Resubmissions
20-02-2025 16:40
250220-t62tyszmgp 120-02-2025 16:40
250220-t6q3fszmer 820-02-2025 16:08
250220-tllx1axrct 820-02-2025 15:51
250220-tamedsyjfj 820-02-2025 15:47
250220-s784zsxnhv 320-02-2025 14:33
250220-rw2p4axjhn 820-02-2025 14:15
250220-rkrqrawnby 10Analysis
-
max time kernel
1471s -
max time network
1800s -
platform
windows11-21h2_x64 -
resource
win11-20250210-en -
resource tags
arch:x64arch:x86image:win11-20250210-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-02-2025 17:46
Static task
static1
Behavioral task
behavioral1
Sample
test.txt
Resource
win11-20250210-en
General
-
Target
test.txt
-
Size
18B
-
MD5
5b3f97d48c8751bd031b7ea53545bdb6
-
SHA1
88be3374c62f23406ec83bb11279f8423bd3f88d
-
SHA256
d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b
-
SHA512
ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6
Malware Config
Extracted
xworm
5.0
127.0.0.1:443
KtxkBmYnUfg4Y0ej
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
xworm
127.0.0.1:443
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/6004-2715-0x000000001BD40000-0x000000001BD4E000-memory.dmp disable_win_def -
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x001900000002b1a7-2220.dat family_xworm behavioral1/files/0x001900000002b1ae-2230.dat family_xworm behavioral1/files/0x001900000002b1ae-2250.dat family_xworm behavioral1/memory/6004-2251-0x0000000000BF0000-0x0000000000C08000-memory.dmp family_xworm -
Xworm family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4916 powershell.exe 7052 powershell.exe 5476 powershell.exe 6132 powershell.exe -
Downloads MZ/PE file 5 IoCs
flow pid Process 84 900 Process not Found 632 900 Process not Found 400 1884 firefox.exe 561 4740 Process not Found 612 4740 Process not Found -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 38 IoCs
pid Process 1724 XWormLoader 5.2 x64.exe 6004 XClient.exe 4296 XClient.exe 7144 kaspersky4win202121.20.8.505en_46538.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 5692 XClient.exe 5124 kaspersky4win202121.20.8.505en_46538.exe 6856 kaspersky4win202121.20.8.505en_46538.exe 6312 setup_ui.exe 1568 XClient.exe 4308 XClient.exe 6296 XClient.exe 7632 XClient.exe 8004 XClient.exe 7496 XClient.exe 2088 XClient.exe 8016 XClient.exe 236 dismhost.exe 4916 XClient.exe 8164 XClient.exe 4664 XClient.exe 3184 XClient.exe 8156 XClient.exe 1140 XClient.exe 5484 XClient.exe 7152 setup.exe 3320 setup.exe 6552 setup.exe 2012 setup.exe 4768 setup.exe 8052 setup.exe 2768 setup.exe 6276 setup.exe 6940 XClient.exe 6964 XClient.exe 6796 setup.exe 7568 setup.exe 2332 XClient.exe -
Loads dropped DLL 40 IoCs
pid Process 1724 XWormLoader 5.2 x64.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 6856 kaspersky4win202121.20.8.505en_46538.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 6312 setup_ui.exe 236 dismhost.exe 236 dismhost.exe 236 dismhost.exe 236 dismhost.exe 236 dismhost.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/files/0x001500000002b17e-2171.dat agile_net behavioral1/memory/1724-2172-0x0000021445720000-0x0000021446358000-memory.dmp agile_net -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" XClient.exe -
Checks for any installed AV software in registry 1 TTPs 44 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Display Inline Images kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Print_Background kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\DisableScriptDebuggerIE kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\International\Scripts\3 kaspersky4win202121.20.8.505en_46538.exe Key created \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Expand Alt Text kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Move System Caret kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Enable AutoImageResize kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\International kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\MenuExt kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Anchor Underline kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\SmoothScroll kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\International\Scripts kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Text Scaling kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\AdvancedOptions\DISAMBIGUATION kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Use_DlgBox_Colors kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\CSS_Compat kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Show image placeholders kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Viewport kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Larger Hit Test kaspersky4win202121.20.8.505en_46538.exe Set value (str) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Enable Browser Extensions = "no" kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Play_Animations kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Disable Script Debugger kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Settings kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Styles kaspersky4win202121.20.8.505en_46538.exe Key created \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main kaspersky4win202121.20.8.505en_46538.exe Set value (int) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\UseSWRender = "1" kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Play_Background_Sounds kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\UseHR kaspersky4win202121.20.8.505en_46538.exe Key queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab kaspersky4win202121.20.8.505en_46538.exe Key queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Display Inline Videos kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\XMLHTTP kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Disable Diagnostics Mode kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Cleanup HTCs kaspersky4win202121.20.8.505en_46538.exe Key queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\RtfConverterFlags kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\Q300829 kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\XDomainRequest kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\DOMStorage kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\KasperskyLab\IEOverride\Main\JScriptProfileCacheEventDelay kaspersky4win202121.20.8.505en_46538.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kaspersky4win202121.20.8.505en_46538.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kaspersky4win202121.20.8.505en_46538.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 27 IoCs
flow ioc 431 portmap.io 487 portmap.io 406 portmap.io 312 pastebin.com 417 portmap.io 422 portmap.io 497 portmap.io 886 pastebin.com 67 pastebin.com 409 portmap.io 413 portmap.io 495 portmap.io 66 pastebin.com 416 portmap.io 494 portmap.io 496 portmap.io 65 pastebin.com 514 portmap.io 512 portmap.io 519 portmap.io 418 portmap.io 488 portmap.io 513 portmap.io 47 pastebin.com 415 portmap.io 421 portmap.io 491 portmap.io -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\services.msc mmc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\pt-BR.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\gl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\hr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\concrt140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_proxy\stable.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\msedgewebview2.exe.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\identity_proxy\win11\identity_helper.Sparse.Internal.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\msedge_pwa_launcher.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\msedgewebview2.exe.sig setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\prefs_enclave_x64.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\mspdf.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\bn-IN.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\fr.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\msedgewebview2.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.59\Trust Protection Lists\Sigma\LICENSE setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.59\identity_proxy\win11\identity_helper.Sparse.Internal.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\eu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ka.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ca-Es-VALENCIA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.59\Locales\az.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\WidevineCdm\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\identity_proxy\win11\identity_helper.Sparse.Beta.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\zh-CN.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\identity_proxy\win11\identity_helper.Sparse.Canary.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\kok.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.59\Locales\lo.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\msedge.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\VisualElements\LogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\msedge.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.59\VisualElements\SmallLogoCanary.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.59\Trust Protection Lists\Mu\TransparentAdvertisers setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\da.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\identity_proxy\win10\identity_helper.Sparse.Canary.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\kn.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\th.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.59\AdSelectionAttestationsPreloaded\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\nl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\identity_helper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Sigma\Cryptomining setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.59\identity_proxy\win11\identity_helper.Sparse.Dev.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\az.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\et.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\VisualElements\LogoDev.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Extensions\external_extensions.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\EBWebView\x86\EmbeddedBrowserWebView.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\AdSelectionAttestationsPreloaded\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Trust Protection Lists\Mu\LICENSE setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\te.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ug.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\Locales\ur.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Trust Protection Lists\Mu\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\oneds.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\VisualElements\SmallLogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Locales\fil.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\onnxruntime.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.59\Locales\sl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.59\Locales\te.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\mip_core.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\show_third_party_software_licenses.bat setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\133.0.3065.59\Locales\kok.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\AdSelectionAttestationsPreloaded\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\vccorlib140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.59\show_third_party_software_licenses.bat setup.exe -
Drops file in Windows directory 46 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\SystemTemp\3a50ee91-8556-493b-9843-6b6274db1d8a.tmp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File created C:\Windows\SystemTemp\58abd5ec-f759-4775-9938-0a1a45386f69.tmp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Logs\DISM\dism.log powershell.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\Logs\DISM\dism.log dismhost.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\Downloads\kaspersky4win202121.20.8.505en_46538.exe:Zone.Identifier firefox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_ui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kaspersky4win202121.20.8.505en_46538.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kaspersky4win202121.20.8.505en_46538.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5020 MicrosoftEdgeUpdate.exe 6948 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS XWormLoader 5.2 x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer XWormLoader 5.2 x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion XWormLoader 5.2 x64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch mmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO" setup.exe Key created \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\Microsoft\Internet Explorer\Main mmc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" mmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" mmc.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133841152288964513" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge setup.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\InstallerPinned = "0" setup.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSEdgePDF\shell\runas\command setup.exe Key created \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 XWormLoader 5.2 x64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 XWormLoader 5.2 x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ = "Interface {C9C2B807-7731-4F34-81B7-44FF7779522B}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO\\ie_to_edge_bho.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\AppID = "{6d2b5079-2f0b-48dd-ab7f-97cec514d30b}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell\open\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" \"%1\"" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\ = "Microsoft Edge MHT Document" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\notification_helper.exe\"" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32\ServerExecutable = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\notification_helper.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32 setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\Application setup.exe Key created \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2 = 3a002e803accbfb42cdb4c42b0297fe99a87c641260001002600efbe110000005dfb4f9ba37bdb015e487c7eae7bdb0137ad7e7eae7bdb0114000000 XWormLoader 5.2 x64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" XWormLoader 5.2 x64.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeHTM\shell\runas setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithProgIds\MSEdgeMHT setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Programmable\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\ = "IEToEdgeBHO Class" setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = 00000000ffffffff XWormLoader 5.2 x64.exe Key created \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell XWormLoader 5.2 x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\BHO\\ie_to_edge_bho_64.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\AppUserModelId = "MSEdge" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\SniffedFolderType = "Generic" XWormLoader 5.2 x64.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CLSID\ = "{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.mht\OpenWithProgids setup.exe Key created \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} XWormLoader 5.2 x64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" XWormLoader 5.2 x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib\ = "{2397ECFE-3237-400F-AE51-62B25B3F15B5}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\shell\open\command\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --single-argument %1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\Application\ApplicationName = "Microsoft Edge" setup.exe Key created \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\0 XWormLoader 5.2 x64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 XWormLoader 5.2 x64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2\MRUListEx = ffffffff XWormLoader 5.2 x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xml\OpenWithProgIds\MSEdgeHTM setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\DefaultIcon\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\msedge.exe,0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\DefaultIcon\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\msedge.exe,11" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\MSEdgeMHT\shell\runas setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\shell\runas\ProgrammaticAccessOnly setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\Application\ApplicationCompany = "Microsoft Corporation" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\win64\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\133.0.3065.59\\elevation_service.exe" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\MIME\Database setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/pdf setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\OpenWithProgIds\MSEdgeHTM setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{1FCBE96C-1697-43AF-9140-2897C7C69767} setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.mht setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" XWormLoader 5.2 x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID\ = "ie_to_edge_bho.IEToEdgeBHO" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CLSID\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\shell\runas\ProgrammaticAccessOnly setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\Application\AppUserModelId = "MSEdge" setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3418141264-4181727730-1624968314-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" XWormLoader 5.2 x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Programmable\ setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14} setup.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\Downloads\XWorm v5.1-5.2.7z:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\kaspersky4win202121.20.8.505en_46538.exe:Zone.Identifier firefox.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 984 NOTEPAD.EXE -
Runs regedit.exe 1 IoCs
pid Process 7072 regedit.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4452 chrome.exe 4452 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 4916 powershell.exe 4916 powershell.exe 4916 powershell.exe 7052 powershell.exe 7052 powershell.exe 7052 powershell.exe 5476 powershell.exe 5476 powershell.exe 5476 powershell.exe 6132 powershell.exe 6132 powershell.exe 6132 powershell.exe 6004 XClient.exe 6004 XClient.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 6004 XClient.exe 6004 XClient.exe 6004 XClient.exe 6004 XClient.exe 6004 XClient.exe 6004 XClient.exe 6004 XClient.exe 6004 XClient.exe 6004 XClient.exe 6004 XClient.exe -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 1724 XWormLoader 5.2 x64.exe 7072 regedit.exe 6004 XClient.exe 7300 OptionalFeatures.exe 6780 mmc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
pid Process 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 7344 msedge.exe 7344 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 2672 7zG.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 4452 chrome.exe -
Suspicious use of SendNotifyMessage 44 IoCs
pid Process 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 1724 XWormLoader 5.2 x64.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 1724 XWormLoader 5.2 x64.exe 7344 msedge.exe 7344 msedge.exe 7344 msedge.exe 7344 msedge.exe 7344 msedge.exe 7344 msedge.exe 7344 msedge.exe 7344 msedge.exe 7344 msedge.exe 7344 msedge.exe 7344 msedge.exe 7344 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1724 XWormLoader 5.2 x64.exe 6004 XClient.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 6748 kaspersky4win202121.20.8.505en_46538.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 1884 firefox.exe 7384 OpenWith.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe 6780 mmc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1000 wrote to memory of 984 1000 cmd.exe 85 PID 1000 wrote to memory of 984 1000 cmd.exe 85 PID 4452 wrote to memory of 3640 4452 chrome.exe 91 PID 4452 wrote to memory of 3640 4452 chrome.exe 91 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 2760 4452 chrome.exe 92 PID 4452 wrote to memory of 1388 4452 chrome.exe 93 PID 4452 wrote to memory of 1388 4452 chrome.exe 93 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 PID 4452 wrote to memory of 4900 4452 chrome.exe 94 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\test.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\test.txt2⤵
