
22KB
MD5e6897fc3ccf6c02b6b0c2447524f1a7e
SHA1569d49e2fd3cf330a8d6df5a120709b6d484c84a
SHA2567efc5148baeb001f77e9abd76de7ed845fd0dfdd5155f25431e54042120b7054
SHA512cada715ed0d4457f9f11056fda49157c13a6ad3d8c9b6ead04e285ce3eab9cfa3225477baa6bd783be94491ffec3c941d1a309ab78fd2424f4dc8f3af56610a2
-
Filesize
185KB
MD52d5a6c6ff39bd2909b29cb2242f8842f
SHA198ad4dc2a1ce560f7d0bb7604c2b0fd333d567ae
SHA256722fcf605cead88965106d42d3d6cab8b25df3125d6623f0bee45e58af80b0ff
SHA51219c5c13cdbc5b47317c6b12f629f439f7bc702ed60b99473e8f32b4cc8e7b5fa5ee4f7cfcd493a558935b5e9a33f80c61a8ea03d850a7d4e52cc448725f3a8d6
-
Filesize
55KB
MD52679b69794379cfbf3f70976b4d24b70
SHA1e11a6b449faa7a8430756a7aeff7c4ddcd706d5a
SHA2568babf340e2c5d6e4e9f898c66061e921deac94ecbeb6764608639326ac2d6f43
SHA512e85ed3911998d0463a2db337c27eb4776953200287afff8a8df3b76572180d3d998e95226442e61d27129333a6959b9b7ee1903070df423e2e4be86a42a8e1a5
-
Filesize
264B
MD53218da831eb0e2db8dcae61d17a85be4
SHA104e012f551f48634238a772a99b10fb18ca9b52d
SHA2566d03777558e941ae2c954e213d21bfd199e2b576240cf6e6956941385fe638c1
SHA512a73ed6715941a619e7a0fd5c2f6bcc394d6928583f4bde78dbced8a1c94a01046765bd71a317ac0813be776d690f07addbaf390472d180a854809f34a7e15508
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5b87424667b9324abe4ca202555b493e0
SHA140a3ef7c08cbb796ce15fda1a31ef154d8826fc2
SHA256d226e82fc756e73bde225de0d892f3827c155e3c6545e1d635f9f425f2df7a7e
SHA512949c1ac8a6269906661ab250f519052df7e3580c5d6b86e5d71ef5a4ed0c4cc766e731c32d5d60c0899fe6e842e3b6ae546f5833a6903ec3b0618f49d40267ba
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD51629a4da2f0bdf83413ec5887cff5eb7
SHA1056b999944d021b5d5f34c8d8af06cb8513704e8
SHA2563bc88dc5f77d413ee1415fcf0dd7c455f3a097eba41e39c0f168382432d10904
SHA5127807d2210d75a1af09b20eda336ff821b695cbf18a21f885eb9f0932193f2edb00feea5f75e89bddd108d6f80f40feb71a1802b4e596c1384c6ba5fc29c49206
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5db4c35dde6cd13c0f572088bf05c1f46
SHA11ea27a740c7a7c10becc9f9612a995f4b729285f
SHA2563506e9c6f9ef0e04041e2e995da19f673517f36f94a1137ecc62a8488c17ddda
SHA51230a64614f04db36f7e832c7512412355f786cc2f99a146e21f851d11b6b3800eff898ced4f442ac22e97094b76d517be4257cef8ad8892f1444efff04d4fe9f6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5483fa975a621f346613eb1a99f580776
SHA12207e2c537dd04b4a6929320260ff3b99b93c313
SHA2567451848b0938ee356f773b94b36ed9a9cbdaa559e77a262e31a485516b198b83
