Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
208s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2025, 20:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://osu.ppy.sh
Resource
win10v2004-20250314-en
Errors
General
-
Target
https://osu.ppy.sh
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Cryptolocker family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\Downloads\\Annabelle.exe" Annabelle.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" Annabelle.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Annabelle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" Annabelle.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Annabelle.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Annabelle.exe Set value (int) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Annabelle.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chkdsk.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\usbui.dll Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logoff.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspaint.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UserAccountControlSettings.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\systemexplorer.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\systemexplorer.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmplayer.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rasman.dll Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webcheck.dll Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gpedit.msc Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpg4dmod.dll Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\usbui.dll\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ksuser.dll Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shellstyle.dll Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\url.dll\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\microsoftedgecp.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cabinet.dll\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webcheck.dll\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\yandex.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DBGHELP.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\secpol.msc Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\microsoftedgecp.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad++.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCuiL.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Autoruns64.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DBGHELP.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmplayer.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mydocs.dll\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dllhost.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\recoverydrive.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logoff.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\control.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UserAccountControlSettings.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Autoruns.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chkdsk.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mydocs.dll Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\microsoftedge.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCuiL.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bcdedit.exe\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll.exe Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cabinet.dll Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad++.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Autoruns.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspaint.exe\Debugger = "RIP" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\secpol.msc\Debugger = "RIP" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\url.dll Annabelle.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3896 NetSh.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation osu!install.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation osu!.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation osu!.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation osu!.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation Annabelle.exe -
Executes dropped EXE 12 IoCs
pid Process 5096 osu!install.exe 5800 osu!.exe 5440 osu!.exe 5444 osu!.exe 3396 osu!.exe 2220 $uckyLocker.exe 5936 osu!.exe 1244 Annabelle.exe 3360 CryptoLocker.exe 5688 {34184A33-0407-212E-3320-09040709E2C2}.exe 1660 {34184A33-0407-212E-3320-09040709E2C2}.exe 3384 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\MinimalX = "1" Annabelle.exe -
Loads dropped DLL 30 IoCs
pid Process 5440 osu!.exe 5440 osu!.exe 5440 osu!.exe 5440 osu!.exe 5440 osu!.exe 5440 osu!.exe 5440 osu!.exe 5440 osu!.exe 5440 osu!.exe 5440 osu!.exe 3396 osu!.exe 3396 osu!.exe 3396 osu!.exe 3396 osu!.exe 3396 osu!.exe 3396 osu!.exe 3396 osu!.exe 3396 osu!.exe 3396 osu!.exe 3396 osu!.exe 5936 osu!.exe 5936 osu!.exe 5936 osu!.exe 5936 osu!.exe 5936 osu!.exe 5936 osu!.exe 5936 osu!.exe 5936 osu!.exe 5936 osu!.exe 5936 osu!.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UpdateBackup = "C:\\Users\\Admin\\Downloads\\Annabelle.exe" Annabelle.exe Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UpdateBackup = "C:\\Users\\Admin\\Downloads\\Annabelle.exe" Annabelle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UpdateBackup = "C:\\Users\\Admin\\Downloads\\Annabelle.exe" Annabelle.exe Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Annabelle.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 255 raw.githubusercontent.com 256 raw.githubusercontent.com 254 raw.githubusercontent.com -
pid Process 5996 GameBarPresenceWriter.exe 4360 GameBarPresenceWriter.exe 4848 GameBarPresenceWriter.exe 1404 GameBarPresenceWriter.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\Desktop\Wallpaper = "0" $uckyLocker.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 5440 osu!.exe 5440 osu!.exe 5440 osu!.exe 3396 osu!.exe 3396 osu!.exe 3396 osu!.exe 5936 osu!.exe 5936 osu!.exe 5936 osu!.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-eu.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1727728127\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1912431134\Microsoft.CognitiveServices.Speech.core.dll msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-uk.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-und-ethi.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-it.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-lt.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1637805366\adblock_snippet.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1637805366\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-af.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-bn.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-cu.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1637805366\Part-ES msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1637805366\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-en-gb.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-mn-cyrl.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-ta.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-tk.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1637805366\Filtering Rules-CA msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1637805366\Part-IT msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-es.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-as.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-ml.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1637805366\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-fr.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-hy.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1637805366\Filtering Rules msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1637805366\Part-RU msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1727728127\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-ga.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-hu.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1727728127\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1912431134\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-cs.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-de-1901.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-te.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1637805366\Filtering Rules-AA msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1637805366\Part-FR msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-de-ch-1901.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-mr.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-ru.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-sl.