- Opens file in notepad (likely ransom note)
PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97650cc40,0x7ff97650cc4c,0x7ff97650cc582⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=1960 /prefetch:22⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1900,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=2040 /prefetch:32⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=2212 /prefetch:82⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3204,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4340,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=4332 /prefetch:12⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4320,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=4600 /prefetch:82⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4580,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=4280 /prefetch:82⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4776,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=4808 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4656,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=4704 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4704,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=4376 /prefetch:12⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4440,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=4392 /prefetch:12⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3440,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=4444 /prefetch:12⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5128,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=3456 /prefetch:82⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5152,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3444,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5116,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5012,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=4408 /prefetch:12⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3260,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5160,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5652,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=3716,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=3752 /prefetch:12⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=5364,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5508,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5856,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=4804 /prefetch:82⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=4808,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=4812,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=5996,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:5680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5408,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=1428,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=5632,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:5324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=5164,i,15375147418154213332,7532130543407031771,262144 --variations-seed-version=20250209-180322.678000 --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:5760
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2588
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1044
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjUiIGluc3RhbGxkYXRldGltZT0iMTczOTE4NDAzMyIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNjU1NjU2MjA2MDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUyMTA3NjA1NDEiLz48L2FwcD48L3JlcXVlc3Q-1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5020
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:1440
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Downloads MZ/PE file
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1884 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1948 -parentBuildID 20240401114208 -prefsHandle 1876 -prefMapHandle 1868 -prefsLen 27108 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fa83626f-56c2-47be-9f2d-45ce682009b2} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" gpu3⤵PID:764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2348 -parentBuildID 20240401114208 -prefsHandle 2340 -prefMapHandle 2328 -prefsLen 26986 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a381adbe-e735-46e1-8642-d2576dc048ea} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" socket3⤵PID:4720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3204 -childID 1 -isForBrowser -prefsHandle 2832 -prefMapHandle 3084 -prefsLen 22636 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d705be3-5cca-4076-a737-98920e994535} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:3624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3996 -childID 2 -isForBrowser -prefsHandle 3988 -prefMapHandle 3984 -prefsLen 32360 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {58eec437-7150-4fb0-8b98-586759d55b59} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:2140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4800 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4780 -prefMapHandle 4768 -prefsLen 32360 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5613d939-2a77-4f5c-a1f1-a4287dba82c0} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" utility3⤵
- Checks processor information in registry
PID:5824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5420 -childID 3 -isForBrowser -prefsHandle 5440 -prefMapHandle 5432 -prefsLen 27114 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {413fc65e-7713-4245-a8ce-37948f90fc95} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:5832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5604 -childID 4 -isForBrowser -prefsHandle 5704 -prefMapHandle 5612 -prefsLen 27114 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d3bcc078-5d09-49db-9a02-3e75dd2d316d} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:5840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5828 -childID 5 -isForBrowser -prefsHandle 5856 -prefMapHandle 5440 -prefsLen 27114 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0466dbc8-effd-4dfa-9b01-47c2305274a6} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:5960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3156 -childID 6 -isForBrowser -prefsHandle 3004 -prefMapHandle 2476 -prefsLen 27114 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ffbb5530-5484-4c9e-9a4c-1b228417429a} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:5420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2680 -childID 7 -isForBrowser -prefsHandle 4364 -prefMapHandle 2628 -prefsLen 32561 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c8ef3b6-f700-47b8-a3e7-9ea33f597b02} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:4996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4680 -childID 8 -isForBrowser -prefsHandle 6204 -prefMapHandle 5116 -prefsLen 27680 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ebe9e372-3ff1-4b54-bc57-36e6223356fa} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:5580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3472 -childID 9 -isForBrowser -prefsHandle 7020 -prefMapHandle 6960 -prefsLen 27680 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8277e35-b3c6-4629-9bf3-494e8f945471} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:5332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7352 -childID 10 -isForBrowser -prefsHandle 7400 -prefMapHandle 6956 -prefsLen 27680 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd616880-5330-4b8d-9dad-3cbe122b1287} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:5148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7564 -childID 11 -isForBrowser -prefsHandle 7344 -prefMapHandle 7284 -prefsLen 27680 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {17d95362-2463-4ea9-88ee-c471003d195a} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:5804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8168 -childID 12 -isForBrowser -prefsHandle 8160 -prefMapHandle 8036 -prefsLen 27997 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cd38b43-4e55-4f98-8bb5-f3b3fea6b97d} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:3744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8348 -childID 13 -isForBrowser -prefsHandle 8360 -prefMapHandle 8372 -prefsLen 27997 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {96e0a904-dab7-4b1b-99a0-2d7443c3ab59} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:6716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6092 -childID 14 -isForBrowser -prefsHandle 5892 -prefMapHandle 6996 -prefsLen 27997 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {42857591-8568-4478-9d68-5eca7881e319} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:6640
-
-
C:\Users\Admin\Downloads\kaspersky4win202121.20.8.505en_46538.exe"C:\Users\Admin\Downloads\kaspersky4win202121.20.8.505en_46538.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7144 -
C:\Windows\temp\F7CDEF595CBEFE111929676BE6A35A89\kaspersky4win202121.20.8.505en_46538.exe"C:\Windows\temp\F7CDEF595CBEFE111929676BE6A35A89\kaspersky4win202121.20.8.505en_46538.exe" -initialNonSecureSetupPath="C:\Users\Admin\Downloads\kaspersky4win202121.20.8.505en_46538.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6748
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6728 -childID 15 -isForBrowser -prefsHandle 6852 -prefMapHandle 6604 -prefsLen 27997 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eee99724-e7ce-4741-b10c-6e39ff340e3f} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:3432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7152 -childID 16 -isForBrowser -prefsHandle 6988 -prefMapHandle 8332 -prefsLen 27997 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {05cb3be0-1bfe-425e-9e36-20d2bb675d33} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:2644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=9280 -childID 17 -isForBrowser -prefsHandle 3348 -prefMapHandle 5148 -prefsLen 27997 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2fe51763-b7a4-40f3-b21a-a16db7b75abe} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:4296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6948 -childID 18 -isForBrowser -prefsHandle 8348 -prefMapHandle 8512 -prefsLen 27997 -prefMapSize 244628 -jsInitHandle 1312 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7efc904f-f001-429e-b2a2-23da3bdedff4} 1884 "\\.\pipe\gecko-crash-server-pipe.1884" tab3⤵PID:2080
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004B8 0x00000000000004DC1⤵PID:3100
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6424
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\XWorm v5.1-5.2\" -ad -an -ai#7zMap18053:88:7zEvent166981⤵
- Suspicious use of FindShellTrayWindow
PID:2672
-
C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\XWormLoader 5.2 x64.exe"C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\XWormLoader 5.2 x64.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\4xx44kl4\4xx44kl4.cmdline"2⤵PID:6800
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC4C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc56046FF3A0B94E71A72D3BDC111BB7D.TMP"3⤵PID:4112
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:6724
-
C:\Users\Admin\Desktop\XClient.exe"C:\Users\Admin\Desktop\XClient.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:6004 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:7052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5476
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6132
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:6992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 127.0.0.1 443 <123456789> 82FBCCF7BA0C5D7317292⤵PID:8136
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -c explorer shell:::{3080F90E-D7AD-11D9-BD98-0000947B0257}3⤵PID:720
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe" shell::: -encodedCommand MwAwADgAMABGADkAMABFAC0ARAA3AEEARAAtADEAMQBEADkALQBCAEQAOQA4AC0AMAAwADAAMAA5ADQANwBCADAAMgA1ADcA -inputFormat xml -outputFormat text4⤵PID:1736
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --disable-3d-apis --disable-gpu --disable-d3d11 "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data"3⤵PID:7988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ff95f083cb8,0x7ff95f083cc8,0x7ff95f083cd84⤵PID:7588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,11990513853745460213,9785622775487926662,131072 --disable-d3d11 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1964 /prefetch:24⤵PID:7720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,11990513853745460213,9785622775487926662,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --mojo-platform-channel-handle=2328 /prefetch:34⤵PID:6448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --disable-3d-apis --disable-gpu --disable-d3d11 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --flag-switches-begin --flag-switches-end4⤵PID:3124
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --disable-3d-apis --disable-gpu --disable-d3d11 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --flag-switches-begin --flag-switches-end --edge-skip-compat-layer-relaunch5⤵PID:5412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x240,0x244,0x248,0x23c,0x2b0,0x7ff954b5f208,0x7ff954b5f214,0x7ff954b5f2206⤵PID:6376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=1948,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=1976 /prefetch:116⤵PID:6632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=1912,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=1908 /prefetch:26⤵PID:7584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=2384,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=2404 /prefetch:136⤵PID:8288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3436,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=3464 /prefetch:16⤵PID:8660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --instant-process --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3444,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:16⤵PID:8668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4108,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=4236 /prefetch:16⤵PID:8792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --extension-process --renderer-sub-type=extension --disable-3d-apis --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4184,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=4252 /prefetch:96⤵PID:8800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --disable-3d-apis --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=4260,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=4476 /prefetch:16⤵PID:8836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --extension-process --renderer-sub-type=extension --disable-3d-apis --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=4328,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=4280 /prefetch:96⤵PID:8844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=4460,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=4448 /prefetch:146⤵PID:8552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=4444,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=5432 /prefetch:146⤵PID:8680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=4420,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=5480 /prefetch:146⤵PID:8688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=6252,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=6260 /prefetch:146⤵PID:8592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=6360,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=6364 /prefetch:146⤵PID:8880
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\cookie_exporter.execookie_exporter.exe --cookie-json=11327⤵PID:8376
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=6396,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=6240 /prefetch:146⤵PID:8568
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\cookie_exporter.execookie_exporter.exe --cookie-json=5967⤵PID:4580
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=6692,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=6724 /prefetch:146⤵PID:9000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=6692,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=6724 /prefetch:146⤵PID:6460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=568,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=4516 /prefetch:146⤵PID:9076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=4440,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=6436 /prefetch:146⤵PID:10148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=4408,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=6584 /prefetch:146⤵PID:8984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=2888,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=6748 /prefetch:146⤵PID:9100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=2884,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=6640 /prefetch:146⤵PID:8984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=6440,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=4548 /prefetch:146⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=5080,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=7020 /prefetch:146⤵PID:10088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=5064,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=5124 /prefetch:146⤵PID:9172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=4360,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=5440 /prefetch:146⤵PID:10208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=4588,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=4296 /prefetch:146⤵PID:9228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=7208,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=7220 /prefetch:146⤵PID:6468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=5488,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=5664 /prefetch:146⤵PID:10220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=7112,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=6412 /prefetch:146⤵PID:6544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=7192,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=7124 /prefetch:146⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=5684,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=756 /prefetch:146⤵PID:9412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=6316,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=3592 /prefetch:146⤵PID:9260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=6208,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=5844 /prefetch:146⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=5824,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=5848 /prefetch:146⤵PID:9280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=3108,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=1000 /prefetch:146⤵PID:8748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data" --always-read-main-dll --field-trial-handle=6308,i,15780710747493016056,12004961445937572076,262144 --variations-seed-version --mojo-platform-channel-handle=7140 /prefetch:146⤵PID:8868
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --mute-audio --disable-audio --disable-3d-apis --disable-gpu --disable-d3d11 "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data"3⤵PID:10156
