Analysis
-
max time kernel
362s -
max time network
365s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2025, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
Screen Recording 2025-03-06 180718.mp4
Resource
win10v2004-20250314-en
General
-
Target
Screen Recording 2025-03-06 180718.mp4
-
Size
44.3MB
-
MD5
02bbb635746e846d73066322261287b3
-
SHA1
f68f8295c7ab22de40e1585f77497d74c4f89e2e
-
SHA256
aadd7cdd3848c8c1755677839c043d17005722f8fde2dc9c4b443d500074674d
-
SHA512
2c4b8112f026e1a51c70f5fca81d057786f4e13a8d7cf8d53474c3ca0242e28506bb5d58ddd41c5e89c54aeab6731f6950f3797bef5bbd415f62f0baaef15a60
-
SSDEEP
786432:GGgr1sZU9600jlhyveuY5FyIeV0IfjVmj21SZkIYaUU08EPvuiSTOmXpJnr3E:GpEVHjlhIeuOr80802I0aUU0d+T7XpdE
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\Active Setup\Installed Components MSAGENT.EXE Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\Active Setup\Installed Components tv_enua.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 514 1012 chrome.exe -
Executes dropped EXE 7 IoCs
pid Process 3052 MSAGENT.EXE 3540 tv_enua.exe 1612 AgentSvr.exe 7024 BonziBDY_4.EXE 7020 AgentSvr.exe 6324 BonziBDY_35.EXE 7128 BonziBDY_2.EXE -
Loads dropped DLL 53 IoCs
pid Process 1392 BonziBuddy432.exe 1392 BonziBuddy432.exe 1392 BonziBuddy432.exe 1392 BonziBuddy432.exe 1392 BonziBuddy432.exe 1392 BonziBuddy432.exe 1392 BonziBuddy432.exe 1392 BonziBuddy432.exe 1392 BonziBuddy432.exe 1392 BonziBuddy432.exe 1392 BonziBuddy432.exe 3052 MSAGENT.EXE 5796 regsvr32.exe 636 regsvr32.exe 4948 regsvr32.exe 3388 regsvr32.exe 3544 regsvr32.exe 5124 regsvr32.exe 5008 regsvr32.exe 3540 tv_enua.exe 3748 regsvr32.exe 3748 regsvr32.exe 1560 regsvr32.exe 7024 BonziBDY_4.EXE 7024 BonziBDY_4.EXE 7024 BonziBDY_4.EXE 7024 BonziBDY_4.EXE 7024 BonziBDY_4.EXE 7024 BonziBDY_4.EXE 7020 AgentSvr.exe 7020 AgentSvr.exe 7020 AgentSvr.exe 6324 BonziBDY_35.EXE 6324 BonziBDY_35.EXE 6324 BonziBDY_35.EXE 6324 BonziBDY_35.EXE 6324 BonziBDY_35.EXE 7020 AgentSvr.exe 7020 AgentSvr.exe 6324 BonziBDY_35.EXE 6324 BonziBDY_35.EXE 6324 BonziBDY_35.EXE 6324 BonziBDY_35.EXE 7128 BonziBDY_2.EXE 7128 BonziBDY_2.EXE 7128 BonziBDY_2.EXE 7128 BonziBDY_2.EXE 7128 BonziBDY_2.EXE 7128 BonziBDY_2.EXE 7024 BonziBDY_4.EXE 7024 BonziBDY_4.EXE 7024 BonziBDY_4.EXE 7128 BonziBDY_2.EXE -
System Binary Proxy Execution: Rundll32 1 TTPs 1 IoCs
Abuse Rundll32 to proxy execution of malicious code.