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1637805366\Part-NL msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1727728127\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-gl.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-kn.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-la.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-lv.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-nn.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-or.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-pa.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-sq.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1727728127\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-be.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-el.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-gu.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-nl.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-et.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_1912431134\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-bg.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-en-us.hyb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5132_367325189\hyph-hr.hyb msedge.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\CryptoLocker.exe:Zone.Identifier chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh NetSh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh NetSh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh NetSh.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osu!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $uckyLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osu!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osu!install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osu!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osu!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34184A33-0407-212E-3320-09040709E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osu!.exe -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Interacts with shadow copies 3 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5544 vssadmin.exe 2224 vssadmin.exe 4988 vssadmin.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "17" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-446031748-3036493239-2009529691-1000\{5FFD221B-0093-457E-91A2-F249453B7603} svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-446031748-3036493239-2009529691-1000\{2A5164FB-ADE7-422A-B640-9875191A25E3} svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-446031748-3036493239-2009529691-1000\{8A13F05B-6256-4776-8A74-DB295F148247} svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-446031748-3036493239-2009529691-1000\{E0A43997-8DF2-4BCD-8E29-20473A137E2C} svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-446031748-3036493239-2009529691-1000\{38E11B42-FF49-41CB-98D2-44067DA87C9B} msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-446031748-3036493239-2009529691-1000\{84017C32-4B9E-4BCF-9195-7C38CCBFD03F} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Modifies system certificate store 2 TTPs 17 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 osu!install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 osu!.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 osu!.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 osu!.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 040000000100000010000000be954f16012122448ca8bc279602acf5030000000100000014000000f40042e2e5f7e8ef8189fed15519aece42c3bfa21d0000000100000010000000e78921f81cea4d4105d2b5f4afae0c78140000000100000014000000c87ed26a852a1bca1998040727cf50104f68a8a2090000000100000016000000301406082b0601050507030306082b060105050703086200000001000000200000005367f20c7ade0e2bca790915056d086b720c33c1fa2a2661acf787e3292e12700b00000001000000800000004d006900630072006f0073006f006600740020004900640065006e007400690074007900200056006500720069006600690063006100740069006f006e00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f0072006900740079002000320030003200300000000f000000010000003000000041ce925678dfe0ccaa8089263c242b897ca582089d14e5eb685fca967f36dbd334e97e81fd0e64815f851f914ade1a1e2000000001000000d0050000308205cc308203b4a00302010202105498d2d1d45b1995481379c811c08799300d06092a864886f70d01010c05003077310b3009060355040613025553311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e314830460603550403133f4d6963726f736f6674204964656e7469747920566572696669636174696f6e20526f6f7420436572746966696361746520417574686f726974792032303230301e170d3230303431363138333631365a170d3435303431363138343434305a3077310b3009060355040613025553311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e314830460603550403133f4d6963726f736f6674204964656e7469747920566572696669636174696f6e20526f6f7420436572746966696361746520417574686f72697479203230323030820222300d06092a864886f70d01010105000382020f003082020a0282020100b3912a07830667fd9e9de0c7c0b7a4e642047f0fa6db5ffbd55ad745a0fb770bf080f3a66d5a4d7953d8a08684574520c7a254fbc7a2bf8ac76e35f3a215c42f4ee34a8596490dffbe99d814f6bc2707ee429b2bf50b9206e4fd691365a89172f29884eb833d0ee4d771124821cb0dedf64749b79bf9c9c717b6844fffb8ac9ad773674985e386bd3740d02586d4deb5c26d626ad5a978bc2d6f49f9e56c1414fd14c7d3651637decb6ebc5e298dfd629b152cd605e6b9893233a362c7d7d6526708c42ef4562b9e0b87cceca7b4a6aaeb05cd1957a53a0b04271c91679e2d622d2f1ebedac020cb0419ca33fb89be98e272a07235be79e19c836fe46d176f90f33d008675388ed0e0499abbdbd3f830cad55788684d72d3bf6d7f71d8fdbd0dae926448b75b6f7926b5cd9b952184d1ef0f323d7b578cf345074c7ce05e180e35768b6d9ecb3674ab05f8e0735d3256946797250ac6353d9497e7c1448b80fdc1f8f47419e530f606fb21573e061c8b6b158627497b8293ca59e87547e83f38f4c75379a0b6b4e25c51efbd5f38c113e6780c955a2ec5405928cc0f24c0ecba0977239938a6b61cdac7ba20b6d737d87f37af08e33b71db6e731b7d9972b0e486335974b516007b506dc68613dafdc439823d24009a60daba94c005512c34ac50991387bbb30580b24d30025cb826835db46373efae23954f6028be37d55ba50203010001a3543052300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414c87ed26a852a1bca1998040727cf50104f68a8a2301006092b06010401823715010403020100300d06092a864886f70d01010c05000382020100af6adde619e72d9443194ecbe9509564a50391028be236803b15a252c21619b66a5a5d744330f49bff607409b1211e90166dc5248f5c668863f44fcc7df2124c40108b019fdaa9c8aef2951bcf9d05eb493e74a0685be5562c651c827e53da56d94617799245c4103608522917cb2fa6f27ed469248a1e8fb0730dcc1c4aabb2aaeda79163016422a832b87e3228b367732d91b4dc31010bf7470aa6f1d74aed5660c42c08a37b40b0bc74275287d6be88dd378a896e67881df5c95da0feb6ab3a80d71a973c173622411eac4dd583e63c38bd4f30e954a9d3b604c3327661bbb018c52b18b3c080d5b795b05e514d22fcec58aae8d894b4a52eed92dee7187c2157dd5563f7bf6dcd1fd2a6772870c7e25b3a5b08d25b4ec80096b3e18336af860a655c74f6eaec7a6a74a0f04beeef94a3ac50f287edd73a3083c9fb7d57bee5e3f841cae564aeb3a3ec58ec859accefb9eaf35618b95c739aafc577178359db371a187254a541d2b62375a3439ae5777c9679b7418dbfecdc80a09fd17775585f3513e0251a670b7dce25fa070ae46121d8d41ce507c63699f496d0c615fe4ecdd7ae8b9ddb16fd04c692bdd488e6a9a3aabbf764383b5fcc0cd035be741903a6c5aa4ca26136823e1df32bbc975ddb4b783b2df53bef6023e8f5ec0b233695af9866bf53d37bb8694a2a966669c494c6f45f6eac98788880065ca2b2eda2 osu!install.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 osu!.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 osu!.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 osu!.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E osu!.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 0f000000010000003000000066b764a96581128168cf208e374dda479d54e311f32457f4aee0dbd2a6c8d171d531289e1cd22bfdbbd4cfd979625483090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd21400000001000000140000005379bf5aaa2b4acf5480e1d89bc09df2b20366cb1d0000000100000010000000885010358d29a38f059b028559c95f900b00000001000000100000005300650063007400690067006f0000000300000001000000140000002b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e2000000001000000e2050000308205de308203c6a003020102021001fd6d30fca3ca51a81bbc640e35032d300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3130303230313030303030305a170d3338303131383233353935395a308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010080126517360ec3db08b3d0ac570d76edcd27d34cad508361e2aa204d092d6409dcce899fcc3da9ecf6cfc1dcf1d3b1d67b3728112b47da39c6bc3a19b45fa6bd7d9da36342b676f2a93b2b91f8e26fd0ec162090093ee2e874c918b491d46264db7fa306f188186a90223cbcfe13f087147bf6e41f8ed4e451c61167460851cb8614543fbc33fe7e6c9cff169d18bd518e35a6a766c87267db2166b1d49b7803c0503ae8ccf0dcbc9e4cfeaf0596351f575ab7ffcef93db72cb6f654ddc8e7123a4dae4c8ab75c9ab4b7203dca7f2234ae7e3b68660144e7014e46539b3360f794be5337907343f332c353efdbaafe744e69c76b8c6093dec4c70cdfe132aecc933b517895678bee3d56fe0cd0690f1b0ff325266b336df76e47fa7343e57e0ea566b1297c3284635589c40dc19354301913acd37d37a7eb5d3a6c355cdb41d712daa9490bdfd8808a0993628