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x12c,0x130,0x134,0xfc,0x138,0x7ff97650cc40,0x7ff97650cc4c,0x7ff97650cc584⤵PID:10200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=256,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=1828 /prefetch:24⤵PID:8752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --no-appcompat-clear --field-trial-handle=1776,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=2012 /prefetch:34⤵PID:5496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --no-appcompat-clear --field-trial-handle=2144,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=2476 /prefetch:84⤵PID:9292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --disable-3d-apis --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3024,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=3044 /prefetch:14⤵PID:9628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --disable-3d-apis --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3048,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=3244 /prefetch:14⤵PID:9492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --disable-3d-apis --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4448,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=4480 /prefetch:14⤵PID:9764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --no-appcompat-clear --field-trial-handle=4656,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=4664 /prefetch:84⤵PID:10092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --no-appcompat-clear --field-trial-handle=4768,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=3728 /prefetch:84⤵PID:9736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --no-appcompat-clear --field-trial-handle=4728,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=4744 /prefetch:84⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --no-appcompat-clear --field-trial-handle=5280,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=4736 /prefetch:84⤵PID:9112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --no-appcompat-clear --field-trial-handle=5348,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=5360 /prefetch:84⤵PID:6864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --disable-3d-apis --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4984,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=4956 /prefetch:14⤵PID:10004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --disable-3d-apis --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3240,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=3460 /prefetch:14⤵PID:5736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --disable-3d-apis --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3292,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=3304 /prefetch:14⤵PID:10028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --no-appcompat-clear --field-trial-handle=3032,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=3268 /prefetch:84⤵PID:9312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mute-audio --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --no-appcompat-clear --field-trial-handle=5484,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=5592 /prefetch:84⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\Chrome Data" --disable-3d-apis --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5580,i,3530799034601476582,15088858849809366586,262144 --variations-seed-version=20250214-130114.277000 --mojo-platform-channel-handle=3260 /prefetch:14⤵PID:7404
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe3⤵PID:2660
-
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:4296
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:5692
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\9fb1583b587a4381b7894e89f5c95a0a /t 4052 /p 67481⤵PID:1672
-
C:\Users\Admin\Downloads\kaspersky4win202121.20.8.505en_46538.exe"C:\Users\Admin\Downloads\kaspersky4win202121.20.8.505en_46538.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5124 -
C:\Windows\temp\AB7F571C5CBEFE111929676BE6A35A89\kaspersky4win202121.20.8.505en_46538.exe"C:\Windows\temp\AB7F571C5CBEFE111929676BE6A35A89\kaspersky4win202121.20.8.505en_46538.exe" -initialNonSecureSetupPath="C:\Users\Admin\Downloads\kaspersky4win202121.20.8.505en_46538.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:6856 -
C:\Users\Admin\AppData\Local\Temp\2C5C481C5CBEFE111929676BE6A35A89\setup_ui.exe"C:\Users\Admin\AppData\Local\Temp\2C5C481C5CBEFE111929676BE6A35A89\setup_ui.exe" -cp=objref:TUVPVwEAAAAAAAAAAAAAAMAAAAAAAABGgQIAAAAAAAA4uWJAvrlrw3hGPOSDRzQFAjwAAMga//+rUS1FkObjfC4AGAAHAE8AZABiAHUAdgBkAHEAbgAAAAcAMQAwAC4AMQAyADcALgAwAC4AOQA2AAAAAAAJAP//AAAeAP//AAAQAP//AAAKAP//AAAWAP//AAAfAP//AAAOAP//AAAAAA==:3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6312
-
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:1568
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:4308
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"1⤵
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
PID:7072
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:6296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:6296
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:6844
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:2516
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:7384
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:7480
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:7632
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:8004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://features.msc/1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:7344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff95f083cb8,0x7ff95f083cc8,0x7ff95f083cd82⤵PID:7328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2414049052248480451,9929710820201210496,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:7428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,2414049052248480451,9929710820201210496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵PID:7412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,2414049052248480451,9929710820201210496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:7388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2414049052248480451,9929710820201210496,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2414049052248480451,9929710820201210496,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:6288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7760
-
C:\Windows\System32\OptionalFeatures.exe"C:\Windows\System32\OptionalFeatures.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:7300
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:7496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pwsh/1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:4308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff95f083cb8,0x7ff95f083cc8,0x7ff95f083cd82⤵PID:7904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1856,10120642905333710668,8416051043466529630,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1816 /prefetch:22⤵PID:6784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1856,10120642905333710668,8416051043466529630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵PID:6420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1856,10120642905333710668,8416051043466529630,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:7280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,10120642905333710668,8416051043466529630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:7396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,10120642905333710668,8416051043466529630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:7416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7216
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:7788 -
C:\Users\Admin\AppData\Local\Temp\BC00255E-17C7-41DF-8AE6-12ADC0B9471B\dismhost.exeC:\Users\Admin\AppData\Local\Temp\BC00255E-17C7-41DF-8AE6-12ADC0B9471B\dismhost.exe {52668057-146F-48AA-8E58-0F67FFB5B31B}2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:236
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:2088
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:8016
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:4916
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"1⤵
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:6780
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:8164
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:4664
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:3184
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:8156
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:1140
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:5484
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3D15451-1F71-43F6-9FC6-2E0E12A822B9}\MicrosoftEdge_X64_133.0.3065.59.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3D15451-1F71-43F6-9FC6-2E0E12A822B9}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable1⤵PID:7740
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3D15451-1F71-43F6-9FC6-2E0E12A822B9}\EDGEMITMP_3ED66.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3D15451-1F71-43F6-9FC6-2E0E12A822B9}\EDGEMITMP_3ED66.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3D15451-1F71-43F6-9FC6-2E0E12A822B9}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- System policy modification
PID:7152 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3D15451-1F71-43F6-9FC6-2E0E12A822B9}\EDGEMITMP_3ED66.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3D15451-1F71-43F6-9FC6-2E0E12A822B9}\EDGEMITMP_3ED66.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3D15451-1F71-43F6-9FC6-2E0E12A822B9}\EDGEMITMP_3ED66.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff794406a68,0x7ff794406a74,0x7ff794406a803⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3320
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3D15451-1F71-43F6-9FC6-2E0E12A822B9}\EDGEMITMP_3ED66.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3D15451-1F71-43F6-9FC6-2E0E12A822B9}\EDGEMITMP_3ED66.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:6552 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3D15451-1F71-43F6-9FC6-2E0E12A822B9}\EDGEMITMP_3ED66.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3D15451-1F71-43F6-9FC6-2E0E12A822B9}\EDGEMITMP_3ED66.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{A3D15451-1F71-43F6-9FC6-2E0E12A822B9}\EDGEMITMP_3ED66.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff794406a68,0x7ff794406a74,0x7ff794406a804⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2012
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4768 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff7fbf26a68,0x7ff7fbf26a74,0x7ff7fbf26a804⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:6276
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:8052 -
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff7fbf26a68,0x7ff7fbf26a74,0x7ff7fbf26a804⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2768
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wisvc1⤵PID:7760
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:6932
-
C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.2104.12721.0_x64__8wekyb3d8bbwe\LocalBridge.exe"C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.2104.12721.0_x64__8wekyb3d8bbwe\LocalBridge.exe" /InvokerPRAID: Microsoft.MicrosoftOfficeHub notifications1⤵PID:4348
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:6940
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:6964
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵PID:7228
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{45F4BFA1-991E-4D42-8C89-5605A2C0F39E}\MicrosoftEdge_X64_133.0.3065.59_132.0.2957.140.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{45F4BFA1-991E-4D42-8C89-5605A2C0F39E}\MicrosoftEdge_X64_133.0.3065.59_132.0.2957.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level1⤵PID:7212
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{45F4BFA1-991E-4D42-8C89-5605A2C0F39E}\EDGEMITMP_9653E.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{45F4BFA1-991E-4D42-8C89-5605A2C0F39E}\EDGEMITMP_9653E.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{45F4BFA1-991E-4D42-8C89-5605A2C0F39E}\MicrosoftEdge_X64_133.0.3065.59_132.0.2957.140.exe" --previous-version="132.0.2957.140" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:6796 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{45F4BFA1-991E-4D42-8C89-5605A2C0F39E}\EDGEMITMP_9653E.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{45F4BFA1-991E-4D42-8C89-5605A2C0F39E}\EDGEMITMP_9653E.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{45F4BFA1-991E-4D42-8C89-5605A2C0F39E}\EDGEMITMP_9653E.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff654a26a68,0x7ff654a26a74,0x7ff654a26a803⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:7568
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵PID:6540
-
C:\Windows\system32\sfc.exesfc /scannow2⤵PID:7860
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:2332
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.469_none_04a25ac34c904574\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.469_none_04a25ac34c904574\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
PID:7372
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7OTQ2Rjc4Q0QtQzU0RS00MTEwLTlDNjctQjUzQUEzRjM0RjVFfSIgdXNlcmlkPSJ7NDYwRDVDNUEtQTQ1Ri00NTRBLTk0ODktMzY3OTkyNjMxRkRFfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntFOUIwM0FFQy0yQTI5LTQ1OTctOTVDNC02QTUwNkEwMjZBRUR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTk1LjQzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iNSIgY29ob3J0PSJycmZAMC4yMyI-PHVwZGF0ZWNoZWNrLz48cGluZyByPSI1IiByZD0iNjYxNSIgcGluZ19mcmVzaG5lc3M9Ins5QjdDMDBEQS0zODE2LTQ4NDgtQjVDRC03QkJDNTYzOUQyMzd9Ii8-PC9hcHA-PGFwcCBhcHBpZD0iezU2RUIxOEY4LUIwMDgtNENCRC1CNkQyLThDOTdGRTdFOTA2Mn0iIHZlcnNpb249IjkwLjAuODE4LjY2IiBuZXh0dmVyc2lvbj0iMTMzLjAuMzA2NS41OSIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGV4cGVyaW1lbnRzPSJjb25zZW50PWZhbHNlIiBpbnN0YWxsYWdlPSI1IiBpc19waW5uZWRfc3lzdGVtPSJ0cnVlIiBsYXN0X2xhdW5jaF9jb3VudD0iMSIgbGFzdF9sYXVuY2hfdGltZT0iMTMzODM2NjA2NDg2MjkwNzIwIj48dXBkYXRlY2hlY2svPjxldmVudCBldmVudHR5cGU9IjEyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NTQ1NDEzNDY2IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU1NDU0MTM0NjYiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNCIgZXZlbnRyZXN1bHQ9IjAiIGVycm9yY29kZT0iLTIxNDcwMjM4MzgiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE3NTUyMTMzOTE4IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJkbyIgdXJsPSJodHRwOi8vbXNlZGdlLmIudGx1LmRsLmRlbGl2ZXJ5Lm1wLm1pY3Jvc29mdC5jb20vZmlsZXN0cmVhbWluZ3NlcnZpY2UvZmlsZXMvZmVkNTU4MDUtMmU4NS00MWQ4LWI0ZTMtNGVmNmI1ZWJmNjNhP1AxPTE3NDAyNDY0ODImYW1wO1AyPTQwNCZhbXA7UDM9MiZhbXA7UDQ9Tk5JVW1sJTJiekFFamt5T3ZLMGZPbU0wcnU1S1k2aGNjQVlFbSUyZkNXa214djNaUlBURUw0R3o4WnQwSnNDczVjMklXTjlwSTgyNk5OWWY0aVdORGVDR1FRJTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBjZG5fbXNlZGdlX3JlZj0iIiBjZG5fYXp1cmVfcmVmX29yaWdpbl9zaGllbGQ9IiIgY2RuX2NhY2hlPSIiIGNkbl9wM3A9IiIgZG93bmxvYWRlZD0iMCIgdG90YWw9IjAiIGRvd25sb2FkX3RpbWVfbXM9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNCIgZXZlbnRyZXN1bHQ9IjAiIGVycm9yY29kZT0iLTIxNDcwMTI4OTQiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE3NTUyMTMzOTE4IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuYi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy9mZWQ1NTgwNS0yZTg1LTQxZDgtYjRlMy00ZWY2YjVlYmY2M2E_UDE9MTc0MDI0NjQ4MiZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1OTklVbWwlMmJ6QUVqa3lPdkswZk9tTTBydTVLWTZoY2NBWUVtJTJmQ1drbXh2M1pSUFRFTDRHejhadDBKc0NzNWMySVdOOXBJODI2Tk5ZZjRpV05EZUNHUVElM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSIyNDI1NjM5IiB0b3RhbD0iMTc4NjA0MDg4IiBkb3dubG9hZF90aW1lX21zPSI0NDgzMzAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNCIgZXZlbnRyZXN1bHQ9IjAiIGVycm9yY29kZT0iLTIxNDcwMTI4OTQiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE3NTUyMjIwMjcwIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJ3aW5odHRwIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuYi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy9mZWQ1NTgwNS0yZTg1LTQxZDgtYjRlMy00ZWY2YjVlYmY2M2E_UDE9MTc0MDI0NjQ4MiZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1OTklVbWwlMmJ6QUVqa3lPdkswZk9tTTBydTVLWTZoY2NBWUVtJTJmQ1drbXh2M1pSUFRFTDRHejhadDBKc0NzNWMySVdOOXBJODI2Tk5ZZjRpV05EZUNHUVElM2QlM2QiIHNlcnZlcl9pcF9oaW50PSI5MS44MS4xMzAuMTM0IiBjZG5fY2lkPSI5IiBjZG5fY2NjPSJpdCIgY2RuX21zZWRnZV9yZWY9IiIgY2RuX2F6dXJlX3JlZl9vcmlnaW5fc2hpZWxkPSIiIGNkbl9jYWNoZT0iIiBjZG5fcDNwPSIiIGRvd25sb2FkZWQ9IjQ3Mjg3MyIgdG90YWw9IjE3ODYwNDA4OCIgZG93bmxvYWRfdGltZV9tcz0iMzUzNDUiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNCIgZXZlbnRyZXN1bHQ9IjAiIGVycm9yY29kZT0iLTIxNDcwMjM4MzgiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE3NTUyMjIwMjcwIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJkbyIgdXJsPSJodHRwOi8vbXNlZGdlLmIudGx1LmRsLmRlbGl2ZXJ5Lm1wLm1pY3Jvc29mdC5jb20vZmlsZXN0cmVhbWluZ3NlcnZpY2UvZmlsZXMvZmVkNTU4MDUtMmU4NS00MWQ4LWI0ZTMtNGVmNmI1ZWJmNjNhP1AxPTE3NDAyNDY0ODImYW1wO1AyPTQwNCZhbXA7UDM9MiZhbXA7UDQ9Tk5JVW1sJTJiekFFamt5T3ZLMGZPbU0wcnU1S1k2aGNjQVlFbSUyZkNXa214djNaUlBURUw0R3o4WnQwSnNDczVjMklXTjlwSTgyNk5OWWY0aVdORGVDR1FRJTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBjZG5fbXNlZGdlX3JlZj0iIiBjZG5fYXp1cmVfcmVmX29yaWdpbl9zaGllbGQ9IiIgY2RuX2NhY2hlPSIiIGNkbl9wM3A9IiIgZG93bmxvYWRlZD0iMCIgdG90YWw9IjAiIGRvd25sb2FkX3RpbWVfbXM9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNCIgZXZlbnRyZXN1bHQ9IjAiIGVycm9yY29kZT0iLTIxNDcwMTI4OTQiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE3NTUyMjIwMjcwIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuYi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy9mZWQ1NTgwNS0yZTg1LTQxZDgtYjRlMy00ZWY2YjVlYmY2M2E_UDE9MTc0MDI0NjQ4MiZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1OTklVbWwlMmJ6QUVqa3lPdkswZk9tTTBydTVLWTZoY2NBWUVtJTJmQ1drbXh2M1pSUFRFTDRHejhadDBKc0NzNWMySVdOOXBJODI2Tk5ZZjRpV05EZUNHUVElM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSIzNjYxOTU1IiB0b3RhbD0iMTc4NjA0MDg4IiBkb3dubG9hZF90aW1lX21zPSI1OTA4NjUiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNCIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTc1NTIyNzA3NzgiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIGRvd25sb2FkZXI9Indpbmh0dHAiIHVybD0iaHR0cDovL21zZWRnZS5iLnRsdS5kbC5kZWxpdmVyeS5tcC5taWNyb3NvZnQuY29tL2ZpbGVzdHJlYW1pbmdzZXJ2aWNlL2ZpbGVzL2ZlZDU1ODA1LTJlODUtNDFkOC1iNGUzLTRlZjZiNWViZjYzYT9QMT0xNzQwMjQ2NDgyJmFtcDtQMj00MDQmYW1wO1AzPTImYW1wO1A0PU5OSVVtbCUyYnpBRWpreU92SzBmT21NMHJ1NUtZNmhjY0FZRW0lMmZDV2tteHYzWlJQVEVMNEd6OFp0MEpzQ3M1YzJJV045cEk4MjZOTllmNGlXTkRlQ0dRUSUzZCUzZCIgc2VydmVyX2lwX2hpbnQ9IjEwNC43Ny4xNjAuODAiIGNkbl9jaWQ9IjIiIGNkbl9jY2M9IkdCIiBjZG5fbXNlZGdlX3JlZj0iIiBjZG5fYXp1cmVfcmVmX29yaWdpbl9zaGllbGQ9IiIgY2RuX2NhY2hlPSIiIGNkbl9wM3A9IiIgZG93bmxvYWRlZD0iMTc4NjA0MDg4IiB0b3RhbD0iMTc4NjA0MDg4IiBkb3dubG9hZF90aW1lX21zPSI3OTEyMCIvPjxldmVudCBldmVudHR5cGU9IjE0IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxNzU1MjM3MzUwMyIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjE1IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxNzU2NjQ3MTY1MiIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjE5Njc1NyIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTgyMDg4MjE0NzIiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIHVwZGF0ZV9jaGVja190aW1lX21zPSI3OTMzIiBkb3dubG9hZF90aW1lX21zPSIxMjAwNjk2IiBkb3dubG9hZGVkPSIxNzg2MDQwODgiIHRvdGFsPSIxNzg2MDQwODgiIHBhY2thZ2VfY2FjaGVfcmVzdWx0PSIwIiBpbnN0YWxsX3RpbWVfbXM9IjY0MjMwIi8-PHBpbmcgYWN0aXZlPSIxIiBhPSI1IiByPSI1IiBhZD0iNjYxNSIgcmQ9IjY2MTUiIHBpbmdfZnJlc2huZXNzPSJ7QTVFQkEzOEMtMjczRi00QTY1LThBNDYtMjBDNTIyMzU4MEExfSIvPjwvYXBwPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIxMzIuMC4yOTU3LjE0MCIgbmV4dHZlcnNpb249IjEzMy4wLjMwNjUuNTkiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiB1cGRhdGVfY291bnQ9IjEiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iMTIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU1NDU0MTM0NjYiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTgyMDg4NzIwMzkiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNCIgZXZlbnRyZXN1bHQ9IjAiIGVycm9yY29kZT0iLTIxNDcwMjM4MzgiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjE4ODkzMTU5NjM5IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiBkb3dubG9hZGVyPSJkbyIgdXJsPSJodHRwOi8vbXNlZGdlLmIudGx1LmRsLmRlbGl2ZXJ5Lm1wLm1pY3Jvc29mdC5jb20vZmlsZXN0cmVhbWluZ3NlcnZpY2UvZmlsZXMvYTQ3MmVjZWMtYWU2OS00NDllLWI3YTItNGU4NmRmZWU1OGE5P1AxPTE3NDAyNDY0ODQmYW1wO1AyPTQwNCZhbXA7UDM9MiZhbXA7UDQ9TCUyYllwJTJmQ1ElMmZlc1ZHNzJ4UEg0RTN5WHpaSVglMmJWWFBWMkhacHFLNGxZMGkyWWslMmZTb0RtbzVYcVFXY3A4R1dhJTJmamhId3dnN0wxVUdybHN2ZXhRWkFHNEElM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSIwIiB0b3RhbD0iMCIgZG93bmxvYWRfdGltZV9tcz0iNSIvPjxldmVudCBldmVudHR5cGU9IjE0IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxODg5MzE5NTk0NyIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgZG93bmxvYWRlcj0iYml0cyIgdXJsPSJodHRwOi8vbXNlZGdlLmIudGx1LmRsLmRlbGl2ZXJ5Lm1wLm1pY3Jvc29mdC5jb20vZmlsZXN0cmVhbWluZ3NlcnZpY2UvZmlsZXMvYTQ3MmVjZWMtYWU2OS00NDllLWI3YTItNGU4NmRmZWU1OGE5P1AxPTE3NDAyNDY0ODQmYW1wO1AyPTQwNCZhbXA7UDM9MiZhbXA7UDQ9TCUyYllwJTJmQ1ElMmZlc1ZHNzJ4UEg0RTN5WHpaSVglMmJWWFBWMkhacHFLNGxZMGkyWWslMmZTb0RtbzVYcVFXY3A4R1dhJTJmamhId3dnN0wxVUdybHN2ZXhRWkFHNEElM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSI1ODQ5ODEyOCIgdG90YWw9IjU4NDk4MTI4IiBkb3dubG9hZF90aW1lX21zPSI2NzYzOCIvPjxldmVudCBldmVudHR5cGU9IjE0IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxODg5MzMwNDEyMyIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjE1IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxODkwMTU3MDUyNCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjE5Njc1NyIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTk0MzE1MzA4NjUiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIHVwZGF0ZV9jaGVja190aW1lX21zPSI3OTMzIiBkb3dubG9hZF90aW1lX21zPSI2ODQzNyIgZG93bmxvYWRlZD0iNTg0OTgxMjgiIHRvdGFsPSI1ODQ5ODEyOCIgcGFja2FnZV9jYWNoZV9yZXN1bHQ9IjAiIGluc3RhbGxfdGltZV9tcz0iNTI5OTYiLz48cGluZyByPSI1IiByZD0iNjYxNSIgcGluZ19mcmVzaG5lc3M9InsxQzQ1RjQ2Ny0xREZGLTQ0MDMtODlFOS0xM0I0OTA3MkQ1RUR9Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:6948