SHA51245620702dbde65315821caafebed2cf43afba9c9652d0a44cdfdb0d6c338d3c9e39168e70b5476398b1ea3eab4eaf761b8a3a15d538e13e3fb654574ecd7b8da
-
Filesize
28KB
MD541e2dc199abde30a82ba880d56c57b2e
SHA17676cf73c85e5b47ef70e1cb1640f3a7489c29a8
SHA2563a4ba59a273738fbd4a78d74fae61d225ad8e68e7d1ca1201244cae60e98c320
SHA512879b8cfb299e92fa8f6e321ff4b92b8cb943365cf7cc60558d197fb8e47bb19b5c5de7a63b4eada273e120167717ba4c4173d965591976d53baaad863589e60c
-
Filesize
264KB
MD597801812619526828a9c4e72fbda6255
SHA1763d193f33d61fb1309097b6e20fa001792e74e7
SHA2562d9ea287cf343056378eb10070653bcb5324debc9f6cd9af6dfb9807040c9b5b
SHA512912b4cfd456e58392aa346576498f2a9c9e82784644ba0483dc7de1ef9cda39cab52b67bcf4b87945333b95e7f4851e98874dc44eceec79c7be0414b908f781c
-
Filesize
124KB
MD59433b058aaa472a3bbebe5c9dac58823
SHA1bf947162a0db591b8d0f7c83d4ec4f63338ec11d
SHA2562373121149cc1c2af3b816b4ecf0b38d9ede14be84177a8aadfaef6dd17d07c6
SHA51283a420dd71aaf77eed2ce69b2cfffe9b35e0c04a5d92d1abb47c30037a4e111c824519a07c43bef3ebfaae3485f14fc5c000e62fc3df1574f22a09066e330760
-
Filesize
15KB
MD51b8581f17705890c80285bd0d2ebfc9d
SHA12d082aef10c028274280dffd2698a4ad99c759df
SHA256bb5e5da7345d1aaf78666d7f9a3a6e9a4f92ebbdf6a16c842ea7a50243905dd2
SHA512aec22b5ec0baa12005daaa29835266d6f36da809803f597ed25c2fe5ce8d38c048af2693d87b2a73b73e87f0a2dff6857679add4b14e5f02dd96b8bfb5505cc0
-
Filesize
17KB
MD56cbb9dac7536c82be4b651e2e1cc4f61
SHA15a362531cbab4b4ba2a7aa50a0cfe5a3e46e7aeb
SHA256171f392b686c18d615c9207a2b664f140244edeb87e87d5059936849de5bd007
SHA512002f65a294a52b6d16d8d5c0c9e9601d8992fd26aa050d9728b691ee846169589ada0892ee5ff4b6f43da9ab585a59f4aff5914b8d8321c1e6dc5cac791beb33
-
Filesize
16KB
MD5e8e37162b1828e6a938bc2488589e4b4
SHA129c6dd7cc043a572b6c05a89d3ae8b0ced434f28
SHA256309484d8aafce66cd3db973c7459a621087d676e45c05efb1062a365a61ddfd3
SHA512bbd90275582ea6f49555551d1981e482c89903e18f1dd7249ebab985c54c045f3c52fcacb569a90a213c1a37fc2edd65b060e71ed563fae05e050911282251b0
-
Filesize
17KB
MD51a9645997c7e8c0c9bcdec765fa9c12d
SHA122e765a4a341f6db9908d8ba285111a7b76d819b
SHA2568b3e46cb476368ea978377bf981b434b6fe07d5447643fa508bc69b77a8c98fc
SHA512a43c2167e1cf9578d0c13344761260826455738a6510568c519c37eb722103e494ad415fa4bc80a44cd5269b80ef3bd8b5f5cc221d9bae76aa6d2696d2c804dc
-
Filesize
5KB
MD5e9987db039f25098372be25d19fa72e7
SHA134a2ef9165837eadea147e51e387a8836d6c51f6
SHA2569aadbec130d98c0966ea9f7dbb84c8556ea224b12dccfcffc96d7b21664a55f8
SHA51277f306790413ccf8a495a7b000fe4ed1c22f2265ef094e74411761f0229596b73268cca48eede7c8b4c46f325a000bcdd503c5ac151ea19f2d31b27b503f8a82