eb566cf2588cd84b8b13fa4390fd9029eeb124c957cf36b05a95e1683ccb867e2e8139dcc5b82d34cb3ed5bffdee573ac233b2d00bf3555740949d849581a7f9236e651920ef3267d1c4d17bcc9ec4326d0bf415f40a94444f499e757879e501f5754a83efd74632fb1506509e658422e431a4cb4f0254759fa041e93d426464a5081b2debe78b7fc6715e1c957841e0f63d6e962bad65f552eea5cc62808042539b80e2ba9f24c971c073f0d52f5edef2f820f0203010001a3423040301d0603551d0e041604145379bf5aaa2b4acf5480e1d89bc09df2b20366cb300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff300d06092a864886f70d01010c050003820201005cd47c0dcff7017d4199650c73c5529fcbf8cf99067f1bda43159f9e0255579614f1523c27879428ed1f3a0137a276fc5350c0849bc66b4eba8c214fa28e556291f36915d8bc88e3c4aa0bfdefa8e94b552a06206d55782919ee5f305c4b241155ff249a6e5e2a2bee0b4d9f7ff70138941495430709fb60a9ee1cab128ca09a5ea7986a596d8b3f08fbc8d145af18156490120f73282ec5e2244efc58ecf0f445fe22b3eb2f8ed2d9456105c1976fa876728f8b8c36afbf0d05ce718de6a66f1f6ca67162c5d8d083720cf16711890c9c134c7234dfbcd571dfaa71dde1b96c8c3c125d65dabd5712b6436bffe5de4d661151cf99aeec17b6e871918cde49fedd3571a21527941ccf61e326bb6fa36725215de6dd1d0b2e681b3b82afec836785d4985174b1b9998089ff7f78195c794a602e9240ae4c372a2cc9c762c80e5df7365bcae0252501b4dd1a079c77003fd0dcd5ec3dd4fabb3fcc85d66f7fa92ddfb902f7f5979ab535dac367b0874aa9289e238eff5c276be1b04ff307ee002ed45987cb524195eaf447d7ee6441557c8d590295dd629dc2b9ee5a287484a59bb790c70c07dff589367432d628c1b0b00be09c4cc31cd6fce369b54746812fa282abd3634470c48dff2d33baad8f7bb57088ae3e19cf4028d8fcc890bb5d9922f552e658c51f883143ee881dd7c68e3c436a1da718de7d3d16f162f9ca90a8fd osu!.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B osu!.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 osu!.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2 osu!install.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 osu!install.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 5c000000010000000400000000100000040000000100000010000000be954f16012122448ca8bc279602acf5030000000100000014000000f40042e2e5f7e8ef8189fed15519aece42c3bfa21d0000000100000010000000e78921f81cea4d4105d2b5f4afae0c78140000000100000014000000c87ed26a852a1bca1998040727cf50104f68a8a2090000000100000016000000301406082b0601050507030306082b060105050703086200000001000000200000005367f20c7ade0e2bca790915056d086b720c33c1fa2a2661acf787e3292e12700b00000001000000800000004d006900630072006f0073006f006600740020004900640065006e007400690074007900200056006500720069006600690063006100740069006f006e00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f0072006900740079002000320030003200300000000f000000010000003000000041ce925678dfe0ccaa8089263c242b897ca582089d14e5eb685fca967f36dbd334e97e81fd0e64815f851f914ade1a1e1900000001000000100000009f687581f7ef744ecfc12b9cee6238f12000000001000000d0050000308205cc308203b4a00302010202105498d2d1d45b1995481379c811c08799300d06092a864886f70d01010c05003077310b3009060355040613025553311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e314830460603550403133f4d6963726f736f6674204964656e7469747920566572696669636174696f6e20526f6f7420436572746966696361746520417574686f726974792032303230301e170d3230303431363138333631365a170d3435303431363138343434305a3077310b3009060355040613025553311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e314830460603550403133f4d6963726f736f6674204964656e7469747920566572696669636174696f6e20526f6f7420436572746966696361746520417574686f72697479203230323030820222300d06092a864886f70d01010105000382020f003082020a0282020100b3912a07830667fd9e9de0c7c0b7a4e642047f0fa6db5ffbd55ad745a0fb770bf080f3a66d5a4d7953d8a08684574520c7a254fbc7a2bf8ac76e35f3a215c42f4ee34a8596490dffbe99d814f6bc2707ee429b2bf50b9206e4fd691365a89172f29884eb833d0ee4d771124821cb0dedf64749b79bf9c9c717b6844fffb8ac9ad773674985e386bd3740d02586d4deb5c26d626ad5a978bc2d6f49f9e56c1414fd14c7d3651637decb6ebc5e298dfd629b152cd605e6b9893233a362c7d7d6526708c42ef4562b9e0b87cceca7b4a6aaeb05cd1957a53a0b04271c91679e2d622d2f1ebedac020cb0419ca33fb89be98e272a07235be79e19c836fe46d176f90f33d008675388ed0e0499abbdbd3f830cad55788684d72d3bf6d7f71d8fdbd0dae926448b75b6f7926b5cd9b952184d1ef0f323d7b578cf345074c7ce05e180e35768b6d9ecb3674ab05f8e0735d3256946797250ac6353d9497e7c1448b80fdc1f8f47419e530f606fb21573e061c8b6b158627497b8293ca59e87547e83f38f4c75379a0b6b4e25c51efbd5f38c113e6780c955a2ec5405928cc0f24c0ecba0977239938a6b61cdac7ba20b6d737d87f37af08e33b71db6e731b7d9972b0e486335974b516007b506dc68613dafdc439823d24009a60daba94c005512c34ac50991387bbb30580b24d30025cb826835db46373efae23954f6028be37d55ba50203010001a3543052300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414c87ed26a852a1bca1998040727cf50104f68a8a2301006092b06010401823715010403020100300d06092a864886f70d01010c05000382020100af6adde619e72d9443194ecbe9509564a50391028be236803b15a252c21619b66a5a5d744330f49bff607409b1211e90166dc5248f5c668863f44fcc7df2124c40108b019fdaa9c8aef2951bcf9d05eb493e74a0685be5562c651c827e53da56d94617799245c4103608522917cb2fa6f27ed469248a1e8fb0730dcc1c4aabb2aaeda79163016422a832b87e3228b367732d91b4dc31010bf7470aa6f1d74aed5660c42c08a37b40b0bc74275287d6be88dd378a896e67881df5c95da0feb6ab3a80d71a973c173622411eac4dd583e63c38bd4f30e954a9d3b604c3327661bbb018c52b18b3c080d5b795b05e514d22fcec58aae8d894b4a52eed92dee7187c2157dd5563f7bf6dcd1fd2a6772870c7e25b3a5b08d25b4ec80096b3e18336af860a655c74f6eaec7a6a74a0f04beeef94a3ac50f287edd73a3083c9fb7d57bee5e3f841cae564aeb3a3ec58ec859accefb9eaf35618b95c739aafc577178359db371a187254a541d2b62375a3439ae5777c9679b7418dbfecdc80a09fd17775585f3513e0251a670b7dce25fa070ae46121d8d41ce507c63699f496d0c615fe4ecdd7ae8b9ddb16fd04c692bdd488e6a9a3aabbf764383b5fcc0cd035be741903a6c5aa4ca26136823e1df32bbc975ddb4b783b2df53bef6023e8f5ec0b233695af9866bf53d37bb8694a2a966669c494c6f45f6eac98788880065ca2b2eda2 osu!install.exe Set value (data) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B\Blob = 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 osu!.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 osu!.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe\:Zone.Identifier:$DATA CryptoLocker.exe File opened for modification C:\Users\Admin\Downloads\CryptoLocker.exe:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 5440 osu!.exe 3396 osu!.exe 5132 msedge.exe 5132 msedge.exe 5172 chrome.exe 5172 chrome.exe 3188 msedge.exe 3188 msedge.exe 5172 chrome.exe 5172 chrome.exe 5936 osu!.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 404 OpenWith.exe 432 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5096 osu!install.exe Token: SeDebugPrivilege 5800 osu!.exe Token: SeDebugPrivilege 5440 osu!.exe Token: SeDebugPrivilege 5444 osu!.exe Token: SeDebugPrivilege 3396 osu!.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe Token: SeCreatePagefilePrivilege 5172 chrome.exe Token: SeShutdownPrivilege 5172 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 5800 osu!.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe 5172 chrome.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 404 OpenWith.exe 5372 OpenWith.exe 432 OpenWith.exe 4736 OpenWith.exe 1696 OpenWith.exe 4620 OpenWith.exe 1488 OpenWith.exe 4380 OpenWith.exe 4036 OpenWith.exe 4868 OpenWith.exe 5228 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3056 wrote to memory of 3096 3056 msedge.exe 81 PID 3056 wrote to memory of 3096 3056 msedge.exe 81 PID 3056 wrote to memory of 1264 3056 msedge.exe 82 PID 3056 wrote to memory of 1264 3056 msedge.exe 82 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 6028 3056 msedge.exe 83 PID 3056 wrote to memory of 4136 3056 msedge.exe 84 PID 3056 wrote to memory of 4136 3056 msedge.exe 84 PID 3056 wrote to memory of 4136 3056 msedge.exe 84 PID 3056 wrote to memory of 4136 3056 msedge.exe 84 PID 3056 wrote to memory of 4136 3056 msedge.exe 84 PID 3056 wrote to memory of 4136 3056 msedge.exe 84 PID 3056 wrote to memory of 4136 3056 msedge.exe 84 PID 3056 wrote to memory of 4136 3056 msedge.exe 84 PID 3056 wrote to memory of 4136 3056 msedge.exe 84 -