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4692
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\elevation_service.exe"1⤵PID:4776
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --rename-msedge-exe --system-level --verbose-logging --msedge --channel=stable2⤵PID:7924
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x220,0x248,0x7ff7fbf26a68,0x7ff7fbf26a74,0x7ff7fbf26a803⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --delete-old-versions --system-level --verbose-logging3⤵PID:2412
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7fbf26a68,0x7ff7fbf26a74,0x7ff7fbf26a804⤵PID:6480
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level3⤵PID:7484
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff7fbf26a68,0x7ff7fbf26a74,0x7ff7fbf26a804⤵PID:5432
-
-
-
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:8980
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:9632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:9844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:8140
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:8988
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:9372
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\ClientsFolder\82FBCCF7BA0C5D731729\Keylogger\KeyLogger_02-15-2025 18;14;06;176.txt1⤵PID:9512
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:720
-
C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.2104.12721.0_x64__8wekyb3d8bbwe\LocalBridge.exe"C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.2104.12721.0_x64__8wekyb3d8bbwe\LocalBridge.exe" /InvokerPRAID: Microsoft.MicrosoftOfficeHub notifications1⤵PID:6672
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:7316
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness1⤵PID:12608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k AssignedAccessManagerSvc -s AssignedAccessManagerSvc1⤵PID:12624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k autoTimeSvc1⤵PID:12664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k AxInstSVGroup -s AxInstSV1⤵PID:12700
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BDESVC1⤵PID:12728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -s BTAGService1⤵PID:12760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k CloudIdServiceGroup -p1⤵PID:12824
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵PID:6568
-
C:\Windows\System32\BdeUISrv.exeC:\Windows\System32\BdeUISrv.exe -Embedding1⤵PID:12856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:12992
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵PID:13036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DevQueryBroker1⤵PID:13060
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵PID:13168
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k diagnostics -s diagsvc1⤵PID:13212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:13268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p1⤵PID:13300
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s EapHost1⤵PID:7244
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵PID:10204
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /medsvc1⤵PID:5732
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /c1⤵PID:9788
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s embeddedmode1⤵PID:10040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s EntAppSvc1⤵PID:10980
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost1⤵PID:9248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s FDResPub1⤵PID:9480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:9568
-
C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exeC:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe1⤵PID:9796
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k CameraMonitor1⤵PID:4876
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k GraphicsPerfSvcGroup -s GraphicsPerfSvc1⤵PID:776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s hidserv1⤵PID:7600
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkServiceAndNoImpersonation -p -s KtmRm1⤵PID:9112
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s lltdsvc1⤵PID:7520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s LxpSvc1⤵PID:4396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k McpManagementServiceGroup1⤵PID:2188
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\elevation_service.exe"1⤵PID:9680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s MixedRealityOpenXRSvc1⤵PID:1892
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵PID:10108
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵PID:8900
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:8360
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵PID:7884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:9544
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s NlaSvc1⤵PID:12364
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵PID:3736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServicePeerNet -s p2pimsvc1⤵PID:9156
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵PID:8792
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵PID:10228
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNoNetwork -p -s pla1⤵PID:9240
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServicePeerNet -s p2pimsvc1⤵PID:7348
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServicePeerNet -s p2pimsvc1⤵PID:2756
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s PushToInstall1⤵PID:9016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -s SCardSvr1⤵PID:6416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵PID:3864
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:7564
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵PID:4736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s svsvc1⤵PID:9460
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:9896
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵PID:3500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TroubleshootingSvc1⤵PID:9120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵PID:9084
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:9808
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:6996
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k appmodel -p -s WalletService1⤵PID:10272
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:10348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k WbioSvcGroup -s WbioSrvc1⤵PID:10384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Wecsvc1⤵PID:10420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k WepHostSvcGroup -s WEPHOSTSVC1⤵PID:10468
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s wercplsupport1⤵PID:10492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s WiaRpc1⤵PID:10548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WManSvc1⤵PID:10608
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:10640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:10688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s XboxGipSvc1⤵PID:10712
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s dmwappushservice1⤵PID:10756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc1⤵PID:10768
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵PID:10816
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CaptureService1⤵PID:10844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DevicesFlow -s ConsentUxUserSvc1⤵PID:10868
-
C:\Windows\system32\CredentialEnrollmentManager.exeC:\Windows\system32\CredentialEnrollmentManager.exe1⤵PID:10920
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DevicesFlow -p -s DeviceAssociationBrokerSvc1⤵PID:10964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DevicesFlow -s DevicePickerUserSvc1⤵PID:11012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DevicesFlow -s DevicesFlowUserSvc1⤵PID:11044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s MessagingService1⤵PID:11088
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PenService -s PenService1⤵PID:11116
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:11144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:11256
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"1⤵PID:8696
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"1⤵PID:12472
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
5Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Discovery
Browser Information Discovery
1Query Registry
4Software Discovery
1Security Software Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD51b3e9c59f9c7a134ec630ada1eb76a39
SHA1a7e831d392e99f3d37847dcc561dd2e017065439
SHA256ce78ccfb0c9cdb06ea61116bc57e50690650b6b5cf37c1aebfb30c19458ee4ae
SHA512c0e50410dc92d80ff7bc854907774fc551564e078a8d38ca6421f15cea50282c25efac4f357b52b066c4371f9b8d4900fa8122dd80ab06ecbd851c6e049f7a3e
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{45F4BFA1-991E-4D42-8C89-5605A2C0F39E}\EDGEMITMP_9653E.tmp\SETUP.EX_
Filesize2.7MB
MD51a59a8af3c58b30ff0fe71db2196b24b
SHA16b0e5ba36f4fc5328ec494272054a50cafa13e68
SHA256ba25974b29a25cb7bc1f58a0990a8ce758354aa6ec5b8b8af210f2c1466ba49d
SHA512f173fe15db8d7aeef4f6fa62a41246550ccee207e6388095a5f87036362d4c95da646e1a7c68764054556e024da80b749646425076e9bfac42fb77be8f2c0355
-
Filesize
39KB
MD5f5e811f1282c044420f8ff5f771d0edc
SHA1ff2127aedab528371ad2b226ce74bd3c00fda1df
SHA256b3e49e1c293f8afb6a6775be3c8d3404d3c0502bfa238e70ff92dd56cbfd6713
SHA5120820ab9cabdf59f524234b3b098c9b7eac393f0885540ff12f268515da80a9e0cbf903b81dfd211d3806f6eec85e131d1aa76c929e574ce148c39b57070a01cd
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
40B
MD53ad4adeb3a7296b242df27fe1fc10adf
SHA1f4b2fd3939bf79632e944633c830bf7ed0919eab
SHA2560150bf53a255695ed3f46759710e8a4d13533fd546a16e5869eb7b465182fcd9
SHA5120b466f42c5c93878d292f9a19813cc2c10d63080713fd979d4c5f8ef0413e4b1195ed9f80dc68f79ad7a9ba12811d4e575b2445ff900ed71e15d8ebabefa94ba
-
Filesize
40KB
MD5cbbf420aba904f809cc9d8156c2280cf
SHA13e14985900792231ecbe835a1618a29ad7155765
SHA256b7ce570fb92145c09b4e2795f900436f1e953e2d3a857ffb8bbfaabeef4ed134
SHA512c1822b337f318d8f920e1dd4462ee49b3ff034befcd494fefbe3a6cec926552d6277f6c33206bd38a7abc13077d2522ad997f069b94500fb3585d862bb4ecde4
-
Filesize
5KB
MD5cfe6359baf7bcc72e0838593f24fc0d6
SHA1b6b1c8e2091fdf157bfe59799b5f1f670525d2f0
SHA2564c08e02564141b0a3c1fac0bb2d8444213c584a0313b1dd88640fc5dec8799ea
SHA512b12e016e36e07d91e5f7f8bc89b6c18df811ccb0cb89d5e80b1c0ccff5d50af78ff87548c696c3bb47275427dc378168b7158300d0746e1597e72191035bd962
-
Filesize
857B
MD54709b15114249c69cfd24df8c8888050
SHA1989738fd782f0b6d012da4f00a285e44184f9161
SHA2569a92a655d57bbd75d9bc72d5fc8685af1114e07f6e81eb839be7dd266babb659
SHA512530ab10c182c2b58048af25bb1ccfe125b894a9ffa0befd80ec438e5f44d83ab7d6702d9ccde10501d83a2ae4c5d5d36e42f42a236d7e2281887334bf3dfe237
-
Filesize
857B
MD58caf309717f2482a00a47b6008c15e01
SHA19c70a21a7fed1e0cbc7107344b9a2ed2e74c02f1
SHA256e8d4ab99ae2334df85ad908b1c8a76ebb0364fe4c66dd814b3226bc544af7302
SHA512a44acd20c384344f5cfeab2866942cdb7d0a6f9225c3af8d760b79c9560113dd51d62a7f0d322da3ed303d40faac25df44efda3379763b0c820e7c6b9f78c25d
-
Filesize
10KB
MD5b2a9368a4c2a36d60873aded1027e751
SHA1d24e42d842cfc4cb15c31fa490162904b13b2355
SHA256f9911cc63fcffe0f4df880ff1580d8401c81e04a01625acb4698544997b8abb2
SHA51258f14782e6224522a66c0d4324c966966a1ca006aa0ff2ce144a7063ed8dc7b0c4ee945103bf9e4afbcee109edfd84ce701faea20923cab61555027b0999b030
-
Filesize
10KB
MD5fc47193122539a6966d390d6f1290c14
SHA1300f233a80f6ddd952a83ef414d1792bef54b8fa
SHA256a69ed214be0aa2a95af1b72ea48ae4425094ea8f20b979acc16adf53271e3824
SHA51237ca660447fcd4baeb169b7ced65ccab4e4e85fed31f94d7d5d509ab634416e05b8b466897ed70b7057983512a2444d2af49f2030307090b0bc5c652cd8dd68c
-
Filesize
11KB
MD5d67f4d3313ada5a76a71fa8b100ddfae
SHA1724332ecacd51d4a3848d292460d23abd6aa9ae1
SHA2569bf860a2ed423cbfef301b7738994b6c091a6d5d82b5d3711991705aaa9a1b3a
SHA512aa081a91949bb3f0f70a67a2d831601d9274d0983ebcd5224cc72ed3f2fcb38209640e78f146278b04491e14f30d255a654c697290ce49d5cc4ab111bae38c30
-
Filesize
11KB
MD5b1ee2ce6c86cc301c1e03a48afbc6e4f
SHA16d5400b2ac1eb4fcaf993491eee0423ec45ccf83
SHA256b022c5a3b36a6e8ba6f1e95d476ca5c8f9792a96e803233b84bd5c96ef4a2b52
SHA512bfe9cc181bab24343cb4899eae8383d48f0f1c75172e75b2d73cc3589ba2de768889a5869e5aa382e91a068655ddf30b97d67b97cae13a9ad300ad65fb3febbf
-
Filesize
126KB
MD5b1da7532f35e89b79467015c5da92c3a
SHA1e27b02168ebdc046050209cd5a79914506431620
SHA25627028581ccb306160ca7386e6e2a05322102c07fbf1837975afd3e613a0eff3a
SHA51235554f3883fbecf31164b695627998b5473d2c5af37a8f8b1fb971c5547e1aefc896416ad2d71efbbc3a80e16bfe16085e1bbaf0088c81c831e30e0f34821b64
-
Filesize
126KB
MD5c2d700befdf60f0d5c319bab7d748162
SHA1a6eb35e8f5a39586ae03cb5d4e215e9587a607d3
SHA2561134c4f4c75be29859354c7fc7212d51b758486e62f7e43a204da23935216ed1
SHA5129f54c7c710479bd50bd9900dab377d5b14abf9096c84d4bad7fbf8ae9ae3a2802c320b366be4a2193307836174996d832fce10bb55c09c9eb4c316bff5306112
-
Filesize
246KB
MD5e5e0b4e4b6b19ebfda685b976423be30
SHA11b350217044e38b1fd99d307440d07eda4df07f3
SHA256ec5c841e42807447388a87c7019ff8f116853999e1388c3dbf96621f92adc9fd
SHA512430c0f719248e4acb97232797dd09202ad0f432e3b1ed1a138a62b6acfac7c1507cd0ca40f89ebb70184c9f93bce9384b4d3f2d5504f355ec7d548ecfff7304d
-
Filesize
62KB
MD52a25320d69ccc11900b6a688d26c5cae
SHA1955874f3dd435fa06bd76f58f3e04f747a7c0e24
SHA2568b6c960bce309bc88a9df4b844e25ba152d96b01d15cc888f69f90aefc285fc1
SHA5124fece963dee83cfdea5019375175d0ca44f1aa46891b9aec7f81c2677bc0a942a97d8e6f3d8b431a84acd1cb45d919e4dcb1ca3686c247b43d84eb1139ef7682
-
Filesize
552B
MD5e434c55809c283e5b3dbb7a31b824783
SHA1cf55f5a8d368bb7a787a233c20710627aebe260d
SHA2560002ab45b2427bb4d2b5e83fab9786ae09db9c3ab3aa06b986895ad9e0048d50
SHA51244caaec49af4e8c2d0830ed832e45fc66875c0a9e09628cae14a915549dd987cfcd2cb5373e782a3ffb960a22d78912f1e94afb2306a5d698cbae74de2b8ff25
-
Filesize
576B
MD56bb1a08a60d0add6396c1d40f34f9cf0
SHA10e6bcc059e95c2f1c9ff67052369d33fbce47126
SHA2568add29e2717e66080e3d26d4b3c7be9f41828501dafb58fc84a964b8523943ea
SHA512a792838f4042dd75be2e207c6df5f798062fc6b0959db1c174212edb25e398a65412c7b07eff77af1054ac5af3566b4abed51401994f8494518c6a750799a0d1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\p\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
160KB
MD5a7347ff2e475a66ebfb47522124a6ab4
SHA1659ecf9efb1c257694258da094bdc8813fc1fd6d
SHA2565c980ff0ba40d312327876147438ec82645276adce43bd7d83a8b748d009db04
SHA5129f3a06a225eb7ffd3d23de2765f709d449904fa51debbcb8a110535a71d6e8d295bef0ae2a34e5e8eff4112ba2a67b85a1ace13874ca9b938987dabf5742f2c6
-
Filesize
4KB
MD5664ebc76c190304d3a672304a6c53605
SHA13337bbc778b7ce1cc3ca17d8455c21ac8f87b907
SHA2562e150487d0c6f78490e87a1aacd2a9f417b591f381f0846eab15399d2d3356f5
SHA512e812db93e26149dd834079456951a72bff91ee8579f2c5a45522661a8acec2b71b3c330dfa18ec531f6c5ce48ad1d9efcdc06af91bb4ac43831d2e810a85ef8d
-
Filesize
2KB
MD5c1ee9ba5c8107770524a2f2cc17c5a35
SHA12b8c19a75802e6be5d10304d15dd6d80d1cbde05
SHA256862c3bb83d204294ac3f406ef4be3f2a7f7c28f42e4e9d036d4afa8b5414e2bd
SHA512db5597becf6a319179045feea246ae43e0a91ac6c6f8411e2d8420551f46c6fa25aad78eed378e2efdb9fd0d60cc651ed8f2c74156ee0490c907ae6339c85b15
-
Filesize
5KB
MD5ccf89a3ec07205d43b9db0c9d59f9e79
SHA1e1620549a62669cc606e7bf15487544da04f8511
SHA25603f66f86916134ea54e5d06bb6157604adadc533166cde20bf8baaf17813790b
SHA512b5af2a52ab5244fbd757ec9654e18892b94ef04e601c8c9d74a35f14eee20d1e201e56122fc3e25465f21a8fd7c9d0ed5da6c2f9ec78dbf4c742f155f953ad6d
-
Filesize
5KB
MD512c763fa1d1812397b25aad39e5e766e
SHA18710d701d07b15cf2bab1ce6c0c59f119e79db77
SHA25642ef38c15bec33f133951d17b98fdb956e92d290d1c306d7fe035b04de5e999f
SHA5125a928bb3036119f4adc9675015ff0cb79605d146d6be79b817c9d3fb7aa5bc79542c1a36282d0411b21bda796e7b9b94c41c1e1b97c8c74509cc4b12654d6b18
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5e2964d3af0a00f8313732b250b505508
SHA1d37c95364e677ad16b9602e41415e892f0381eb6
SHA256e9b0006e2b115ae45046ea56a80b6de374390beae110cf573b45dabeda6c067d
SHA51213d65d39bc3bda265b1701145c2d88b00ee685ab63051262c6eb91950846549696f8e3284ccc7e30df8b9a369177823cb5ebc6b0d684f5f24df5340203d9f98d
-
Filesize
356B
MD582528decc41ce231960ccce2e22d9516
SHA1f740629948c75ab823271b0be28b6b6375bf67b0
SHA256be3578e571f799cf5aee23213d569e041ec0da1dae5e94972144c170cab3467f
SHA5124da4c6763f861b5e4b0ac0653c25d18038dc14e1a46783e1b6fa039a254d3bb8c7adb2927e9e5ab687841387474f3fb8c54f17d6300de7b86007fc8bc485a001
-
Filesize
523B
MD56df55a3a51594266c4c19d57d427a8b6
SHA17e11932dc2c58fd11b454d13dbbe9a0764c4ee67
SHA256955c3696fab4758b78753f85fed1d4fa14675f3255962f13ee65c71142e386dc
SHA512e80835d5e231a451359083aa0c92d1de70a5f0bb8e130ae55fd34c0a6c9da51e3dfaa8f0fb0801096ec1adbeb7f3b4f58a6d0e26faae4ef7c089a77e09365ba1
-
Filesize
690B
MD58bd3b7696551c391cc8d46b3e8a0994e
SHA1761b85be3df8e5a4b6bffac07cb5fe63eacb2458
SHA2568ac21bb214c97b1ae1c0664047628a488fba8a8b7bdd15ef126a718717fee184
SHA512951a5c7c879daf558016af65c94ce73a6844b93a96ce14ca114302a8bceccea92697959fb80cfd2a11323282c989bc5f6d4fc73d05184eb617ee3000b9601876
-
Filesize
857B
MD59619b0cf0d8cd03e97c3a7d4e84757ec
SHA1fcecfcf26f03a09ebb7bc6076ea7900527fd9fc3
SHA2565a5645c1fe18e686a38bd31f0435881e4feecf5a9cbd00fcba1b534db0e72987
SHA512ebae39b6a583d857e4b614273c1403079c93009ce156c6a8f86b017861b2cef3f266e848b9675308f08da679fdaf40f040ae840cb564c59132103559fad10710
-
Filesize
857B
MD53e963da22cd2483056c9a518863d9152
SHA1af50947aceb9cab3478904f080dedf671608c0b9
SHA2561fb254c961287b3469edaec5d41b5bb746a2e13c8c40bfb22eaffda0aa2e78a9
SHA51237c797866a0140be28c4b6012e109afb916745ffefa674500b4c6d47c57d4a421113c0380ad33a688316668cd0b1eef7b5a8f7cc8c4f5cfe81862095652eb8ef
-
Filesize
857B
MD53f506bec3e9a85a2eb2f0590d9f72a9e
SHA111ec3fb9af0996f6f29215ceec8bdd40a8bee64d
SHA2566bcc6d671d6a389236dcd5c95e14a9c1d4b96e7dd202e2e5cbce8081cb4a0e57
SHA51253a5cd5a2ecea0af166f63c932d7bb8d79e7b55d50530bdc58e897be7634db03e7eeaa31ac6b0372860a66123f5d578a81e047d1976fbc4cd11ac4a4ae057223
-
Filesize
356B
MD5270eb524a5596f697c22e32f0c0b4e5e
SHA16f81b4b3bb68bb019bb1698c40b125f335954aae
SHA2564a4a9b7aecf237fb3393d20d7510a232722abd6be7450bb9f979c1a6c4c2fba5
SHA51238e5a23f3fbf87fb132d978e58871fe5843188ebd888eaf7e174946022a6912799cc2ad8abdce1f1a26d118b6e8971fb0226b5cc5224636d27db0e478d086458
-
Filesize
690B
MD5e9504559faa638ad2f82767ee668c9a1
SHA1bdcedc8b9788980ada94c29adfe5cf566af9a250
SHA25602c3449d3dfa2d523183e002ea9f9344c60e9e652dd7d78d3ea44d21cbbbbbd6
SHA5122c9a5419fa1bf0ddb21cd1ac9801b22ac04ce5d8671d0ce279a1b32bad0952d534118a35202601f91fdf290d4fc109270ffe16d0a18886bb7538bb58ac17cf1f
-
Filesize
10KB
MD5fe1e70194746d023579fd7c1368d6c78
SHA1a8f3d98ca40f593bb06539ad7f7e154bdae9af6b
SHA256fb35f1538c0b1da0a4820bf3507d77568df552a9bca3ac65f9828484ee61686b
SHA512116563554b480bb39dd204145d529384e0767b0457b2a1d1c70e70d0470ec3c9829850278f234c71bf833c6372abeacfb13165e7e57995b4977d2be056496ccb
-
Filesize
11KB
MD5b574dcbdc83d1a74deefbf186a63e055
SHA168e3e5cd7591e228e42b73064d7c184b14622ce2
SHA25617d2d7de18cfd44b4e65c3f143d9379f1b7d957a1083667a7765ec81513eab88
SHA5128a2343a3972f65565a2c431b5a2b3aee1f2d366b8822f3d72a87eb4373837ce22640552760ae6f719852d9275351f78ea14f84807d5d2808825599314a443700
-
Filesize
10KB
MD59ced4bc07bac704c0e7d48bb7a497d48
SHA1c513cadb4419706e10885e22ba402c7647d410bb
SHA256e32fb1d432dd90b0bd8f1a353e9b42a6832d57eceb14ab0b1c3aa1fa97a51aea
SHA512d284844a01aeafce17ebddff9358965491ab65662e6b3710eca26b8fab2f0cb655488e8214d491ffedbb5a2acb24b5e91d5e89506f8691e62cfea03c4c7960bf
-
Filesize
10KB
MD5992933f272f9851574ef432966dac883
SHA1c2a1ec50202f94deacf5ee9717007217acd4229f
SHA256b230404c7fe355083795b791f3e366cc4f33e0fa0780002a8cefe11ef282bfeb
SHA512fb928717af5c25da5839abc9c5d0de6b42eef5115e42a541d3f514381a2129a21b3fb468400ed7aa4b8819c3784514bd3b538b2fd9c0df7fbe9fda7cbb74e5f3
-
Filesize
10KB
MD55c3a895f724a7d4e4202117e399998c5
SHA1f0e193c5941e9ad2b8089fafd29e6a121c253099
SHA25685a641302e9ec44a07f02f688a4556f7eadd83412af8ce867df69fbfcc0bc0fb
SHA5124dea75a00dba1686644e7427c83f276e7174b5f1f1fadfd4b774ec381b931e070248a096983c8c01a3d25ad5e1d65c6cb6eef5419fc3bb4f7e5a5f5a6fdc8a90
-
Filesize
10KB
MD5ca0cda919590b15e2a24209c7a81ce0e