-
Filesize
6KB
MD5cf5f378c4fb26fef1cee2caa1ceda1f6
SHA14dacb830483042219f3d05e22d1907d1acc666f7
SHA256e6bb9b2d3880e7cfc04ded136ab05a8f565bbd096812f275cf7805b5ef65e5ae
SHA512157d49e57a180fc853f4b1fd9701ce2831087f3c50815188d7c7b14c76b61cbdc79b0ceaa63edd548dc14748b19e344576e2000ea5ee4a01fb9b925c56759fae
-
Filesize
13KB
MD5e7a5b813be330f02920a91737be71936
SHA1ee25b4af6b726fdce103640a9de67bc323ff516d
SHA256c0b9842b6dc74b78d2e131ea1eceff02465952c0b557b5b65faa748953d6fde6
SHA512d60efc75a6724168dae25acba4901b71268d27ac46f6dcb1f3f14fff062eca5537be25db776b692ffb7632b67185a7e5d197a3d57265ae0b8ee91379294a7ba2
-
Filesize
20KB
MD53d229a2094c438b7fb599b5170182940
SHA144d60b86cc2026d1dda64866be21a9e3c2e41816
SHA25642b0f21fb26210f743f156cddd7e2cb64aa54b9e03f56c3d72b74fc2a932050b
SHA5125991cd37919021a841f00a884b6edbe9a198dcb4fd21d91c834dfaa5f73c92bae72842b99d5f5421ed653c4c432a6c32dab1016f54b2223bbfdd4121d8be5fde
-
Filesize
20KB
MD50152542deb2c7385cbe6ab4192e86f09
SHA121665c68827d7e98d070990601f002c51be212a9
SHA25679a677ec79a060beaa8d4e4f70ce5bcde0f5b933490320855701f75c40d36646
SHA5129fdbaaf297ad402275a3c90dabb7a622971e7838bf91f5b4df789d45ab778839bd88de360353d681d3e9758590388f94bdb8c42f133dab37611d250b48706002
-
Filesize
20KB
MD57f6088d52fce16c911f94a26d88a940f
SHA1577728c62477ba94e6e49ff4a12aeeb4703ee60e
SHA256c2072e32d7002e51bc666bfce258e3f2f219a7b87e4fcc52e9b246baaeb32c04
SHA512c74598a26b14267e88dc2d59263267031a1667ec76b1392655039bacc0286bb9e8fa11c1885aaf21a0f6be855963202840c31750d9d22a7bc846351618b880bf
-
Filesize
20KB
MD52399a1596e29b542731f57b7c832dfec
SHA1511d66995acd01d135fb12cf9a302e0a6b7369bb
SHA256e3458d8bc00ee95b4e6721701e2d37cd17481f8a7363d08cc51bcb0ecc7b796f
SHA51249f5589e6f47f89d31979e0db4d507267fa88bf10497853afe575519845138fb9957f3059064e4b0f7d786e01ba1cc5b59fa79c2a1966eac18c9c90c28960a03
-
Filesize
10KB
MD50a49b927d736afca5c2167ec41a6aeae
SHA17bb78954b092767e27f258504952a16b501ed497
SHA256a96ed53f426065055eda34353b088298da2d38c2de76343b28ff11efc0f19af8
SHA5125a352f24fcb9cb640ce2221dbb8d08776c93cf624e165bfeaa8c03c5362b4aa5f84213cd892ea91a97f9cdc3fabbe667086929f230af087cf4ccd7e54cb15e6f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\000003.log
Filesize187B
MD50518a602d4b99943fa5a5d864d4a4b7f
SHA163c903f60ed015ec2a9978ed9ae4724bcbcdbdc0
SHA256d7c51d10e5dfe72b12579cdc60c13b2a0621c0d4dc42b97323c243c5dbc51a76