System policy modification 1 TTPs 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Annabelle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Annabelle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\WindowsDefenderMAJ = "1" Annabelle.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System Annabelle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" Annabelle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Annabelle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel = "1" Annabelle.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "1" Annabelle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Annabelle.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://osu.ppy.sh1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2ac,0x7ffe2e81f208,0x7ffe2e81f214,0x7ffe2e81f2202⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1928,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=2388 /prefetch:32⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2352,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=2348 /prefetch:22⤵PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2640,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3464,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3472,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4872,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=5052 /prefetch:82⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4700,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5052,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=5068 /prefetch:82⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5508,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5812,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=5836 /prefetch:82⤵PID:5836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5812,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=5836 /prefetch:82⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=6040,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=6152 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --always-read-main-dll --field-trial-handle=6096,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6524,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=6596 /prefetch:82⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6560,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=6620 /prefetch:12⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6416,i,18177209203539676855,16275774487655702221,262144 --variations-seed-version --mojo-platform-channel-handle=6308 /prefetch:82⤵PID:5596
-
-
C:\Users\Admin\Downloads\osu!install.exe"C:\Users\Admin\Downloads\osu!install.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:5096 -
C:\Users\Admin\AppData\Local\osu!\osu!.exe"C:\Users\Admin\AppData\Local\osu!\osu!.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5800 -
C:\Users\Admin\AppData\Local\osu!\osu!.exe"C:\Users\Admin\AppData\Local\osu!\osu!.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5440 -
C:\Users\Admin\AppData\Local\osu!\osu!.exe"C:\Users\Admin\AppData\Local\osu!\osu!.exe" -repair5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5444 -
C:\Users\Admin\AppData\Local\osu!\osu!.exe"C:\Users\Admin\AppData\Local\osu!\osu!.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window2⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x264,0x7ffe2e81f208,0x7ffe2e81f214,0x7ffe2e81f2203⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1752,i,3232253702790826969,992026383128047105,262144 --variations-seed-version --mojo-platform-channel-handle=2248 /prefetch:33⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2208,i,3232253702790826969,992026383128047105,262144 --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:23⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2016,i,3232253702790826969,992026383128047105,262144 --variations-seed-version --mojo-platform-channel-handle=2492 /prefetch:83⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --string-annotations --always-read-main-dll --field-trial-handle=4152,i,3232253702790826969,992026383128047105,262144 --variations-seed-version --mojo-platform-channel-handle=4160 /prefetch:83⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4472,i,3232253702790826969,992026383128047105,262144 --variations-seed-version --mojo-platform-channel-handle=4532 /prefetch:83⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4472,i,3232253702790826969,992026383128047105,262144 --variations-seed-version --mojo-platform-channel-handle=4532 /prefetch:83⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=276,i,3232253702790826969,992026383128047105,262144 --variations-seed-version --mojo-platform-channel-handle=120 /prefetch:83⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4532,i,3232253702790826969,992026383128047105,262144 --variations-seed-version --mojo-platform-channel-handle=4204 /prefetch:83⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4268,i,3232253702790826969,992026383128047105,262144 --variations-seed-version --mojo-platform-channel-handle=4776 /prefetch:83⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4088,i,3232253702790826969,992026383128047105,262144 --variations-seed-version --mojo-platform-channel-handle=4800 /prefetch:83⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4748,i,3232253702790826969,992026383128047105,262144 --variations-seed-version --mojo-platform-channel-handle=4992 /prefetch:83⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4632,i,3232253702790826969,992026383128047105,262144 --variations-seed-version --mojo-platform-channel-handle=4180 /prefetch:83⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5020,i,3232253702790826969,992026383128047105,262144 --variations-seed-version --mojo-platform-channel-handle=5012 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4476,i,3232253702790826969,992026383128047105,262144 --variations-seed-version --mojo-platform-channel-handle=3608 /prefetch:83⤵PID:3104
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3376
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2632
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵
- Network Service Discovery
PID:4360
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:5276
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5372
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵
- Network Service Discovery
PID:4848
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:5696
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4736
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1696
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:3664
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1488
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5172 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffe1e72dcf8,0x7ffe1e72dd04,0x7ffe1e72dd102⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1628,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2168 /prefetch:32⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2132,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2420,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3240,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4504 /prefetch:22⤵PID:5996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4784,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:5352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5340,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:6028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5552,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5596,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3476,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:5584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3344,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3424 /prefetch:82⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4924,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3364 /prefetch:82⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3376,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3360 /prefetch:82⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3012,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3952 /prefetch:82⤵PID:2396
-
-
C:\Users\Admin\Downloads\$uckyLocker.exe"C:\Users\Admin\Downloads\$uckyLocker.exe"2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=1180,i,5685831399886478817,3682100311037252848,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3976 /prefetch:82⤵PID:3196
-
-
C:\Users\Admin\Downloads\Annabelle.exe"C:\Users\Admin\Downloads\Annabelle.exe"2⤵
- Modifies WinLogon for persistence
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Disables RegEdit via registry modification
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- Checks whether UAC is enabled
- System policy modification
PID:1244 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5544
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4988
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2224
-
-
C:\Windows\SYSTEM32\NetSh.exeNetSh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3896
-
-
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" -r -t 00 -f3⤵PID:2728
-
-
-
C:\Users\Admin\Downloads\CryptoLocker.exe"C:\Users\Admin\Downloads\CryptoLocker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:3360 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Downloads\CryptoLocker.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5688 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000002244⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w000002245⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3384
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5632