pid Process 4680 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tv_enua = "RunDll32 advpack.dll,LaunchINFSection C:\\Windows\\INF\\tv_enua.inf, RemoveCabinet" tv_enua.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 385 camo.githubusercontent.com 386 camo.githubusercontent.com 387 camo.githubusercontent.com 388 camo.githubusercontent.com 389 camo.githubusercontent.com 393 raw.githubusercontent.com 378 camo.githubusercontent.com 384 camo.githubusercontent.com -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SETA79A.tmp tv_enua.exe File created C:\Windows\SysWOW64\SETA79A.tmp tv_enua.exe File opened for modification C:\Windows\SysWOW64\msvcp50.dll tv_enua.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\BonziBuddy432\msvcrt.dll BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\s1.nbd BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Options\uninstall.bat BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\page8.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\sp001.gif BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Alpha-net\page13.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Alpha-net\sp004.gif BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\CHORD.WAV BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\SSCALB32.OCX BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\page4.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\SSubTmr6.dll BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Runtimes\spchcpl.exe BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Polizoof\page1.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\page7.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\page9.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Alpha-net\page9.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\page18.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\page5.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Polizoof\page6.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\page13.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\J001.nbd-SR BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\t2.nbd BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\t3.nbd-SR BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Options\ManualDirPatcher.bat BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Polizoof\page5.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\cb006.gif BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\page19.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\cb003.gif BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\page12.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Alpha-net\page1.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Alpha-net\sp003.gif BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\book BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\page11.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Uninstall.exe BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Reg.nbd BonziBDY_4.EXE File opened for modification C:\Program Files (x86)\BonziBuddy432\AUTPRX32.DLL BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\j3.nbd-SR BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Snd2.wav BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\t001.nbd BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Options\CheckRuntimes.bat BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Options\registry.reg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Alpha-net\page4.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\p001.nbd BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\BG\Bg3.bmp BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Runtimes\tv_enua.exe BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Alpha-net\sp005.gif BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Apps.nbd BonziBDY_4.EXE File opened for modification C:\Program Files (x86)\BonziBuddy432\BonziBDY_2.EXE BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\ssa3d30.ocx BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Polizoof\page12.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Polizoof\page3.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Polizoof\page7.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\page11.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\page2.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\BonziBDY.vbw BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Bonzi's Solitaire.vbw BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Reg.nbd BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Options\bonzibuddys.URL BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Polizoof\page15.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Polizoof\page8.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonz and the Treasure Chest\cb010.gif BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Alpha-net\page15.jpg BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\j001.nbd BonziBuddy432.exe File opened for modification C:\Program Files (x86)\BonziBuddy432\j3.nbd BonziBuddy432.exe -
Drops file in Windows directory 59 IoCs
