Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
594s -
max time network
635s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/03/2025, 20:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Mezantrop74/Redlinestealer2020
Resource
win11-20250217-en
Errors
General
-
Target
https://github.com/Mezantrop74/Redlinestealer2020
Malware Config
Extracted
lokibot
http://blesblochem.com/two/gates1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Lokibot family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\system.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\Desktop\\Ransomware\\Annabelle.exe" Annabelle.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" Annabelle.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Annabelle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" Annabelle.exe -
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Annabelle.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (222) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Annabelle.exe Set value (int) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Annabelle.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chkdsk.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\recoverydrive.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gpedit.msc\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Autoruns64.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bcdedit.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpg4dmod.dll\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webcheck.dll\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\yandex.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bcdedit.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\url.dll Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Autoruns.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmplayer.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmplayer.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\usbui.dll Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\usbui.dll\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\recoverydrive.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cabinet.dll\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DCIMAN32.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\control.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UserAccountControlSettings.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Autoruns64.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dllhost.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mydocs.dll\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\systemexplorer.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\control.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCuiL.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspaint.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rasman.dll Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Autoruns.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\systemexplorer.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cabinet.dll Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webcheck.dll Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad++.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad++.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chkdsk.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DCIMAN32.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ksuser.dll\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mydocs.dll Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\microsoftedgecp.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpg4dmod.dll Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logoff.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gpedit.msc Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UserAccountControlSettings.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dllhost.exe Annabelle.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2416 NetSh.exe 53804 NetSh.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LOGON.exe DeriaLock.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CoronaVirus.exe CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini CoronaVirus.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-09D87590.[[email protected]].ncov CoronaVirus.exe -
Executes dropped EXE 3 IoCs
pid Process 1792 system.exe 1944 {34184A33-0407-212E-3320-09040709E2C2}.exe 2360 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\MinimalX = "1" Annabelle.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/2416-1308-0x0000000001550000-0x0000000001564000-memory.dmp agile_net -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Lokibot.exe Key opened \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Lokibot.exe Key opened \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Lokibot.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Local\\system.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UpdateBackup = "C:\\Users\\Admin\\Desktop\\Ransomware\\Annabelle.exe" Annabelle.exe Set value (str) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Windows\CurrentVersion\Run\UpdateBackup = "C:\\Users\\Admin\\Desktop\\Ransomware\\Annabelle.exe" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UpdateBackup = "C:\\Users\\Admin\\Desktop\\Ransomware\\Annabelle.exe" Annabelle.exe Set value (str) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CoronaVirus.exe = "C:\\Windows\\System32\\CoronaVirus.exe" CoronaVirus.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini CoronaVirus.exe File opened for modification C:\Program Files\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Pictures\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Music\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Links\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Libraries\desktop.ini CoronaVirus.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3517169085-2802914951-552339849-1000\desktop.ini CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Downloads\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Documents\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Videos\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Videos\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini CoronaVirus.