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:5608
-
C:\Users\Admin\AppData\Local\osu!\osu!.exe"C:\Users\Admin\AppData\Local\osu!\osu!.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5936
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵
- Network Service Discovery
PID:1404
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:3452
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵
- Network Service Discovery
PID:5996
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4036
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4868
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:4036
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3924055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5228
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
8Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116B
MD52188c7ec4e86e29013803d6b85b0d5bb
SHA15a9b4a91c63e0013f661dfc472edb01385d0e3ce
SHA256ac47cc331bb96271da2140941926a8accc6cb7599a6f3c17bd31c78f46709a62
SHA51237c21eaff24a54c2c7571e480ff4f349267e4404111508f241f54a41542ce06bcde4c830c6e195fc48d1bf831ed1fe78da361d1e43416cfd6c02afa8188af656
-
Filesize
66B
MD55bbd09242392aacbb5fac763f9e3bd4e
SHA114bb7b23b459ce30193742ed1901a17b4dcf9645
SHA25622b55f5d9b1bafb80e00c1304cf5e0d6057a304a2e8757b4f021b416f4397297
SHA512541e4c7998e91a5113f627c2c44e32b54878fe225b3b9476572f025f51f2b4ec4a44b102498adcc22b8fe388970645bacfafb6e7fc8a216df4d7bbfc8b0ff670
-
Filesize
76B
MD5ba25fcf816a017558d3434583e9746b8
SHA1be05c87f7adf6b21273a4e94b3592618b6a4a624
SHA2560d664bc422a696452111b9a48e7da9043c03786c8d5401282cff9d77bcc34b11
SHA5123763bd77675221e323faa5502023dc677c08911a673db038e4108a2d4d71b1a6c0727a65128898bb5dfab275e399f4b7ed19ca2194a8a286e8f9171b3536546f
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5677edd1a17d50f0bd11783f58725d0e7
SHA198fedc5862c78f3b03daed1ff9efbe5e31c205ee
SHA256c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0
SHA512c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff
-
Filesize
82B
MD52617c38bed67a4190fc499142b6f2867
SHA1a37f0251cd6be0a6983d9a04193b773f86d31da1
SHA256d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665
SHA512b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0
-
Filesize
414B
MD5a439409f6daf9c8afc82733f3e1cf5a7
SHA13610557825d6fc935fb33a4e0bf0b48588c2e063
SHA256933669aa5540672a9e8e8117f4d99e7b83ea268e097c48fcc25d994fd2b2f876
SHA5128e96c9e57e16a2fa4b225099585f460ae1d8b9e0bbb814226adaf0b7a0a60aa5b527c74b1b888319e9754a0170a6e44c4d095e38b0bcf325de516b8313fa61b3
-
Filesize
2KB
MD5f292e79b10b43e0b8ee8f70d3aa0ccad
SHA1dd9659bd9ad068504f025d4a406598af155b8c27
SHA256a67f5cf48042273a59334f5fe39859ca2ed776a43e8af0f4ab7f250d195970b4
SHA512f89313396f0d83bc6e38a90e4184b75e432e38c16614f71444c928b5ecb1d9d1ac70147c5b96bbf6f5bf33e16745d91ce94d6b858fcc9d2a9957769187b9862a
-
Filesize
5KB
MD5eac57a9e439ef3cb957ac0f034daee95
SHA13414a8dc86434deeb5c8909c154179e88f8d426a
SHA2567829b8538a4194733cdd51317b384113fee551bec97e1b8674f87d4abdb30a43
SHA5121b946044f4bbeb05f462cd02560f86b3f3c370c1f851c387d34d8499fe7fd05ca5c248b3c38d175a0a7c91718e0beafe4d7454b1095d69153bcc9c57bf77f486
-
Filesize
10KB
MD57ca26e48dfa903687a49a45ce5c1797e
SHA1203a7d5f4dc8feccc51ccafd0d9552f340aa595e
SHA2565506b7d2fba01064e1dec8dc9b5b93aad3a507d1ab4ae58b28812ce25e185c81
SHA512d2265cda43e3817ecd0d53119ee98b41b7642d54f11a27050550b456ef80352b0ae96825819bb743965e7fb9f6135f7348047825c026e7c898446e8dc8662fa8
-
Filesize
11KB
MD5632fb69ff31cc264b16e46d82c56d2bf
SHA1e4eb8fda7a857010aef6e1595276493b33c964d4
SHA256d1b54e3e54bd18f504627ba310e9862ebc85af393afc9bd40a9bdabf7c5e8c23
SHA512be9629d83499c8e0ad63fdad6f7fa26727272f5f49bbfe34268d84de26cb86bf83dbc75627da97ebc3155bcc7d64101c1c70544e82a64a9a80de9e34bd126a75
-
Filesize
11KB
MD5f2158fb0642cb0c2c628eda6ca3e805c
SHA1d6d67a71637965169c1f84d4c3fd3cc2bfb07fe1
SHA256cede6ea89aa76beb2f1797691b33b0058bcb1178ae2921045c1dd5f5219073a0
SHA51247dd97225b6e839527e80c9f500b680eacb870130b05e2c0eadb471ccc0476ddc2f2409cf344bb3bbdee40c27dd8422a84810fd66a405354a23626a4cb1804eb
-
Filesize
10KB
MD52e7b34e8c9e05cee99ac47143c22bc46
SHA1f7f1519650b87863cba300f7444ed9989ce35a3e
SHA2565dac151edf90fe4ce5eaf208bdfed9e76d910a8e8b2dfb1e30d69a9b04af6d15
SHA512872ff26f71ec8d79e4502ded57837b109c1006611e8e63e429b62c95b55fc5666e161cc30233ecd98a46c77bb6558d2a729e95636ff035e7a55d51c8c7e347e5
-
Filesize
11KB
MD57cdeaaae3fd000af0366413181c7dcb1
SHA1b55580fd1c5345a83a5be715faf9b3d61f97cd8c
SHA25627ec0065a692d3dad3e44252e83edbf27089b73fb052b74cf44cda946c3693f4
SHA51262ee7c1bb2b65b2a0513d9bd064f843d38d5fff3d583c4e2a16ac7549a0210d77908a818477f9ee0ac6eff316ebbeda89dbb24b18b1ea975aa26d22138b77518
-
Filesize
15KB
MD5f4c31e1267c5c5c4c3ac135387315911
SHA1a9e58e5140742e0b25395e4eff2019e491c7e21e
SHA256003fbe143f47ac9c60f6ec1c2c693e91b29ee65bc084f63f1b15c2e6b2067a92
SHA512a7cb51df6648f818fefb01b9a845a09d8c630c56448eca38673f1fb135f69c5f7e19d1b92ee433ae098d4e0832e067c811e92d9dbabad15657113fe1ad96ebcc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5b174994f0f712a1b267c67aca53977c5
SHA1ec065ef04b3f4415e97ecca09a41153efb169dc3
SHA25647d13f1a50b7ea318dd0e8372be9b33207e28dbcc4b8d602c3720ec78ea2a597
SHA512372078faf6491d77cc13d1ce3733d02f30a3fe242696a1aabd7f8b89364e63bd715ef4547ee9fb7d244870d295f4e43bd2689c8b92946efd1de2c7eed34aa7c4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe591c19.TMP
Filesize48B
MD5ed2d99d1391a9b9bdd8f7e0bd55cca30
SHA1cdbd2ab98db980b40eec6a7637272041ccaaca3d
SHA256ec08daad1b414ae3e08930d48c5ae3bcfd406a803a8024abc703236071556117
SHA512d7ae3ea9b6604cdeec02e3ff94b9c0e9501a49dbaf1e4cee4769c56c6a6afc3b78041bf795e8ca455e503e2e4b4e81d2a732a97bdb301aa76d4da0e6ea0a1481
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\df7af435-c7b9-49b3-90d1-be96472fcf30.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
80KB
MD5e80f5aa7017acd57d328801c96719d2a
SHA1a4a2402ca93db04b632a54070b38ca9e3ef95d55
SHA256eb50f37bec073960fdc58edfa1096e75cc0f86929fa4788284e7204d7bcbd352
SHA51235d5038952ef229bc45528d05609e3c64b6fc97eb2cabc341d30fb7485e604b015ce43c201baa9039e0c12b1cee2fceedb0e205510772f2a701405a9261df29a
-
Filesize
81KB
MD53c415dbd33e1ec02b52595a66697e6c4
SHA1fab37a11b04dcdcf5b6fdd41df80731000c9c3ca
SHA256ba9fc28a00b0cfa4a724176f7b5dc1aee184a63352eb6942ccae7e119544ab10
SHA5122a69741dbac7a5309bcbdf9f1e9c8c5f7b9677823958552b9c3a73145c7ba1a075992ef82ff2b1db3a63f6d2f4a985c1f422eb5836bfcf60b53f943d51bcc8ee
-
Filesize
81KB
MD56f28b61444cfbb40d116bd303fbfff2a
SHA1e76a776bc25e18ae5579d93527714ff72e93c734
SHA256436dd6f2f8c399e997a202c3cbace9bb1dc5baaec37944bd014044915df7ab7e
SHA512c2af328814c3f88234d6d24f8db7e47a770441bc1d9d6af30aa80f8d290390180d9143994dbc0bcfdeff900fc89c8189b7752e3454fa22662b025993d07469a1
-
Filesize
280B
MD58625e8ce164e1039c0d19156210674ce
SHA19eb5ae97638791b0310807d725ac8815202737d2
SHA2562f65f9c3c54fe018e0b1f46e3c593d100a87758346d3b00a72cb93042daf60a2
SHA5123c52b8876982fe41d816f9dfb05cd888c551cf7efd266a448050c87c3fc52cc2172f53c83869b87d7643ce0188004c978570f35b0fcc1cb50c9fffea3dec76a6
-
Filesize
44KB
MD55b73b3c9acb7fcd0f3efd7fd921523f2
SHA15f88c4f225cce29de30516e0b453932ec1d3f74b
SHA2567b1e248d998c756becc95515a38d61fe2e815414528aa04fc69e22740182fdcc
SHA5120d309c62f3898c9d0bd3b12f1ebb8a9a04b945830346914590115598fb5d86e08854fd0c1d7796bdfee7919da9d335b0af4b0333448b898e5151378b1875135d
-
Filesize
520KB
MD53dbf52b2ade884bd5aa92bffa5ffe3a9
SHA1d0edc9b5b0c72470eb1845563904b134deac29ba
SHA2562b6c3c96e7451b28bc62ab585df14f9ba10c37701b819acca522bf8b0771fabb
SHA512cd4e88fc088a472a9527ea55ab2fedfe91ffa4baeaa076a399c552fdd7423577da2afc89e999df9044ff078c1dde90849b6cc8551c9c2876e6b477d042dd8bb8
-
Filesize
1.0MB
MD581197948ab37c36342094acf4ffd635f
SHA13085a1ad325228260ad94bfdd45ca05ba1c20982
SHA25631cae9f1058e8b14b84875ae8e080b9f81a0cfe6812d8cc08a36af031beae9e5
SHA51262469fa362e8afb7e35b3d2e310712e3493116a1d6d0ac2ab529c1def9a2a712d3ea33afb18a8bb1d1baf3cee2ca7d14e46798615d7e4ba111df3c5ec3e1681f
-
Filesize
8.0MB
MD583f7c3d78a4fd3c87b83a7ac4411f563
SHA1a4266e36e9194cd430267a293887bac49a67e983
SHA25676aecaa3108c82bcb0753fa5e5be24eac9caddf9db38df2c28630a021fa9e8e5
SHA5126c33b43fb3d1ea8b79eb8c184c1892349abc2b545b3f211004e222310481257ab1d38735c4d02a040a8b023135a487ecc8380b719d3cbed3af6d5dc4208808ef
-
Filesize
35KB
MD5e12c593ce4270a5bab3f4f2475f75c85
SHA124e58bad661ea2e6f486e0e20679d75a7a9a33b4
SHA256939171c3c518399409e0ad5888478c060a2d9a62ebf7d62da4665d926617aefa
SHA51282c2e476f9ab7bd35da789c1da72ec2026e1a3f69e858635ade1fe4d781c6fba5b0e75381ae1354729cdf50fec957ad3b1464564d4b1686fc15c834a0f167c9a
-
Filesize
150KB
MD54b3196e7a3313919c263f7db39765dba
SHA1fec4cb716f8486e8da648cfe897c8f6438ede43d
SHA25635b64066b4cf862747eec294332df08750d1e2edd055c42eae6fef2284054529
SHA5126ca8bc1587b7b75ad2ef7a3ec87745b710a1dbecb6da5e2a45157e5f2e50dbf8e684bfe8b1882a5bdcc825789f73a0bfa328ca9e05ed2a802806a0b393bb4a34