SHA512cfe06dd74faeaadbdae966b794ad2aa762e224d361e9b9ebb47759b63c75ae9724a6606ed211178039bc4eb17ca3c0abe1611231381fcf3a90b7207980de3bd6
-
Filesize
350B
MD5f673364cdbdb93f94d8861bc9a7d7943
SHA14b33a8eaa7a9fdd5fa9c24453f1898eeb8bde828
SHA2562fd9f9ab9f80d2004e03064bf514a257b1c663a0dbdcb1c3bcd5c3f26c800573
SHA512db503593a4170699908e78d4babf4851ae06746680af80a169ff603551d8ca78c0b83c8dbfc93b49c051274019ee83cb875d00e7ccf306eb0ccab58ca7dac97c
-
Filesize
326B
MD5353e2ab3f323007d4ec190244a434bd6
SHA1f5ea45ac622398f16cf327afb64baad89ce57b24
SHA2568d50fc2fa961ccf6ffcac5cdf8f0e6ec67811d8194036182627935caee6c3ecf
SHA512bfbb9efa673ae1d0b591125a9870a7711942b835f306f12ca94235556507e3075585a30678f0fac3cc4bf8bbf077f1cfb095244d522abd9a2262219754c9e4e8
-
Filesize
5KB
MD5fe4cd2fbbb3339bce26162f566876068
SHA1c120e67d965d529ea9a2805aff0731b2bea7679d
SHA256705182b2d04af54cd043e618d6cbe050b3239f2b1ef740eea8c9408264b9b3da
SHA512ea54242a01ed85e251d903a3823460832d2001568442cc7ba9fb65ea3bb231a6c27caa3ea446dc553e5d9b0cc3092d3ca7893b6e1fb8425ec31f020d81e06a89
-
Filesize
5KB
MD51a1c75e011c6b76e825546bd9a93b612
SHA104bd05092ad46559dc017d610dd68a95c68bdc45
SHA256107b0d91a2731d6e9168b244782a6b752022bfa55762561ee895f9fef1d06bb0
SHA5128ad2af5dfb93798c7fde713d5142e42a595a0ca53ed329a812dead2289ed6fec72166f658307d90c6980c00522feb38d402f8d70bf1713bcf1176ad24fa755a5
-
Filesize
6KB
MD555612ff8e8d7e5c00028979cde66bbf3
SHA1712d4b2a858f9d2c88f14c917f5836e7b805fef8
SHA256a0dd3596036a506457d064b0ff1bb4b5fd44ead41c0aec26db410e6307aa1334
SHA512e6584d78b0e1bb9514a1ab79352e3b1dc49254a5ad01ca60d92c0e5eb51df662f5bc27af2b34cd1c12e2dc64728714342792f51a2e09b25bb5671f81c5ad5bef
-
Filesize
6KB
MD553bea137ec76e02820a1afd9c7a1b6eb
SHA1e63e97dc91b79ba0958bd591c58dbee4c69602e3
SHA2562cca7a01ea40593d7a4900c0a621bf0ccc61f063f7f1e3991d23b99796f65512
SHA512c5429c37ed413fb0f1a541277608edd0f436f35d5128d8bceb8904f4770a4f312b9d5773e7f03de6efbaa0d49d651784a2ab844b1560fcb4ebf98ab46a823203
-
Filesize
6KB
MD56f8a475ab4782f0716c9e153bcadfae4
SHA15264dd7e84f47ecf2b14d99de5978f0551a38983
SHA256faba3d9f695ec59db39555f3a296a3b36d8953675f91ce08fab8a875347ec517
SHA5125e3601867e6d3c289a87e668e814130b88df116d0c4112f2a66aabc44f23e289b30eb0fa24ff6e08fedeb77dd92d1feadb8f94e64d06da89e0edb2ae6379fb17
-
Filesize
5KB
MD546a06acd695596d36e030e89ce6d05cb
SHA15edb9b6cc5f785c02bce134eba627c906a88b706
SHA256422f22912cf689d77c089762f97a56b16c2be717c45f08af428e71183d370b62
SHA5127049c8a2ab5910fc8da2453ec7664e9487bcbe73e8d63fe3bc8c9b6e38cd2a60a3dfae6481b6691d5d06e440839ecf5123cf87ccfc5681db8a6efffe9611f263