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3517169085-2802914951-552339849-1000\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Desktop\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Documents\desktop.ini CoronaVirus.exe File opened for modification C:\Program Files (x86)\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini CoronaVirus.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 camo.githubusercontent.com 2 camo.githubusercontent.com -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\CoronaVirus.exe CoronaVirus.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Control Panel\Desktop\Wallpaper = "0" $uckyLocker.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2416 set thread context of 4740 2416 Lokibot.exe 131 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\uninstall\shortcuts_log.ini CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-white\HxAccountsStoreLogo.scale-100.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_12104.1001.1.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreSplashScreen.scale-100.png CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_KMS_Client_AE-ul-oob.xrm-ms.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\ShapeCollector.exe.mui CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\AppPackageWideTile.scale-100_contrast-black.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\contrast-black\MicrosoftLogo.scale-200.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-amd\DatePicker.js CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\rhp_world_icon_2x.png CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\text_2x.png.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\Accessibility.dll.id-09D87590.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\MS.GIF.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib\components\DocumentCard\DocumentCardLogo.base.js CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\UIAutomationClient.resources.dll CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.32731.0_x64__8wekyb3d8bbwe\Assets\AppList.scale-100.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsNotepad_10.2102.13.0_x64__8wekyb3d8bbwe\Assets\NotepadMedTile.scale-150.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\Images\SplashScreen.scale-125_contrast-white.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-amd\Keytips.js CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\jfr\profile.jfc CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_KMS_ClientC2R-ul-oob.xrm-ms.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.MicrosoftSolitaireCollection_4.6.3102.0_neutral_split.scale-125_8wekyb3d8bbwe\Win10\MicrosoftSolitaireStoreLogo.scale-125.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2020.503.58.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\CameraSplashScreen.scale-200.png CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\tr\PresentationCore.resources.dll CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.targetsize-20_altform-unplated_contrast-white.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2020.503.58.0_x64__8wekyb3d8bbwe\Assets\contrast-black\CameraAppList.targetsize-24.png CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-time-l1-1-0.dll CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\UIAutomationClientSideProviders.resources.dll CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\UIAutomationProvider.resources.dll CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\UIAutomationTypes.resources.dll.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.2103.1172.0_x64__8wekyb3d8bbwe\Assets\video.png CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_OEM_Perp-ul-phn.xrm-ms.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2020.503.58.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\CameraStoreLogo.scale-200.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-white\Doughboy.scale-100.png CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\edit-pdf-2x.png.id-09D87590.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Excel.ReportingServices.DataExtensions.dll.id-09D87590.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Office16\Microsoft.Office.PolicyTips.dll.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Threading.Timer.dll.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.2012.21.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.scale-200_contrast-white.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\Images\LockScreenLogo.scale-100_contrast-white.png CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\close_dark.svg.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Retail-ul-oob.xrm-ms.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Trial-ul-oob.xrm-ms CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Client.Excel.EditorRibbon.dll CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\trdtv2r41.xsl.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_KMS_Client_AE-ul.xrm-ms.id-09D87590.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Java\jre-1.8\bin\prism_d3d.dll.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\ar_get.svg CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-white_scale-180.png CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\System.Windows.Forms.Design.resources.dll.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1909.12456.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\PeopleWideTile.scale-100.png CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\client-issuance-stil.xrm-ms CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected].[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Runtime.Loader.dll.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Advanced-Dark.scale-200.png CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\download.svg.id-09D87590.