-
Filesize
113KB
MD5783b259d4c68ec55de237c0b1742b099
SHA1ba03d603418ed538c987c5f4bd0756350574a847
SHA2560419b035f4b0046baad2c8672c1092b00f37d7f11d03f6bc7612fa80ab29e99b
SHA512627ae2071e3402610ce0417e7b45a87f7070032af7c03c087ab757422fc42967cb97e07d8a23e2ad15844ad4111fa97cc4783b6e5b4b99125d528f21a928901c
-
Filesize
30KB
MD5684573a6096724bdbfef5ac60d005813
SHA10c27cfe72d722c6a43add13ef8568f0e0410adb7
SHA25689a5133985eb00c09c893c7571ebaef8cb03c637689dbef7f1312e9767b8b492
SHA5122ad760bbd14e2fa059635eea51063c48f6274c492c4da13d5e5b8abee77eab379ee3b192f3b9d3840a766b19bc169557b70f2cc63015f23bfa4165aa8c2109d7
-
Filesize
411KB
MD54f92ef650a62eef4716a6d5c62960498
SHA1f26a52ac3e4bb46cd38f9a69f626530a56ffcbd8
SHA2565af975e07dbf851a1a4750df04462f2ee0818b07764e27536897295e9319d828
SHA51267e69156b03ce5c7be42f278e1725d711e5882b05721297c6d2922ad3a4548e0a056df50bd279242c01419fd1d9469de4f8c294042e315c7a42f19c7b84e887c
-
Filesize
17KB
MD5a305cc46ed4e4e6996f4a951368b647b
SHA180d05da75dbd9393c6718f77ff3f421bafa0c571
SHA256252df635199e370bdc4da12a04356c66af548fb66bdba8a625b28de44edd9577
SHA512c40a9db847e30a55f4b5fcfb9448b03d6df989758019de764af3dae271677a879ff874256951011879329aa059bdf1dbb3ffe0a00e09c2bd5772919f219ae913
-
Filesize
62KB
MD5b9f3ae49058ad07984c9184cda28f1b5
SHA1f53cebff19ae71d21a0f684a94c022788885cce7
SHA256cbc330ec75d3d04a31725f106cf8597b6d254f99704f356f1a586a2f70995b45
SHA5123175f23b24923ae5dc38200f86599ae324f5761cdf4e9a14f4e62c0f4031cef22982b605fafcbb49350fce1f10123628714d7f7c66c79f46acf7f81e6fa16c8a
-
Filesize
64KB
MD5b9f502213933d8d2d5f857c45089c228
SHA1f14fe1408d5588d3a41e5d030a7bef20177ef568
SHA25653146be4931aadf37cd36b92d82da0787862cc097a98d255cf168a1a47d0dc00
SHA512d981b6e9f5e60937e15fa5cdf61ad2bde53df67e05cd8285dd3a3e53466f6b1700cfcebda9188d3b09a3ff3557f1da2de76fffab8551a82aeee8a79af208d2b5
-
Filesize
73KB
MD5b5cf8ae26748570d8fb95a47f46b69e1
SHA107bed153d47f9129a944ee54dd72952deed074c8
SHA256cd398be1a91817126cef10224738e624358edf6f08043abad7e60c1aaeccc8d0
SHA512f08b9289695cf530094f076b2df4d2b0e1a1daedd00190d123b4179b2c1a1b5e8b2bb988d86fc6dc9eee117d88a58dd5b6dfe7689586c17068f5d2da01904d76
-
Filesize
25KB
MD5b1d149b020f8a7ccf5a771700c30c7b2
SHA1368637ab0c77a419ea0b7d74328291bd7edfa334
SHA256a6a4f51b20f9d66921a930e253ce2b1e39b62de04582aa115d06dda94dce34e8
SHA512a7ad47bdabee8d3ae002157c2dcb2ede484ce7a3e038069adc3cb3bad71724d3d51cca014b9058f0a23685d3cc2c6ed2fbcc53189e89abfeb0d6652a42a35726
-
Filesize
144KB
MD56ce0d433fdba4ec3e2483e8282a45166
SHA134d2ea9f50d3751195aa504df52ad1af830765ae
SHA2560e3294c4bbd55bc439e7e0a8ff614b00fe69335612a4df9d28fc8fa7abb5f66c
SHA512cddc0766fea086a109cbb368a0e03e2429bed53dd59b89d8d07e6a92060c63744d1a22c2718327854ff5cdf01383c4664fef837307ae33c8c698088347f89429
-
Filesize
72KB
MD57559b3774a0625e8ca6c0160f8f6cfd8
SHA1a403af3337e6207d144b998b9c3bed439af562a9
SHA2561f49b8706547682e2c5ed6642a2f2dcbd287da458314b967c60d774aa7edb473
SHA512392ca665ec105f4e3b6ae13ab58df7c74a06b9b9b4490db01d0c4711d21fc9158b3ca61de9a50a897a6f6f8f3c7c9fcd5a10dcdc62949428e464f20e570e9467
-
Filesize
90KB
MD555c843b0b146c9d1db049e4751172fe1
SHA1d28ae417f33c5183fec5e2f8422c826855f71a90
SHA25696b7b4c95a9d334d7a6b8ddacabf919e9ce37afff929e79c5e7fbb9284f9d36e
SHA5124fc5a00261e1ba0d17c76febaca018ecab36d4dfe506cc432990451607df70ef39b25dd2552ff8a017a63d90bd418c6a72a0f9784adcd5db33e106c5d5fd43c4
-
Filesize
49KB
MD5a394150b1005927ccb8e9bc6fb49e151
SHA172bc15d9181f21edf44f70e0bac5d62440ccaaa5
SHA256468a4649574087cee91fb395a4d58864525f44da30e86fdf09007424d9e6341e
SHA5129e2b28df733127d0e389f2ab23afda5d667ecd98f07a5f0ffc505e094506bc683b581896280aa3ae6655563904e846ee3b737c8fc5bd334c1fc94442200a8518
-
Filesize
1024KB
MD509c44d7d3fe021b80c0c6983d43e7879
SHA162ef901550bb1438f574378cdcce94aaf37249f7
SHA2563fc829a2ad9ef1ded5449ed209d27c613bb1dfb1226d8512e411594f50a5699e
SHA5125c2422cb651ca203ab60b8b140fff001fe598835f4f7aa96c72c90680ed89c836a436b86337f9673426635468a7ff26655df2fe0ba3d20ea091e5d57d5e2c431
-
Filesize
58KB
MD5976d150b893fa889b5d24c96befb88a1
SHA10ed0149316ffebe690d8738ef2ff03c3ae2f6991
SHA256b80ff6a80dddde81cf27d6e3343d8b215848e9ea6038bd1fdb875dc01a56c154
SHA512b2ce794d2a1bebe304811fa6a6da2bb8904394e24083f1ad0a45dc39643c5272610f9248009793366f87c0b06e671ca025fa5d6919bc47a0a2352d23a20a2dd0
-
Filesize
19KB
MD51ea5a526db8735d0b906b9c3cbbcd19a
SHA1c629c116cb7ed736b0b1bf7c5d960fe1823daca7
SHA256416beae7512c0d304ad717c55d68efd80114768dc2c2a681d555f611384b593d
SHA5121602c2785a6e133356615626e08300979d26fa6d465910117fb3f98183a93047adedcf287f03a2835b61131c52612a412dea9a33c291ddcb3f1a6f977efdda02
-
Filesize
47KB
MD506db23f1e591d51a01fd2dc2e0cd0ad4
SHA12ede60aaf5c347453d2414afc1beee2797c5ecf4
SHA2565ea8e1db6abfb61b580d95e83d9be24223abb988dbe0def11f7732b09c97d43e
SHA51209427ef2ea28c55cb7606bd1c67298d95f77dff91acfb97a98621d8cfc909448d687b25a2f604442572b03a9b8ba643177855e96c003f7c4acfa408304903fa0
-
Filesize
910KB
MD56728595d12bd4ae47b5c6e739b17b134
SHA1dcae0ac4535640ae1ccc145935ec43870e1113f6
SHA256b4fa52f5d2e2578ae72cda44c7a863d14035c7461d26112afbddb4905fbfffd6
SHA512ffaf647f86cc39be9f94a3e1f06d6cbfac4e5c62133451d8a32b96cbcb664d954ab3ce516f15995de2733528ba57204ef74eea841a4505b799acfb90185c3a24
-
Filesize
91KB
MD52feeb848c5ba527035942684efb7e8ce
SHA1f7fd18a64083a174d5b24ee93356f0fd84737565
SHA256576b39f26e2c331c8908dcb50ca6610243e6409ce531abec4de8b3c4e1297de8
SHA5120221d004f58d96e8288cbd21ff857480b7cda5585b48638e6188f06b0c11cebb17ca6f3fba76874808e93ae2bc635ee75aab8b98ad50bc5f59a7e5568317f3ec
-
Filesize
1024KB
MD53e544e838ae9900bd4a7911484588b2b
SHA194a601e3437ac7da903e69befe2174d21e8dbd25
SHA256375902a9c78251b2193b63711973cfdb25a4650523202747b386c0ec6d997dd4
SHA5123800fc330dea5f061180381ab70a55eabe593097ddd3fcf4e90e4392e1c079a917f0dc54adf043db5175fa2e018c4b2d9a2c9bf39eb69ae61e23180d86440216
-
Filesize
1024KB
MD5f1b2fed563fc766afc46ab18ee54d5d2
SHA19e09d1d549757c298c2369d58d83abf43d5bd5ab
SHA2567c743415152cf689c96912e2429abf31ec46faaf31b67ac105c45d8bccf6bdcb
SHA5127527a7e2bf755b24773198326f958e21a35a7806fef82f04bf9afe8c5f94414f46b69011c1d2e809833ad5c2ea043d4f918576d2e8aef2f3c7619c0b25ad7d94
-
Filesize
1024KB
MD5d0288682c596edbb837094cbf4a62063
SHA1d07f72003a13138c24b1ad216e3db3e2aa408295
SHA25675e6dbfa6768fdd68aeb84ed1578d7b105ecfd5dab00a17f35df459c94f0f54e
SHA512f363c06c8dc2b5158e4e5299d7544e9a4cc46917a146d853f7db132ccb0db9bee1b084c3b20cfd2ac9395979540772c3e03833a91a7982a8c37b417ce7e8a27f
-
Filesize
66KB
MD5eb935e5e07bd75cf2f7493c84e16ed8d
SHA1d2341ffece533c0e2c1fa9f4f719c496c819b39c
SHA2563d30c2c3a67839225fba63d704ef18befe770bbeda45a4d8affd9a3cca8a2153
SHA5123f7da357a77216446bdfed054c604e3c526125077cc1e70e7823d23028faec48d0cc92e259620840bfc14630d8e540601f5dbc603db1809ce5fb861d35689c74
-
Filesize
27KB
MD5b555324ca28598f4cfa31deeb032c104
SHA1a8b1f5c98deed3e2dd859bbc13bd05b7dc4647cd
SHA256608a6293b55dedd1a54daa0574a177a1e8927c989aa8d30c079e649dfe3ec50d
SHA512330337b8af375c9aebf17f4ac394f53753bddfa176287e2f524c5defa301cbf2068d035978747e6dab59c76602254ced31056a8205e051156870d3b30f298bb1
-
Filesize
61KB
MD588b8dfd8777e79fa3cfb0aba9c24de0b
SHA1336e0a2f6607388d3029d01a4d72d123edc10c94
SHA256c9d5b7f970d8764d06ffd44e224d442b0206c440226ca53c689a59664a938800
SHA5120fbc0ce867ad01cf8ca726bc53db9b7b1bbb1a6fa9ac813a1de8bb0403b93808e43a4626fac2c1ad19326c1edb5b12c28bd8f44af4da33288febb626a0c704bd
-
Filesize
96KB
MD528aa0d261b04149285b4ec9850b7ae97
SHA1c1700720ae616aca2ee9b459b8012f190f3a6f4a
SHA2561cd1971677bc6b453950877ad6caf5aed64c80b8687ee588986ac7f5629c1004
SHA512e0c74073f15156d3a3764798b9db3f5ca3a940b0099dee72c88ba45a7ddaab8cbd23060a2de7466b0823bd76d3d945aab216aaa1b5dfb3bd019d3117585da1d1
-
Filesize
50KB
MD5efe5292e8d04d99caa4dcaa169330b6d
SHA111a8e64ea2570dde50e65eba825a2b3cf38e3961
SHA256d1ad71461deb535b2147a9d5bed382b8c64c119218d8a17ef7f183632995513c
SHA512f826c5d791d9fadcb7ce3e1d914cdcb5b0102882e1b8a4cc8667290c60944ba3c0941f05a25ac51b42185a0129e336c4ac17129cc54d0ca6def4648131685e36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5e0930e068e7aa49a9fe01430f5e0ea42
SHA1e5056570c751547a95b196ea82e28c7276b13735
SHA256036f2a5de3bb00720fe0b1cca7724e701dabb3aeef5ccf67d903f5e1dd9d1a01
SHA512b1d3b75eaf5c162e032272cc57b33610ddfe55586549e87b2b8025f35506df8b164908d1cbdfab31695b995ae5392ec2a8662d02105a3c4db3b4e6f9bd05c09f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57c9a9.TMP
Filesize3KB
MD5edbb2b5d864b72bacd7eca8814e57703
SHA104e45222192391ed83cbb668ec1f3ad0b79750bb
SHA256740b266dfac1d9b51b1e49687bdfb8b8da554a01e5ed37810b11c64b0c6de135
SHA512d4f71a811bc11461e721fc29d7e56175c885f2468c889948967aa7d01ee5b29614e9ee1519dd9cf4b122bd955999520e87df41778cc84902dda588691656bc5a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
24KB
MD5a7a605a83e133f50da26b20cd2829099
SHA1c2959d3c6576cf93e5d6fd1e102a318e6e7302b3