SHA133c3b1efb7c4fb8aba53a15e33bd16beac9665e9
SHA256892ced00f6693d42310a206dc07911a2ed873d9b60e8d3ad3fdc00475fefcaca
SHA512d4e7221b5907d34ade589118dd2ed8bd19a5462bcc6fd7176265331ce5f7a4b6a992c8029e4838ce5cf8f2dd3546cc6b032d2f7d87d92593e468c5ed7cf24d32
-
Filesize
10KB
MD58fb625b2f998de24c7beae8dee21dcc4
SHA1e69e9ddb61cfedfba83c34d67b230da630a4b8b0
SHA2566d25e2acdf0b153ea8c4b398952627c02ad5370d6e693af045de5ff805a7673b
SHA512be61ac56cd3c756e67f796a584090692d958e78e94eae1e8407e37aaf942186342bfa08b10eddde5c59dcf1b595d5ff0f15f7fa581f69a3ec77ca7fb112111d1
-
Filesize
10KB
MD59ffff482ab93c8aa88c9dace1d8bfeed
SHA1a1d77d1e4b0c47ec20d49b97f2ec32288d99260e
SHA256c49044935084d9fe52de5818b938b611331407319f469ae03b5e2402a05ca844
SHA5129820ec85d0a13e7c9d146ba1541a8b3392a8b0db689b7239da6d853e383f4f9539f27726cfd8a9c881d99c2f8a8ddee48bca328125469baceeb221963e09f76f
-
Filesize
10KB
MD5787ac8249ec472c16f7f6d9168e74d25
SHA15d4a7583fa8aa667947608e6f657339e2ed76c17
SHA2561e3d52f74225402a299beea1438110648d951222661237a47e4befb79f195deb
SHA51253214913f248836192d611750c3f8974604579d1426fdbd900b2a2d99b10ff1f2d3f8970ee5263721d1a9ff4473dab7d44dff2dc10899bf21213cd07311a7ed9
-
Filesize
8KB
MD5ecbfa64b002b07cbf8460759c955bfac
SHA1cf5fda95650b21ce90b954b7e5ec68c26432f242
SHA2563f0b609919b94d86af5695f58aad4c30b46a167d56a0f3ff59a3e4d32e0f873b
SHA512bc8ad3c4bda0e7f1577e2ce25f029ebfdf6c2d8605da5aa651b78df680a0c3913abffed87205c733b7b5a8639d21f505f034274f0654578c34cdbe420f190bdb
-
Filesize
8KB
MD50814241bafc5b004f041eb11762e57ea
SHA18058b832e8cfcdecbc66c907d9859fdd3971f6db
SHA256cfa823636bf402c02b51ba3f6e323ea246759b90f2b0d6a7ac3379644ac0393f
SHA512e3065f78d3626be644214552900f4e39ebcef3c0408c559e8fb078da6bbe82924e26cb9bf3ae4d54adb63645b6ba72ec821e091f0a0bb530540f935d7492d61d
-
Filesize
10KB
MD515270c41c33f7efc2ccc6216c7e7774e
SHA19e32a6e4b70dd751d205ea8b4d9b80f6b479d265
SHA256989cd493577dc38f093944318e8ac645b12d3260eb9df8036f46be8a13788d86
SHA512d7b41893e050e36b571def07c28de68e2a566ca3b733c0d570628c45ec05935dbdc0b2833e49ead910ff4a6f73a85ffab27ae6c81eb4516280177d15a0afc1fe
-
Filesize
10KB
MD5e4c394b0ababeaa30f935dfb685f0e58
SHA1a2389c702199d695f852703885df99e8bbe1d46f
SHA256e38b9d91a9addd936a217e1e05e18268cde4417ecd617098b3a968636e96e2cd
SHA51243f07a3924d139acba474506af9c741909253e2135581e782894792ce3416012cc902b177ebf61b7e2e0dd1e2040dd08e467999076cf227c4c2f7dbd2794a460
-
Filesize
10KB
MD54c8ceb0e7551beb12c1793cd300a58d7
SHA1491522473a3b857efca0738e9555b8c551846bec
SHA2564c674fc1ba2ae13e133559ee5861fad891dfbdd195058b123b4a160090e21f32
SHA512308e80fd35e04357aa5bb1d7a2c89aab953297b38801dd39b18132b7ecc321ad5f7ea1afd6df2ec4d47f0044b2b634b56b48be3c3f6921b3ec7dbffc49e08401
-
Filesize
10KB
MD5c09a75a7786630dc72e997a6beb89611
SHA138b00a7dcaf1dcad1416b93ec113c14f7b3f7170
SHA2565a9bd58a9a103f131974f1b4f28341246aec27d2403400b5d74a0fbaca48d315
SHA5121d9323556b7363f560f495bf8079dbc7c1c6b615f2f0db1f6892961f82e167446f0feb8d36095eacfd8b65a52a4288599afe1f8b87c7baacd3ca98537328caeb
-
Filesize
11KB
MD5190b7c899de8d5998d3fe42a91f43c48
SHA1d27bb01f68021e93efe491abdd3405063a4dd1e7
SHA2567a10dc1ce1c031d7519c4b6b85e89ab7a9648e602f035fecd80ac9f8e3f787f4
SHA5125d2fdf0b9fb7f5099f86df8440021988c856e750a46bf83135ae951b1f8540eeb516d49aabcdf9b2809d08493c16c5df48fcbba0acd44657424e957af86f62b3
-
Filesize
10KB
MD5c09b525742766ca972e437e859b42083
SHA1d5f2a0f0d83d170af86e7aa6c4c34db528981577
SHA256e5c59265b218e0f0843060fa663dbf2cbabfa727fb827381a42bd0705bdf4cf7
SHA5129f699d10d7873b3e53e6bd4d0ec23433d8dadd52852b932ea99127209870d3f047cad623a6cd138dae04cd8d9dc542d5e56d3ccd861fc85b26d14c953a2fe7c0
-
Filesize
10KB
MD531581221d316ab30ab3a65adfb746a3e
SHA11b92a5532f1190517ad2809e1d0ac0b411d1ddd0
SHA256e1cf0f52d112f2798a0b57be3888b60638c1a24e6b3f378ce696885ab3d7c842
SHA5125f6c4b54dac13b83e1f1f4697a1141d61231bdb83074b953f82c54ac9190b127b3f89b0eec23503fe1b055efe6068d88ecd41039996ce5e9359ebb8ce8587970
-
Filesize
11KB
MD5b8fbde8544163b0a852beb7f2a35af30
SHA1fe98ec27bfbbc167c84066946d454e225c943b62
SHA25609d0f76b6a9dd51a9a0efbe442b9c1dd4088c57be986a973da8598da3603744e
SHA51290b917110004124b5cb620c3352f19a07d80d4279ee14795ee653335325b84ba5ad0a2db936af17e4bc1a8a776c1a841c13518f79ba73ed7da59a65cba3c93dd
-
Filesize
10KB
MD52f78ef29502feecd7587c82b8075939f
SHA13ceee4fed2d150144508872f4c3afd0306fe37df
SHA256161402ea754bd5a7487a8198c65e28127d82b578764a966a6ba0c6181c617f7e
SHA5129923894a125c82d75326b30a6b97f2d3a4d3861f0fb7afc7e8578a078a60733e31e7677aa63d0823f8ec14d9a0ca9d6a12b2391a500e1620adc49d66d1482422
-
Filesize
10KB
MD5f7c1eac4f91f7f4a63b453db569fc4e2
SHA1462898ddbd288a205d3472ae230f14c282d5eff3
SHA25661db820559f63d332b9fc06b7806b677fd1ed6e7e7e716f1331da4236a034aa0
SHA5126f1b1d1516a48b12ef833fe66516c4a1cd9e2b38580086d9bb3cd1babc31df0a94a7828a9f620be619cd7b13ee105f50cfc15c836b315fa7de442d5c0d6dbb66
-
Filesize
10KB
MD5d803d40d12fd30b7163de10c21739eb3
SHA1241e93cf77fe3c1c0f8fd981eff3da9ea29eed1b
SHA256357a57dc03827cd3d41365dcb3ccfa7da25683a4c84a027540d5030d21ce6bde
SHA5122cb8c92ecb5b40a1d6ffd8d2d8d5a91f0f4925ba285ac661c4207ebfa0a7bbf4d575a8b761e930f9edbccb1c8fb18b5d888195169092d837a43aba7d25fac3c2
-
Filesize
10KB
MD5144004f57eaa99cb6a6d5e5b779e2619
SHA152aefc3eb45977c7c269f2653ac0c6c6f07cdf3c
SHA256a1c0cfef5fc91286764bb192db0c600807791b5c0b0899f55b23f6ae7e37b85c
SHA5128141ba80db6004d8cf9353ece7a3c617b5baaa12ec9262c78c070c60c15c2749c8866d922130860259a5b2a4693691d62fa114d508bfd0cb7f9068e1b70c801f
-
Filesize
11KB
MD5e16362849ebbee2fc10671339c912e3f
SHA1d793d06609de58c951eb613575e1fb0fc9f72779
SHA2565b74a1b4c4a0fac77048f0aeb48d7b53c055410d2f8aa8d7f0305d55fe978913
SHA512af7134b7951b06b4bf361e478d465eeff0903a28ab4f4425198a7114f209878a362943f69500515f9e4c9149a39900bbad84308e728839b80846a3450973bfa5
-
Filesize
11KB
MD5ffcf99e92b6657db468f06aaf139116b
SHA1d0ba9b5a142ae546a53b4d98b75c027da2e03f0b
SHA256a41a5f5e6dd75c6b9eabe1f476629d7e6932c8349e7e73ba135ee797ebf6a725
SHA5127c487dcd18e48806d735cf0f3f165354452700fb0dc9f758f6dc2d0f2854a07bda1c5d1b278eb834f7186c0a78ac0af374d1b6f376b9b623f855d215a5420379
-
Filesize
11KB
MD5b7595585f40c72b1a85011b74deda85f
SHA1a8b84310deb4a36d38f65d3b9aacf71f8493f1ad
SHA2564591c6cd53f8cbf53edd6d78b8fe4a7364b6b1738d2a25a12eb9c32f746a60da
SHA5122cf9b354e6510fe5442071aa1346c79d5ee2b0abb348f516827f3c513c151a0ff5470a9f1300f61025cfbeb05fcfe6486dd18312e7d6e9af2de1651ecfe6be02
-
Filesize
11KB
MD5bdfbb551f45f571bc417880056d8d0f5
SHA190d18b9d3d4f4d3b47504f8d8a8a8a52adfa0be5
SHA25689cd59eaa3d49ea5bcb92f038ec780c7026168bff5a47d43c21d699687c8b177
SHA51233bbcee97c174c3f98eecd43e63516c1ca7b611cb54ec33a5df89a1224f3201f749d733970d6c08f641de8850c7d4d27cac54225d77da394271630d864353d70
-
Filesize
11KB
MD556c1273d7ed6651d68d70e73653f6d2d
SHA1917a649ca6c02b175a11c1fd2de61f6254558e7d
SHA256b1dd3bdb146605e355b79a77f50110b8403de7da75fcbf403141d5990645494d
SHA5122c894f8ae4488e11f8b90e33fbcbccb7b285c4224df0d75323c36488e2ba8296ec17faa76472e2b32cce3c2b4f48d76e63a68700aefb238981d9f3d95e626d88
-
Filesize
11KB
MD5cd996913b6bab2debe40ebd7f6bbf745
SHA155f09a387ab65bd9ab6b28f7cde49538edd2f201
SHA25690ce728da9edffd3ac786517e309af87ce307484557ed9d941a84fc9d4d501c2
SHA5120bc72a19f44baee4f409263207e0c044f07b30a549d7097465001232f532f90658f8163a74b59487ce8e2690588937c7c6d9ba5d2f56e925de5cfc1b36428ce3
-
Filesize
11KB
MD522aba00b35f2fd15c6f3a7ef002f6c2a
SHA106610317628ae96f3c0a58e12167c582d5506945
SHA256fc656a586e0227a4faeaa236aeff5b3844bca21a1aa9361425bdc5e78a826122
SHA512ff6841cd596439dc41c39529fdf4247d2d8f027327e6c52889ef1f98a1f74bf5e8c8e995f191931f9a463700ffb0cbc1b72c88654519f22c9e1f0fe5beb62fc3
-
Filesize
11KB
MD585e0cef4c2fec5d6ca346e7b100a6c72
SHA1e97bba7a112a7a49df141365f5a6b4fe7824a81b
SHA256ac6ee6a0920dc06db4ad79d0811fd5e978810c00ec3343d98d2e5140b3ad05a9
SHA5124e5579b536554c8fd535b5c1cf4db1540dfc7558233b8f2f0c37a4d14b903d1f69b40cd16bbe9708f995ec29861b3d830329ce934eb8356a869021a5de587f54
-
Filesize
11KB
MD5a5a0b85c763b3e89b88db59959c85b9b
SHA12407ed16f0d48e84cc1bf3a6da1ea0b78d664956
SHA256a20ff7e0cc3d04b0464d0d18ff75575639f772635cfd87ff174518afe44b29ca
SHA512ab99c627f736e60a672dd87d1c6295f7442406dae3cf2f42409aa421d31b726aacd78331fdaa26890ec91fcaa6ce78183fa83573eda95832ae9a370b85776d58
-
Filesize
11KB
MD5a345b627433189f4919f2ecd1eec45ef
SHA11cd13dabf7037c4f257ffe0221c3799b400f8f4a
SHA256abd4ef173e3df23aed4960317037a8367432b13fd94316750e9f5d0e79079690
SHA512dc1abc2a8e05b8bd07aa9958a01a7578783ae37f603b6f3f7d7d34f35f8f1bfd25194b43944c72c20a129114b1be18afdb771898ac58c6f99f1887aca5b924c6
-
Filesize
10KB
MD5e52c98d3bb1b6ddbb355092eee404562
SHA1063deb6457699a1a5a137e262769f1dd06ba3e8e
SHA2564b650d5ca57b8c94e26e3b7fac733c65ad408eda33c040ab4a51a9bd997ca39e
SHA512e7ecad657d8dfcb71e50a236059894adfafd5a8105f49e875aa3178f303fca23f5f541f175581ca3e50a84f127d23c09db5156fcfbc60dde63c5488a12068524
-
Filesize
11KB
MD55bd0aa109c94f842aaa8072198f41ee6
SHA1aa02eb7582a6f28de2dcc0c4029f58ed46f73588
SHA25624c52f46f7b076dd3ac43c8b66a41f20b784893bd23d7e3acfd0a6155908d32b
SHA51273b7a0634bed7378c4d349b5b98e170fe0aef4211bebe383b1f6d1a8139704393bd1b35338426ff1d3fb5025d82401054850f9a377a5415115a79f52eda6fb12
-
Filesize
10KB
MD54491037227c775e577f5fdbdc97b25bb
SHA1db7dd34177f8b5fea6d0349be7e54900a9c77548
SHA25685113c9c8b09fd9f377d4470b6be36e841e9b6168a69c6fabcb8852a8ffb2cac
SHA512dfd1e425cdedca92d043911406fe114917509383d20205ee201687689b149d3924bc4a5f01643ed7a633b34680457a56314bbfeea68ccb151ef890699303c325
-
Filesize
10KB
MD5710bed3589e5d884035998d4bd39e195
SHA1a38639abcf7a6820bf4a5621b7b374dfec39e455
SHA25603756692403edbc77c45a1f517e02c06d47dc62f4f73c9d9b4fd7ec24f2f11b4
SHA51246e6958d105b77e7c0cdba11e3507893e38ec49681aeb96ce67e13005a824809e75ed3ea6febff9e153290ea4a7d43d45fd39a7eeedae8071e81909653c18820
-
Filesize
11KB
MD5f534e31c2ffb05867f46733902dc9eed
SHA1c2b42ba34060b7d2f11206e053907443f541a797
SHA2560b806549bd64423ab5223cb8543d678eec2af61d076ed63b01448644456c339c
SHA512b335745def6d0ff4e9048fd021f6599df185a8b3ab10c50f15489df6d0915468dbf5be45b08c9a3a28b8d05ccf3c04012bb647d1a2a96cfa961695d375465930
-
Filesize
10KB
MD5d89563409eccfc72c9921d87391263d9
SHA1537606054fb9704e3743fbbf4f574ebdec0e0912
SHA25649763606354cafd9f52b71e2934c541ca1dc81da9532bad0478c8880d30fe91e
SHA512bf64dbc3876927cb8323f56ad3c632d8c6b2ea8ccd79f36d202ee4533487bc862235357e4ef306d7b4f29b5f16a87ff140f168d3818ce9265f579e1f6e4813f5
-
Filesize
10KB
MD58f7cb354e9d2b9c57fbf2ba60aa1caac
SHA1e2c26c78bf28438501c293052b572e584e0e95e9
SHA2565c9995f781ad807161c51682d317518290d0786eeae0a1e00b27568f46c826a4
SHA512671c92d09a688334a826a71e049a8766c54eb86c14eded34cf4cca7bed385556ab7bd665ec41ca0bc1fbb168430565840a4b93b1d04f6ccdb09811d4ef9221a9
-
Filesize
10KB
MD5a59f5568a57209962568976833f857b6
SHA1777335639a592e59913a79d04aa7e4b851cd140a
SHA256dd66c644b666abec475bb235a600796e38ee635103fda985875a1848127602ce
SHA5129120a2c1125cb46c4a8cd12f784ccc90e837c0bd79b2860d2e400f0aa3075dfb401768f9190423cf9c26f33cb298c802c30cc8e56a7b2de3dd02580021d3ca6f
-
Filesize
10KB
MD55a17fe506474563779558bd857fc3d2c
SHA17b1f954cc47b3a9bfcd1eb46bcc30d6d10c8cf9f
SHA2561b0af75926a891b025cafb3d037356563c29f963707041a79b4bde90e7335289
SHA512312e05c88b7925da508eb76a193840be63849608d96c2babf997a170da066e285c3ee31d9e5e9ad261fd0fd20113ef98eeb37566035b7089fb5cf264d6cb2355
-
Filesize
10KB
MD50f25ef0584e0bc2b0d63c0998516259e
SHA1221f3e0146374ac103a2a8442a4e85814be4903a
SHA2561e2c7901378fb3eea6a3c1b386b8e343f43d7b66469d64ca3e82e5505fcb0aad
SHA5123bf9892f25fb944a238be9739b31860967b564e35fdbb8aa037cd3e763c012efacbf62e14ad2a7c2cc2c91b7ef94a8b3e4a875cab60ae181abcdc90d2355458b
-
Filesize
10KB
MD52514c31abd28285faa41fedb17ae04cb
SHA1c4c2ce43dbd9e972292d1e899dc8820a37f926d5
SHA2569b8b31651659afec14db64778d2f8a563a07e2dfd807056da0da9a21105880d1
SHA5129a79a46bceccd48c83ccf5e4459037b91e1198f8ffa8ca5700668f42cdcd78bbbc5d733a515f367d78b4fbc5a7f8126a462490deb76aa703693cb88135c0c3d2
-
Filesize
10KB
MD50ccdb56203b89c7544eb850e26b20fa5
SHA1b10bc9cfb6ac1b7bc2f08b27b6faa5fdfea98e47
SHA2568302980c638156b04103d5b0d2ffc90afb0b8a410e11257b66fe1651ec37ae55
SHA512b4aa2c586d7bc78e469d99e5f245817281638f674836fc3c055be9d25be5c6b70f1295594b795f7c13e73827ffa4c333df5f1d4831f4e10eb67eb9af806511df
-
Filesize
10KB
MD5216176273a2423d378cc9aa91b9a855d
SHA1731399f7f36c1aeae5c03685d25fbba1e98396d9
SHA256d24095c31fc394adbee83c63d486a1b866f0e827873fbad04b504959a60fcd19
SHA512a488f5e38ae71ebed7952b0332fca720d78d0300de1b14697ca9d6fded8b5b13f60c7243af089925cfae1575ea49e776a1851db7b79993612317c438af349f5f
-
Filesize
10KB
MD5fd5f98563594e303a6f1c6466d46b081
SHA1f895a97fc42202e05a536c16c3dfae90eab257ba
SHA256b9fa28f7b825e07e0a32b6598e4ccbf673b05df9dc1730077f5bbc5f8d61b3ab
SHA5125354dfdd3fa936b8191ea9ae8402682338844022a98501741be371b6ab3866de92d08d96f873b622fd6b7eee3b7a1d4335d24837f20ca7ad6bc203ecebd68b30
-
Filesize
10KB
MD570cacc1b4378e88a1e8da45cb2e56045
SHA13cd975b0dcdd4688c02ad534c98084e51e63cdfd
SHA256fdd0151912c30e5af4afa1cfa0d130f58d6eee12637e45ca8ff8e6b8cb42de32
SHA5122aa9ef64d121ee043fab0e8cdb096edf2b3e4084f327faad45d9c73712d36568d76f5fe027ece0968debfede7f76dfc0e6d854a252eda1021b09c11f4b0fbac3
-
Filesize
10KB
MD55e73c230f5814fa83cd72a4fb5b0e521
SHA146ac6620809f2a73e2fbcba8ee735a3b35ebaf6f
SHA25665f09c43a18f1f3f3d80804536846299690c09e4042dfe3859a462bb47d14fee
SHA512e25d01a2323b399ddded19d53a432d3ecb29d0b15f33d561017335af3502f2f2c043afd93fbe2d68951660aa2412b64c830c12f46d73624059f52a5a5bcd6cf2
-
Filesize
10KB
MD5da94d65aa645dffa635950368ef3ee9b
SHA1bfe57ddf5bffb97e707f7173077802294a8d9e54
SHA25658a46ef2fc07edea19a1bfd158eab07eb677a2280ade9db80ee1aff41f56f435
SHA51249ee19bf3ac7865428d2fa6104521c99ec6e5eab6425878fc4755fc0605b4b309cb29ed4edf077e631ad8b9c1a2f4323724374bf798711ac2f23a82c722f9552
-
Filesize
10KB
MD5ec9a61683a742bb4f065fbd09690137c
SHA1f674f67f506ca4aaf0ba10eef1f3193bcc2ca184
SHA2564c8008d2f097eecb8e927e92abf89e1cb0a8b89438fd814c3d231018c6897b9a
SHA5126d8b54a0d2cbbf3bb29a13293bf9a3f0719a2b33df03400de99ea536d1cdc0c45bf3712e25fe689a72dba29e629ce249e67c8d97ae02790c2d9f06b5d4634953
-
Filesize
10KB
MD5e7a5ed555b01bdef4a0ea26567f5f1fd
SHA1d7114a60f087f129a5921640b987efd20e138dc2
SHA25625d03a20793833b34575357b5978994d12ddad883d911f3fa2b4af5907d89a78
SHA51221cbbf8d12ab65c832b2a1265ed641d86384003e8cb2ce1ca5523f258b422c44d9b55cdb3dd916ab56b25c73f47597bd48a2826a1626b0c0eeb866a9cf912460
-
Filesize
10KB
MD5205df2b85e01c8653a4a2379cd1db3e4
SHA1fbddd9b42453da0c7109d0d006c6635dbf0f1046
SHA2565fe1560580db83a8a418e85cc593a07df80e8d3a99a09072d4f1c659b6cce35e
SHA51253279c471702c59336a307b9db6f7bc2ff45dd26908a000a4b7f6e33b91524ddeeef39c07aba21404c49e0459fcd121d456100842e208ac814d63cd3fce6c69c
-
Filesize
10KB
MD50f6639fc920603d40d49190f124debbc
SHA1fb309739f7281bc26bac6576ac5bc27d33e3762f
SHA256b07be727bf1aa5b688672531261204437ddf2b14eb180dc645f54b88dbf47465
SHA512a64e56d6ea9587de1bdba44e533a7558e98b29322472896317dcca1a14dae975277beab2f52f6bb1c1a658bfdc85f5b9942fa8dba2858571ec786bb6b7c277d5
-
Filesize
10KB
MD50401e3f39f838ccff3448103ab10d8b0
SHA1824553286d19041fa7bc8ff1771d883f331a60e7
SHA256850669eac5794a1bca2c2b4ba50d760680a82590fda82b7572a0d95fc7866c82
SHA512dcd869b9d64e9994ee53f4ea26f92448ed1d08a2531b055f23fb3852c271e07cf3a7110863e6116d7238747891e9083613c5f235bf88b242caa22997cab1f1d4
-
Filesize
10KB
MD5e77eda615e93e05f825d2c65c1e6917c
SHA1dcc38c81d8d63e938597703d0fa9c03e578cf8bd
SHA256ff91c2d79fbe5f3ff03b5465496108d46f6619392e36d7d171da1a9f66de3970
SHA51295d6d213eed5302837c50bfad904dc74c4267afc0e23bfab41489558d0442251832cf06cdf78a1af3f69ee49cc0658a480f1f3b8953cd52ecb4313b5d570540d
-
Filesize
9KB
MD5d925408a966f1ab28e89da9f2678994b
SHA1433cb0122909390c18ce249adcfe16e7b17a8c6b
SHA256faafcb6d684907ac1e511d9f4c548bec45dc325f115fc179161dafae2effa222
SHA51261c1dff189865ba51c985d5737060ebb0a4d76beffad7a0a7141e02773ac81bed2252efc696290a8ae34758952b95ea466585407a502c6e24d63ff8137c55987
-
Filesize
10KB
MD567baa3fd28be3981c07a274951e091d3
SHA19981d864f25bb148cd8f1712ccd1170ec150666c
SHA25682c0f502e607154fdabaf6757c1ab4b11ac00e26cd689272dc70721d70930f44
SHA51260e4e82f997867799864586c15c2fc3062d4792b6386965e49d2d96f97e4177b4bf2d57efe1b7bebcaa879eea2460fa7c39976049470eb9ceab20a51c377d1e2
-
Filesize
10KB
MD590e3dc0b8683bb7fbf881956c64833d2
SHA1472ba4a932c28b8c1b3ec001b47f12b42e5d7b57
SHA25628b90100c2f76fa75745063fd6e81f076081abcfdd80cac8a4c373b63a35c60e
SHA512211ea83997f38f9261aa6c7996e163ad885a44d360c84f4b2220eda265bb45779dc4747d4ffe323b2e71911c10b8a7e1c715eef4bbe0cb57d2d76e71e0e2ff6f
-
Filesize
10KB
MD52894aee33ce415e69539fb67535f09ee
SHA13f14606b44782a3713fe513ab0ebe49337ce3a4e
SHA25614103d4c57a2c6c910576ad728a2a457e204d504e727eab4008ebc50cccec267
SHA512da4d32526a34ceeb6200d3e7364632889b0f3cbb6af48ea8b249961bfafc8920aa896d591c71e835e52b92b47cb5a782be7fc49a62276345a67381b05bebec93
-
Filesize
10KB
MD5a8c04e8abf3165320c0cad95e6cee13a
SHA1c1721843947192a452b8bfdcb21e9afe08a6da6e
SHA2565ebf4c7f06bfce99f2a20fa7b0b01c858430743b2b5ece65e9d69d92bb584d05
SHA51201cea605493ec9b5ac49c419b20cba278d63f2a55943302750465293a64769f530159d1447a144dbc7c4a03e7b96de348408422b1c5a02d0b6b7f638d25f60ce
-
Filesize
10KB
MD51e9e452d4e7b4b57723c9101f60f6a5a
SHA11c5fa284c811f8ddae3837c19ab00659699f452e
SHA2561446b2e57ef91f0cbd9d531e26831672c07e0d24b65ed128a3c75e7160ef6ee1
SHA512b13cc5fbdace3e93aad054b96852575aabaea39c34386b75b196826f15d8a936720699fc5235b42d1866c552f1f407fe3eb4f5526020371297127910ea511a15
-
Filesize
10KB
MD54805616aa4d977167876d3e3b012e8bf
SHA1e7876b85410ddcb9300b4ea4f4d60c5da30c7d9c
SHA256a113fb2b25cb600b02feafbc7ed431a59cb8e70f18f8de9fa3253382345d8686
SHA512e2e1bde9796faf88619037e1119e424697fcbb296cb24535fea1f36016b4e3e20d1ecf2570566cc4c515feb0af4057370c1cb7a78492a0bf63529a472a55c9c5
-
Filesize
10KB
MD5c814d28b17b480e00470043aec1ded21
SHA1238342247ee7c5c8d1fbc120eb168e8337c8f7a3
SHA256174f94fc442cb8b8e4553fa0c404f98ac6c5f2795a71f47c0b725a0af11dfe26
SHA512ffe3ad2f8809edcea45dd2f133f8776aefc2fe2f1c3b81e2ee99e912aa7abace46480eb5c1ad6ee574c61b91edcd2598a943e9f52dc49a6d3d0b3397494ec116
-
Filesize
10KB
MD540398cb202d865940878c87ce26c40d8
SHA1aff90649e894ecffe1a5dfce68e999d030162692
SHA2569312973631f6e9558b8642103e76f22155e07d436d5dab352fb693950153b6ba
SHA512ffeb455e9fe562a44dc5959da9cc674f06b04e3eb37a43e0c69d2a8023e5766a9ad3e2209800276c5f04a36fdb13d4ffa7e1ddc08d4e6d628c809d30738cfeaa
-
Filesize
10KB
MD5bef3ddf3d7b6adf29421e2d71ff67d5a
SHA10afd5651db23bfd5a06a3f7fded4f049595b438c
SHA256e418748de50443741b187a4537d3ec12bef7fc3a19920a066c628eb1fe70e289
SHA51268ce4c5d7ad1902dadbc3dbc2fb09fc0cb29835dde84164d1a8ccbabfef874484a7fef786454bc48d6f5ef7c2d06ef89791374a2fd719cc78c4c778078b5fa98
-
Filesize
10KB
MD58b11b4de6a2ab3381238a904bc79bc11
SHA12183132b98f3655b8ae3c0e3f7c3dbc32e0359bf
SHA2569ada47cc03e8eebd323d65466d9eee7dda6c403e7ad9ef865ab7d2a777380f7a
SHA51256939ee357fe6f5d227346629ce8a45ba986c9f2220e9f84105cb72a9c0c1d79d6470dfeeb79b88b917a6a18ed9531d2c7e1929bb1f390996406327b503ebf45
-
Filesize
10KB
MD55cea6f4e9757c11ecb241918fe5390c5
SHA13fb475bb00289a1207fac2d27c5c62ce18a26141
SHA25648064b62ac07912a4e47f928428762e7a82014cbcce505335fb9df364c777e94
SHA5120f272fecc0ca4d591b5a7de157b66dd75fd1b03b0dce8a8abe81929914032ac5b9347b4f6e8d17b8bc6110a6b4e32e9ad5fb6e5f18c19a8ea266651521a13f64
-
Filesize
10KB
MD5a29fca2f36aaf3769b0219e2e93e4467
SHA11773efb7cf7d89696014e24ed90ab5394e50eecd
SHA256bab4ff64847a8839bd750fba42806e1ed0c9b87eae941696bf03e1ede0e2987f
SHA512eff728c665647dad79fc6c494cfe5a9151e621f14254c1762b6f6e8f76d63693f1cbc95031c8c38da62fdb73d8ae9c2316d94db00f3766b35cda56e3b619dfdb
-
Filesize
11KB
MD5dc1c325ee9409bf2ade747d8dc3760c9
SHA13642fd9199f629828a021075f7b83209317a6294
SHA2566b752c666dc3e664306bd2a0e50346045da6755375b9f33c9a8a31ebbd9046d5
SHA5121c601167d94376d5aad8d8db73a628e6da074227a5654c858f98f21e7da9d6e584ce0484c879afe89cad1c31f92dcc6e04fa983e2cfee1cc7101fe9f7d8c6b01
-
Filesize
10KB
MD5e9fda21d026ac30b3d2c607fd93b88da
SHA17c37db4bde3a658346de2939c093600a8d7b3309
SHA256520ec8d0b11cfbccef409f0fa5daefb4d4734f84bbe74cc8d7ba7380b5e7b275
SHA512f107bfa596a74cc72e022856ead9031b2cc509edab46b8d8d14623a4a5a1f5d7665613204c8cbefe6938318205e07e9336812730226f981c1ebec41d533228b7
-
Filesize
10KB
MD5ba25f77d054b453477733203739a7107
SHA126e9f8078abb814adfe36fdcdfcc3362f1e3a333
SHA25638e2d22d9c02503a9e46555c3d1f8e1601f57b61aee41f638404025e2315d18a
SHA512b8b62bb5b0d187e57e0927baa2713407ff4af133924b93436360c2f44adf06ac9be2b87970f28ae27beaf5d2c6d57e5d91dd54af2db6ef81ae7b97a46ccbf527
-
Filesize
10KB
MD54881c7ea844250b7d6f280b0aa67afd1
SHA10c8ba3b8e3b8abec4e4c2cbdb47c559663113dde
SHA256a13395ce121218e6bb5d77578ad9530187d94dd31c3ca66b672da837ecfaa176
SHA51211bb3ff29b0a0742304c089783e212b4d01f13f1504ddcaa9057e7e57d5ee0762f20f88045aa702a2628b7fda98edeaab00cce1cba1e7f6c8b87773e2dcf59fe
-
Filesize
10KB
MD567f69849b6fc65f127d4745a9bcdfab2
SHA100de229986e5e76161289632fa2d7c5d014550bc