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\VideoLAN\VLC\lua\http\dialogs\offset_window.html.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019MSDNR_Retail-ppd.xrm-ms CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\GRAPH_K_COL.HXK.id-09D87590.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1909.12456.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-36_altform-lightunplated.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\theme\lib-amd\createTheme.js CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\theme\node_modules\@uifabric\set-version\lib\setVersion.js CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\pkcs11wrapper.md.id-09D87590.[[email protected]].ncov CoronaVirus.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh NetSh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh NetSh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh NetSh.exe -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $uckyLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DeriaLock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCHTASKS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lokibot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lokibot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ev3n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CoronaVirus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 3 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4544 vssadmin.exe 1584 vssadmin.exe 3296 vssadmin.exe 53788 vssadmin.exe 53780 vssadmin.exe 53796 vssadmin.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\system.exe\:Zone.Identifier:$DATA 7ev3n.exe File created C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe\:Zone.Identifier:$DATA CryptoLocker.exe File opened for modification C:\Users\Admin\Downloads\The-MALWARE-Repo-master.zip:Zone.Identifier msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1020 SCHTASKS.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2216 vlc.exe 4260 vlc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 2752 identity_helper.exe 2752 identity_helper.exe 2448 msedge.exe 2448 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 3656 msedge.exe 3656 msedge.exe 2416 Lokibot.exe 2416 Lokibot.exe 2416 Lokibot.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe 3996 CoronaVirus.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2216 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2416 Lokibot.exe Token: SeDebugPrivilege 4740 Lokibot.exe Token: SeBackupPrivilege 4924 vssvc.exe Token: SeRestorePrivilege 4924 vssvc.exe Token: SeAuditPrivilege 4924 vssvc.exe Token: SeDebugPrivilege 2128 DeriaLock.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 2216 vlc.exe 4260 vlc.exe 4260 vlc.exe 4260 vlc.exe 4260 vlc.exe 4260 vlc.exe 4260 vlc.exe 4260 vlc.exe 4260 vlc.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2216 vlc.exe 4260 vlc.exe 1560 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4864 wrote to memory of 3740 4864 msedge.exe 81 PID 4864 wrote to memory of 3740 4864 msedge.exe 81 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4444 4864 msedge.exe 82 PID 4864 wrote to memory of 4376 4864 msedge.exe 83 PID 4864 wrote to memory of 4376 4864 msedge.exe 83 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 PID 4864 wrote to memory of 5100 4864 msedge.exe 84 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Lokibot.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Lokibot.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Mezantrop74/Redlinestealer20201⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0x48,0x10c,0x7ffacbc53cb8,0x7ffacbc53cc8,0x7ffacbc53cd82⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:82⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2508 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3724 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2100 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6460 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1408 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6580 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6208 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,10173767047785488620,14161939652224847612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:4288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4304
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:872
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\ReceiveUpdate.m4a"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2216
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\EnterCopy.snd"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4260
-
C:\Users\Admin\Desktop\Stealer\Lokibot.exe"C:\Users\Admin\Desktop\Stealer\Lokibot.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416 -
C:\Users\Admin\Desktop\Stealer\Lokibot.exe"C:\Users\Admin\Desktop\Stealer\Lokibot.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4740
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1560
-
C:\Users\Admin\Desktop\Ransomware\$uckyLocker.exe"C:\Users\Admin\Desktop\Ransomware\$uckyLocker.exe"1⤵
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:3060
-
C:\Users\Admin\Desktop\Ransomware\7ev3n.exe"C:\Users\Admin\Desktop\Ransomware\7ev3n.exe"1⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2908 -
C:\Users\Admin\AppData\Local\system.exe"C:\Users\Admin\AppData\Local\system.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat3⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Windows\SysWOW64\SCHTASKS.exeC:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1020
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:4352 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:644⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:3816
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:3256 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:644⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2652
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2088
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:4752 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:1748