description ioc Process File created C:\Windows\msagent\SETA281.tmp MSAGENT.EXE File opened for modification C:\Windows\lhsp\tv\SETA786.tmp tv_enua.exe File opened for modification C:\Windows\INF\SETA799.tmp tv_enua.exe File opened for modification C:\Windows\fonts\SETA798.tmp tv_enua.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\msagent\chars\Bonzi.acs BonziBuddy432.exe File opened for modification C:\Windows\msagent\AgentDPv.dll MSAGENT.EXE File opened for modification C:\Windows\msagent\SETA25C.tmp MSAGENT.EXE File opened for modification C:\Windows\msagent\AgtCtl15.tlb MSAGENT.EXE File opened for modification C:\Windows\msagent\AgentDp2.dll MSAGENT.EXE File opened for modification C:\Windows\msagent\AgentAnm.dll MSAGENT.EXE File created C:\Windows\msagent\intl\SETA270.tmp MSAGENT.EXE File opened for modification C:\Windows\lhsp\tv\tv_enua.dll tv_enua.exe File opened for modification C:\Windows\lhsp\tv\SETA787.tmp tv_enua.exe File opened for modification C:\Windows\INF\tv_enua.inf tv_enua.exe File opened for modification C:\Windows\help\Agt0409.hlp MSAGENT.EXE File created C:\Windows\lhsp\tv\SETA787.tmp tv_enua.exe File opened for modification C:\Windows\msagent\SETA236.tmp MSAGENT.EXE File opened for modification C:\Windows\msagent\AgentCtl.dll MSAGENT.EXE File opened for modification C:\Windows\msagent\SETA248.tmp MSAGENT.EXE File created C:\Windows\msagent\SETA25D.tmp MSAGENT.EXE File created C:\Windows\INF\SETA799.tmp tv_enua.exe File opened for modification C:\Windows\msagent\SETA249.tmp MSAGENT.EXE File opened for modification C:\Windows\msagent\mslwvtts.dll MSAGENT.EXE File created C:\Windows\msagent\SETA25C.tmp MSAGENT.EXE File opened for modification C:\Windows\msagent\SETA25D.tmp MSAGENT.EXE File created C:\Windows\msagent\SETA236.tmp MSAGENT.EXE File opened for modification C:\Windows\msagent\SETA25A.tmp MSAGENT.EXE File opened for modification C:\Windows\msagent\SETA25B.tmp MSAGENT.EXE File created C:\Windows\msagent\SETA26E.tmp MSAGENT.EXE File created C:\Windows\fonts\SETA798.tmp tv_enua.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File created C:\Windows\msagent\SETA248.tmp MSAGENT.EXE File created C:\Windows\msagent\SETA247.tmp MSAGENT.EXE File created C:\Windows\msagent\SETA25B.tmp MSAGENT.EXE File opened for modification C:\Windows\occache\tv_enua.exe rundll32.exe File opened for modification C:\Windows\lhsp\help\tv_enua.hlp tv_enua.exe File opened for modification C:\Windows\msagent\AgentMPx.dll MSAGENT.EXE File created C:\Windows\help\SETA26F.tmp MSAGENT.EXE File opened for modification C:\Windows\msagent\SETA281.tmp MSAGENT.EXE File created C:\Windows\lhsp\tv\SETA786.tmp tv_enua.exe File opened for modification C:\Windows\msagent\chars\Peedy.acs BonziBuddy432.exe File created C:\Windows\msagent\SETA249.tmp MSAGENT.EXE File created C:\Windows\msagent\SETA25A.tmp MSAGENT.EXE File opened for modification C:\Windows\msagent\SETA26E.tmp MSAGENT.EXE File opened for modification C:\Windows\msagent\SETA247.tmp MSAGENT.EXE File opened for modification C:\Windows\msagent\AgentSR.dll MSAGENT.EXE File opened for modification C:\Windows\INF\agtinst.inf MSAGENT.EXE File created C:\Windows\lhsp\help\SETA797.tmp tv_enua.exe File opened for modification C:\Windows\msagent\AgentSvr.exe MSAGENT.EXE File opened for modification C:\Windows\help\SETA26F.tmp MSAGENT.EXE File opened for modification C:\Windows\lhsp\tv\tvenuax.dll tv_enua.exe File opened for modification C:\Windows\INF\SETA26D.tmp MSAGENT.EXE File created C:\Windows\INF\SETA26D.tmp MSAGENT.EXE File opened for modification C:\Windows\msagent\intl\SETA270.tmp MSAGENT.EXE File opened for modification C:\Windows\msagent\intl\Agt0409.dll MSAGENT.EXE File opened for modification C:\Windows\lhsp\help\SETA797.tmp tv_enua.exe File opened for modification C:\Windows\fonts\andmoipa.ttf tv_enua.exe File opened for modification C:\Windows\msagent\AgentPsh.dll MSAGENT.EXE -
Program crash 1 IoCs
pid pid_target Process procid_target 6908 216 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grpconv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BonziBDY_2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSAGENT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tv_enua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BonziBDY_4.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grpconv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AgentSvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AgentSvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BonziBDY_35.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BonziBuddy432.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133886153252483053" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F59C2A4-4C01-4451-BE5B-09787B123A5E}\InprocServer32\ThreadingModel = "Apartment" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8E3867A2-8586-11D1-B16A-00C0F0283628} BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{916694A9-8AD6-11D2-B6FD-0060976C699F}\TypeLib\Version = "1.1" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{065E6FDD-1BF9-11D2-BAE8-00104B9E0792}\TypeLib BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{57DA7E73-B94F-49A2-9FEF-9F4B40C8E221}\Programmable BonziBDY_4.