SHA256199438eadaa48c19b9230cf5527ef7066f0ad42b0654124744199babe0539608
SHA512341e6bffe530cfa7415ceca1193ea4b5b338f4b3aadb7d7a9f0418544ac36ce22eafc1fa8f4f73068ef7931746f84c97068a43e35996606c7b18533bda572671
-
Filesize
10KB
MD52337be38366d87bdb2ddaabefda849e1
SHA1dbdd75eccaf9a339528935ff8ca11b041d12781c
SHA256792c66f833e35c9458bede42f45e820de431305f6dbb3284ec3f5d687c3a01ac
SHA512ca3461c1f86cf4a11fe7fd86574517955b4c3bc986cd503f4484e9021326b9d11092e90cc4196a7bed6366878f111176e417a239418f79a91b1e6361c59f0df1
-
Filesize
10KB
MD579dd95041989a3bce2b9169237b5e5b2
SHA16c096a4db5ba308e8ea81efe9728e811bb9a6bbb
SHA25697b73b495f0ec2eff1fe6e411df73307322aad4b00a40a29fd75e2428547d92b
SHA512e83cd7e9b8209038400990585c6e09b2fa576c70a71cd4fd1e117076ba297d510149ad1ec97e690606cbae48a0ec565c873d85144c62928d588b6352eedcbe7d
-
Filesize
10KB
MD55ea9b3e7da8ebded637a8ccdebbd5696
SHA1a9df8f74dc848b72c37519efb2e3dcf243b4db3f
SHA2563c0459d4335001e2bf85a1dfbaa19a4fec16bbbe7d516b6bffa2e7af50aec135
SHA512e4976e062955ea949b0bd7be6029279ece303dbe60bff82d11d59b1841599679e0e158c35ab310964011a29367b2115e1466a5fa87552083480f5b4301c4a104
-
Filesize
10KB
MD583bcad79e67d04930005dd112802fa39
SHA1f467cedd57bd61a02e6d8d9142fb2bec24b25009
SHA256417e03222d2a651644331f53772eeec0723c4c17a9963e5a7eb9f2bdd7f65bf6
SHA512406ed9406c932d14efbc74dcba31f887669efbcbca37b705fe40c8ffb272461ee029c3d353c5c53892c247fda4913cd4d62aeaff0ee58cc06e05654229f09345
-
Filesize
10KB
MD5628268fcd425af103607f96eef0e46c0
SHA1b4cbb74b8d81a973cd0357604eb4a4e43d39321f
SHA25602ae7ad268769ef3aefb151d993ad1124d05878f664c1a63d81b976b79b3c6e8
SHA512a197189cea0600f8654a3bc58c1fe49d7e7067070446fb133f2934e7307363617f5d4c15fca8ef8065f897e29823cbe0e0f4a01348dbadf87387894c92d3bf13
-
Filesize
10KB
MD5966bbab99af37eede74d2228ad04fe5b
SHA1753869bbf524c6cfc5223d9276ab83425e03498b
SHA2566c185085fa52d2531f6f795160d8ff6cb2cfb3784c9409c14476af0da05330ec
SHA5122077758b80c58b935dad4a0138d5f731210472f2456cd9ffd425fae73373654c5f27f7b9b33c04d731166f3ef1a3152e3f19454b060fb7ccd52c111238879de3
-
Filesize
10KB
MD506346b5af437777d7a9b8ad67ebc27b2
SHA176c842c2e5ff62d81fdd0af652ec92c861b29b7a
SHA256a9a3ede3162e69ba85589e920641c7d762a422201298cf210aa2d770922e6d49
SHA512e8ff00ffe4552e75348e347ff4ce4fc6d3c8cf7d7ae54d683c6c5dcfc96635be945c6fff0f4e946b7803ce4396bd010c3366c92b762a3980b9d6fa1d76e89996
-
Filesize
10KB
MD59166428ca527d6cc56acf93035791683
SHA179fa464c53e51a101f7ab76c85084e2d2b3f18c6
SHA2569f7c5b95b93bd12736e14a291d378c465f0c371355056b84ee5307e83429d620
SHA5121d4e6704b6906d0e9ee8986f82cbc037fa2486da6168452bb4f42223c309bfe4435ec3b8f4fb099220986bac02ceb5e71750a760724dc69e3b8a1830f7737619
-
Filesize
10KB
MD52d2846b08990a8dd57e8c15571171fd2
SHA16e22cd583c3715514d21fe3c7f51d93dcc8a559e
SHA2567543074bc8c9d1a6598f170ff9acd58fac86d402db2b281cefb20204ffccf1c2
SHA512a6b4172465a430e8c9dac83c656a643dbba5effb95d51b2dd96b610bd1c23430be59bdf0f99a40337f005c89bd0586b8f3d32134bd7892d01d25961f57dd58cf
-
Filesize
10KB
MD56bcbf14d52b263fe6cf7de8e0b2f5848
SHA1d04c342a0c2df99dc5eab6b1f3cfbd8b8ef94449
SHA256a612320af0bb0d551183e65e7dafc3a8c2720d3376c33f8e9c831fbdc27d84b5
SHA512fa4498bf278995df50cc255d5384187c9c5869a83c1ffbe2f1e4d228d78675f55e310848f527a85e7c7fd92ae8f3f0bfb591b928013606f821700888c1964390
-
Filesize
10KB
MD559a43fb9b99490bdb83e39f750c4eb20
SHA133cc0a10820e0fb7d3fe8c729feedeb464d292c6
SHA25681eff60ccd80e72898d0cba654341ea97e4415e67c6a55cc7d071c5a5ae3b54d
SHA51201f9bc55bebb224f89827e82c8d6010eea74da5923b09280706f701d751b9ce23643103bbca90eae5d0fd75b670966221ab0f3eedd1412721e81063d096ea997
-
Filesize
11KB
MD5b3adcccd168852947881b0449d4d40c3
SHA1efb04ff7f73ae1fd96120e28210a2802e3a7178c
SHA2569f8d2a160474660f6f6e923407864a55ca5cf90f4d2e4babe90833948ed7ffb5
SHA512466c55202ab263254f59440cd1ce9da4e3ee8f74c256692cff9ce41195a27a3818c65de6c32bc40148ed4f3e2b8f01f72ab612c9c55b40918f086cf4387dac6e
-
Filesize
9KB
MD5071c635728dcf565268fd9e3b5c6996c
SHA15a950c48c6a2a9f73007b4ac0da6098766302b76
SHA256b65044ae7cb626302df54b2bf5ab88aa8cc03c4738889283cd8ea5449f4fa971
SHA5125cf0e7bf74688ca67096c589f57302110811a487b7831db9ad3c142bcbf5f8c7ac5a030d9da9a296c7d9818804500aa4b3f576e54f76b3287acc3a94f852ee91
-
Filesize
10KB
MD5542de76a4a80f3f40f0bcbd7badfbe3e
SHA16d5595531c8da5c53ef881c39230af67270714ca
SHA256f0b650facd2a969472addbf7e12950e209540f9c7db3081319aab27e37af0acd
SHA51297587ff83cd7d4005f6f98238b07040a90a24d79dee8b3c7f0751dd5eebd8ce046f04fa0024cdbb460c85fca00163478e9f5c026955bb90b0d11d964dc55f820
-
Filesize
10KB
MD59abafe04ab7b05c131b6ccdf1d959035
SHA18c9bf235e54d36617882a71d315e5643606995f8
SHA2567794f3bd88c4781048b281f09a08223afd80160b3e68dd0eb119e052ae6788b6
SHA51272b19ff3fe4cd0f6ea544fda8d62664e024ac60e17016097ef296d53a960bea11a7888908317be04c1bbada163c2c7413f24f2a74b791c5169dedbce4443823f
-
Filesize
10KB
MD5d01ad55b26682e98c95c7806f89ffe55
SHA1b2f8c5dd453b5b384b89a09f07efbde9b25d48ac
SHA256ae1aae72d23abf76be3b4b8d1c28a3b95ac1dfa6f65f1f9c3bd83021317b2f64
SHA5127000474a2567332a8cceed7d7349968f4fb7985100228506b660cfa1b150bd67561949e7e6098c5d6472af4533d54cfee28414b2565dbe068cf9240e16c3cf7b
-
Filesize
10KB
MD59dd3f6385ddb4b8376c07669c0f62e04
SHA1a3c874135d3af29d7f860a8c7e4012dde2cf0bbf
SHA2561ae59b74c3501c99b91474e48d3ab93330ad99241b27ab8db377a58c5c6228d1
SHA51228016a1b0d337a24e3f6ca45cfd8bb982399dfb9e455b409c5e1fa8e808a6e8db40053bfd7069ede7381a03b1747e41f9d600d6b535de9eac1274da236930f53
-
Filesize
11KB
MD5127f207860bcfe668bbb53f3149ad4ee
SHA13ba75a059b4390899a163f23ea7760635c69588d
SHA25682611c610bdb7a628217295b521feb6685f57cfa2a92c2f98e3de3dd6892464e
SHA5121065dd25c74174923dafaba60b3289dff6b81d3465b0ea66f812fc4535cc7bbe65d7812427ffc2903c4b5cd305c58352f8872d18767846db1eda40c5aa75dcc4
-
Filesize
10KB
MD5fc3eb5a0ec12dfe2f538dbab12dabf68
SHA19e4c508040ef5ef17c7f08092ab313d573d9e84f
SHA256650f7dc064854984050d7f5b689909829af26e23634e50255f304335e3abc5eb
SHA5120c44794654b55fb23c8889aeda824e174473232995924bb53b9bb6d3c9192c534bf9b13f9d54068cc3a8c5fb6bc314d578a297d1c39b3be8d4a7b2e30b0aa6bf
-
Filesize
10KB
MD56fd94eb1cb3eeb6882cb65a6871b7e70
SHA1081c6930cb277522b9199038a3652f3884ca0040
SHA256e08b5c53161d92a6071014f4678ba8b61b141f019c9c66993f93e43957183f0f
SHA512fa12169cf58d419774132062feb29a0489fb31295978bc57d2853f0389c056cafd446df734d3f2e057f1acb39d20093be5897a5dbf4f3a9aedcf03e97336826b
-
Filesize
10KB
MD583de3bd685e9475196fb43d006817e45
SHA1df7d809bd5dd6b61d9cd2fe4bc233b4db55402ef
SHA256e3445c46ea15d841858d38171e586c3a20df524668c107f13fa4688f2a0347ad
SHA512b97b2524495b5b54de42658698e9e6a0060dafdb99d79812fdd83185a451b1b0373963ae76c1c191dedd2c004e38319962dd45aea9982bfea2ac7555645fc09d
-
Filesize
10KB
MD5c0fb461f68a0ba96cb18e0570c615f61
SHA1e00749a12ec8569716955a6ac05b9fc8b13082d7
SHA256c3411f95f243d8bedf58e98f838516dd3c1ed24ee09b2c89218d496916299621
SHA512b8ed97cc12a71289635fb3f205d83219a041a00ffc4eee1e91239184083c5d167fb839a1972fc665acecbc71034064d3d5ff5e914503d1f5de83fe45bf1a35a0
-
Filesize
10KB
MD584f16cea604d2e33e7a4a8d6939f0b2f
SHA1ca461d707f3ceba72d6323477387673d0a787d0d
SHA256a0f9b0d378d6fc16e7494700d5c3202473e3698a430c6be679ec6c038f22dd8c
SHA512e2adb3d7d1eac7763e5890fd61b888a194490bc135b4ec235ca5aa29a81213558488d49dcae71e97c03f3a2c037e963981ba4584659ec202688c404b4def7618
-
Filesize
10KB
MD537870e1dfaa4a86a2eec814cdc09b6e2
SHA1919cea1cd35437ecfb712d3b9770a3a04a065ed0
SHA256df9069b88d2d374a29a0f03e5e4bb23f48d3c19c0b5c729b6dbdfbbde9f7050f
SHA512a122c179d2ec4aa83d4413c3864adde1461d3dbe9fe39525e646670f77ed90e2520b8f40419f876f47f0443ab547a7549cdba433df1eb108ba3561c8c35d8c62
-
Filesize
9KB
MD5609e429195f4116d92b1834d95e21402
SHA159bf1eadfb36985cc2e58c1b5c875791a691eb02
SHA256921191f14e1a8c5cf914c6bd831ba76fc07bfb86e4ac61dd02231fbb04eb092a
SHA512080e829f9c3d7f964cb3fe8857aa1489c7d94b2102d2454d9dc1cc471c3334016963562f45af63e55963d4ecb6a2078483fbe5c9bd21e2392fe99a369c91d1a9
-
Filesize
10KB
MD5e324cd08e8c2aa49fdae05e004754d24
SHA15be7bb8a7ae2a0a99b6db58569bc4610cbe26249
SHA2567383530f5faaa685f228b7482487b3d694b724d3e080a431c69ef275ba42f6d2
SHA512fcd92ed00dfca9a9cbc6534b1b56102dc81a9a76f45ea1f7ff8a2093d5954e4a7ae4ebcb3bb05c3017ad5bc1111f7f00b08842e895cc96761eaef68d589e7adb
-
Filesize
10KB
MD519a04d8af8eb1c876b0234fa4cd61b07
SHA1f43f7c2284c41495d21d5e6fc2c72e4e6025c859
SHA256a4c7d5589767e67541edb3e5ea1e9b3137f5034ca3e97984335ae7843f3d8241
SHA512acc20e65a3b08fab796be4d9faae5de67133caa9b3b10bfc372a362756dff343964ce87f0fc7a46661f131430f3aba7a6ec4768df0f241c5f669a2c819609b93
-
Filesize
10KB
MD5eed2172b772b549791f67b72ef136e44
SHA1c42b39690e5013e7bd4bdde8ec74ac25e09fb9f4
SHA25637e8b0ca9eea3eb5e58015bf6bf313e39a9b9ce5a2e925100eb7cf10eed890e0
SHA512874f34c9231d77a1f90a3ec5142be72197ab06adab19373a06ec0340eacae0edb1cb63b7c7c9dd8b0700dcccf656a478abfee5cdae1bf23ee186a06c6dddacee
-
Filesize
10KB
MD533d8ca4ba751c7ec9759b91232df0bbc
SHA13cb145ebe1d3b85c20d47304bf16260847af841b
SHA256d3d362c1c0cfaf311666718572068934aacccb0e6bbae152b8c75b6e8bddeec2
SHA5121228f20eb54285520651b9cb03ee70c2197b7fa3324fc7d2cd36157549bedb8b52c27e1a2f39bfa2ebebd5430503ee71ea824cd4c769e0ef29cd8c116234838e
-
Filesize
10KB
MD5f882a89d57d04d15ee556febe07933f2
SHA116953b7e6f79bb14c58a05d9df5749dbfb46091d
SHA25656b359e545d8b1e8438057e61493b96f522b22dcc0221c56557ad089e525ed55
SHA5122acb4b0b81d58aa6c47dd3cb91f531ea2597e33e9f2c19520df5a0ddfc40289dde97beb1f15d7f0bc8ae293151c33f2ea0483ad9abe487fde716b39e220e973a
-
Filesize
10KB
MD51fb6482ad1ce39d428fe0044d929015f
SHA166eea877b8370bfe7dd817d0c35facc6fa1d8924
SHA256ee3787d5527bd247450b71fb5528011e4d05c34df98008f8aeec01e72624f12f
SHA512436c08a9f99d341cd6074247bad4043dd1c9572a394d2de8365b28db3525d27f13368d6c0ed5a27e9b4365dcacf4ec1df64ed305cbf18414914c53eacf538914
-
Filesize
10KB
MD53563a3db4e3578954f7fa022aed07eaf
SHA11bcba068b656973da60899e126cb23847e5427f6
SHA25677794290f2d1f1754912963d72a9c1ee208314021cd385b6407580e8eed59fea
SHA51293273e1e6a3a7104f47c296fe863abbf3a32eea1ba980a10fb13d65c9a95accf76d166c71184d3901b3ee2bf137ed37b6706426ae2406a566c445188412a9f35
-
Filesize
10KB
MD5a29af751159b53ea711b95fd116f0e07
SHA1bb0f9cce6b0f837e527b71fb9ea22587448c27f8
SHA2562d0d24f2614b49a792372c40e42e6f0a9715b900c346443e303ebc6d563bc77e
SHA512a754ffb6aad2d72333e908debdd02eabcaad672fa4e1aed9395937a8572f6fe195c9867aeeae138b5e62b7865f6f2a9f9aa39b31066949923cd0dd6453ffef00
-
Filesize
10KB
MD517386c7e6b0362aaf37ff0973591854a
SHA1e4c42cc5023a32a1c923c43bb45ed31c0464667c
SHA256d02c9647773f5ee038f0e7597dbb097924e662097855414213b4597df8c452d1
SHA5120d44070cc4e9d8a70b29ac0b6a2097f28d662c55132a6d1458ac5a32da06c12b9ba5e3ab2b2d93ffea02b3a0a99c1cc8855d96b3d40932174525db3f5d5c5eae
-
Filesize
10KB
MD56f51bb5b7c8723afd8e7c962ebf6cda7
SHA14bdb28259f46967e990989c7482ce5e9021d35d4
SHA256ab2e335be07f9d20470d6834993d98a3eee0d182d2b2ce8373fd919e4bbc7289
SHA512c49f8b602027d799132b83845a0d9928958697fe5ae3b707006bdde60163b9652ca14ec4bb6e44c53ff87998bb85ef58c36a0638489a04437f55823326ed8440
-
Filesize
10KB
MD5643e79bd0c6f3c909b4e04675f84afa8
SHA16f8d43bdb3ec8cb8ec8214de73f1553dc9c86fd4
SHA256e8f63deeaa4e0405b13cf5ffa3a86b8f98d092126aa42fa333a36ec8de257129
SHA512cace169e4ed6619bb361810163e990ebd2d82f85b6331042a52608443ba30ff0dda1da6f236f44389ba08e744e7c745efd5bcaeeea51cf1435fc8d418fb2a9ad
-
Filesize
10KB
MD593acab56f216fcbc49336d7277f58fee
SHA13f5960b3f3a5f36b55f46585639f3def45ed1658
SHA256f93ad45dac65f7f6a2f7286cae0738fca75bb33eaab3684089f452fed70b2003
SHA512907167eef980ea54fb8081ed06a08966618600348a059351948fff5c10f8f97b358d67dd2a27ce36e4ca9271a96b7390d9b19be1ea2e591afb8be093f32a8148
-
Filesize
10KB
MD5cff88216574121cbca24a47ee0883b26
SHA163bea48ac546887651bfa7c9c9e612c30f6f7194
SHA256c1db380ba50a5928e2c18bcf61dbcebde3e2c7c263ca16a3a9066923ac64c507
SHA512a887e54b9dc938f52f7a5851aa0c9d580d37ac59a41ca9355a348ae89e386dbb962cb3b3a819dca80ce62a37199cf5569d43eacebab2df65160104f73e115801
-
Filesize
10KB
MD50d43fbad9cc7773488548ec94bbbe912
SHA197fe3fbeddd44d3bd40aeca60467c3e1075a0488
SHA25696f93916fa624508ed6edc4ee608a2538204ae2f830c0108125572340e4b19cb
SHA5121543555b71e768f22a122729a10fefc4abbb2ccce824e53784ae2b63741a71da63ce313348bde51360190814fb44e4f240847b1417a3ee6c2188d876ffa93f87
-
Filesize
10KB
MD5df2e9735426a3010b0dfece2e8cd2c8c
SHA15db5a17ecff0a82cadd5728f955dc67fa225bfe7
SHA256f0cb7b75d7cdf8718681496a957947fb0ab0ab086cdf876253bb3f5c5c0c8809
SHA512369cf4199abd4348bffa5f5fdb1780598de88145d7636f78100a1b2081060f17d7d1552d2fd7b5dcd49a324f0f1cc2d11c484b9d9d3eee8ed3bc76871ce78c78
-
Filesize
10KB
MD5b2718b17aae66506115d0d68659e01ca
SHA1e5566856a50810b5c2ecb5b771f5959c1edf1a3b
SHA2565cb856e06cdeb64d2ea2544265705e6f814b2602a07d575b83a2d70a32fe7ae2
SHA5122bc91eeac13f477cc9791835810d5790e5f05479e891d05039e8d068e26139cd5cccd42dee43e9db615630f6f09ef837e75037d0b24395ec9b25e505227ac8f3
-
Filesize
10KB
MD5e6473bce773f9e70ff891c8919f74707
SHA1e26fa3001e3dd6eefb9b5f08ded266cc07e3228d
SHA25636ce0f828f98c46037b5ce6e9be396b3e044713d3d604bd4c35b72d65dc83d11
SHA512821c753045b2ca65c64af014bd49efcc4692dadcf3c186c7469f444352a7bd3b088e0cca1bc3fa0b807e685acf3db04ac4ed88e0716145299ca82c7089c95973
-
Filesize
10KB
MD522afe477bc0cbdb153c628e84742fd9e
SHA1226f4a9132c18e03979c9ecd617adb427314c19e
SHA25608e1ba9e242185828891bec372e1e7e3a4c36df3716391236c86935adc7816c9
SHA5121c9cfa17113964a79f9870c4ede0ba9483f11de13d433427eb49fc1d918c80e88ee7bea7f1e689c7ca1f2fc51385c2a848633da3ac610e97d007d20afe6249d7
-
Filesize
15KB
MD5f99987cf8fa29ee6292aa1cf33660e1a
SHA1b5a38acd24933449c4c72029ed86767b619ad356
SHA256e60ac4ef6f3c4d03b3879ec95d721fdd54e1fed0172490cad859db843def2edf
SHA512f503f20c0a2c01d35adda9c03e71a9e21efa07e1e185cc54600b524b8a4a0315d8d25231209236d86a53b96f205a43be9501fb6c431b45dd6ad5f1c997c988aa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5acff26dc61d1381de51cfecc0646706f
SHA1055378abcc96141116452ac08721662838b76ea1
SHA2568c0b42dd6a22ad64ba99bf767e5ac34881c9fcbbe95363ec13e73f17145022a3
SHA51240ca8cc5e06f912b4f3fc5d902cedc404b1c1af46da545b9d9dbc7b6dbbc07c4a4bad44737d6c0e3b8d8bdc23274affcace27b5620356787da88c63725dcbeb7
-
Filesize
114KB
MD53c92aaea81a08733edfe51b6cb84734c
SHA14cd72cb297010b85d010359acb381856c4da2fe8
SHA256e3500845a688efb8c605beb80ddea8b7533b5a99a219a2cfe99393ec48aa5b12
SHA5126534a9332d44a93164be0965836967d438d0be94859a24344f5bbb4fddce59183fae77683dbeda060b3c84c6a6f8f12ba288a9bdab31b85c22f82ae0ffbf1250
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\bdd110d1-1f84-4f3d-b2d8-218100e88997.tmp
Filesize10KB
MD5cc34d3590324ec9f56372eb051c3f8bd
SHA1982812a3992f8e175a060f45f3c9bc4d1125fbc3
SHA256700e5c55ea87b500f7f4091828e1e7877402bda3ad622a1c32b9f0264b6791be
SHA51275cff1ec6a1ef8b33e01ac1685f54b3cc1f6daca2d9d7b429445bad81c4d6b2caec884287f953d657667f2d0be6f8983585874dd5b0889e083389b3a1b084d82
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d10b812e-2357-40cb-a27e-5e91b93332e8.tmp
Filesize10KB
MD5f5b5e01d0b30926602f552fe6f4247ce
SHA12af981e45296505d1d84ee1625755b5f612b515a
SHA256860c3eba415efac0268e6acb0783b7205afbe0eb86a84375f0c6cc0d4f4e5043
SHA51218aa9c69d8b47569a724aab4ce49a2f01fe67aaab48c1a68d494a2bb03c06b0efb3eefb61703a38c6b986ab69e264f75313e49c58a6210a73298b82d86ee2294
-
Filesize
246KB
MD5d2df2297ffa8354ed4f04389984d7893
SHA11a18ee398db330efb46efc9c3d3b243aa757c41d
SHA256e59487e1bcff5b0f2498c7497185f9a4271dc3aa76d6f3ffc4e1fc8cdcd1e292
SHA51283f598b9379bcae38b59426b2e7059cc803db6757ecac6ecec5427bb41e46dcf380d7c9c4d333b8d6e268bf995d764c0c29072a903c37e74ef085c3a5c264da9
-
Filesize
246KB
MD5ffc5119185f7d5d532a06b3b56c97a1e
SHA1a34a84e0b977399393013a2bc1a31f9705f6a5fc
SHA25647938b1b5b5ccfdc8c17212623e62f6784598356f167bf338261888d04d2725d
SHA5127271acbeec35d235a9613c802beb440a7b0ca0d4379896d4cba5d33002cd6295576472f32657150f3192f0209a91e81facc5f273793fd65d66bb49b9b0e07ce8
-
Filesize
246KB
MD56d5c996ad1397cbea20c3b6a63c0970b
SHA16d0525cdeacc79b123c48938a8d153426f15fb42
SHA256f464753496e47a1f492ec4d08d00228c4a8f2d6ed5db84656b3db8e8c141d782
SHA51207cce17168eb6b5d7ed477e809b12d19b5a2f5b1743dd91d8e029abb9f235d3b256f18d4f3e6273b267cae86f55667d1b6889c4e4886080680b4b79e47c26c13
-
Filesize
246KB
MD57e4ac0a3756e8e2d0dd498103f281669
SHA1b1146013e69f90f63500e215ec8f4425140c5ae8
SHA2567f710bb0524b77735dfd345ada6a3830265a18bd15d8b78d8e021ceeb78e1b42
SHA5129dfd016b4cf4386a934dd86aa5415070aa23e0a73ea22ad1bdc4dea83d95f79646ba6fc00b3182bc96aeb7168b31285b59371e87c3397ffffd52da3a8e604217
-
Filesize
246KB
MD5fd1baa401418d8b1487f52d4d371c8e5
SHA1387c2392254f0677836f1ec142ba3653c6a9add9
SHA256e20802ead232510141d92db151625435bd7b44cd430e4d09007c09482d45f6d4
SHA512120de040a0b6d874bedee128f7673012f2a720c6f031d0c463c7b47164298c733b8aa31b6e56346345bd3f6519f6c692e73f309fbee5258fee9d631b8a6efb27
-
Filesize
246KB
MD577844f281fee2b77ac7d2f35503de97a
SHA1f5a8dde536713040180750ec417f1b748dfae2fc
SHA2564dfe1074f103e100e39adf71534045f4d54d7b8c169b429489eaf64efb7aaa61
SHA5123e0f6cad98b94d8f4394788dfe94d7fc288526deb8b9637cfd9026b124497a7171f28c821d737d62d47fcd90c4f19d530a9ad465a3d06c0891bbf3409bf58b70
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\AutoLaunchProtocolsComponent\1.0.0.8\protocols.json
Filesize3KB
MD56bbb18bb210b0af189f5d76a65f7ad80
SHA187b804075e78af64293611a637504273fadfe718
SHA25601594d510a1bbc016897ec89402553eca423dfdc8b82bafbc5653bf0c976f57c
SHA5124788edcfa3911c3bb2be8fc447166c330e8ac389f74e8c44e13238ead2fa45c8538aee325bd0d1cc40d91ad47dea1aa94a92148a62983144fdecff2130ee120d
-
Filesize
152B
MD57b90c80d925775948935ea16162864f2
SHA18f4772cb3a1d1b90496cca5c8a5acfb14cf18435
SHA2566f75ccc4d064c683c0cc0fbbb61ed948f671c36b7a0c8a57179ed6b334648331
SHA512978a0ab71f7b16e8d6b357be7e11fb92a7d1594bbcebb06c46d871db4e10ef0dbdc035e071e4a6207a3ca447e07214aef3e4d7d3c69069c1f040c48cba243493
-
Filesize
280B
MD50eb4b63ffb4b9c32da35665e45b5d70a
SHA1d71b377db2efb06f99c86c266a281ab4889d0fd5
SHA25622fbc6bdbdf9a080a7151085e9c6056920c639591a4ae166a0e6a15959d77cac
SHA512dbd442157c49c100ae1adb3720006a038712daf5fd6bf5f4635999cd32315a8a2b35ccb5b86416ec5cc4847cd0924bc5a8ff2040fd46d4c3a0e25d6313e30989
-
Filesize
44KB
MD5d1f604157b0745a40453afb93a6caa42
SHA13d5d77429b03674ebb0ba34d925ba1b09310df5e
SHA256468456974fd86b33647942820dce7284879acfab9e9e6eca008e1fdcf9006fb5
SHA5120644ce93724a57dedd8aec208e5a038e323a1b9871d5046d58a87c60479626693e6c8f25b7c7f7b60fd35aac133d2e660ecbd8f8d579ad1fc6703ae117a485a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD596cd34dee46fd8dbbd694836b50e2752
SHA19f88eb6abc1f22e557e07af217ddc7f1d34dfa5c
SHA256b7bd08265756c182cd50c2acba129df0113beea266f9c557d6e291ac2da57453
SHA512847dd40137461676e9e772acdd659bcac234d54a809fdc6d36cd5c093e1d8c83a0fa555bb7fe9a728f58ace3a57daefc8d651b6d0402cda437032a7c49be7b84
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD51329a1d7cb757c1562d6bff8e5289d51
SHA176f7940152c7d4d54f2053dba726c34d4e19cc1c
SHA256b070964289708404761c118be11029f208a5512b92e04b647d0d2e5199a02964
SHA512fa2fa17ff36889881715a78e75cc7bba194be64cd4a68e569a799a8dd6b7a6bf4e007393c3252a373f9a69c5de192a19a9cbf6894cbf6bbc33ef1d57bc398ee3
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.86.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
4KB
MD5348330934d8f43f8cde93e35b3766e4e
SHA1a262adaa1b9e248f35b89daeea414f88f35b28ab
SHA256495fc26b799198bad533ad0c77c23a1db6a809479a7339f2920ff73b4fccfca5
SHA512c4988b61a1a4166dfcaed3434a5e15ce2bc1b93d4c34c11685370f6992b3d19d21c56f562b7f664a8c7952bfd1604bb6eceadf10151719069cf3be0c8e5f04b1
-
Filesize
4KB
MD5a14c142e8a25a342c228b2587be504d8
SHA18a4fe584a0e861cb553b0072503eb4f05c073d62
SHA256a40c8b13119061b9d3491fbbf5548ad1b675c638e6da95469c934daa9d68970a
SHA512005b47f154ae5fb6d9cdcba34a73901caf899d9d9ed502b66ddd465ebb619de19d8d17fb40d1f4e6f6b05d15ac5c272a91068acb921a25d955a6a7f02d8d8eca
-
Filesize
15KB
MD53d83b6096d56a23d26a9f6bd40e4b5ef
SHA121d33b0997c61088c34eda72e06da5afbdd5ff10
SHA256ae6819aae3f1743f880b02679aac60c585f28ac778bb2a5bc34b730eb0c2c6e0
SHA51287d53569810bc9c306e8d34de27d472b2a5d76fa6b3607b590a54c5467e351ca8f0b548432c607222f20612434077435f2e6cc9a2a8d09b7ca7040baf0cddd17
-
Filesize
17KB
MD5699e754781450f01393665260a60c411
SHA12f7841485a2ca1fe3a4a454ea519f12cbacf4176
SHA2560c84b7171abbf5b8403044094a9b3e0805cdcbdde93388e5bab81679867bf99f
SHA5128a2b8e96a509668edba7bf34a85bc649764d02c3eb37797db180a06aad344f912607913670b82f2daa61c71c3d3886269f93cd99515387fc8982ee9eeab8065c
-
Filesize
14KB
MD5c5f3bcec25cc5bf1e6256ebc39a87b64
SHA1350d0e3c1312c2847784c0318926e322041a86fd
SHA256ee4d50552d0b9cabe787eac17928e52279fed1b4575fe79b7052a5645952dcd0
SHA51292304d6629734b55b91b9a995c9706e6ee839fab7d743660dc93e53b926e9af3b7ad1be99632091fdf22b85fe1d32f14c5167400c7231b8b5e1a4b031afb426a
-
Filesize
32KB
MD5d2f5777aa1f526d8cb98189194b19f4a
SHA1b58e48070b870c603b96ec666dd3370011b0a44f
SHA256e9d8a0124c0dc477fc502aad0b581e6ddcefdc2fe7af94b39af389aa8abf0a8c