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:643⤵
- System Location Discovery: System Language Discovery
PID:3388 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:644⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:4220
-
-
-
-
C:\Users\Admin\Desktop\Ransomware\Annabelle.exe"C:\Users\Admin\Desktop\Ransomware\Annabelle.exe"1⤵
- Modifies WinLogon for persistence
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Disables RegEdit via registry modification
- Event Triggered Execution: Image File Execution Options Injection
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
PID:3924 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:4544
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:3296
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1584
-
-
C:\Windows\SYSTEM32\NetSh.exeNetSh Advfirewall set allprofiles state off2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2416
-
-
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" -r -t 00 -f2⤵PID:54076
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
C:\Users\Admin\Desktop\Ransomware\CoronaVirus.exe"C:\Users\Admin\Desktop\Ransomware\CoronaVirus.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3996 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:52696
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵PID:52768
-
-
C:\Users\Admin\Desktop\Ransomware\CryptoLocker.exe"C:\Users\Admin\Desktop\Ransomware\CryptoLocker.exe"1⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:5040 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Desktop\Ransomware\CryptoLocker.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000002343⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2360
-
-
-
C:\Users\Admin\Desktop\Ransomware\DeriaLock.exe"C:\Users\Admin\Desktop\Ransomware\DeriaLock.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
C:\Users\Admin\Desktop\Ransomware\Dharma.exe"C:\Users\Admin\Desktop\Ransomware\Dharma.exe"1⤵PID:37060
-
C:\Users\Admin\Desktop\Ransomware\ac\nc123.exe"C:\Users\Admin\Desktop\Ransomware\ac\nc123.exe"2⤵PID:52816
-
-
C:\Users\Admin\Desktop\Ransomware\ac\mssql.exe"C:\Users\Admin\Desktop\Ransomware\ac\mssql.exe"2⤵PID:53252
-
-
C:\Users\Admin\Desktop\Ransomware\ac\mssql2.exe"C:\Users\Admin\Desktop\Ransomware\ac\mssql2.exe"2⤵PID:53428
-
-
C:\Users\Admin\Desktop\Ransomware\Dharma.exe"C:\Users\Admin\Desktop\Ransomware\Dharma.exe"1⤵PID:52156
-
C:\Users\Admin\Desktop\Ransomware\ac\nc123.exe"C:\Users\Admin\Desktop\Ransomware\ac\nc123.exe"2⤵PID:52716
-
-
C:\Users\Admin\Desktop\Ransomware\ac\mssql.exe"C:\Users\Admin\Desktop\Ransomware\ac\mssql.exe"2⤵PID:52756
-
-
C:\Users\Admin\Desktop\Ransomware\ac\mssql2.exe"C:\Users\Admin\Desktop\Ransomware\ac\mssql2.exe"2⤵PID:53324
-
-
C:\Users\Admin\Desktop\Ransomware\Annabelle.exeC:\Users\Admin\Desktop\Ransomware\Annabelle.exe1⤵PID:53572
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:53780
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:53788
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:53796
-
-
C:\Windows\system32\NetSh.exeNetSh Advfirewall set allprofiles state off2⤵
- Modifies Windows Firewall
PID:53804
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa398c055 /state1:0x41c64e6d1⤵PID:54176
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems64.dll.id-09D87590.[[email protected]].ncov
Filesize3.2MB
MD59185524501fe489469bedaecb8f60917
SHA1d5414465c9b4a30279289bd1f10bf1d5da0f36e5
SHA2566f6c07bb342c9810511b879de1ab945af401327266dd93a0b91f1231c171923a
SHA512097141b377a7480f10ccc6bed0d206150a17dd16b8e5054231dfb95015243c4fa68ba7fd993fb98886e044224db541271a07f57b64d9ca84dad0773162d234ab
-
Filesize
152B
MD50517a9ec1a0298a87dac0ad50c998d79
SHA1c01cab2a1ffb6180134315d827709b46d07018ea
SHA256084f62f24d15ce30e231b1690497a004070932b3618e06d6b26079a489f689a5
SHA512d9be6c0e55a74137b1e6dc882b0e665cb6c18fe80ff585cccff0bd4fc32923b155b62000492613c861b3f0cbfa8996dac7ca12d66fcf06d1b1d0e57294dee84d
-
Filesize
152B
MD5236fd72d944b494ed36178d8c80baa40
SHA1affaef8eea7ac675dfccc68528f9cc828906d209
SHA256c84f8f8ff1471655a154db4ba294d245cdcee376bd482f7b433b42f28d4f0184
SHA5126db4bcd8f81de26f8d5a350019f45be7fe00c3531efbc2cf8e96c696b4e75acc81514fbe10c02410895fa318ec1d2c0bfec429da97451d32d9b0a8c340b2894b
-
Filesize
21KB
MD51930bf2d057af4d2d7c6556ee866cd81
SHA192425d90d77efe4fb2152dfa6e0928c915c3addc
SHA256d67a7783eb75bca4e06722752196f4df2a8fca5e33ab4130026c504c892af961
SHA512027c0de20bbd3adfe51d7195570a1c3e07796c4fda5c9d8e512a421f7830037aab0bc4e60003e32f17487a5bc03d1d50b635c6b47138e767b79e9ae3e3373b76
-
Filesize
38KB
MD5adf2df4a8072227a229a3f8cf81dc9df
SHA148b588df27e0a83fa3c56d97d68700170a58bd36
SHA2562fd56ac4d62fec83843c83054e5548834a19001c077cdb224901237f2e2c0e4c
SHA512d18ffc9a41157ea96014a503640b3a2a3931f578293e88cc05aa61c8223221d948c05637875d8e3ee5847b6a99341ea22b6a1aee67c170e27bde5e154cf1b9ca
-
Filesize
21KB
MD58e01662903be9168b6c368070e422741
SHA152d65becbc262c5599e90c3b50d5a0d0ce5de848
SHA256ed502facbeb0931f103750cd14ac1eeef4d255ae7e84d95579f710a0564e017a
SHA51242b810c5f1264f7f7937e4301ebd69d3fd05cd8a6f87883b054df28e7430966c033bab6eaee261a09fb8908d724ca2ff79ca10d9a51bd67bd26814f68bcbdb76
-
Filesize
37KB
MD5a565ccff6135e8e99abe4ad671f4d3d6
SHA1f79a78a29fbcc81bfae7ce0a46004af6ed392225
SHA256a17516d251532620c2fd884c19b136eb3f5510d1bf8b5f51e1b3a90930eb1a63
SHA512e1768c90e74c37425abc324b1901471636ac011d7d1a6dc8e56098d2284c7bf463143116bb95389f591917b68f8375cfb1ce61ba3c1de36a5794051e89a692d8
-
Filesize
26KB
MD5398c110293d50515b14f6794507f6214
SHA14b1ef486ca6946848cb4bf90a3269eb3ee9c53bc
SHA25604d4526dc9caa8dd4ad4b0711e929a91a3b6c07bf4a3d814e0fafeb00acc9715
SHA5121b0f7eb26d720fbb28772915aa5318a1103d55d167bec169e62b25aa4ff59610558cf2f3947539886255f0fa919349b082158627dd87f68a81abac64ba038f5d
-
Filesize
18KB
MD58bd66dfc42a1353c5e996cd88dc1501f
SHA1dc779a25ab37913f3198eb6f8c4d89e2a05635a6
SHA256ef8772f5b2cf54057e1cfb7cb2e61f09cbd20db5ee307133caf517831a5df839
SHA512203a46b2d09da788614b86480d81769011c7d42e833fa33a19e99c86a987a3bd8755b89906b9fd0497a80a5cf27f1c5e795a66fe3d1c4a921667ec745ccf22f6
-
Filesize
18KB
MD5217be7c2c2b94d492f2727a84a76a6cf