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F7AE601-0142-11D3-9DCF-89BE4EFB591E}\TypeLib\ = "{972DE6B5-8B09-11D2-B652-A1FD6CC34260}" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{53FA8D4D-2CDD-11D3-9DD0-D3CD4078982A}\ToolboxBitmap32\ = "C:\\PROGRA~2\\BONZIB~1\\ACTIVE~1.OCX, 120" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{29D9184E-BF09-4F13-B356-22841635C733}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\BonziBuddy432" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C74190B5-8589-11D1-B16A-00C0F0283628}\TypeLib BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95A893C3-543A-11D0-AC45-00C04FD97575}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD31E-5C6E-11D1-9EC1-00C04FD7081F}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4900F5D-055F-11D4-8F9B-00104BA312D6}\1.4\FLAGS BonziBDY_4.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F049-858B-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{065E6FE3-1BF9-11D2-BAE8-00104B9E0792}\VersionIndependentProgID\ = "Threed.SSCheck" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{065E6FE3-1BF9-11D2-BAE8-00104B9E0792}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F5BE8BE3-7DE6-11D0-91FE-00C04FD701A5} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BDD1F04B-858B-11D1-B16A-00C0F0283628}\MiscStatus\1 BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE3D-8596-11D1-B16A-00C0F0283628}\InprocServer32\ = "C:\\Program Files (x86)\\BonziBuddy432\\MSCOMCTL.OCX" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C74190B4-8589-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{065E6FDF-1BF9-11D2-BAE8-00104B9E0792}\VersionIndependentProgID BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CDA1CA00-8B5D-11D0-9BC0-0000C0F04C96}\ProxyStubClsid32 BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD31C-5C6E-11D1-9EC1-00C04FD7081F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FileType\{D45FD301-5C6E-11D1-9EC1-00C04FD7081F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4900F5D-055F-11D4-8F9B-00104BA312D6} BonziBDY_4.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Agent.Control.1\CLSID\ = "{F5BE8BD2-7DE6-11D0-91FE-00C04FD701A5}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8DB2224E-D2FA-4B2E-8402-085EA7CC826B}\TypeLib\ = "{F4900F5D-055F-11D4-8F9B-00104BA312D6}" BonziBDY_4.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{22DF5084-12BC-4C98-8044-4FAD06F4119A}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" BonziBDY_4.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0A45DB49-BD0D-11D2-8D14-00104B9E072A}\TypeLib BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ActiveSkin.ComMorph.1\ = "ActiveSkin.ComMorph Class" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ActiveSkin.SkinSource.1\CLSID BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{53FA8D49-2CDD-11D3-9DD0-D3CD4078982A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ImageListCtrl BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6B976285-3692-11D0-9B8A-0000C0F04C96}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F04C-858B-11D1-B16A-00C0F0283628}\ = "IListItems" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE11629C-36DF-11D3-9DD0-89D6DBBBA800}\InprocServer32\ThreadingModel = "Apartment" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{83C2D7A0-0DE6-11D3-9DCF-9423F1B2561C}\ProxyStubClsid32 BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E3867A1-8586-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{065E6FEA-1BF9-11D2-BAE8-00104B9E0792}\ = "DSSPanel" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C4ABF875-8100-11D0-AC63-00C04FD97575}\TypeLib\Version = "2.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66833FE5-8583-11D1-B16A-00C0F0283628}\TypeLib BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD9DA660-8594-11D1-B16A-00C0F0283628}\ProxyStubClsid32 BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66833FE7-8583-11D1-B16A-00C0F0283628}\ProxyStubClsid32 BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD9DA660-8594-11D1-B16A-00C0F0283628}\ProxyStubClsid32 BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{972DE6C2-8B09-11D2-B652-A1FD6CC34260}\InprocServer32 BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3C01387A-6AC2-4EF1-BDA2-EC5D26E3B065}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{66833FE4-8583-11D1-B16A-00C0F0283628} BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{74179610-5A56-11CE-940F-0000C0C14E92} BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{822DB1C0-8879-11D1-9EC6-00C04FD7081F}\TypeLib\Version = "2.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4043742-AC8D-4F86-88E9-F3FD3369DD8C}\ = "_clsBBPlayer" BonziBDY_4.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ActiveSkin.ComMorph.1 BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{065E6FE9-1BF9-11D2-BAE8-00104B9E0792}\Implemented Categories BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6549F504-C43A-43F3-B8CD-D077AF0427C8}\ProxyStubClsid32 BonziBDY_4.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{322982E1-0855-11D3-9DCF-DDFB3AB09E18}\TypeLib\ = "{972DE6B5-8B09-11D2-B652-A1FD6CC34260}" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ActiveSkin.SkinEvent.1\ = "SkinEvent Class" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C74190B7-8589-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CDA1CA02-8B5D-11D0-9BC0-0000C0F04C96}\ = "ISSReturnShort" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{53FA8D42-2CDD-11D3-9DD0-D3CD4078982A}\TypeLib\Version = "1.0" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Program Files (x86)\\BonziBuddy432\\MSWINSCK.OCX" BonziBuddy432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{065E6FE6-1BF9-11D2-BAE8-00104B9E0792}\MiscStatus\1\ = "139665" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD2FC-5C6E-11D1-9EC1-00C04FD7081F}\Programmable AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{159C2806-4A71-45B4-8D4E-74C181CD6842}\ProxyStubClsid BonziBDY_35.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ActiveSkin.ComFilters\CurVer\ = "ActiveSkin.ComFilters.1" BonziBuddy432.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\TypeLib BonziBuddy432.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6304 chrome.exe 6304 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