-
Filesize
6KB
MD5a278ddc9f97cc6fdb8be32b6bdac17d4
SHA1363bc804dff056fb4ceeb8ca9ba564c1ddb8f124
SHA256906d71703bab5ad854743e7edf94356992b91c7fe43188a834ab56f9097cd023
SHA512c22b4f2d8bab54dd26373d11e4128ae122929dba95466632a7b26abba6483e4816c14ed2ef1c707dda378b61fd82895a5f33af024a11d27ed82da51a3b6c2e66
-
Filesize
2KB
MD5bf606b1e4786d1033c15b27ebc6660d0
SHA189b428d67519aea8c8b34ce48a456e29b0d09743
SHA256f3383f610cfe21927aa7f53eee960009ee6bcf97942fc159379247db7d6425f7
SHA51264253de4c879b36e82245ea1d805fc9dae59e1ebbf4a018a18d6506a212cea476e1d4938624b3d0467cfbf8da8d946541391429eb18913910c7ebb139410fb1c
-
Filesize
128KB
MD5273a384cd6ff9d5d30811d6c39e12875
SHA13ed306b0dda48ab121f9f8db30bf125e8087cbe3
SHA25658227962b4ccc522c8987bcb208f732e8f7f319656592d5e600bf75e641b46e6
SHA512c7f71f8248bdfa758379e0b9f8cd4ee8f46da23b9a87b3300e9e8867277805189efef389649b16dc166475d1c430f4badf275cf227bb9062e181d187e9e66648
-
Filesize
116KB
MD58f6d634ed42f7788abc2ef4249e54680
SHA1e2d71509b992df44202dfaf90de42f5f64499713
SHA2569b874b295fb487d0de7e77275ce0515acbba9b24278691d3bcd7d93e1fa78be1
SHA51223be85ed6b3b5be6beacdd422331404ac6d3dc0dadcff9b05bf9efd82f18cc3e2b0a004be9a8101ae11cfee7359d5d01e07a3da5dfa29adc355638bada7b7706
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
10KB
MD550ce3a66c280235ed54c9a758e5a19ea
SHA1d9f0d7fa99ecdfd980840bf7c26d1fd046ae7cf9
SHA256e1834c182880fbcf9cf18d22409fbc9ba6f58b8702bde40c2433d628d474e199
SHA512f7e28b58928e2bab1bab0010f8ab338a9167f59589ca3a7912ac24df28e6f26d5ff5b3f34da1877bd8ec2e57ceea7e342f82c85af207a99436301654a59dcc79
-
Filesize
11KB
MD52c21d5bf604024635a2a74af66dc8d09
SHA12ae71d1fa1c8b00b5cc12a07b007f87d3d4275d7
SHA256d5a21840d8ef505b94fa2ed0a0f7c8a3eb970be63d913f46bfaa0a3a487ba11e
SHA5123ac92606346fe1f330522fb3321ce35b1c1ca390bf367027b9de7f925563f022ccdd1c031aa96392c1db749e316de9c9c616710d33a07d89854b34e8c2d6069e
-
Filesize
11KB
MD59b83e472502f18eee6e78c56cd50a988
SHA137870b85efd7ab93f78b5a181723c882278556db
SHA2565b4a739c99ca6cd587f622e8aa18cc0c4ca53e6ecb6b49493152c07db1ba9a23
SHA5124c8ab4db50303016ea57274eee354c45bfedc053c8196591d4556aeaa74ec11e5556865a20f38e7ef65611b02eefb940c3f39765aa14e3d7b4071316ce79c45d
-
Filesize
10KB
MD5cbed6cad4fea9b4c291adadb62652e81
SHA12a288fd86dd95975423ecb78e84d025becdea55c
SHA256112d650f462b134b450904f47c47493b0fad9612f03cb9a2a169ecf2fd72f3f4
SHA5126103bdb7a7cda452b6ed7159e9f1c9818d041a4acee98a01778a05c1b9834b702737b99d55c28ef388a443cf53157f85141646ffcf1fc260baf70f67807bd58b