SHA110fd73eb330361e134f3f2c47ba0680e36c243c5
SHA256b1641bab948ab5db030ec878e3aa76a0a94fd3a03b67f8e4ac7c53f8f4209df0
SHA512b08ea76e5b6c4c32e081ca84f46dc1b748c33c1830c2ba11cfeb2932a9d43fbb48c4006da53f5aac264768a9eb32a408f49b8b83932d6c8694d44a1464210158
-
Filesize
16KB
MD5dde035d148d344c412bd7ba8016cf9c6
SHA1fb923138d1cde1f7876d03ca9d30d1accbcf6f34
SHA256bcff459088f46809fba3c1d46ee97b79675c44f589293d1d661192cf41c05da9
SHA51287843b8eb37be13e746eb05583441cb4a6e16c3d199788c457672e29fdadc501fc25245095b73cf7712e611f5ff40b37e27fca5ec3fa9eb26d94c546af8b2bc0
-
Filesize
60KB
MD580ececc1294d34fe3288ffef1cb694fb
SHA1c6a10deccbbd0bac69715bf1d1a19fd447671c59
SHA256dcfac6747a1caba216a8edfcfcc7581131866b6eab02fe82064cc3b97e6c56a5
SHA5121470098136343f624191d690f45b71dc60c7a55260bd03d0c335603838b7983f6640c60636fe6763abb3d7af9f68600ef60da3ef55aa47635d33ac82295e956b
-
Filesize
55KB
MD592e42e747b8ca4fc0482f2d337598e72
SHA1671d883f0ea3ead2f8951dc915dacea6ec7b7feb
SHA25618f8f1914e86317d047fd704432fa4d293c2e93aec821d54efdd9a0d8b639733
SHA512d544fbc039213b3aa6ed40072ce7ccd6e84701dca7a5d0b74dc5a6bfb847063996dfea1915a089f2188f3f68b35b75d83d77856fa3a3b56b7fc661fc49126627
-
Filesize
44KB
MD5539ef33992c75ab3e44b2674e19d44fd
SHA12411aae91e8c809cb527b65a74423e14bb740376
SHA256ebd2825013cbbf37c2994a9f7a8a6b3ee21628c652b8338ddfb4ab15865e6a3b
SHA5123941547b58e09bd03727f1dd761fcd322901b93100fb3772298b1e78b00458ba43a2f5716099d5537ceaa866a40b82b175a4cd74199ff6e841cc67cca268728a
-
Filesize
87KB
MD565b0f915e780d51aa0bca6313a034f32
SHA13dd3659cfd5d3fe3adc95e447a0d23c214a3f580
SHA25627f0d8282b7347ae6cd6d5a980d70020b68cace0fbe53ad32048f314a86d4f16
SHA512e5af841fd4266710d181a114a10585428c1572eb0cd4538be765f9f76019a1f3ea20e594a7ee384d219a30a1d958c482f5b1920551235941eec1bcacd01e4b6f
-
Filesize
109KB
MD507a241480e6cb8e8850e10c26896ef76
SHA155c55b15bf17b9df7c18223819a57794fd6483b3
SHA256ef3c1a0c63d71600ee199a2d493767db0f867d3e632362790ecf520011cb5d78
SHA512a693d4736408d68907484a0b8c52118000213b262115a13dedcd3197fabf4ebb686a2005b6f10428760abcf8e7689ef04f929447d0a4e59d22e97ba5a2ee3c52
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5b695aa88571a165de0db673a37fd994e
SHA1fcb6f734cbbe2c9fa2039d10af5d5a8ac26edc18
SHA256bf90a105d8b53953d43ada94e8940c9bfaee335bc71153a503e4fd3d8f30efc7
SHA5123fb9eac44cf23c8754b4bb8f7f130f7644b46f6906c8c70fdbb44c41e5d987e86a6fd6c935a47ab85c9851bb7741c1772a49ab21485c89dfabc625045a8f4e80
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5a5d5e7b81151f285c4f5ed849fb332c1
SHA18473e202e8e71e0427ad6b2927607151a76f714e
SHA2560de232dab4d43e5195b756232d47cc9ab928c594e28a7274da9518b0f12b74ef
SHA512427b2f0384319bc755aa8b5459c9d2c3ef6ab01f027f48c421043e6fae7bad6a2854a8f93bd2658e5c2aa286b7a1daf65079f10cc145e26c9ce30af632f53c41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD59fbde481553f5586e592ddb6ce0b272e
SHA1cdb0a9859639f2f1eb4d7953e46be8d95f5b3325
SHA25689c926e3f4d2c6ef67ee29de62429c37bcef51d96fae3357e5387633c4a24ee6
SHA512f8d4bb50b6c8e93a3d7de1772b6e8c5dabb4911060abb84364ec1976265665fb5a1e570d781a89f2f67fc0738339bd1046e75a97fe9a08ec1c01b26e7eaae31b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD51747656e7865cf15b8fd6bb15c006eb2
SHA179a3e32e47d6cff9e1fec3efb9a540decdc6de81
SHA256dea2a57031b1e4c9a2b024eb6299e2aaaf2c7137f04573c710c7f36d7a81ae19
SHA512c50ec66bcd27050c4490fa66380d4e7e76bffce39eef080ba3148b9dfc8e92414b1c349a4bb33ec6ebe347744d308053093310821515c29bc700ec4074717b22
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD546d091b39ad290f8000fec1cbfb91720
SHA1c15578ac05ceff5d166bce395e942e5602921393
SHA2566b456c5b5ba0c0d141b54497b539141bbcdcbd8364b90a5f6a63434f6d327fef
SHA512dbc40ba80b8c52501bb0f76465da79109043da7f4ebde4265c52012a9919fabb904e00a8f490f25998bac2aba66d297660a9493768765fb337ad58a6285fe924
-
Filesize
650B
MD5fc7dbc97a7b7af8c36afbdb2b21d62f2
SHA1c5326f83b6abf2d79835edaebeb888a636a171e8
SHA256ffa092d2a231ded48c4abab22c690718ffe7cd44d5fb18a67e953bc2878e1723
SHA5122734cfd4fd5c4bdc1b9576d93dbb749476a6f212a33ea4520eccfa80a284f7f08cff61a0bd5c3387e0d68cdaca21fdacea8a3623c0ddc67633f7bd87ec6b11b7
-
Filesize
1KB
MD5fb602dd79c88af468f3f49d7225fe7f4
SHA194dfac40812ee998189eb4fa62f856787f7b621c
SHA256ca4cc366ba7e778fc9152d4173be3107e7040b005e6aa217839335d245413ae1
SHA512f58fd49cde77e0d655b4189b8c53c15b715f1bd41660af68bf4c4d8b8e71c31130e74f0e6f01ecf43a64987a63cd07b336c0bf5911e21a458d42cd551ecf80aa
-
Filesize
580B
MD5de6bfbc5ed570c7dd0b5c39ca55b45a2
SHA1f3bd188f5f10a984867ee2863f0d9d5a212c548a
SHA2560528be9334e1a684ba41b219a5ebb5ab6b63d7e5d4ef2ce7b19844dd28a18bfa
SHA5125087d65c96211a9edf34d8a12b46f0e2454d09b1398d2a371c1347ec00c8e6c1a7e568c453b346f5323ad29973fef709846bbb574ac8a9b8be841df1a717fdde
-
Filesize
1KB
MD51d64a9b28939f0e2e1f4d1b9720719b9
SHA152a4bfa308e879f2f08d6f48a6424e0add5a3438
SHA2562bf76f2ae6f20e8c3e112faf4f1d0532419a22332d190c2854ac6c87edbd417e
SHA5127373c34a002c713542e6941782bc272744604eacdfb1e4966b4243d56226fc3c982f6ce09db518b327f2129967e29c37fe90f562b548d138258efc5e4572ac30
-
Filesize
1KB
MD5a41ae127ba0cc1bc0717b2b50144a5ff
SHA1e5fa347b96974b7a47a02a6e64ed0441663f6159
SHA2561e424a0c425e3c99ddba45b57d0b6812c0e8f555b07f00c4e88bbfc5e38e61d3
SHA512e3cc4da01dd20c6caf896266ce3dde6f7f5aa5d795e429db9c3715c6392c1321521d627d3ba5ef723de5bae8ae08dcdb63ae591e2c37b6dbaa0182754b271863
-
Filesize
5KB
MD5b87eed35d0ab7c1dc80bfc2f45b5999d
SHA1b10088afe1e00a915d366b17fab28432831bc6bc
SHA2566e5e7923a09aa9a657024d1a27d05c0f0aff8125a7c2c4f4a102316cbd93eb3a
SHA512d52baf1d5f89da389b68b42ea8f33cad942b3158862ae5809ffeaee57f062af3fbe9b4258ca1b5ff442dc3dfdb4954e1d5fbaa95b12c540c47572135cdec25c7
-
Filesize
6KB
MD5b277d755279bf28f90ffa7a85698bf8b
SHA1b1a7ad710a7aaef9bd3f247174f1c060ce61bf62
SHA256e9b97546a8c6fe3d4389964fbcbc7c553300012b607a1e1a342c28421cd5cf09
SHA512496aa9c0c0cd21d5e6782efd241aa4cc3ecdffe85abfddcd9f14fed5ea136ea7908a2a2b067b35eea4e7e573ec29fc7736ec26c2d3516da38b9259aa1d087f14
-
Filesize
7KB
MD508d40fab134068127072b60b7cfa1954
SHA1fdd7b16a1bde5c84566365386d27f2146721b749
SHA256ee7a7d4dfa5130c3defb751f02428fbe90cbce9d5f9300dbde1336b09b0aec92