SHA25650a92a9b0000e89dd320df5c69432da210a969075c078f1ed73f8bfee6a2dbcb
SHA5120d8aceb79c47e95d447b0113415651cfd494403c5bd63b6309c0e76bc61795e2973a2d2ba9f529081fee1818be2f96a18d6ae7cc8c163a807a538b053286c6de
-
Filesize
192KB
MD50456963aa2ec11d9d00636d889e85ab4
SHA19f7d8813e2c0d482df1f909339293933884edd43
SHA2562fbe5fe3657a973de28d0ec81c7733543529d9d14f4b49f6bde437d4ea838c18
SHA512b1d94e142d240d2b307f211719d72a938811b8b5b6b67fe0f46aa9f9e4c5618dfd0e34e0465887012dd7e9535d36e3f0f420f197b63de2c096f998c46f730b92
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
5KB
MD524272c15f91a9ec8cb5e20876800c239
SHA17f3d76c9ed6e242db731a0f2d10c9486b756ba63
SHA256680109833633d6945d9e1db347c637475dc09fe81077b598c568b215b88895e0
SHA512f6fb08c4a32e5cd455e2bc06b4ee345df37c6ba394d257a189d4754b56c7d9a85c487bd9625d3ab55da92ffcb8837d743e4db851285bab2030e09bccb6056163
-
Filesize
5KB
MD5d9d76ee338dcedd7facc1a9fd868e3dd
SHA12cf594e4a56720cc898faa994a7f44aa8740987a
SHA256e3e2623204199a5aae3a4a48944668f7f9535f481479558c4f45356d5e3fda07
SHA512f3f0ac8d5fd1b4c465cabc25a2efcb5891efc1e4ff5156ffa43c10f219389b44f251393a9b736be867ffde7e73930e6c4a49547a1c0bf8320356ac1ce10f3320
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
18KB
MD505fe4d2598b8275a421f0142cac1d98b
SHA1ef82b4e3c98c8f765edad82aeea21b1c1c6d7517
SHA25600b706089625ff5450922d4936f57c8e1e70454b099766552dcaf6455027e152
SHA5120c7ba2bf1aa6d34d25ed96485e3f13482687c5bd132a4bb7b7b3932beaf4b5d84575dad242874b4998a4dcc1afd1caf7168a4951a11530e2ec06e58748731529
-
Filesize
17KB
MD57f06497fc6fcab84d98c71c02468fa60
SHA1234ce767b254be0ab71d5f3020d1b0ee8ae6476c
SHA2564c57581f18adeef99cde1d83e9f467a27e71678d69a930232fc9ee79728f36fc
SHA51221adc6c97c006f7d34ce4bfbb1c6ad032e824a10f84f1a6af2badb5396b0ecb8121cede7ecbbf00d6d31cb6d3402af5d46d4e7b3e7996eb7a9d42b21d8960ce9
-
Filesize
36KB
MD5b03f979fb2cc7b6c338ffe84a889cd6e
SHA10f649a84fc2b4fe45bb66d207bb8643b5e42121c
SHA2568715e202f37fd5fcfd222d00b61cc2c080855a0301e575b41bdec0b8c30f9e14
SHA512635d78cb0eaa68a6428e8e5197f9022d31d86ec02334ce1b51ffe40e800ca3c2a1a0908daf7d448f9783ebab27d5a615ebaadaf480bb8844f8794b16923d029a
-
Filesize
338B
MD54d8166953794914aeca984f1d27f598b
SHA19e354e62543d4584d3fc14270d3f404e242f6873
SHA25641b2cfd8f1df81c395f549a9b88e60e1fb5107f3722f64d9b975598b2e67eed4
SHA5122fa5919b41d3642e35e53d34457feb975bc7a2cefeab4be5707fbc4808f0424963f67e012ec4cfb15e15ca875bf26b980254ddbb4829b4065baad715102a0b38
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\000003.log
Filesize112B
MD5cdfe26193ce3645e23eadf921eb501b4
SHA1464ea7ba919aecd38b6ab31c2654e8be6096c2e7
SHA256da91fe2654ae85c41a51ee924ab16786cc1bea937b575bf3e2e78e0f0ca7f090
SHA5120dc797f7174e2ad9663af85a2f88d4665643cc39b2750e07ee8afe817bb797e4c36f9672c6ad0ac1cd125a33761954bc554f29dd91f7ebeda94783f0c4873272
-
Filesize
347B
MD5d9641ec71d522f9289935a83f85ca086
SHA16e8ae78701305182e4096bbac32b193ecb96c32c
SHA256163d73ae5884ff930de2cb7d340b35b0262134ef83206fa4c7428139872bb5a3
SHA5120e3d872d304f94a8e8d45a220341ce7d25dab8f401734e36a4dfcf384a7e984576646bfe930416627d80dd2a17523c885c17ffe2fb9624682b75e6d727423b92
-
Filesize
326B
MD507e68f8ff2fe33790bca001a7761019e
SHA105a857163802ec5eb546b8c5b590ceda73cb606a
SHA256b6a829eb92808dc3d01608785e161b5ef96b55f43c86fb5f3875ed26c5eb99b3
SHA512db06a8975c8520396b7b6c5dd51b783660efe0f842db63582877199a2c3ad09cb77eafae4d61584630c91b2cbeee78050587a819473814e9f2354a5f1b8871f4
-
Filesize
22KB
MD513d04dff7cd608bba1befb9223f5e5a7
SHA184679c617f024dc1569700ebcb87c285ededac84
SHA25615f967c8279957b367c050f17d00b8d911ed82d6a7824cc10ed29bea528d2dc6
SHA512966a778b03aaa86571da4ac99951eaa597527b6ea62073a824bee9f469308ad2ac2d061bc2bb13fe139fd213fc346484decdecc98a754ec03df1d70e4f0b7663
-
Filesize
128KB
MD5d4e0b164ace71c59fde9f66136f3ab66
SHA163aaa8af93b7d277828d6b18a2115708c0a46651
SHA256338945bd7f79e872a7ba2a148cca635f887cf75bdb0b8822796f78d09e955be9
SHA51240bd649370fc8aacd11606e08062274474f46ed9ba6bea81fb9d6ef8b60b97d66e37a0a6b2902c59d8f59bb542e580b766951f199cd729dd5b82c25cf9ec5f64
-
Filesize
72B
MD5748ab6c6283c0d2ba14f6d4ca762427a
SHA1b6ed86ac3ed80fec4f7f5992e5513d1706dc4fc1
SHA256a8ae6ab27ffc9daaed7a29ca7ae74343950e9455d9c192d14904767e43017e5f
SHA512bc0f2d30e1eb538a1be8d429e05b92e32ce40eddf393233366b51e0e5694731e141ae955141483c6ab9f2b40414eb274af21218204498c9bfe868c661007fc5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe577203.TMP
Filesize136B
MD56164a6d74378ae06562a43fc81c3f4e0
SHA13503058fa5193ec6380a5431a5231e2955e95f07
SHA25652098dd8f8b0e42ebaad9dfa686d282c33caf4b6dd6af3886a8ff017d71fa834
SHA512b324e29e01f93015ad3b90015e09b5d6c897267b708e89b992fec204cce8c5b4e0fa8bd5846e53bc2adc9b7ef4161e0aa0311362d72fe5a419f15184aafd41d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\WebStorage\2\IndexedDB\indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
460B
MD5ab98d1d67ba1ad6870d7b0e9a22d9468
SHA163ab69590044ec4d8b9520d2be326f4b24099a6b
SHA256c47491b8a33a62141d03a733674c598c0e15756f729fa48e770fd6c507394b0e
SHA51239162045a165106881107f2631b4199e38e63e529c1a6e01b78563b0e43d2b4145948c99c924a211cc10761eb70279a1629e5f38dae2042c5b05f98657a0e1cb
-
Filesize
13B
MD53e45022839c8def44fd96e24f29a9f4b
SHA1c798352b5a0860f8edfd5c1589cf6e5842c5c226
SHA25601a3e5d854762d8fdd01b235ce536fde31bf9a6be0596c295e3cea9aaf40f3dd
SHA5122888982860091421f89f3d7444cacccb1938ef70fc084d3028d8a29021e6e1d83eaef62108eace2f0d590ed41ece0e443d8b564e9c9a860fc48d766edb1dc3d9
-
Filesize
41KB
MD5318e76955a2388144142103014b07317
SHA1deae0926337222f3d4fd21077eed125577b872e1
SHA2562697c2eb8b5d6571f693401a5526ecf2a6af3d99f49194c965fc010069c3e6cc
SHA512bc81bf9678713b22d7d7161991738b965e53d51bfb3299643b39f91026f77af3bff301b4382a4d64b6174a3155e23e8bcbe3804605f96791b34cb3617d14bfee
-
Filesize
47KB
MD5f30145cfc864457c56fd8b34dd6fe326
SHA14cd42a4feda26f595f93af58c85ac27295292c63
SHA25621f2b0e647d94120bbbd005e1f96198114820e9d786be896093d846a6b1f3649
SHA512c0435830b9ebabae57ae49728ffc3aedc8300e9c10bb68a34ae517f655480c4ae1d3203a63f32ae70a961c92b5828f8575201a443762fc54d6077002fdae0816
-
Filesize
41KB
MD55ee73e598f2a336f28223961388991b3
SHA16165874d79c9121da5d466fedcf8af561b2bf008
SHA256aa8f8f873d6bd25970004dfe8e862a5f2e01eb20d3c2faecb8fba12fe0465654
SHA512a2e053cf654e4de12910ee98321c34bed6ba43568a13b3e1410789cde8411eeea8d761c7a988b403f781ce229f04dcfc633f625d06c32999c3a6b58179dd3eac
-
Filesize
41KB
MD511f82bb1646290a4a250f4db837e2330
SHA1ad97c7840cbb8c7cf406447c33d4c713885b710e
SHA2566472cfd2bb8070931cfd9d1094ba2ba5684ef60a42926fe46adc21e6888f9526
SHA512fb164e98bb6b3ca10af360550d64827fa97462c8687f370fa38f3abdf6272c5be2aadcc0496ea71f66593ccc11a0f127ce75d3df88e40a6d02bbecb78c6955a2
-
Filesize
41KB
MD5b1f2c61b4c37b8145c2d60185793ebd7
SHA152c0c295efa18a2202248d10f67bcb364c32077c
SHA256efc7296e275e11f0074a147398e73b51ef07762be4183b82063aba93641e9d0d
SHA512d2e8d37ddacbfabe9998140e15ae280bb91615c216dbe5f0eccb9b7a57654d9f5dfe762ce4e2a76be7a9f470d95d2fd277ea651fb3c7b2e2a7a674b25ccb5728
-
Filesize
47KB
MD5ce5603e9a5b9fd4ce494ac170b1dd8f6
SHA1dce788fb41fe261947ca5c43de4666c9c846a7e3
SHA256832efc09ed52d6892aa5f2b4ef6cdd2c98bd4826dc64aa261ce645f8f8c29bbf
SHA51258e79cfabad993b044d654969aa96d56aa374f4285967b3de6fe2f189e314bf631ea22394c56865a4f0500097270cf05927683c6e82d3cde3b218054c98e57d3
-
Filesize
264KB
MD5b1fe5cf5c8ea7bee0cba6eee98e8b0c6
SHA1cac2ae2cd6e1bd1190ce2e1d4cd7eef22bd65042
SHA2565addfd24eb3a72fe39c5c0d7213434e9a286b484930bf2ea3ea26b73961a74a6
SHA5126bbfbb872175c54266c93a83ec94771f74e970237899ffe3abef4aa9f3679569bc14632fb9b07e54a51b14b80ce1485fe467cbd1c79d096f26a82ec69d1504c0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.57\Filtering Rules
Filesize1.8MB
MD5d7c9c6d2e1d9ae242d68a8316f41198c
SHA18d2ddccc88a10468e5bffad1bd377be82d053357
SHA256f215127185b2ee6b01e12b6ca75d3e5c4e454598dd4aed36124ae13d59afd547
SHA5127fd14824e9200dd99e1fd2cee402656dc0cfc3d0a60058c5eb05c68e9e65b7f0b47e550fb4d6c2b59eba204dbf3ef9e69dc9723b43a9b3ccd5412d6b77715fc3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.57\LICENSE
Filesize24KB
MD5aad9405766b20014ab3beb08b99536de
SHA1486a379bdfeecdc99ed3f4617f35ae65babe9d47
SHA256ed0f972d56566a96fb2f128a7b58091dfbf32dc365b975bc9318c9701677f44d
SHA512bd9bf257306fdaff3f1e3e1fccb1f0d6a3181d436035124bd4953679d1af2cd5b4cc053b0e2ef17745ae44ae919cd8fd9663fbc0cd9ed36607e9b2472c206852
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD50653d575c3b6dbe8241b07f8b4f4aba1
SHA19bf70e1d1857e78f1b51c41299dac7b27b384c09
SHA256247d06e672344ad95b91cb9bab141432cccd1be2581072ee521b9e942a7f3da6
SHA512866e36d2c58cbaf5eac684e8aef1a6f5ff8435ac32023094036d366f067c1967d07bcfeac45fcd0961517725cde11d5413fb2bc1d8ee625913c8edef7aebc38b
-
Filesize
325B
MD51668faae6e14769bf790ea74d42b0b1b
SHA131e3d6753c309666c2fd95ae2656676b394fad8f
SHA2563598dc977c635999a9492fa0750b80b15d91cbec8528d03e874c0d57b448273f