-
Filesize
12KB
MD5b7240b6ff473adfeee7f4eb444375bd8
SHA1545af3c96817444722c1db2db6c543cf89c444b5
SHA25651017d9887a91b7b847ff78770d0e3df1190ffd8b6d37fc7d6e28ec9c10cb4bf
SHA512af63dddfd9ed598cadc52ad4422d91db9ee70acfbeea9d72cc56bd78ea4b2127c4eac93b708100cd8f98c45f158f63e5babd816d897b8946c06285f8d6d21cfd
-
Filesize
264KB
MD58c6e2ec733a2c41e66d35f5f8f373e78
SHA1a4a30fac376cc696becf9853b73ac8ec2e420076
SHA256b5d5a54952428b03ff41014bbb2d0f0c224929062275cdc9f9d0883f989e8f26
SHA512c8c45f1a0483fb1d73eeb2dc11b4997da604d589951f6302703db84a634583f1b03198cbe1b04141f8bddcdb7056f9aab4745cd1795735ac3be0f530b999bc8c
-
Filesize
78KB
MD5b0154fa8f0c07a70f09a6b78246d5123
SHA16e8b9e0d5bc08b0dab06603869a6abe0509f0d83
SHA256296061e93b54e651d2a649f221f7a0cae21c45d75a2fb302a8e91b186f6f4078
SHA5126bc6c0e757d28625bb12b63bbf48d0e3dc776a6580338dea9c9b5c12d0755d8772def2a2436a85cb73da244c327ed09459feee1c93a9427f45b0e33a5b0f525d
-
Filesize
292B
MD512858ec20d6d75e4742c84ba4ddb3eb2
SHA1e089a0cc4c664b4ef46339de48a78d842d9e3ab7
SHA256b26638fc107659aa2de777af59fecb82e908587e4884683e43a29396d2206136
SHA5124db1edad8f91c0c04e56bf674446535b2cc4d4027f9348f4d684007396529be7662548bc5c1cb2a3b8628766ea4af1e2611745a158c2fba376a4bf1e06e9e8ad
-
Filesize
1KB
MD56b3014319400b535f6cb17d437c8da79
SHA15ef69ae2261d5e2bdba21c52c47f5b2541dab0c0
SHA2560c794267a3dca61740ec387cb23c53a4bfd8ffec8f181f2dc1bf9d65d9e0a244
SHA512affb456e16ba89be9133c956107c6e1bc4a4353d2312ddbcd3dd8c92945714d88f844362c858f7183bf9af0abdecd862f989c23a8d7eb65071a51c8674a00dbd
-
Filesize
1KB
MD5d40c58bd46211e4ffcbfbdfac7c2bb69
SHA1c5cf88224acc284a4e81bd612369f0e39f3ac604
SHA25601902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca
SHA51248b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68
-
Filesize
32KB
MD5bc65960f232d6c0216d9046997b8bb7d
SHA14d59b8b33adfa74b848c522c0713f857505b3304
SHA25626a19917c391bb5b45a15c6a457674b30b16473edcbe8f2f4a535af508b2e2ab
SHA512f16be60d4417abc925a75d496bd339c90176f150317cdaad7ffe41920fd408e28dbaa62b290e31ba498818f4eef9090193b20fcf580c3d6b0dc5f8a9a3ecedc7
-
C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000001.regtrans-ms.ENC
Filesize16B
MD5b19a0ebd53d293a974003992ab56730f
SHA100ec7efbe522bc6991031ded6934b8ea58a58d27
SHA256e9ea127f4f86a4d79d1ec5d85a54856e858855f3da9401338cb2b90bc75f44cf
SHA512e6fe00d237a51ae787f13749e8dfdaddf824afd7576906eca8418ff9294194f44c2e2555d2cbd564f1547236b2269263f71f1dfe65ff3acf2dec7c5c7cbbc735