SHA5128008a4779d6c4e5de2d037ea7a996dc168c37fb3c8a38c4950529bc9ce5c0c34fc0efa575189f90b8e2d66cfa155a39b2b2189ad4d0a665892c2c3f86ce47c5f
-
Filesize
6KB
MD517fbec0a26ef8d1c6025b7c52abd4192
SHA122224d7c04c171e5e8d04269e93c19c286c8fad9
SHA256cae38deebb076d03bdddc743f2b3ee4f05d3f2ea63e481acbb9bb2f0b4e3e8d2
SHA5121878bcb3db70f48ba59e251f61c14c9f879911d54f2aa6070ecbfc069daeea2202a85ff2223ad7b6184308d1f3ab7ed89cf0ec83be4a7dc72f7bdc44ae159a89
-
Filesize
6KB
MD550b4d97d77eda56a0e9f6e21d613efb0
SHA18b2c74ce40d45573c4bb68fdf27b5037bedd08ad
SHA25687d2be26d67a947b8daf74e9d2f3083b875af1ef76bcf45e4a6ef101a85aafb4
SHA51210639e6177720034e2c08234dd5060d289bc7764de7a75f4a800f66b50d9f0f9f7cf9a4ea7cbd153d79bdae08ffc2df82c2d99476258317fc83010477599c612
-
Filesize
6KB
MD5c84da4dec29326beb480995808e4285f
SHA1e7a1d379f45a3f54f207ce0e1d7f856bb72f88f8
SHA256d513453ea53201c93d730f6ba0685b8fddc77b5e076838dcc82c68653cf68e66
SHA51216c7304dd00f1d462a41b065e4b18d1c0d6f433cbe8e2c5a9028297bb587de069e9913a0f4232a20613498f1b4baacc1199942ad259e7365d9043f2c22ba6d48
-
Filesize
7KB
MD50c08d6d31c058c557766b085f83230d8
SHA1762d7a61fabd2c2ce2e8d610d491c116c8bdfb7e
SHA256945fd1642f428948249fb6c256fa9388198a5f86198d6ecbf31ac2d52c664d6f
SHA5128f0c968db7e6302f7540456e8ca617b5cc81fab7107ac8652650025d60514997f875a7fdec6bbb281785fcd601b1c83b6ee2aeeb0064159d255f20876e6b133e
-
Filesize
6KB
MD5dc22af33753328fe0e5657f781d1a64a
SHA18dfd623174c635a040435c228bdef18e9c8298d1
SHA256ea7906c650ac1bb0794b51a21cd4f3b98563bbfc6fc8769031e6921c6151b1f1
SHA5122c1b4984ef4496ca9ce15d9e3c2f898e8e32652d5eb131384e5286a8aa7e56bc5fdefacc3b2d800c611d5804542dae456a92929baf11879c875b41919c2bc075
-
Filesize
1KB
MD5135804faed14eabf74ae306c16bfbfc7
SHA129765971c4298535c5d387e31ab5e363ba79f748
SHA2563c37a0b50f262e5ba5ee7613aa376ec4a09315ab04a03cd8a07b87b08c60dd1f
SHA51205630a73908ae4ec371bda2f70e4c34d3c55dc7c343b4b61957a2e5a7053076df1c18720f3f11c43c03c101a140df4d55e62f9d48bb9cc80eb0511d612205462
-
Filesize
1KB
MD50a5ad87afe87224dba8e3fed51c57377
SHA17348b9f367e5f6d9ad47aa6198c738ff7f4bd3a4
SHA256712653742243d2a5f98bef4079fded5321cc6bf15e788fec79dff89b2d7c716e
SHA512e3a08dfef087ec45d5e9b710d5097a35043e665f9832443b335f16a4c85cfcf8c46edfd36c802f9f5ee75ab486606876f9768b6b0bfed107ade5ae08f43822e4
-
Filesize
1KB
MD5d1185f0015f28309c6ea32662ca3191f
SHA116c06bc952e3b6d08944240c81bcbcb8159c39e2
SHA256dcc2c04d5fd1d39f0fd766a174b1fe6f9a1e41376bf004a2902e9853931d0741
SHA512fcae67f0c1eed0afd6af403f4c565a492500cfc3cc5f81e6f94a7f46bc1f3ca662ff5d9bba1ebf4082bcaa71003b03344c2ae37750c4b3add158a97f52917377
-
Filesize
1KB
MD5dde0741d2a7343f97ac21e4c3f0d819a
SHA1e7073a80c4a803e5dc6e284caf2587ebd5c82458
SHA2564a6b25aa279946c723d620547cbf2c79dd41e218f2c805411dadee707c606f33
SHA512979e9b03bd9378a422263851f1b99d5f041f9eb1f78ab6ded79acbf01615c0b039d0902d3303271dacfa04049aa9ab8d4e9b46bdf521627da0013d55caf48d99
-
Filesize
1KB
MD5ac3a33dd2309f3d771b8b844acf4ba07
SHA11e0ab86ad7a0da724369a0b0ed5a1e7a1b8150f2
SHA2564732e78883cfd146d67a85286be5a64f2f0e65dd3cd8dc2d1a230765127ae8c4
SHA5129ef59435863bff7120f0f842c23b31d508ac545bff98ac1a6ccb3fad8d27da3264531fe6bb4e3bf301c9f6298b22bbe724f38a3b3c1f42dde8690835eafab94b
-
Filesize
1KB
MD56f2abb6c24f05de0c373f8b39e2057f3
SHA1ffa0471098f49c848403cd2e402fa24092ab3c24
SHA256630e8dc229a4f92a7a3020b5115970def824e23cbf2875d44f2a714770d71b75
SHA51244d8689d414f67faf112a80b041fdc8c5ff22fa60d54a94c820aa6a10534f62950c4e2e4061126507d2ece69f9c1187d9cc5c70224512a1b8afa4a80350ef73b
-
Filesize
1KB
MD5f96b98e73f376f9574f506b5cca1eb48
SHA1955f072294976fda9f98539c1b9a04a465de3d95
SHA2566c32e65cc5d168735b8a96c7ca8237fb09c572771635d241e23e4ba458b52842
SHA512e1a20f9cf8f8280ddda75f2160c3f7e5f2944f4b2b148b2689a72a1963f732ab119be97e6995772de85902057cc69239d589f73fc272b9b944635d1f2bd8fda5
-
Filesize
1KB
MD579c40fceebcc09af1d17334afdcae38a
SHA178f5061d4bc832b2a2cb16163fda778372e49944
SHA2569bdf53b773d05785da70fe426937f7b2b4575d7fad2f59f81c240efe856f155e
SHA5128cf5a6acbccd6367bb5509f3dbc88db8cc6db810c362e06d2ff6caf54b6a2aec76dcf82d07428654696b511e3ba5f9a4620b1fd199aa3f2a4c15da0f96f05bc8
-
Filesize
1KB
MD5ec958cff184c5476bf08a1a971012d0e
SHA188f657e2e2d444090ddc3243f754b6468c302039
SHA2569d116b810e47f960b0c77527b8c68e15c4a89d6127859b8ca805cd898de325f2
SHA512dc65f5162ed0db2df809d804f561d34e81968c719390a60623638ac1c0078d8a9d82d6e93bb48b0bd6ef94c4aeb4bfe08e0ccecaaae2978deede16a613ae2257
-
Filesize
1KB
MD5053d92e279627a6e3b69a8c03b812d94
SHA14feed4961032b26d44561306c037b281a6c07f6a
SHA256b76cd4a583420a58543fdcdd67a71ee9847d4237f852234dede72f8ba81becbd
SHA512c5e420c456dc0619a3294fdc90caa8be61af4acb788280bfb6fde63f9c3a4e5b24f025e23ad7c6cbb04fcd4dffc59160664aa1fa504069167f3f28b536af3b79
-
Filesize
1KB
MD5856058831cf1cc199adb4457577f41d2
SHA17b785d20dc8e7853d89c66208243064d4e318716
SHA256dcbb8c0d388852737622d9867730e952d3f7522b93f0e8ee9b6fce5b301178a8
SHA5123f8e82dfd31ae988c1f53099056eaf952d6ba2e716039f1add2f92a1999a566c23004b9f8205641866b1953c920a2a2f50252c906d8f30033e6822eef434c462
-
Filesize
1KB
MD53ca460797320d290a1b7241381655ac7
SHA1d6ee71276767f5c151514e6826bafc38636afd50
SHA256a4d37af7bd3dc604c331f5a1947bde20529f93a04f9e615ddb9e274c51d1d332
SHA51270e9b50450735d6d04c58bb84bd2550dc52f8bdc9c2d06b6a702b0abf6653369224b0437e96a3e9f5afe08c2929f1c055e7912faefa12698dfbf196868568744
-
Filesize
1KB
MD540f06a9207aa9be4b90de8f04fa71881
SHA13564a3b34fb9b96dfb2acead48a21e6fcf1b63d4
SHA256a5b8a75588f006a3368fc40453779b501afe96f37abd1cfdfcaf443b99ea10fc
SHA512379e975da0de00499f32f1437554de7f5fb8c1dc770c6f4596cf211afc5c52759a4337febf11ab5521b3119bd2bd00fdae5c19af2407adc72816534a00455af3
-
Filesize
1KB
MD50cca499e09c33986a390aaab573fbf87
SHA118d5863cfe40eb6e00dd9630e19a7cc0c4baf869
SHA256e802547de0ed9a12a002066bf2f80406a88b50d8122b452fea7836f879942a6b
SHA51284073a3e2cdeea163f4b6d7ac93ef8a621e08f9f755b8d2502d0a69aad466794914bc90b80747dbca9b5b456e9b08c5de453a9df7bc52c56e34b6aa0b6fec29f
-
Filesize
1KB
MD5e5875e0c5a48fdf80b3f2aea649293db
SHA1179c6eb96233687e31a6421570066dd9c8875ec7
SHA2561caabb7e009fdecfc65e3101bc7080087a0b2b23c229db5471bfb06e381a5340
SHA512f01c49569d0050bea42eea4a0ce3803bb7a6c39c45201eb37e05e9589e48e3a9fb783523d323dc53e58b7f69fc57d1afb008db26fd46194ef191de373939aefc