SHA512d2f507d039661c770ccdd8eab7664107338eb167da634124a20c476a89be8abee800e9d3d1c1e0e96612df7468a1821f81d7e1b9341add33f47280b6d50aade9
-
Filesize
583B
MD55a36e2bde62f772442ec56bc9fdf72f5
SHA1618a550fc4009bb8f88a44eddc92341f9c46e661
SHA2563ebb71e912c1fe05acbf81364fed40315bb2629cc14b02444fab53edc5993341
SHA512d5ddba3c3a14dff8fce01045344e46285bd548df6df65c9ed2a63ea6dd799ddbf5e84fc3c77cbd06b23e1a4cbbbb6e374d785988e43e1a870bb0639f5143ebf2
-
Filesize
370B
MD552f0cb7b4289feb2d62b6d512e01f7ea
SHA13fd364ee4b658dc4780a0e28249a11fb3d1547f7
SHA2567f2fa47746f483e06620eeb37356fca10a92394aec5e0bbfff6aad32162625aa
SHA512646d11c999dac14727ab29fd9dd87ce3413b478f58c4f7139929c25826de5aca37def5e9dd86e3296b65f3403ae45c699fb33f26bd477c02412adfa81d633640
-
Filesize
1KB
MD53639314c379799f33a8f0438522e2e61
SHA1f4ff7663abe775dd24a2267ced1c05f904cf5a0b
SHA256d279ab376a0d3f6c3f10a1e57c43b0588e62f37916e2bbfaab0dfcf5521ac19d
SHA5125079bdac6f3c8d5afd53788be9b09d5ba6a2f34f3b545fafec8fc4c3cd6a94875a5645326b53344e5b3e59ac752bb719eb79437078859640dd7f6de4ce0ca227
-
Filesize
3KB
MD572f9ee7049b03e4a5fc2c6c138b8f404
SHA19293231cbc28094c4996bdb32937d1b09c1eb541
SHA25646339dd1bd0895941c1156285fbb22a0e315b5b935431f0bfcf5fbe09b39143e
SHA512e04b2fd52dd503e7f85527f937c5925298a74a293d5a3eac2c17723a7ca3f809b4346a66128e4e8233de465f77691a701bbdfe08cb5fa268c53c5b66b6e82c9f
-
Filesize
4KB
MD59d78f6184cf91f9da9e478def00626c9
SHA161b93f10c5ae0ca3064c7aaa95e817129354024c
SHA256b65200cdb7d4a4b34761ac25466d6bbba7a4c0607309b17ed3834c626358debc
SHA5128a74033776a0c9541a612d25612123f2ae5a55cdb7bef233d620ce887968aeff91a32940d80f815091075f258654a22423d4b96593e9276fa81084a403c5822c
-
Filesize
415B
MD5919c29c6ab687a513665b27446065601
SHA11413a8d988d116ec0d08ee9cbf88fe55dde2d8bb
SHA2567297515ee06d24901d83d1c9c00d24901a2914c6537f890b3c51cc42008b1859
SHA5123c383ca78fbd97f3ea37f1ecd63234457431dcc2c77f14dd6cc0b86615c98e34cdfab2472c01400eeeff568bb70993dfe3fde190e42665f6198033e3b0b6bd3d
-
Filesize
325B
MD517325a889b8a2b81e3c12e95b3f14219
SHA1118597be8a648c9233e4a6b1f05537b7752362b6
SHA2562c5474eac87a202ef249040f9b349bdb5e333665f553680e8811c4140832f920
SHA512761e55be19054b5727f1d26e9b36224e4f92614ad17b1a96790f82841c39d6a9ba10f5e7bccb2b48c1571c1b4a564ffc36abbf61140dd5254ecabc155d2c9917
-
Filesize
583B
MD590d81ba78461f30041b7199c6d0e2589
SHA1b35b1fef3f72fded6b8393c2052b606b9e487aa0
SHA256f0585673827552ea3f243881a3026bad7e14f1ff8b9fa194cb9647245a466318
SHA512c37523e5cd9af1502e9816f18526fca27d3a9834e3fd5c06a67b66c6f30099061f87788968849ff48d94038183f797529e4bb2b3845cb193784d6c80d42041e0
-
Filesize
325B
MD5f47f21ff6c3c5a07592597bffdfbe19c
SHA14feeb314b26196d16fc0409846eb982c195ef6e3
SHA25651ef5b2da43c4071aff90b13f1c1392423e77f4be9727df891443f9d611dc1dd
SHA512c4e319b579afd723d32db2ca9a207e2c1129dac99746fa555b5adb42cf88a8346570d3fe54ee798a8807fe70fd369da5d1ad30031d7bb3f95578fa1552bf71a8
-
Filesize
583B
MD55003873b62170f078a96413f0b6862db
SHA1187239410ae5c907ebc0a16b737caccd99d83e39
SHA2569d3018a6647b28c1b6f083d612a76372aacf25fc669504107ba0d2c34811e65a
SHA5125cc684ddd561f7478e1772b43194abc89767c4eb4818d53ccb7e3c1d37ff5022595a7b5221218b38421e48d83fcf9801cf8a7bf6d5f36dc019e8fe4b3dbfae71
-
Filesize
456KB
MD582d4ee89f4a39c764fa6297a95ebb10e
SHA187b1f581ad017bf62604d8071a23fde8b81550e1
SHA2561081255de41aafd51bc8f4e4404ef02209e59625ae65fa926657df5690716c5d
SHA512904fd99f7d5951a23af202fceeade044b6d4f40c75db09d0237618ff80b90934ca4ad3210751f6e5bcad71b3a4131e24d420e94292bcfb7acbc3490ebc844382
-
Filesize
4.2MB
MD5b4d949571134fc3ec6c28f1af7a75e49
SHA107eb5685ff4f19ff8ed466c68c2426e2ead69241
SHA256b415f3e061d9758316074dcbf31d6dba48cb0b89405254db94ead0e43ed88511
SHA5127abb1128d4f9312ec714f7d3f4e1d1ce12a6f93235d6382cf25c39dae0d7d88b5ad5141f512659c33cf57a762e14711b6b690b33da7d16c7d7be35c8b292131b
-
Filesize
4.2MB
MD5b66478cc0f9ec50810489a039ced642b
SHA1992ede70f0fee5cb323b4b810cc960bf2531875e
SHA256e512fe71775f767285cfb3310d8f1ac042639ab3d1a02ca3675b82cfd3cbc702
SHA512ed07e71fd6bc2bd9f2ada8b8d6aa80662d6ffadce7d692f078e9ccd8ada2ba47b0e25967809f567fb93ffc96271037f010a0038bb78301812a75e30eee9b2645
-
Filesize
711KB
MD5c00b30289cc427caff97af5aa3d43e03
SHA18e70885a62b0fe510422c2367b1f6de489b67e6c
SHA256b155e2bfce3adbbc45d01ec991160ab4fab7e8d33a0ab835463da860d3693867
SHA5123a70161a5adaba0101f2d2ca1522b1e71d04079ad15cc87a030b00c14b45df9545d5cba55101e25d9bd101769edb87a8e4d893125780e86fa2551290ab720860
-
Filesize
77KB
MD547c83b958951331ba409d6b80316250c
SHA1ce14566676a27a0899079781a41888a2f1303127
SHA256e51523f179a8ab8101eaa3e587c5e1dfe6c19636ecfa582896833f06d2e79064
SHA51258408238279126e2b478a2f7cda513e5b5908140cc615f271e2baea7a2fe59046f51040406adb86194cc168ff4bc9ea2ca92834b9d90116f9ceb2384a4325896
-
Filesize
125KB
MD57623474a8b9bec1e3ffca813cdf93bc3
SHA14a1c0ecf8cbed18d0472136a7096ee8c3c2fa774
SHA25667766e574baa86eb8317623acc2957e8e28944bb801a8c10a0fa9d29fdb4cfd3
SHA512b7e7205e48eade918d63b483fb500867cc8196496fe9136f0177481d654a67af8319b6823fb04787e4bd6ee46c031c2b6fea57f0bf12b8a58cf8e0003834bd7b
-
Filesize
50KB
MD53ad3c0fd4dca001a2f9e707b74544919
SHA1c6176415ecd3e8f38f976e4234325452fe1fd2a0
SHA25681111a1cb6f8f362cf232e21098c563fe1409160300f2a254f2a1762e5d4db04
SHA512436dac92e4a60dfc02c8c7a7ae496df7199c3fd15ef668bff2565f428f25be9c3ae1d0e120d64767eda1a9d4afa2e8bfeb6d047745440c3fce854080c44f42c5
-
Filesize
3.3MB
MD5c5b362bce86bb0ad3149c4540201331d
SHA191bc4989345a4e26f06c0c781a21a27d4ee9bacd
SHA256efbdbbcd0d954f8fdc53467de5d89ad525e4e4a9cfff8a15d07c6fdb350c407f
SHA51282fa22f6509334a6a481b0731de1898aa70d2cf3a35f81c4a91fffe0f4c4dd727c8d6a238c778adc7678dfcf1bc81011a9eff2dee912e6b14f93ca3600d62ddd
-
Filesize
146KB
MD59f7f22cef980ec272a9b73bf317500e4
SHA1ae11d7cdfa84a242e31efd6f03b0ef764d5f900c
SHA256041a631d114e45a11c43efe3b7712a10ce8052cf4b313c7f4577a5b9adb78072
SHA51219e432313c1e28fc076fb9e9c3884c3c97cc2d05b6d1aecf429180a6f5cc407734fe758bcc63936d5fe7ef8ac01abdf5ec4b17bb08b26c5cc87c560f4b89c5bc
-
Filesize
3.2MB
MD5a4dfddff62d1e917ebb0688cf8d96be7
SHA19376bfa069a72da76733cc72cf90386920815142
SHA256cbfc536b80405da7b5c37c97fceaf2310daf58d78c806140367b8f513352342f
SHA51297de24a94f7aaaf3035853c0eb93f44c5c2cdfad99b563fef225d9f2b6f4fa3fe8f89850895d286322191cf8b372aa87da6620796cd32fe368f75b6722b556c3
-
Filesize
11.8MB
MD53d77d460c415f1abc7067e82c64627ef
SHA12621ded989c576a059769203eb8cbe5986650b7f
SHA2565f383d9017509e2e986adcfd54ffabd55dd0e538d85eef8dbf840b8a370926d8
SHA512951664d7ce2c434ea9332666ed5e79b655ec4a2e70d8f5bd0ba2d8ba4b6367bad0978f0509ded9d1a8b2b4ddfeae70c34e08afa8be5132ad83dcbfa16f18f15e
-
Filesize
30.4MB
MD54cb98d63f1b2b9dc38e10e9901ec52d8
SHA142c0e8b8e5c7a4113e38a977221f845ef8406722
SHA256ba3467a8db908d81a0729f78fdc5c8f1d1595d3da4e5a9a34be9a16e06da9f87
SHA512d351b9ff851490187b003c675047b6a20a2519df3818bcd18a674d6edab1d211c9661acc98403b562ff3268576ea203b4e0f10e962467b9849b72431c92735a4
-
Filesize
3.5MB
MD53c01738b1f92ef6b523e57103f3bc31b
SHA121e2c49f26f45eebdee6badef9705397273ae0af
SHA25617b76572ca658e857a5ace2d21dcc3976ce1a4fa9e7482f513b8f2d628074fbd
SHA5122f3eaaafc9d7ccc33fd6a8e0b81088c5ade2831f7239eff95f09d9ffa2d28fb7196e64b49ec346706b91d54b2c905f9ce8de1cb0f1b245fff51028cd8db4e8c4
-
Filesize
24.6MB
MD51c8e86ef195e872e51567f3f058fe813
SHA12d62b2103f8c15c0a15e3d7e0260268c1357bf5b
SHA256ca68da088730f006dcb547d93f1a29c89461953c4656299227b56d235ca0b113
SHA512591235d7f4436b6db0e6ba7efa07c78c2f5a707dea1100e9cead242c1d75cc60bd8b9bc1e5a010eb64cd44cd2e6a5c322a486e04e416f6104314fc8a7e98a8ea
-
Filesize
75KB
MD500678eb6be3b52d562b66218c93e21a8
SHA1ba583d1520da22f3d3b89196c981279ecda58648
SHA256b18c8437663002e4a4f06c4c1b7bec71fe13e5e6bbb927c68a273de02a5c690f
SHA51258d9ffa0f569ba7b1aaea62b49f5bfa18bf23c54d2487eb9e4da984469236c2d4baabeeeac7e4b71d66b8c30f7fff4890fee5ee25e00369fc4afce053cbeb048
-
Filesize
338KB
MD504fb36199787f2e3e2135611a38321eb
SHA165559245709fe98052eb284577f1fd61c01ad20d
SHA256d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9
SHA512533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444
-
Filesize
414KB
MD5c850f942ccf6e45230169cc4bd9eb5c8
SHA151c647e2b150e781bd1910cac4061a2cee1daf89
SHA25686e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f
SHA5122b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9
-
Filesize
15.9MB
MD50f743287c9911b4b1c726c7c7edcaf7d
SHA19760579e73095455fcbaddfe1e7e98a2bb28bfe0
SHA256716335ba5cd1e7186c40295b199190e2b6655e48f1c1cbe12139ba67faa5e1ac
SHA5122a6dd6288303700ef9cb06ae1efeb1e121c89c97708e5ecd15ed9b2a35d0ecff03d8da58b30daeadad89bd38dc4649521ada149fb457408e5a2bdf1512f88677
-
Filesize
4.3MB
MD5a4fbfa935c39f826f7050981aec178ab
SHA14b8c4b533be72f1a1a400d562fd7f90b24af80d1
SHA256be4b9d25e3e5a193f6cefc180b906c68abbc00a3d39af377d462e19c588419d0
SHA51277d60cf7d8d14a0a10ed6f6e82895847f2676a34bc9f83ada1183e98f5fa14cfc591d344f2a6c2f21c7cb681415c8712c6e35e2089017b73fc4cbb2e0d78a6c2
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c