SHA512fbb551815006bae653c2d9dcf10bfd50055b27981dfe5eeee6013a5da54317828361e78fbc08de59cdddd127f780800b96f83210c1406cfdf5fbf7dd0b4ea93b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\0e6ad484-30ca-4e68-87db-3ba96d4125a0\index-dir\the-real-index
Filesize72B
MD59eaeef57dbe4391f7ec3814b05fddf03
SHA1d84151f18dbd54277fc1fc3e34c993ae7c203131
SHA256b39d9f202d03a42f1f9c3896403527f92a6ba263fe19bb6406eb615667e39a22
SHA5122a4883eb20d5f0463503a6275617ee0c4d4fed0b95f9d6637e533ec418c3631e4a6edb18264664ba00a94655c02a2a2824eb8ca3d9b1e6f92737c81ade606fa1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\0e6ad484-30ca-4e68-87db-3ba96d4125a0\index-dir\the-real-index~RFe6f492a.TMP
Filesize48B
MD5722c80f106bc61c799cea40ff81f4cf6
SHA1ffab6939d68506800301d2a320735b3fa8cb4aba
SHA256d06bb7a1c01644521a0efa00de1bf49064f5a15769b7e6cb7f99e805f8d8e4d3
SHA512079939e43ad6cce65230f429294180fb5a59686229c9beed8a24d92bfc161daa903afe59167e5ad46c32aa0617fc3986a431b722f5a640957dac7f7f5955c0eb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\1ba3e74e-8d47-4316-9b26-7188a0c17d67\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\786aaa4c-822d-4a99-b98b-a6467fa9994c\index-dir\the-real-index
Filesize2KB
MD57e76d69d92f1b0c75bedb8903fba500b
SHA1d6af8fc54b662b6fd61b122bdd1ea273c4908548
SHA25633ec5f8c7633350dfc78f539df659ec1732ae1e1ae61a079ae0a4c593a0915c3
SHA512ed67ad30f15e71581ce2e2ee9c0ff57205afbcc46ab621665b2dc5b8669efc579338cb8a07d892af347cd7bce982f6ea52f1e138804ccdb0ee7494c4234c854a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\786aaa4c-822d-4a99-b98b-a6467fa9994c\index-dir\the-real-index~RFe703a6f.TMP
Filesize48B
MD577d2709da8700291642c5396e31708d6
SHA158100f24037acca71cb955708aeddf6d845225f6
SHA256e508df3672df3c58412a611683cffbaa5c27daf88834bd335dc1ca2814912b01
SHA512217410738e6860d7e5feb956203c97cfa162d5e0808000ea45f5bcb49dfa66d57159ed65d0d170a8d5f0ac990514f6540a7d028174a7c3275837f7f1cf62a4f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize192B
MD5aa5e46b2a61c5a832fc0d95f690a2978
SHA1ee879fbb052aeac718a9c51d0580e52707b7d56a
SHA2569c87a076db689565422ef9f480060fe8201f90bf9e3242b33814d506071ca353
SHA51272b8ff99f33dca35584db784e61fdb44c4457f9095d5476346e14e85582a3568f423b00490718fcb145fd843ce12935671503db636a8f17302f760c90486a0c6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize255B
MD5acef1d7f54c5bdb2eea787dce4e2f455
SHA1a31431d99f0717e1e428589fd4f2f5863c5b0844
SHA256bf63e4f91484a8f9df15871ffc5c6f98988981915feb085d3846e8f70bd13646
SHA5127d68089180d17d89766c30f820dc4253193393dccd77020a7db2cda6adce551956ccb98e29c4b559352ff32c6822855a8c103a3225a9dee0834f4c6669639a06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize253B
MD53e4a13a73c78c1b5de7dfbb4e55f9bdf
SHA1ba12a170e706ad9a38b53259403420ba19ac081a
SHA2569c12f760fa4b6f8403c79262c5ed70b6a1642c3ade721e03d6687ccee3631451
SHA512fd98318dd95e2c382e9069120560b8efc8271633d669f3429f5a614879c44dd862de8b0522bc60fa6104938cea0a07a3ed210f9cabd19e82f88dca1c6e870ed0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt~RFe6ee37a.TMP
Filesize119B
MD59875d1d6be7320670fe34faaed7a06c7
SHA1cfcaab6be87eea4a059dcfb06a7b75a2cecfa84f
SHA2567dc9a590f97ad087e677acb42df31b1dedbfbccc586240372b93ba82f1f702b1
SHA5122bc9c5849031ef77d6a3ac827f792ce65bab351878f6e284015de376bc64eb7ac9004238e24e4c991b0c652f39972f3f05bf13f21d01f5894a8fcf72b1f56e57
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5d132479f10d710a0251d24ad085fd6e0
SHA116be7a987a3e81a6b00e027fa08981d303323b93
SHA256799ce37e1e08493a6bf89f4df60713548af3947c0b01f20d42ca6cb1acbc4491
SHA512f929d3af23250da3a60ad9dd4a0359eea58fa56ec5f63c2f372acc80b7d5dee077e673da4b282b1129e7a053bee9d86c28a9fe9f7fcbfa266726df222222c64c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe6f3294.TMP
Filesize48B
MD5437f249437e157516bbe218458be9ce9
SHA1b81147cf6a824ace408bde77c39544f7f72bf324
SHA256ce58a5f72516015384335a35ab5b4dd890359ae674c6403625bf35bdebfa7be3
SHA512b5900dc922091aa6dc1deff32b5e99b5f1d4bd13571c485141b939d63eee732260afa345f5391e3ffb068d6771c1114ac4b66a80b45b10a8638fd0b00dd6a267
-
Filesize
2KB
MD58f522dd423f80b849a8839368e1dddbb
SHA136735f40108ca9e7137085a5de09c004fd3dcc48
SHA256cda90e582c2be8a4544f6ae7af3ca55ed2d251ade57069abb98c9407f8141074
SHA512a6f99b2ce5a2517da0e9e26b011e044394d8291bf1c97fc6055fa89c75c6b70d5b460d5a4280451da6f5da35e10454c9ff39e775a6c319639a32093dc5928923
-
Filesize
20KB
MD5094aea233abef63409e48d92de78bdc8
SHA162e37b2ccd0f80d9278b17a96eda189e61420e2c
SHA25660f82a6840bf1e0e4e9d2234e09639407ca96d4b422b2b69c28a3879be859522
SHA512da21cab7b308ad5f1550a013f5861aa36e1111281703aed4d138e2b87e8af406119e16a755987e9d75a31ee19dc0b517f6a0fe3adbf1ac26c01bb37568d36b1e
-
Filesize
872B
MD533d200d1c34b474903031934ad1a66d6
SHA1c542412604f6c42524caacc6f2a986a7acb6ae38
SHA256a7e1730ece7da60b4e4219d878a76487c10abc00abfceb967d0bcfdaecd34e7b
SHA512bc1326e1b6e0060e6adc5a92bd05588b6b5c8a7249879b82195804cba8f680f99d2a31adeca3a6552a9b05a8e1361b3e9947cc604c036af4efcdfe27e3c1254d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Edge Cloud Config\CloudConfigLog~RFe6fa7c4.TMP
Filesize465B
MD5c2990cfc356dbbe4f173e5f81a1bf57f
SHA13a9bd0a1348e90a22a435396092302318e3e3407
SHA2564772e2cc73d7554c9218a5256f2ba551ce8a881dbeb086c42426efe46b3a4c41
SHA5122e87e9ce7f0dceb716e81081f9c1dfecce007180ae032d59a79a68c06f8e394a7af00ffe59c43b47445f29eac88f4a6d31776ab74062f42834bcdc80fa6d3ce9
-
Filesize
19KB
MD5290c46250b8c14d38ed38031d0c4bf71
SHA1a2c1c18a4d3c882e9716ee14151a86b509079403
SHA256099faaa6e6c16895e5890deefc070844c1a54949378cee201305f40f2a8a9120
SHA5123c64c2a5a9f9d33e38e206f43142ec27897f109b9af6629639b5618a62da4dd9305d57f0005db505384dd6b40c9779777e2f0342cf0d175f0d75624680971186
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Edge Cloud Config\OperationConfig~RFe6fb5fd.TMP
Filesize2KB
MD51f795181b631c7397193ad104e77a253
SHA1cb7784bd10beee2b3f9eb3b6503553d5b8b150b5
SHA25617a9cca9d11450b75af87f81e3ca0e91e20dfe4a5c5e998a3dc7e5e83622e99c
SHA51299d7c4ddab1f6edc5d6bfb0aff9064ee12bb805132a032097b6652290e1ba72984c917384b62564e279f3e89db25c8a5dbf1ec784ef5f6425c8f2b7be6e41dbd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
44KB
MD5db04820ab8fc345373191238b33f3e3d
SHA1913b20c6a51cb121bdc5d474495d44ae2c68b298
SHA256fe391fb656f1ae70832944f3357e2488a2e1d000e3796a8061b525e5f8720c90
SHA5122699acd3782dda09e477148effdf06eef3da2e09dcaaf0b5b87b9f59e4a6f60c4765767869cdd3d235855f539d271b12fe447ea5804b027724b352d4486130b8
-
Filesize
264KB
MD5065928e039b387d57a203025170e8978
SHA11142c57b9e928c94adb276ea62bb1a0af54891cc
SHA256547822eb9932e6127c7c13ed7201d46ac99fce75d0dd6f4efda9c4d4bb0ed60f
SHA5122e616c8725c52021e95f4f38b26453e3f74096dffa6a2a90d72fbfa44f54e61050ac1237e06417e4016060345edc2285379e87c1d3ce77226a42b8b81b2ded5a
-
Filesize
10KB
MD502203aafc34e7f90b254b2b8671067d5
SHA1904896ab7edf2205d0c6df53138315edb9f9551f
SHA2566a8b4a29fb01caf2fb8a83858398b948dbc4bde66639d5baccaf849b833dc949
SHA512814e96fee373e52cc6200597d6fa026bf3f7d894cb732ca7fb51ae429fea6484a1940b6669e748680407e91a61a9c02dd493197678c6931460b47a9bdb454955
-
Filesize
10KB
MD5896a82f20d6abf6df0c49fbccd7472e2
SHA151a906ae70b2dc888368073fb9e0b088c5aba96b
SHA256385a8f1fc5e4f8a52ea669e22425bf3992f078ae8bbbd655a22bb37a140b006f
SHA512dfadd70e6cb5bd884c085b8566a46d57461e70850ab7c80b69202eb0328ba43a942cb661abd970dcbcb674a3c9a7b1f09d2c7f6c4d49b1e86979f4730ce07a3b
-
Filesize
7KB
MD5960ec17bf75d75a06d1de3432ad0e6ff
SHA18849002385e6d4e8b6d7a087d8be89b556e74fd9
SHA2560cea2604aeaea2fc17800d2cd26dc4ca5dc150a62b21d51de868494e4105fd79
SHA51225ac980dbbba5949c9ac8a32e0bc3f585236b143792f3dfed12fd324c9ad67b4de9bda45607b251450edbba5389552012a854194a806b316a7f4498866f2f5f4
-
Filesize
26KB
MD5acd7f582467886dea5b3001c39850f92
SHA1939d01d74c55585ca0a946d7b3f39bbdf0b0ce9a
SHA2569e49489468ebcea3e05ab4d398305debc5120b982dc1135bab045043851b61d1
SHA512a5672804e8521191765a5a2f87e4821581f53362888b219d3885bfe0f862d9d6973f1af1f28283ff08c4fa7dd86f8a36633f3ef3401685fe829a26ec71102866
-
Filesize
22KB
MD57f151e9d73a14be3c1418006dc961a73
SHA1b8e037dd72f9946054aece928b6ed1d8a9968cad
SHA25601ed4d80571913e87777b8d683d0460974f528ade189cb7a4dd5c0acd4578bcd
SHA512b4f3ecaf14668fc81b15b908988f07110bae7e9f536f8143ccee4849e98c7d6b71955a9f13a9e728639ab5e944d1873f1505d649aa80dbdd17a8398a348f8711
-
Filesize
11KB
MD5cbd426137c3f8d0d16490bbe583c3b2c
SHA1bf3ef80b3f19d646fe9ed76ec79ff3129a52f0f4
SHA2566819d191baa17857eb42df1b9c103914eee614e8b43b5b99d9147eb28ebcacdd
SHA5126d32041b0737d589018a91c5ecbb3a5edf2951e387dbcccfb766c334bb320e97f80907e158f6fc4cd61f0dcc5b57ad21cf50b95735746beeaf29df7ad35fab76
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\TrustTokenKeyCommitments\2024.12.14.1\keys.json
Filesize6KB
MD5b4434830c4bd318dba6bd8cc29c9f023
SHA1a0f238822610c70cdf22fe08c8c4bc185cbec61e
SHA256272e290d97184d1ac0f4e4799893cb503fba8ed6c8c503767e70458cbda32070
SHA512f2549945965757488ecd07e46249e426525c8fe771f9939f009819183ab909d1e79cbb3aeca4f937e799556b83e891bbb0858b60f31ec7e8d2d8fbb4cb00b335
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\Edge Data\WorkspacesNavigationComponent\1.0.0.5\nav_config.json
Filesize2KB
MD5499d9e568b96e759959dc69635470211
SHA12462a315342e0c09fd6c5fbd7f1e7ff6914c17e6
SHA25698252dc9f9e81167e893f2c32f08ee60e9a6c43fadb454400ed3bff3a68fbf0d
SHA5123a5922697b5356fd29ccf8dcc2e5e0e8c1fd955046a5bacf11b8ac5b7c147625d31ade6ff17be86e79c2c613104b2d2aebb11557399084d422e304f287d8b905
-
Filesize
152B
MD5fd0c1352ee6c662b352392414d0e923a
SHA1cdd99180d68ad4bd2b66a405f6055730d6808696
SHA2565ed9372964fd56aff9d274fc4d0e6ba169f7845565ab49a4db666be0ff81c4ad
SHA51270b399e71ad23179eb6b4d817ce0be8c23a15f602a7450b57afe3cd4f3377c307d2299f14ab1718c9c734047a7cda394c3e332a041db26261c2255e3b0ea8348
-
Filesize
152B
MD5b1209fb9b14fabb30ea71b307eab90b6
SHA18a15a471bd12ac66a810697cf97af754b215aef8
SHA256fdc93698ec6a08ff10d7c1ea004a1a1ceda8b0457bb8188b4ab5a12b35def684
SHA5127a6ce641a06817e868813c496ebfb75e696edc54d4d0ae46360612a8bf57012251590bf1f729a50f05eb7deda8005074e4d9346eb0630ed8c5f85c8c2fe6294f
-
Filesize
152B
MD578707c6603d4cb6a430ea3b2c753d4fc
SHA1cf7a8de4e56bb938dc541cf7bc1020468380a614
SHA2563a2dc92fde27e237552135e5a5fa27be1d809ec5a89f1d3fb0eab26013d38035
SHA512a4addb22f68cabbfa9e65e4ec3476d420279e1d8f1d13e790c1619bf55dfd0783bde90209687e1aaf802cc1d1c07fe50e32eaf5c5f3c7ed7adedc67325b846b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4657448a-e689-4d51-b796-c50171d1d95a.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
5KB
MD525e19a6cc30084a7a0be78511455f086
SHA13217b70bc95fe9892a81ed60905df2cc50fe3ac6
SHA2567c19f22c23d357d029bf0858e94ec3510eb37ce8eafc63d536e4b1fe4dc0bbf8
SHA51257fd7eeb18d4cc07a62d734ad76c56d82968cdd4a65bd0654514a66384402ef39d22efa5692d7cd411de6312ba07bc1b462bb46706b06508b677b7f717954957
-
Filesize
6KB
MD563d3fa4dda5e420322db12ea1ba6e1a9
SHA14d958871525d165784148ae76944c0d3e6413eac
SHA25638ae4a9757c088203a9beec3b856eae9ddc9aeed444e5609e2ef67c60ae9ff0b
SHA51254b22f55a4b4c3a8175894d4eed7a3ca6f9b4def9e2265fec76659d974f377b1359857c10d15d7a52bf29685a4a4e6778bab265236db10fa0a8518cd3ce91150
-
Filesize
5KB
MD5d11d6df01f1faf671b2893bc933d3499
SHA134b7025775d1f65d740f84d01f3a6ff06b62494f
SHA2561095ebb34dcb6cc98ebef63ff65ec99aa52f416f64bbe60a16630fbf4d8f253d
SHA5122db19a466cbdb7491d1ebfc1765ffa7ee9509004a7f9ffd742bd4e1995d3c2eca9cd49db5146f988c4b98af9cb32fc720e6157ba886abe9ab7f2858623244962
-
Filesize
25KB
MD5c37168a426c3b32dc370bf0d82c1aa46
SHA12ce2235523f8aecfa7d44b4d2fd5eca33f1e718b
SHA25631c373746711b1b5e7cd9921a88393fcadbbe485375ae687b94c926e0a1068ce
SHA5120679a5b6dacf7946928ec64f18387f6f35fada33dc0d0dee8b3b7ecb5a90367e49d86392907c671ab744329bd880160fab28f5820da101fc81837984baa7a7be
-
Filesize
4KB
MD509af66392ae5c5790f3357331d7a749c
SHA1eddaed225ac4d140c3b3e85ef272324821479c45
SHA256c144b394d7d5eab0ecf1ffb1f1bc81f7e8cf9137f36e4ccdd453a1e732899469
SHA512836d6960be82344aa175da98f4c7672f3647c7319cd0a1a5aafb18ad01eb0339fabe6d1beced5ce8d83f2ff14e067da1a3df88d7e1c23aecfb052125e97cdecb
-
Filesize
10KB
MD543b731fa654e1e4db3caa628be48fd52
SHA1e13960435334c4744be717acef2ac395553f4946
SHA2562e71d9d8fe899b180b70723ee832d5e7bfd6e94af39fe033335a148f909ccf35
SHA512ae5841323db097baf4ee6aa85d9bb0292ed013c8cfbaa3702720694d461626a0d93da9f2e8b8c9d7338c671e025f563208c65ccc5d71566908f05ad18d2c696b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
944B
MD5781da0576417bf414dc558e5a315e2be
SHA1215451c1e370be595f1c389f587efeaa93108b4c
SHA25641a5aef8b0bbeea2766f40a7bba2c78322379f167c610f7055ccb69e7db030fe
SHA51224e283aa30a2903ebe154dad49b26067a45e46fec57549ad080d3b9ec3f272044efaaed3822d067837f5521262192f466c47195ffe7f75f8c7c5dcf3159ea737
-
Filesize
944B
MD580b42fe4c6cf64624e6c31e5d7f2d3b3
SHA11f93e7dd83b86cb900810b7e3e43797868bf7d93
SHA256ee20a5b38a6674366efda276dbbf0b43eb54efd282acfc1033042f6b53a80d4d
SHA51283c1c744c15a8b427a1d3af677ec3bfd0353875a60fe886c41570981e17467ebbb59619b960ca8c5c3ab1430946b0633ea200b7e7d84ab6dca88b60c50055573
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ynpujim1.default-release\activity-stream.discovery_stream.json
Filesize25KB
MD5ce6ce0ddea913e53fa4386b93d1d2be4
SHA162f56e8c4c8a928290f58fb675c26bbbae93fa35
SHA2560bc8ad2f1ef9a9943516d20dec1319fcfcbb158a3810126767af899e3d91c04a
SHA5127c788c1ab2beda2ec07311fd38d7993d2b5baaf5947870dc7f7a3f483304a9493a322864d9bcc01186f56b22365e7c993e9bea001063bc60a0b2898cfcf77571
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ynpujim1.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD5a301c41247091112bf338b4b78a423be
SHA1f89486b2ab6c74c9d90d326fbefb035f48e62147
SHA25614e8fa69213ebb72174d4b0ef131fdcd615a90bea1963cb85bf2b7a47db29e65
SHA51211170c8b68107103d9084b5b54a8199ef3458d76c484fe7d2006c32459183c6df67fe847e27db234aa93b834a703a6bfaa5b8e432feb1469d0a7b3c7211e8076
-
Filesize
9KB
MD5332ebd73c8950fe3b900aabb9e7497d4
SHA1355d0774b9396547c59059823b28a7bf96f47c06
SHA256508f7839288e4354e39b4af7e515986e0982e169c9404a1825013fa163727755
SHA512ecb848cd95c658ce700eb8eacb3ac1d5678ae8b3a4ea05d739818808722c4ae3e1e8f4ad27f41581fdc10b59374004a6801b0ca34bff5538466de72902f76518
-
Filesize
13KB
MD5a4eec48473206dc502b70735414b28c5
SHA1bfdd8593dbb4973bab9754c8d8fb2adb378f2831
SHA256622f8f1278a9f66af9abc7c99c765ba79277bc6c6389ec7426bee5c433b57658
SHA512fcd71d46d9e9fe75a0c9fa9fd9a8273be9fda1c3e31ede7aafd8abfa083817b6ea57b31fdf5c1685fafd1705b9187aa3bf6ee7d93d66e75a6885d75337d29518
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ynpujim1.default-release\cache2\entries\9F3CE6B3798B5FAD0695B2D8E6B573EE06B1A1C2
Filesize488KB
MD5a30f2aef87a8457ea9095536263e1b49
SHA18c4ec1d5a028127335e7e1f97c964ee7e91a1bb6
SHA25668760a09396c491ffbb0895995c64643601cccd28212395ac7d05125ac97669e
SHA512711bb7e0a63ba8b625b4026a757386ed7e06118b88631adec35d62eeebb9476e5fd11cc9bc647a927b10ee3d0ac5ea1608fd76fb6ed3c944d034d5e5719b88cb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ynpujim1.default-release\safebrowsing-updating\ads-track-digest256.sbstore
Filesize1KB
MD59257c6d7a11efc7a942eff10952f2aa9
SHA1a476fa1ce6ac65601534fc49c5ef39fcc9852645
SHA2563851e32284e0eaf5687e6b55c6fdc5ad0b5020b81699bde6faffca570016cad4
SHA51252aae9e5a565d08d54db74fd9c5ec6bf831ad03f5901d6212599c9c6e554d22d475a7c169e4068f13eaaa247b4562008fd658a5fb7e287646945f6ef30a5d084
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ynpujim1.default-release\safebrowsing\analytics-track-digest256.sbstore
Filesize651B
MD5758e863d90671e7e3012d8a9d6169aed
SHA170823c8b77ae98e04dcea417964417e4bf1ef301
SHA256a6c2d1e172f62c8557fd75f5185a937d46433f03221c7221e59ebacbf2f0bb57
SHA512e8cf425b22040ca8338587bff3457af50871fea4496b2d27a827aea615f645acb76bcb1cd73d5ee77d07f139816dd390262ee231adc661c5a1a272c1c9828197
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ynpujim1.default-release\safebrowsing\base-fingerprinting-track-digest256.sbstore
Filesize367B
MD5be7d2765def13d5a252cc963f62e9dec
SHA14055e5b3ac7581e27eadd02560d7f30e9df4caa1
SHA25606eee65e89c04b4e84a983437d9d98295dc2fe629a306244aacd7d2a787e5bcd
SHA512a7f5b82eb2688df0255a7e04a330bba2adeda4c7990fddc9f0bee5447285d2de93c6cda2d24f1708970f2596d66be3c4e1942ed3f974901e97297c5bcd2a006f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ynpujim1.default-release\safebrowsing\content-track-digest256.sbstore
Filesize511B
MD551d0037241fd968870f54ace34821097
SHA11de7bba79b592fd60ce7996625aafb6850cd4030
SHA256c0d2ff4a77d7b1383af6534b54b0bc3e5dc9248447246d77bacc07d645587de1
SHA5125d77a27ed7a82e6106106860b50ef389656250d012fe3810b2e8c8a481357ce8475cf41fc9c56228dc3bbaee80151c9fa99ed9e77c7b4c675cc38cd95bbfeab0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ynpujim1.default-release\safebrowsing\google-trackwhite-digest256.sbstore
Filesize43KB
MD503e14be9bc0a656037a3b5942a546b9c
SHA127c8c966f0c0199c6790bc3b8156d1f018b8c5b0
SHA2566b768a574930c00b1ae0da8677c98b99efb66d81d2bfc7bc3856ba3dcaee73e6
SHA51233aadd19c593b005d5940d26f65f135162a161631218ad9ad0741549fb81ebf3958375b4ee4fcc154cbc2694e621180670c9a485828862af752de557e9e82b89
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ynpujim1.default-release\safebrowsing\mozstd-trackwhite-digest256.sbstore
Filesize9KB
MD54f1db84b523d8fea02d102c3a16332d5
SHA1321f249d1a4a9773def0685f3329deefcc23f09c
SHA256e08084395a8e1cda6b8468242bfdbed772031758abcf9ed2d35bd676d161dd5a
SHA512d9c1caf61c4e0337b15c9519dfa5af72761b44f85ea05dfbc5ddded8b660cb572bcd450a367e643beb4437bce7000b79f9ab0b798ff6db49a6dba4aae3b0c61d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ynpujim1.default-release\safebrowsing\social-track-digest256.sbstore
Filesize312B
MD58b43d39113c80a060f79bca4cf917e35
SHA10b17ca32ccc5c7670c8d51b7c9a88325c80f3490
SHA25688c6a99c31843bf96caddef9256b0f5ab4e789cb14d921ffe05708db35961be5
SHA51216111c5b337a4f039c22d35c2736061e6d4eadb7ef781e1be887f9dd02566eb0bca79cd5c5d05ce96dfbe6fba09f5e250fd101d3a8002c553af2f025e0d7bf9e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ynpujim1.default-release\thumbnails\38eebc9954161826508f6f511f1d6b37.png
Filesize5KB
MD5b4dd5ce0c1e1731fe8f6b43249bfe9f0
SHA114b486ed5e212f417ed2c06d1c83d7f0ffeb5bf2
SHA256d22bd98d6ba45e91df3f199b86bfdda912ac2f52c74fc8090ea9a96088f1784c
SHA512115822557811f48e8a1b34a17e58453005212ac9767c2a4634deed8b4b5cd82bbdc8858328034d6dc25b424a17522f496ac9ffdcf247825251eaf587fa1d726b
-
Filesize
150KB
MD5240cd355e89ec1f3566bb2ef1f361dad
SHA12ade60eb20f0fb16657a4fb024d207a931dc927f
SHA2561f0388d23a4d8492e2f9839392b22a6957deae8750b60ff860ee939811594295
SHA512961fe2017949d185761d8491ab4f7f2ec3b0562cfb6fef202c34d685a87f2ea032f53d653e4c1d492dff1fb43d738e7727985738c1a956a1a18aae77a3d7f3b6
-
Filesize
6.0MB
MD56b8044020683f23bfbd3fdfebacdcb8f
SHA1e3fe1ae2505e677219a2ea4dae01919a2f3ff06e
SHA256136923bef365f206ed0900336b10d6194620d41b3ac90e239c73448616b3bc27
SHA5123264560a4f37fbc4856aa47ba34072a8fa70b51028083a136a16a47f1de16420137c777defe3e587dfde4c8a9687b63457d17074d274542ab1da54104af67583
-
Filesize
77KB
MD531fed201a3c6bcd8e0a6216dfa068be3
SHA1b849404e8344118b782a67c3470112bca37fcf89
SHA25619fcbe3b88feb5121f228b1843b530fc6eb7fd1de409a6aae528cb75209a119f
SHA5122687bf002c5e710b8c9c14cfeb7b83e715135a1c777339b0334c44da6cf4edb21b4a10f608007abb699be9ce256571e07f60d31029c6a0539fcab6c2c004e30f
-
Filesize
290B
MD5030f3cc39209905d1a27ee4a54f54c54
SHA1037149a40d76fafd5f0b3641f46617ba15b7a5a5
SHA256f68a5dcc580d1ce2da3e8e68c3595dfb012b264c2008a54e1928554b3bae9153
SHA51218a709717b83b81fdc739914e09e4968986ddc03438d4664a09f468e0a6580660dcc18e7ae92015a9002f8808cdd6687379c9142492235f52bfb78dfcc4de82f
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1KB
MD5ac2ad49a2f6ef58052401aa797c93aa0
SHA18f1934ab85432704cf4b6af05f13075d2bf690f6
SHA256f1b987fae12f48972a46d79b5b17e0f0a8b053c4a39c9d504d27232e4baad504
SHA51294f0fea380e22fec1f6c77008cadba060342f429c095458c661d92b783890a6850689e63e46952d3e16d56996f48c3a2ceea7052a0c773f35ee5fc99b8f234ca
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
1KB
MD5cd335d96f3bca424016d8f9eae93e5a9
SHA1bb3f595ee94d80dbc0be8481728345b0b02b5e7e
SHA2563e8f6bd83bd8f1b6eb2d397c95cc9f0dc76ce470318719b94bdaf2d6b861754b
SHA51247fd03cbf61d8fd776e2ae845336cd91b31f28eb62d6cb9fe305403302a8ba0c32b6cfde3b1485581d973f7588ef73c70cb87f065f60e119df8d5a74cc4b9a75
-
Filesize
112KB
MD52f1a50031dcf5c87d92e8b2491fdcea6
SHA171e2aaa2d1bb7dbe32a00e1d01d744830ecce08f
SHA25647578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed
SHA5121c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
30KB
MD53a065d179741e49630d5773fc4b7b411
SHA1ddc199dd85034a2b7f9108e9fe8a7364400afead
SHA2564de0f1d5d8a4831ad36acb2d8e5d2cf1c9e2056742fb289472d4f60d0c0d6fae
SHA512fc6950b1779c4d0b6e4319020cac3913a64b047d6ada530c8d54c2767e6eb6559271b4f6608076f915fbfb92f3ddcf23260aaa1d67b2e0e245c13ff137a3005f
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
1KB
MD5d40c58bd46211e4ffcbfbdfac7c2bb69
SHA1c5cf88224acc284a4e81bd612369f0e39f3ac604
SHA25601902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca
SHA51248b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize15KB
MD543b9ae487a2fa7e372ce1b3da78a1cc4
SHA17679ef5b3bb3336910cbbd7aa8e11e417e09be46
SHA256654258207ec75a77a4c89f2631d9093c257e6c395487ad46caf8687f382f03b9
SHA512cfc96d733fe8ff83e8542d7b854469f7b518524d990d187226cd525d4ee276186b67ac2e67cb463d0427e670dbd9e7a6bf43a15ff73500211d6b7e7c5d7c2596
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize15KB
MD55380f18e5fc8eed849d2e361e7a13c1b
SHA1f0041780638fc4274290e11b28310a6befe8e2bc
SHA2568c77f3db47016d785cccc4b19c458110519ff91a5f5195c7a45a8672f33d60c9
SHA512b8ba6743996fe64307b15bb46082eba25be775f19a7ff0e98cad1756c099ea764116af678f67419eac5f1da65a86470b5488bbf2355e04bc9c949f809f377785
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize15KB
MD52c1253a85fa0dfebb4780221c6cc688d
SHA1f2f957c23a365e584581a1ab629fc0ba3aaab36f
SHA256e56c0f9fc1272bd80825bf311707c5529c7536bf9a4ea2978c17d8c43778f5c9
SHA51237bcbffdab47f12c1b177e08ddb39e76f66d0c6cab1d5e49072752c7ed133bd055012c5d8fb40be57ae80694d676ada4b92f091c0ba2bd916b4a67c83da9c8d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\AlternateServices.bin
Filesize8KB
MD57a399fd8425cc7cb2dac8e807384534c
SHA1e1d0c1521f3f3a2cc39acec7a152cfd2a68045a3
SHA256bb96ecf9a25df249e361589fbdfa368db0f2a2f77ef716ac242b5692e3d7771e
SHA512c1c76e03c99de4dd59dbade1d480a1309ae7c6ad623c97f06e313a8027ea4f3404cf90c0066d0ab0fdd1bf5d9b4917af84614814ed100d271aa9cfcbb32b2806
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD53272751b43fa0c9c9abdc80721b90e2d
SHA1947d45e9f6f781f3b2cdbfb64d9d16370918ac2f
SHA256b4c703984746b5bb09dc7c8c53cf5c398581b35a478f60169ec0d4facc800a4a
SHA51223407368d9e36568995d441f3a8e8274f13a2edee95a78a9b4e58027b085f31dbedd2b3508352eda6b2abda4f3692351320f42fd9449234f3726b0225c4a64bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD59983bcf7175ff8637e65e9acdc269441
SHA1c6f31658284cb24abb979509450f5f595aa56b9c
SHA256d9d9e39103c45d18718acca47e8ba2367e61031e1c4671cb8b63b81a9100a2a7
SHA512bd46e543221fb2ba03bd8fdd19a7aca80a06eb6a2ed9c627405e984c6bd400f430b00eb7a26297991b94fbc71d68bf4779e3d2f5959b1fedf103e162248824c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\datareporting\glean\db\data.safe.tmp
Filesize41KB
MD57ca045803352a307b9fde96df3d214d4
SHA13593dbc38ec9693844503190cda77341360f756e
SHA256ee8439f13a20827d3a5d79f8abab806fda63fff4135c466253977c3ef1ce1557
SHA512dfabd9e1742c01de57cd4c3953bed1daf6025c5a0a691fe23360c7b0ffedd6d448f5d5c9c82e4e9f9f9290e7e93a4111a7fc26556ec128784b63c9abd477c919
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\datareporting\glean\db\data.safe.tmp
Filesize69KB
MD5ee9863c284a365d5b986a263ae988026
SHA19a9c7d825fc8da11a3daaa7d3fbe8dfc16f6781c
SHA256fd06242fc72412aa384038aa936a69231aeef602eb2f27acc2615943f72cd9a3
SHA5123c90ce2ef806dec1e045312614e1deedbfd63e6ee114574d21a0a60aa2472a4069bfefc477703e521fbd97170f5f73637136aad2fa9da701734a58355baa7cf8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\datareporting\glean\db\data.safe.tmp
Filesize86KB
MD5639c24ca331b0c39157951593720533b
SHA1bc1636a6a8f8a9c9856fa444b1787c488ab8e93a
SHA25662e899a32940cf38ddbbd678bcd23a1fb6124b3f85d318ca77cad94f69f53d28
SHA512d181cb98fd3aebded6a61eb7bdb3adf9223dbe245d7a2bc66dfec989382ec5b5890e4e5ac99f593b8caae91787ddc7ce7733397e89df3ee281add4c9ec7de15e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5fdf6a5477099c94fb1a36fe98d774caf
SHA1f585dafe233127a0ba54ff27cf6d2cc05123077d
SHA256d40eac79f4db1fdbd4c6e45b73a5f762190d67b05b4f2085a2f3e58d1751d673
SHA5127ac72b4e2cf42015aece4a92d8d128bda79b3e402b2dd9a5a899f12666574051b8647147772b63e31b0476aa03f3a41a1e714e19413a21b49fb36d96b43158a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\datareporting\glean\db\data.safe.tmp
Filesize41KB
MD5c2efdfad2ad9554afe0f8fcdf436ba18
SHA13ab57435868c793fba797f824ec1892d3396eb7e
SHA25608a5050721dd5b52d917cb6e239d9e74c42936775b61b7a6c3d0bbf8ea637dcc
SHA5126ab5e92d5fccf03f40ec7b87ba3d7f52c42f74cf504d0c4a1c49a7fa7b54a34daf1d3910e66ef1eeaa8aca3d8b9e8243def92558eced855ec5e036fcbf74247b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\datareporting\glean\pending_pings\00b54e90-d931-4655-9bcb-c56fd7616366
Filesize28KB
MD569c2d929de941f196445045484892ffb
SHA1f805c56590bf1a759fe52ab057d52e204afbeaa6
SHA2562b27720c6c9224b02296067bdad9920a26334b5cd3bcae9483f6090a2212d1c7
SHA51238eefe3938a34ad885a0ffabc47408f4826d8b8dc3e4b5c2a074cfd792acdf742efa3ba0ab0b1b1647713ab7db5ff7b3cfe9bf1376c226081cf979873ddcbbfd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\datareporting\glean\pending_pings\2a3a439e-3e84-4376-b3c5-78cc82939313
Filesize671B
MD56340e77c4e8c459ceeab9a7240fd7725
SHA1ef989bfe8dae24513cafb0dfdca64431abeda7b5
SHA256ff23e3b383980facce671c904c5b23302ce5bd085e569f66581034592cc1f92f
SHA512156dc822e56dfd0431f318f593388edb949d0f30024c3b76e664720af588040f4ee921d5f08792d87eae6fbeb8e9682078999800a1b12155d39965e9322c279f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\datareporting\glean\pending_pings\407bd72d-3d4a-454a-8171-51af9d2eeb53
Filesize846B
MD57bdbd6f3967b97acc7095356352c27c4
SHA1228526ceaffe1e3b43646646a97031b6a6bd527e
SHA2566e7db105f5eac5d5bb6afb61077b3c35c08e5cb14834f227079e247a8f3f3e48
SHA512f692502407b5e09d8d848c7e1991f97503439fc08378278341908c4722f7b94ec82fae2f83d6d657d7b31984c577cfcfda2c3a67774d2dd6fc654dc3098a3be4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\datareporting\glean\pending_pings\99900634-1606-4aa1-9ce5-6f92cbfd108b
Filesize982B
MD5a2fe52d08c9659f69cd8c5882b603c05
SHA17addef4dbdde1932a0ca5784de343cefdd1b5062
SHA2562635f7a9b12d0565a437ae774e1a0e25be28f752ad4f24b105f12292cc2779c9
SHA5127d781e5e54166a2de7771fe7a0995cd916be239204f58f06f071194f50cfec614a7c4811fdc9737be97d468e32291f02ad0a0dc2f5f05e8c26bd0451f1211a89
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\datareporting\glean\pending_pings\ca52bec4-0af4-4ab3-9044-eabaeabd200f
Filesize3KB
MD5984c7125f736d84fd1e8e12b8ce2ccb8
SHA1c2318823764f1108642c617823644ace5c6af9f8
SHA256a2234ab373ca65d2bf672de10aec1377c2785fbe0a41a4ac9fc02c596826fcd1
SHA512c4c253ca2d5c047d2fa731d833f07907b65596d334c26aea1d473dff04e01f57048153690c8f18a6ac33c6191a41ad7d613bc000e6a45db0311299e6ab8bd18f
-
Filesize
920B
MD5944e3837913ccfd836673cac1d86921e
SHA1a3acd9e8caf4007e121c0eb4e23babd95676d68e
SHA2568f556562942646e6bc2a00c553f899673a25900515f7135fee219f11309f5bea
SHA51269898786298029fdebe8315a74a44fcd5894f6b8716cd88a30b861f65223c856565444ebaf89422dd1a2216c6a6477146331075a7dcc86558a21ebda34940a33
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5e376e4f085d7e0f765a19b4705e22cf6
SHA1609df6c48d2348beaa3624d60e96506b128dad97
SHA256153e537688dbe60fd3b2645ac287f19ce9c66807feb37b213f1f26daac6cbc0d
SHA512a655fb0c0543cc8e2d044173ffa0c4d0367344f49e30dc65621490db4ca082a72ce25e897e6297d7d814df7762b56dc5e8547ba3835cb3de20075ffc6ed43939
-
Filesize
9KB
MD5722f624063a2aadf516ff784756c4e4b
SHA100bd9976a65b0a1d6b7be58aa45d5ec609fc0845
SHA256d829d626958d7ab2c12e56c21992f54217d4cc56bd9fda74976fc8d4724d6f68
SHA512abcd0a5f2c77cbf1d4fb13d41f2fcd9e624c9acc4b6bf09c01c2e0dd9a07645618c595e1a096a1a7fc17e7d065552973c7c9208f2baa349d408294081976a5e9
-
Filesize
10KB
MD581758509d6e8bf17342057620acd9bec
SHA1fcb4895ce2ee7fd1b36259e819b7386729f6e1fc
SHA2561f0eec3920b2c857a66f66ef013fc46466a53c6e320409bebceb1b385459de1d
SHA512139744e77d26137c55f086cdd189f8a2a8343352890513c53a617e880c64b634e4b912e3f7f34abd33381fae2ec38c615ba5d3305b9759e023d8bcab360f0b2f
-
Filesize
9KB
MD54528044c49e9fbcad3c7c3d89fa5cab8
SHA1a82a3d330b957e60b88525a618548d72aaeff6a1
SHA256bbcae5b5d6026aaff9ddde770e01ebd3a58cd7d9f9a38e7164ab0a3ccda83c6d
SHA512dee4cff72456929d8dc2215868d7be14f231fce059684defccdd4c4fb658388a60047edecea4b42bdbe404785102ffe9933c0808f9490ec36939faa53b36dbfa
-
Filesize
10KB
MD50808d9bf37f3ef90ccfa8bbb0fc30e72
SHA156e516c567bdfb7f0c0681dd94ad9ef4d33f042f
SHA2561253983c28f38e37463ff66f37b046b4afad8ec7fee686357eb7a9615cfd189d
SHA5121420808d7efa29a185672f3f5ecba1d4f5f11c23780d0ab266666cffb0b9a64926d916218967737874f46832acad00d76f14b0e98f30b6b8da43cc5df946bb3c
-
Filesize
11KB
MD51b2b97de27bdc0523bff9d9a962dd4f0
SHA1b0840cf13ca7784d2e95c4e910fcb6af119206b9
SHA25683d9ae50e471d8acec81a7d32cbbec28523b1a54a2a866c2edb59481f9643d61
SHA51292689c4fb340d32394c801958c4c2aef5f2b887b30417733ba9be09469ebf0d027501d95a15fcd9e061d76141fce652a75a25f60275501ec5e167ed846ac5293
-
Filesize
9KB
MD5091b9074c04dd49beb2e6c689b6b3e7e
SHA10066339646c8d95e797f92203ea01d5054a62c58
SHA25633c13874a3bfece7b80889c2db52fa821b23b6ef0dd5a9ef9493b50ef5b744e3
SHA5126b2a06dd779e8e9723f442d7336b12bafa46098acf7ef4c99aa52547fd3fcaa948479b9f32258d8cf40f9aee14acb9e73e54b1958299aa6a405d75bb18293775
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD507e7b9256132376d51bfe7805a74ebc9
SHA11a4bcbc098a91ac6dc7b8bfda61ef28608d1fabf
SHA2566b911d23ed3872c3b955ce5dd8173e5066e0fba71fa5c143ea8832794d0fb328
SHA512c10d7b69f342dc3211134666c1351de22e3b7f8544983d10d05b993f988959cc763c181439629e9ac25e92309f388eeecfe260a94e7a48601c22c5a9f091759f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\sessionstore-backups\recovery.baklz4
Filesize7KB
MD599c0b4257337a7072544fe365247a070
SHA1b67d16d47c4a4d4c1ceb054872cd65c067589257
SHA25691fc1586e56315da63afe301b16bb7a1ce1ee88e97868b9b73f4ff42caa48840
SHA512e1b5de9ddb8d429ff71b5d110e4b241860c8acec1eb58457810462d2d52040902742572f7114ec6d5485df61e61314199d3c2e903a31196f9d4513212f052e70
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD5c8e2556827fb971f7437702eb68f7630
SHA1dab7cab0c5197649bfd57e0b47c14499f942698b
SHA256efe4ebc3529b780dfc943c2834e9d32f9bcb84392ed427ebb6aff890dec833d8
SHA512ffa8f314cd5de7352353140a7e411c1c40b4ab2f59e06d1b3fbaf2342990a14a26116225615491abf125f50a63db37d7ec43cd0e54e25f83406d66a86fe78288
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5f5b6245777ea6db3723ea6e877948587
SHA1ec3d21d5947a91ed8c9aff5f0d0ca425ccc13de3
SHA256c05f640e183eab39bed561b39e2bcf81ede41034da121e240d7baf69a549a3ca
SHA512039febe2d8334d6ee092ae2e701bc18bd9b6603ea2fd5748858f340d5952a4b9c9de07728f68151087c56ac779174cafa7a6bfc25818c21011fe33b9155f0a33
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD59484403b704a5b23287ae0f81816cc1f
SHA17f087afe1a9daa2d41a535d2593c99ca951223b3
SHA256c3a8ec5e96ff30c8eeebba7d9a67406636174b437b52adcccf8da5cbbc805d32
SHA5125896f7d50a1b3b2149572a585ae6d9c3c56c6c4c6029b4a3842bc713ea515bd2bc5a763f0b1e16d57ebde60f444d687c14e03a04618011fbc3e57b579ce3f687
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD5752caae9f02de4e2a9de8a052064c244
SHA17b478dc4ad60b1700c31192a32874f77e362e245
SHA256c8f3e58252ff862fe478a0df593666e017cd74c083547556536e07b84d4a4ddc
SHA512d24d5e249a8331b0cf5be1ecaa1393088e84c9681a87314dcd93fdea7110596e445cc161a40eea8f5756974558b47e6ca2d90cdde041c5ac08997e402a3e93c3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD56cb36c0337e1901071ec2686744e8f6c
SHA1e16e5088384bd090f9c063d2950f67bd8b234e36
SHA2561f9d49199f26c76bc74a045ccac93ed89ddf5e3268b5a1689685e793ad4fb057
SHA512892c67589b99b51123a60a6788854d0ff60cd0cf24db848aa8ce1e93d4c10281cbead40ec231200dd6962c716f44e5722d668f4c255c8aca57bcf5e0972f08b7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD567443327aa03ee82c101f0d35bea0cf4
SHA118eaa1e3f9a25d50ae4b0ebbc6262e1447ff373b
SHA256149182c3535a6e9135ea313048e9b2e972f6176e16d50da3d7fea859c1ec75b1
SHA512b8ac81f8fc54973d75069f1af75907f2e0c3a0eea90f0a5e79fd1f065ce15adce7e2a5ffa20c2ef1fe1ee1bfcd9e578f847ec61595602f720a12658a4cb54fa2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD5b20b2fd1dff2c79f4917ccbae1ac54c1
SHA1ac657c68e7089ebd4eb78dae82d655d256a3e687
SHA25618bd356856192c5aae9282f36351a4ea1a02323a6e235777b45ce783d13bd2e5
SHA5124b6376a9f48988499423d2ffe1b2e1efa59770d70b5dc07f40c2fc49a9924cc7f73b9bf114e4198b1712b58204b4b358ecd9faaff99de0c3f05d24ab5c27df00
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5f83686ab6b9feba55ac6e6303f6de097
SHA17a426a53754e5b20aef6d5e5adae358418e52609
SHA256c0dd7e9fc080909933134bc18b9795639ebdb392302b851b4c808a0f8b89a182
SHA512ec97ee2e8a8dc24d0e1a01b1bd5c5895c83b5bcd1b9fbd450f25df3277d422cda439faf9d61bf04dd33536e066e9e8a96c972a451a4d415bdcc95a5a5a3fe394
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\storage\default\https+++mega.nz\cache\morgue\51\{06aeda1d-1d08-414b-a260-5778faabff33}.final
Filesize1KB
MD53efa9abd92666265dd81c4f4311a96f9
SHA141b6b716d67b93555e444cd453f3c6e3f8c9522c
SHA2565066b1841e8877db31312ef3af86f9bc9234c95071119e025764f45241a4e2e7
SHA5125961950f077501608a0f2975e7f69c483eeacc4eec4ac77fd650cc1131609501f87819f93ed23aa508a90426156abf038a859fac4112d2d4435bbb634027cd6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\storage\default\https+++mega.nz\idb\1409365021%s2p4.sqlite
Filesize48KB
MD5c635e631ad9c3085c44e9d2de20859e5
SHA1805e3eb2d0b722ce537e5a425822cf9f3bb86e2b
SHA25604677d182eb154725ffcabd0e16cab24e4476c5b8061edbbd79c2b729fe92205
SHA512237ed90aba28302e4b6d62028944709c2b47d5524dbe2b44a5dc1689a4e4b347e305da76a1a9e1300173f7cdd0658df528504a0fa3b7692d83be3c3d84d6bedd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ynpujim1.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize664KB
MD5f90af58a10d108536c07905c7d07c5a0
SHA17491832a70410e6c2e161cf4b24d70af3779f9cf
SHA256902a411aa92c38dd43e7237db479f643917dcb899d07cf5b4170b5d61942699f
SHA5123e8eb09bcfad0f521ffc62517ebe7a36568e047ffd7d358ea2df947e6f66b90db39976cdd5bcef1007bc2d1ef28205b422d583450f2ded31954690010c72bb68
-
Filesize
39KB
MD57c42f6329537bd5671683809a811850d
SHA1532522018e200e35076d4ae1b33660d1227384d6
SHA256a53e4da354d822e837190439ed08f13703e6bf95b0a3258874167e20537550d4
SHA5121a1260b5fa3686c748ca52672b3fb5e9d4e54d96503d240ed5a5fd4f943818ea5b0783cb7837065d1d5b28c93f0edd3353938f749cb6260978a0745cdca2afec
-
Filesize
72KB
MD58fd49d1e359f6d68d54d8fbdfc84c185
SHA10a813350c8b6218f31a3eb0ac6119acfc998b421
SHA25604f0e6d0ff38aa87d551c493b6eacf36de25de9ce730a6293b2b49ea5824d988
SHA5122cec8aae0e3e9301033b29d1937eeea6d6ce3d018e82e439759c3bf784e8cad4d16adec8abc656159faa85646033b68f53e91d03792256eed659eb57bcbd1e20
-
Filesize
361KB
MD5e3143e8c70427a56dac73a808cba0c79
SHA163556c7ad9e778d5bd9092f834b5cc751e419d16
SHA256b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188
SHA51274e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc
-
Filesize
1.2MB
MD58ef41798df108ce9bd41382c9721b1c9
SHA11e6227635a12039f4d380531b032bf773f0e6de0
SHA256bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740
SHA5124c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b
-
Filesize
1.9MB
MD5bcc0fe2b28edd2da651388f84599059b
SHA144d7756708aafa08730ca9dbdc01091790940a4f
SHA256c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef
SHA5123bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8
-
Filesize
350KB
MD5de69bb29d6a9dfb615a90df3580d63b1
SHA174446b4dcc146ce61e5216bf7efac186adf7849b
SHA256f66f97866433e688acc3e4cd1e6ef14505f81df6b26dd6215e376767f6f954bc
SHA5126e96a510966a4acbca900773d4409720b0771fede37f24431bf0d8b9c611eaa152ba05ee588bb17f796d7b8caaccc10534e7cc1c907c28ddfa54ac4ce3952015
-
Filesize
138KB
MD5dd43356f07fc0ce082db4e2f102747a2
SHA1aa0782732e2d60fa668b0aadbf3447ef70b6a619
SHA256e375b83a3e242212a2ed9478e1f0b8383c1bf1fdfab5a1cf766df740b631afd6
SHA512284d64b99931ed1f2e839a7b19ee8389eefaf6c72bac556468a01f3eb17000252613c01dbae88923e9a02f3c84bcab02296659648fad727123f63d0ac38d258e
-
Filesize
216KB
MD5b808181453b17f3fc1ab153bf11be197
SHA1bce86080b7eb76783940d1ff277e2b46f231efe9
SHA256da00cdfab411f8f535f17258981ec51d1af9b0bfcee3a360cbd0cb6f692dbcdd
SHA512a2d941c6e69972f99707ade5c5325eb50b0ec4c5abf6a189eb11a46606fed8076be44c839d83cf310b67e66471e0ea3f6597857a8e2c7e2a7ad6de60c314f7d3
-
Filesize
6KB
MD56512e89e0cb92514ef24be43f0bf4500
SHA1a039c51f89656d9d5c584f063b2b675a9ff44b8e
SHA2561411e4858412ded195f0e65544a4ec8e8249118b76375050a35c076940826cd0
SHA5129ffb2ff050cce82dbfbbb0e85ab5f976fcd81086b3d8695502c5221c23d14080f0e494a33e0092b4feb2eda12e2130a2f02df3125733c2f5ec31356e92dea00b
-
Filesize
319KB
MD579f1c4c312fdbb9258c2cdde3772271f
SHA1a143434883e4ef2c0190407602b030f5c4fdf96f
SHA256f22a4fa1e8b1b70286ecf07effb15d2184454fa88325ce4c0f31ffadb4bef50a
SHA512b28ed3c063ae3a15cd52e625a860bbb65f6cd38ccad458657a163cd927c74ebf498fb12f1e578e869bcea00c6cd3f47ede10866e34a48c133c5ac26b902ae5d9
-
Filesize
241KB
MD5d34c13128c6c7c93af2000a45196df81
SHA1664c821c9d2ed234aea31d8b4f17d987e4b386f1
SHA256aaf9fb0158bd40ab562a4212c2a795cb40ef6864042dc12f3a2415f2446ba1c7
SHA51291f4e0e795f359b03595b01cbf29188a2a0b52ab9d64eadd8fb8b3508e417b8c7a70be439940975bf5bdf26493ea161aa45025beb83bc95076ed269e82d39689
-
Filesize
1.4MB
MD59043d712208178c33ba8e942834ce457
SHA1e0fa5c730bf127a33348f5d2a5673260ae3719d1
SHA256b7a6eea19188b987dad97b32d774107e9a1beb4f461a654a00197d73f7fad54c
SHA512dd6fa02ab70c58cde75fd4d4714e0ed0df5d3b18f737c68c93dba40c30376cc93957f8eef69fea86041489546ce4239b35a3b5d639472fd54b80f2f7260c8f65
-
Filesize
238KB
MD5ad3b4fae17bcabc254df49f5e76b87a6
SHA11683ff029eebaffdc7a4827827da7bb361c8747e
SHA256e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf
SHA5123d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3
-
Filesize
12.2MB
MD58b7b015c1ea809f5c6ade7269bdc5610
SHA1c67d5d83ca18731d17f79529cfdb3d3dcad36b96
SHA2567fc9c7002b65bc1b33f72e019ed1e82008cc7b8e5b8eaf73fc41a3e6a246980e
SHA512e652913f73326f9d8461ac2a631e1e413719df28c7938b38949c005fda501d9e159554c3e17a0d5826d279bb81efdef394f7fb6ff7289cf296c19e92fd924180
-
Filesize
183B
MD566f09a3993dcae94acfe39d45b553f58
SHA19d09f8e22d464f7021d7f713269b8169aed98682
SHA2567ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7
SHA512c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed
-
Filesize
109KB
MD5f3b2ec58b71ba6793adcc2729e2140b1
SHA1d9e93a33ac617afe326421df4f05882a61e0a4f2
SHA2562d74eb709aea89a181cf8dfcc7e551978889f0d875401a2f1140487407bf18ae
SHA512473edcaba9cb8044e28e30fc502a08a648359b3ed0deba85e559fe76b484fc8db0fc2375f746851623e30be33da035cec1d6038e1fcf4842a2afb6f9cd397495
-
Filesize
187B
MD515c8c4ba1aa574c0c00fd45bb9cce1ab
SHA10dad65a3d4e9080fa29c42aa485c6102d2fa8bc8
SHA256f82338e8e9c746b5d95cd2ccc7bf94dd5de2b9b8982fffddf2118e475de50e15
SHA51252baac63399340427b94bfdeb7a42186d5359ce439c3d775497f347089edfbf72a6637b23bb008ab55b8d4dd3b79a7b2eb7c7ef922ea23d0716d5c3536b359d4
-
Filesize
109KB
MD5e6a20535b636d6402164a8e2d871ef6d
SHA1981cb1fd9361ca58f8985104e00132d1836a8736
SHA256b461c985b53de4f6921d83925b3c2a62de3bbc5b8f9c02eecd27926f0197fae2
SHA51235856a0268ed9d17b1570d5392833ed168c8515d73fac9f150cf63cc1aea61c096aa2e6b3c8e091a1058ba062f9333f6767e323a37dfb6f4fa7e508a2a138a30
-
Filesize
4.5MB
MD5286e21fe9b16b9a64ee74e71e99811da
SHA143e79289b16f250bd35714968a70e5f5644226ba
SHA256aedb7a0066d70da695b89a6533d8cb4bd0a1f578db762dd578c7cdac5865bcc2
SHA5121d43a55bb933a226ee4bc72575efaf0f463b7a0a5c4bbf1d90d18c38e3c5c1a4981a7f11c7459d2fb746bcfec15748eef2a8a02edaf8622ea051a837e9eb79d8
-
Filesize
233B
MD5d57661eb0c959595cd5ef5bce2d7a674
SHA122647c477783fc8f1d50986ffb41e0ad62c8762a
SHA2568883d8587037e3641440e7b0d0583d46f1a8869f1181e76fe4ad065b7fdaa62c
SHA5120277fdf63c00c77271fb173776b2f807821ab6d6d43a6ccf3769525069755640f386276322ea0ea1e9d508c930dc5e50c3218b025b10ceae2ab670cdf4857c09
-
Filesize
288KB
MD5450607d010afc15bc3a88574c1083f29
SHA1d6940905ca17247c5e7aedcd2aef2c2418ff68d2
SHA256b613df944be6894b4563b09f91646d5d9b64943b20f55ba975f82083db456193
SHA512198718f2eab0659943b83924200fb62010bb8bf4137229d58a9a12ac87fc1565cd0c8b3df1ade500ffdd13cfc8b58bd674dc1b1fa91a4bf6e6ef02230e703989
-
Filesize
1KB
MD50c537a0f77f299315fe430df0dfdc399
SHA1065e3237839f1ebd9f427af73dc0502b56d717c1
SHA2560ed81b6a3507e2ea087cd92494a43ae25bee30c345842836d982db6cba1a8aa5
SHA512d9bc93f314ab123e0cc413ae44babf3adf022438c3d45047fe0db73c40530bddc2f4bdb191d7e550c059adb22b0df8119548ee8c48bb449f595e3d47eaa7b65c
-
Filesize
134B
MD558d3ca1189df439d0538a75912496bcf
SHA199af5b6a006a6929cc08744d1b54e3623fec2f36
SHA256a946db31a6a985bdb64ea9f403294b479571ca3c22215742bdc26ea1cf123437
SHA512afd7f140e89472d4827156ec1c48da488b0d06daaa737351c7bec6bc12edfc4443460c4ac169287350934ca66fb2f883347ed8084c62caf9f883a736243194a2
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
160B
MD5c3911ceb35539db42e5654bdd60ac956
SHA171be0751e5fc583b119730dbceb2c723f2389f6c
SHA25631952875f8bb2e71f49231c95349945ffc0c1dd975f06309a0d138f002cfd23d
SHA512d8b2c7c5b7105a6f0c4bc9c79c05b1202bc8deb90e60a037fec59429c04fc688a745ee1a0d06a8311466b4d14e2921dfb4476104432178c01df1e99deb48b331
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
80B
MD59e72659142381870c3c7dfe447d0e58e
SHA1ba27ed169d5af065dabde081179476beb7e11de2
SHA25672bab493c5583527591dd6599b3c902bade214399309b0d610907e33275b8dc2
SHA512b887eb30c09fa3c87945b83d8dbddceee286011a1582c10b5b3cc7a4731b7fa7cb3689cb61bfead385c95902cab397d0aa26bc26086d17ce414a4f40f0e16a01
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1