-
Filesize
1KB
MD51b47949121d7120770c0bb7686423c00
SHA113e4a0b4d182626c6643558e8086a217a3c7753c
SHA25652763eabe6cd5c34d357679ad273f57f447bc4da7fc9ecb1f549d61a6a3a67c0
SHA5122e21fadd31343f99fe8c6449c25518a5af15700265b6a7d640a8fecbdf08c6d67af2fc31495db69d5e3d8668bb61a2496b881c8fb4d8310cb2678c4f48d83e1a
-
Filesize
1KB
MD5d54f6295b9976f61a4b1963f8168fff6
SHA14426ef81fda05adc6cb3d1c08fea6883297859e7
SHA2564778b07e2b088d55788e4f470724a2d84ef1c1e5771e16a197c556639707df0b
SHA5125497997403499c0eb78b820ba0ad28b2248f00d83eab8696155af291e41ffbb2fe8989435647959a17b82a0a23ff3a1b2492aa82175436bb2a15df228859b468
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
76KB
MD56ec4acc2ba249bda82dfb1108942cad7
SHA1aa3ba72f9ca04cacb755389a02ffc5491b4482c3
SHA256907e8ababe74f65a0ef155b23909a0478c9c21f163d73127910127c51d221b50
SHA5126f395afd202848332ca52be26b856396c9c46f724cd45bf576178a03d148605a7082534aca0657cb203111bb4ac83933c7535ad66bb207e73100f833e2a11c08
-
Filesize
16KB
MD5d926f072b41774f50da6b28384e0fed1
SHA1237dfa5fa72af61f8c38a1e46618a4de59bd6f10
SHA2564f7b0e525d4bfc53d5df49589e25a0bccf2fcf6a1a0ca3f94d3285bb9cf0a249
SHA512a140df6ec0d3099ef374e8f3ece09bf91bc896ac4a1d251799a521543fe9bdea796ba09fa47932bd54fa939118495078f9258557b32c31d3d4011b0666a4723f
-
Filesize
11KB
MD5291340f2e2ed2cd892da13de4c9b1ad4
SHA1d27cd29de39180fb945087b9794db2d93fc332b3
SHA25609bb793f2e5c0ad08da5a1e1f22861914cb81e20e01237a73c5a4f0aff777cd0
SHA51236002314eb4ab16fc6b52ab1f6396d45900c3d877371cd1b5a2b53fb6553cee576dad5eb362f1293e892071b67a7102322121ca4e8ab45862d84d42655256192
-
Filesize
12KB
MD5a98ad99892dcffa73c1fade4b99eb596
SHA1f1b3fc278e5c1dcf3bc6a3590adb75d1bed2ff26
SHA2564c8d586879629f9a89f83e6d3442d0edfa42f1b72586ee58082c436731263864
SHA512b29199ea903065f807462166e42b760cb2d2432db46b02b75f4d0add08199867f4b7b02aaa8b4ce7718578163ec9a75be3bad9d3966591361df46ff742115dde
-
Filesize
12KB
MD5b64368367fbb07be82302f1fd2dcccd9
SHA1552914e1e1430f3dff9ce1054aad08dba28ab537
SHA25618eda94bc0fe5fdbaec16894934ae8baf3025381de24a50fc6fcd2ebfbbc9630
SHA51229e10b2d8956be05543bc15bf34d9f30debd28ebee380730d44757aaacb820928d3dba04023f04ad0e24dea1f6f3316b71bd60ef14c5ee3611f85da34103f42a
-
Filesize
12KB
MD5247a6d3aa990fd22d128d943a0d515b0
SHA148c54e31d3daf967411185bcd7e4a436ac541763
SHA256d7ea737496fe3ecb5a36a3dc4358772d0414bff3650e1d8e5c9c8eec028aecc9
SHA5122ba29c11fca8018806b4bdb884c56d6896beb2599e94c788d66137d99203eb59efc36014318138db4ad56752101394b38e1ffcd40003f75c869738dec15f7326
-
Filesize
12KB
MD55ebc83f9abc2137b72798c8993a53094
SHA179ca5d6c6b41996ffb7b208fd0c39fa9aa1bc056
SHA2568dba9475f12ff85de369363b18a2c29466b87486b0a9ba40fa403ed076e28c75
SHA5125a5bc40cb19430a21fae61c368c9c4bcfc9415b00b277317056b76ebb76ab1e213ad4cc20635001d8da89181b8f57b4297928fd692b463ae90a0e1c0d23ed0fe
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\c58c3079-559b-45e5-b783-b9e5742d5dd7.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize23KB
MD5cbff29ec37ff29a8acc0a3a1c063726f
SHA11c39513a82f1ac1534ba17532910fa9d6a4e4156
SHA25605aeafb6af5a918b8ae9b5228695adf1a2ba276ca22194adfafdf9d475e0a951
SHA51223da5992f1cbdf7597c2f10b443834e6fc901639c4b3045c181adf9da54bf6fca2379c101346d12c338f147250c724c18d097904ae4001b06668d905a98bcf6d
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize23KB
MD5eb7f0671f1cf4cfc166202f8f97d85ca
SHA19fac90d0290f5746e10505406f1aeb1c9f8df617
SHA256392a5dfdb619a8762b2936c33b11385bd645dcf8fa7e321b1299ddecb09f9f76
SHA512a6196beb001f15a449d9ddc906b41808a824ddb700426b9c97656431cd39475f1ad1aaedc76a1e7db2a77121d82fb5b6525d4e7fa95cb8f9b1190637e08d319b
-
Filesize
65B
MD514ec9228f87fe7a0391c379d5fc4f6d2
SHA174516820b4da4467228c8643d38684c488e4e464
SHA256ce05780d3187ed7ed84e0e55220ecb806cf24cfd5c5427d34a7f68727d232830
SHA5123cd7156b0fd38cac1173a204251309b43e8e25716450ca78d004aed9529015f25152b17a10e87386a8a9d835754f4e3bd2380b3a5cdf6a57708e60183b742fe6
-
Filesize
315KB
MD54e5a386c463830af49dc1cd424c315f8
SHA1011f33c10f356786d4f87b0a0c693a818d312261
SHA256f8744f73187d900e3d031237b99a47eeb6ad3888782243dbd4c5ca0694883d58
SHA5125ed773e8a123439909ea53bc155f6c61ed6a389b36cc08bf2d345f154ddf97a0b139eb54d5323e5595b0e6693aa2e0a63a9ae3649b4b14a00ee7e33667661573
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3517169085-2802914951-552339849-1000\0f5007522459c86e95ffcc62f32308f1_84b86c79-824b-4f4c-8fd4-af8ec2f606bc
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3517169085-2802914951-552339849-1000\0f5007522459c86e95ffcc62f32308f1_84b86c79-824b-4f4c-8fd4-af8ec2f606bc
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b
-
Filesize
304B
MD5781602441469750c3219c8c38b515ed4
SHA1e885acd1cbd0b897ebcedbb145bef1c330f80595
SHA25681970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d
SHA5122b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461
-
Filesize
529B
MD5d39c5ddfa2990dacba9c9c0a4d003c94
SHA1f35228eff865ad4541a4d418f3130e17ae6a7376
SHA256a21a850ad92d855dede3403a38872e1ce898755bc17e6d1e30a209a7d741b7cb
SHA512b7feb2d174708589c6a438966e78f8c4141d18e5b431b716873d02148f4d28ce8eb3b139e4e5eedf5a5cddc50577fc5f7631f0367e61e85cd2baa8269a318793
-
Filesize
94KB
MD57b37c4f352a44c8246bf685258f75045
SHA1817dacb245334f10de0297e69c98b4c9470f083e
SHA256ec45f6e952b43eddc214dba703cf7f31398f3c9f535aad37f42237c56b9b778e
SHA5121e8d675b3c6c9ba257b616da268cac7f1c7a9db12ffb831ed5f8d43c0887d711c197ebc9daf735e3da9a0355bf21c2b29a2fb38a46482a2c5c8cd5628fea4c02
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444
-
Filesize
124B
MD554ba0db9b8701f99a46ae533da6fe630
SHA12bd5aea2aceea62deb7ba06969ff6108f3381929
SHA256bb1455630e747e00b60910f9eadf47641ecc46e917034d08530430569d8eaeac
SHA51227fa4e43cf1a1b79a597cfb28aa29457aa096d8c485f84d7b2754268148bfa7430e53abdee4897f911af51aabbae3942ff57cbae02765bbea27e1c181bfecc1a
-
Filesize
28B
MD5df8394082a4e5b362bdcb17390f6676d
SHA15750248ff490ceec03d17ee9811ac70176f46614
SHA256da3f155cfb98ce0add29a31162d23da7596da44ba2391389517fe1a2790da878
SHA5128ce519dc5c2dd0bbb9f7f48bedf01362c56467800ac0029c8011ee5d9d19e3b3f2eff322e7306acf693e2edb9cf75caaf7b85eb8b2b6c3101ff7e1644950303d
-
Filesize
10.2MB
MD5f6a3d38aa0ae08c3294d6ed26266693f
SHA19ced15d08ffddb01db3912d8af14fb6cc91773f2
SHA256c522e0b5332cac67cde8fc84080db3b8f2e0fe85f178d788e38b35bbe4d464ad
SHA512814b1130a078dcb6ec59dbfe657724e36aa3db64ed9b2f93d8559b6a50e512365c8596240174141d6977b5ddcf7f281add7886c456dc7463c97f432507e73515
-
Filesize
6.7MB
MD5f7d94750703f0c1ddd1edd36f6d0371d
SHA1cc9b95e5952e1c870f7be55d3c77020e56c34b57
SHA256659e441cadd42399fc286b92bbc456ff2e9ecb24984c0586acf83d73c772b45d
SHA512af0ced00dc6eeaf6fb3336d9b3abcc199fb42561b8ce24ff2e6199966ad539bc2387ba83a4838301594e50e36844796e96c30a9aa9ad5f03cf06860f3f44e0fa
-
Filesize
674KB
MD5b2233d1efb0b7a897ea477a66cd08227
SHA1835a198a11c9d106fc6aabe26b9b3e59f6ec68fd
SHA2565fd17e3b8827b5bb515343bc4066be0814f6466fb4294501becac284a378c0da
SHA5126ca61854db877d767ce587ac3d7526cda8254d937a159fd985e0475d062d07ae83e7ff4f9f42c7e1e1cad5e1f408f6849866aa4e9e48b29d80510e5c695cee37
-
Filesize
1.3MB
MD5a8f0dcdd63b2fe44a8151bdf2bd2e14e
SHA13beed43253732c37e849785d7bf4108e62b1d1d7
SHA256955c6e991eb04d0dc64f704093b4e06a693d251588a4ed7930d3fcfd91b0a986
SHA5126f018b494248edcfeff77cddb4e32e22f92cc7d1fe784c845e01a92aa03e74657c41738af03f6baea2f6a2a80365e82d6d0365d639166e0a8703c20d6bb19c0a
-
Filesize
701KB
MD56d8f2ef788100d2f0d6a46737fd7a276
SHA144e24c26b2d9e1fc71909aaf43d92a761084eb2a
SHA25638dd4ff4ef6013d8b087887381031f26d9ac0ffa00b808c9843bd9286857c05c
SHA5120a2235adc0f07f4dcf28ccfdec9d3c908578c1ef1a609f402255156871b658a38491787c2031b691652454194a9d79ae8b4731f4d6228d9b4bb13d2acce75d0d
-
Filesize
10KB
MD5698465978e4770dd2830bd90a23866df
SHA1d9d2ddca91f8ce22a875979fef72c7b77057ec51
SHA2566ff1c70a7fe5d7472e29a58ae6921f2841f3d2ea55d75f7fb9c029a64116c713
SHA5126d9f98c4f19833714267c4b47a7fa92e37bbb325e9320ff88b2787ff4f6411d9bb3b8ef3bf1854556547699561e056683124087cc6a4a049c57213687b1a401a
-
Filesize
910KB
MD5cea6d93300453cc0ef4fab26ea4342c4
SHA1f1559d5be865777e0d934fb3332095d805720b6b
SHA2567b747602338ccf309cd550944faa8a661a9a068c94a654ebebf0d188c2cacf0a
SHA5125ecd5d61326e72db5a80915af5af31ae63b33cc7ae6d6c46e05afca807e1e9e6f9597d0615d4d1b41023214f93fd0535febf0b65c897e5a6b90bd94f8fbf32a4
-
Filesize
967KB
MD5036d07d15c8c95111b2d25c8fdc5c4b7
SHA1a9bb78d0ed2beb4556f359a71b046457f7bd09e5
SHA256f07b44af2d6806fb256e8b5658399c37e07c6aa4366d1a41f3162a8020fbda88
SHA512384bb052f9a06a08e96a5f28647c58b2c64eebdb10b40441104cc321bb964388e06f669ce9ecfb0565c30d7633ab7d23dcb498690718d961fd12ad91b2d21148
-
Filesize
11KB
MD5266d086dfd98dcb3bf2c9dff934021ba
SHA1f4d2f4da32ac6af3c23fd9900a10ba46a5836277
SHA25680bfc19ace00dee83a3a4d125130e9bf256b13ce12921218a566088b6d078027
SHA5128ed07d9ded915b6b6010326ab07e4cea589e88aacc9649aa8da56d2e010689f5c29dceec91b0a5add7e5d642bd9b5e58076beea21a58f0ecd731959aff346d5c
-
Filesize
455KB
MD5429910e888fd937a76209ebcab5b265b
SHA19bc027aa726c3603cf500a3a868ecfd6f5d9de89
SHA256985101602db362f95928e47a0085159fa3b3afe004671fd37715d5d3d5f39c1b
SHA5128910f55644911ddeedd16837f4cc24bf3e71c0386cf3528492950c41c1771cc24875a4af6227639df0a9aeadb9cae607d06823867c00696f78654313d17a5b78
-
Filesize
12KB
MD5354e6dcfc1779b5e7bea932aaa44671d
SHA16f37906b7fa521f36afefacac04ad9a811acb7fe
SHA256c023fd711fbfd9440b896a86f04594c6b9c786a4ecffa2179c056d8337252cdd
SHA512f4af2183fcb6884d4769ba7dff87997f473d1985d137b9a2d4632364ec6f25484eb2184253cc7682e7d4fdb3d2c42e7b656371cadc456d6ff877b9a2c738e3b3
-
Filesize
436KB
MD5d308021e5a79f6d55617f8b2689d630a
SHA13c729fd53962207564dc4021179db6102355361c
SHA25633e7216dce78173326035d4f9d7c3a70e8f46af749f5ddcfb9a3fdab765e7bb1
SHA51206405d5ed56615a3653cef4030d3a69b3d2a6af17f02152919760a2fb2cacc23789db5387a028ca765280705a04810848f3d272ca13efaed63fae60be8a4149a
-
Filesize
11KB
MD5a081c98b535d55c2af07a2bee85ab2f3
SHA1ad2b17e141642c6ee5ba3147f8cd8a0a0aa11979
SHA256d6d379a9844b6936280bac02c2c1585111975b4bb82e18918b00a48caab7e750
SHA512f46d15f579905a5765a6f307483be2378ab7f57bff0cd8ec3ae28e0d23adac49b7c21a7dbac2f865d43e72787e17ddaa84363a4cdbfca72a4aedcc802d50cfab
-
Filesize
796KB
MD5f3a4e64432f573abc84ad5c7e1d757e7
SHA1f73e50429bcc5e825abc6ab4d1adbc5aa49f5ad2
SHA256521bb2556e90da17632a4c2f19b6686bed5e04d0d5de7ce4ca281011a0e7113f
SHA512d9758f2ee7ff2b83f5f87216a1c25063d596bb2aea4590dd14faa4c5e054b9ac45e3dd1dba337203abfb69dd47f918f52a14471e2bdedc50e0ffbf7d7c1f2740
-
Filesize
720KB
MD5792728eaf9da0b1a006e130d2bdbaf60
SHA1de312028cefd28d63955167bcb5e99db483f40bd
SHA2568f8421bdf9421968d22da73a4bb3675b531401891b8df0c3e86eb0f9e2ba047c
SHA5122b6980739cfd5625e8c85d81a1842f7226c560e1340bf2aa00fe068f1d750e19615cf987391e2a06ff427aa039ddf69c21092fdb04fa981bf5355cde5828c84f
-
Filesize
599KB
MD59b8559534af855896eab65d810ad06cc
SHA1074b6f7b89135d9b7d9c51265db648e2ff5d01de
SHA256d6623de58f989453ab0f0dc34201b9c97cad067a35a00dbdacb0f2c67c0d8d1a
SHA5126cdbd53d21526a97d2561b907c2322e0d1154207ee3192c8e5ad6368953c1c7cf6ef579acc4f564ec29faf18be69f34787942fad13f0f7b34a9ab3f8d26eda0a
-
Filesize
246KB
MD5ffa243b92d251138474c821cb3915fd8
SHA170fa7e030c54a29ccf6c4835942736425d93782e
SHA2562965bd71bec96684e2b1a9543ed59425ab51aaa30e4a292da417bf780ec95b9e
SHA512d7fd6f811387d4eddf74579703c2b760019d9238f27635713bf6ee3961388decb30470a245b7a6743dd48b131e80c55ce350cfe033284b4829f821553ad690ca
-
Filesize
260KB
MD5d3016dc336bb1a9685ee9cd9487b3c22
SHA10981c6e45af05d07b2926aed2224016b80ebca73
SHA2565682a5de2ad99bea4be0df83ab27d22078d2b46bfe0bdaa71b6fe68af3a1db2f
SHA512b6fbc3e1a2ed53f5a982081246576a1491d6b95df5bb445d98dd91e70fb0f157a541cebf7da2f7c3c60064791a1d07802fef8b9c2d628c375e57ea16fc4b16d5
-
Filesize
514KB
MD57af4d53b5f42690b7f091c8c6d930608
SHA130a018983f2f54c23991e14b4ff38eb4eec1e7f1
SHA2569c93a80df107c076590159877d2e2fb9daea90ec017b6672c2b1bd5bb50c66d6
SHA5124581632085df462660818ba7bae9fcdb5847838808dd0be032be76ddf3bf366c47779eb74f4a76a24e59d77d18d19f4b6ff191559898b00e69dc7fb01ead7f5d
-
Filesize
430KB
MD532cafdb2cfbcfd38276d5b71d03c22bc
SHA15a7b7db08702152a2eea828cbda6d1bbc4383f1e
SHA2561c0ac8fe3bc4d2628f1cabc2c0393bb5d3815f737557d34c94866b00b243250a
SHA51252b7713ab724ee8cada5b2b80d57987976f6f850a0215a70ee9c4daa13248becbc031f9bb44bcae04698b9a2f49868ea5a44958a76c824b2758a194ab3517a04
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98