pid Process 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 216 wmplayer.exe Token: SeCreatePagefilePrivilege 216 wmplayer.exe Token: SeShutdownPrivilege 3040 unregmp2.exe Token: SeCreatePagefilePrivilege 3040 unregmp2.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: 33 912 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 912 AUDIODG.EXE Token: SeShutdownPrivilege 216 wmplayer.exe Token: SeCreatePagefilePrivilege 216 wmplayer.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe Token: SeShutdownPrivilege 6000 chrome.exe Token: SeCreatePagefilePrivilege 6000 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 216 wmplayer.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 7020 AgentSvr.exe 7020 AgentSvr.exe 7020 AgentSvr.exe 7020 AgentSvr.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe 6000 chrome.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1392 BonziBuddy432.exe 3052 MSAGENT.EXE 3540 tv_enua.exe 1612 AgentSvr.exe 7024 BonziBDY_4.EXE 7024 BonziBDY_4.EXE 6324 BonziBDY_35.EXE 6324 BonziBDY_35.EXE 7128 BonziBDY_2.EXE 7128 BonziBDY_2.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 3220 216 wmplayer.exe 91 PID 216 wrote to memory of 3220 216 wmplayer.exe 91 PID 216 wrote to memory of 3220 216 wmplayer.exe 91 PID 6000 wrote to memory of 4020 6000 chrome.exe 92 PID 6000 wrote to memory of 4020 6000 chrome.exe 92 PID 3220 wrote to memory of 3040 3220 unregmp2.exe 93 PID 3220 wrote to memory of 3040 3220 unregmp2.exe 93 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 1012 6000 chrome.exe 95 PID 6000 wrote to memory of 1012 6000 chrome.exe 95 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5412 6000 chrome.exe 96 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98 PID 6000 wrote to memory of 5216 6000 chrome.exe 98
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Screen Recording 2025-03-06 180718.mp4"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 22722⤵
- Program crash
PID:6908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:6000 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9398cdcf8,0x7ff9398cdd04,0x7ff9398cdd102⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1560,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2600 /prefetch:32⤵
- Downloads MZ/PE file
PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2416,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2376 /prefetch:22⤵PID:5412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2128,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:5216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3176,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4264 /prefetch:22⤵PID:5620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4732,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:5856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5236,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5576,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:5496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5640,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:5316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5828,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:5144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5440,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:5956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5420,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=6064,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5460,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:5844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3272,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3360,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5836,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5592,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6160 /prefetch:12⤵PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=6288,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6320 /prefetch:12⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6168,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6240 /prefetch:82⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6176,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6228 /prefetch:82⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6264,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6996 /prefetch:82⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6992,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=7000 /prefetch:82⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5488,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=5932,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=on_device_model.mojom.OnDeviceModelService --lang=en-US --service-sandbox-type=on_device_model_execution --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6204,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1260 /prefetch:82⤵PID:6848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=3228,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:5316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --field-trial-handle=7084,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6576 /prefetch:12⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=4708,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=6336,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6424 /prefetch:12⤵PID:5448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=4752,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:6952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --field-trial-handle=5812,i,4241572119939285093,17650965184556057124,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:1016
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4840
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4688
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4c4 0x4701⤵
- Suspicious use of AdjustPrivilegeToken
PID:912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3912
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Bon.zip\BonziBuddy432.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_Bon.zip\BonziBuddy432.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\BonziBuddy432\Runtimes\CheckRuntimes.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:6032 -
C:\Program Files (x86)\BonziBuddy432\Runtimes\MSAGENT.EXEMSAGENT.EXE3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3052 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentCtl.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5796
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentDPv.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:636
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\mslwvtts.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4948
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentDP2.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3388
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentMPx.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3544
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentSR.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5124
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentPsh.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5008
-
-
C:\Windows\msagent\AgentSvr.exe"C:\Windows\msagent\AgentSvr.exe" /regserver4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1612
-
-
C:\Windows\SysWOW64\grpconv.exegrpconv.exe -o4⤵
- System Location Discovery: System Language Discovery
PID:1292
-
-
-
C:\Program Files (x86)\BonziBuddy432\Runtimes\tv_enua.exetv_enua.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3540 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\lhsp\tv\tv_enua.dll4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3748
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\lhsp\tv\tvenuax.dll4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1560
-
-
C:\Windows\SysWOW64\grpconv.exegrpconv.exe -o4⤵
- System Location Discovery: System Language Discovery
PID:5008
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bonzibuddy.tk/2⤵PID:5180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-skip-compat-layer-relaunch --single-argument http://bonzibuddy.tk/3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:1892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x2e0,0x7ff92b4bf208,0x7ff92b4bf214,0x7ff92b4bf2204⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1928,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=2984 /prefetch:34⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2972,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=2968 /prefetch:24⤵PID:5888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2228,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=3040 /prefetch:84⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3468,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:14⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3476,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=3600 /prefetch:14⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4228,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=4328 /prefetch:24⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4212,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=4256 /prefetch:14⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3620,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:84⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3628,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=5332 /prefetch:84⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5492,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=5140 /prefetch:14⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5708,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=5680 /prefetch:84⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4216,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=5740 /prefetch:84⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5296,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=5124 /prefetch:84⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5296,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=5124 /prefetch:84⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5244,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=3640 /prefetch:84⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3780,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=3760 /prefetch:84⤵PID:6208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3736,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=6332 /prefetch:84⤵PID:6396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6368,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=6304 /prefetch:84⤵PID:6436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6392,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=6532 /prefetch:84⤵PID:6476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6684,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=6652 /prefetch:84⤵PID:6484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6520,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:84⤵PID:6912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6844,i,594566176823833349,6370630856091090742,262144 --variations-seed-version --mojo-platform-channel-handle=5256 /prefetch:84⤵PID:6944
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c RunDll32 advpack.dll,LaunchINFSection C:\Windows\INF\tv_enua.inf, RemoveCabinet1⤵PID:880
-
C:\Windows\system32\rundll32.exeRunDll32 advpack.dll,LaunchINFSection C:\Windows\INF\tv_enua.inf, RemoveCabinet2⤵
- System Binary Proxy Execution: Rundll32
- Drops file in Windows directory
PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 216 -ip 2161⤵PID:6888
-
C:\Program Files (x86)\BonziBuddy432\BonziBDY_4.EXE"C:\Program Files (x86)\BonziBuddy432\BonziBDY_4.EXE"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:7024
-
C:\Windows\msagent\AgentSvr.exeC:\Windows\msagent\AgentSvr.exe -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:7020
-
C:\Program Files (x86)\BonziBuddy432\BonziBDY_35.EXE"C:\Program Files (x86)\BonziBuddy432\BonziBDY_35.EXE"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe shell32.dll,Control_RunDLL speech.cpl,,02⤵
- System Location Discovery: System Language Discovery
PID:6516 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL speech.cpl,,03⤵PID:236
-
-
-
C:\Program Files (x86)\BonziBuddy432\BonziBDY_2.EXE"C:\Program Files (x86)\BonziBuddy432\BonziBDY_2.EXE"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:7128
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD53d225d8435666c14addf17c14806c355
SHA1262a951a98dd9429558ed35f423babe1a6cce094
SHA2562c8f92dc16cbf13542ddd3bf0a947cf84b00fed83a7124b830ddefa92f939877
SHA512391df24c6427b4011e7d61b644953810e392525743914413c2e8cf5fce4a593a831cfab489fbb9517b6c0e7ef0483efb8aeaad0a18543f0da49fa3125ec971e1
-
Filesize
7.8MB
MD5c3b0a56e48bad8763e93653902fc7ccb
SHA1d7048dcf310a293eae23932d4e865c44f6817a45
SHA256821a16b65f68e745492419ea694f363926669ac16f6b470ed59fe5a3f1856fcb
SHA512ae35f88623418e4c9645b545ec9e8837e54d879641658996ca21546f384e3e1f90dae992768309ac0bd2aae90e1043663931d2ef64ac541977af889ee72e721a
-
Filesize
796KB
MD58a30bd00d45a659e6e393915e5aef701
SHA1b00c31de44328dd71a70f0c8e123b56934edc755
SHA2561e2994763a7674a0f1ec117dae562b05b614937ff61c83b316b135afab02d45a
SHA512daf92e61e75382e1da0e2aba9466a9e4d9703a129a147f0b3c71755f491c68f89ad67cfb4dd013580063d664b69c8673fb52c02d34b86d947e9f16072b7090fb
-
Filesize
2.5MB
MD573feeab1c303db39cbe35672ae049911
SHA1c14ce70e1b3530811a8c363d246eb43fc77b656c
SHA25688c03817ae8dfc5fc9e6ffd1cfb5b829924988d01cd472c1e64952c5398866e8
SHA51273f37dee83664ce31522f732bf819ed157865a2a551a656a7a65d487c359a16c82bd74acff2b7a728bb5f52d53f4cfbea5bef36118128b0d416fa835053f7153
-
Filesize
3.2MB
MD593f3ed21ad49fd54f249d0d536981a88
SHA1ffca7f3846e538be9c6da1e871724dd935755542
SHA2565678fd744faddb30a87568ae309066ef88102a274fff62f10e4963350da373bc
SHA5127923556c6d6feb4ff4253e853bae3675184eab9b8ce4d4e07f356c8624317801ee807ad5340690196a975824ea3ed500ce6a80c7670f19785139be594fa5e70f
-
Filesize
152KB
MD566551c972574f86087032467aa6febb4
SHA15ad1fe1587a0c31bb74af20d09a1c7d3193ec3c9
SHA2569028075603c66ca2e906ecac3275e289d8857411a288c992e8eef793ed71a75b
SHA51235c1f500e69cdd12ec6a3c5daef737a3b57b48a44df6c120a0504d340e0f721d34121595ed396dc466a8f9952a51395912d9e141ad013000f5acb138b2d41089
-
Filesize
50KB
MD5e8f52918072e96bb5f4c573dbb76d74f
SHA1ba0a89ed469de5e36bd4576591ee94db2c7f8909
SHA256473a890da22defb3fbd643246b3fa0d6d34939ac469cd4f48054ee2a0bc33d82
SHA512d57dd0a9686696487d268ef2be2ec2d3b97baedf797a63676da5a8a4165cda89540ec2d3b9e595397cbf53e69dcce76f7249f5eeff041947146ca7bf4099819f
-
Filesize
45KB
MD5108fd5475c19f16c28068f67fc80f305
SHA14e1980ba338133a6fadd5fda4ffe6d4e8a039033
SHA25603f269cd40809d7ec94f5fa4fff1033a624e849179962693cdc2c37d7904233b
SHA51298c8743b5af89ec0072b70de8a0babfb5aff19bafa780d6ce99c83721b65a80ec310a4fe9db29a4bb50c2454c34de62c029a83b70d0a9df9b180159ea6cad83a
-
Filesize
1.0MB
MD512c2755d14b2e51a4bb5cbdfc22ecb11
SHA133f0f5962dbe0e518fe101fa985158d760f01df1
SHA2563b6ccdb560d7cd4748e992bd82c799acd1bbcfc922a13830ca381d976ffcccaf
SHA5124c9b16fb4d787145f6d65a34e1c4d5c6eb07bff4c313a35f5efa9dce5a840c1da77338c92346b1ad68eeb59ef37ef18a9d6078673c3543656961e656466699cf
-
Filesize
112KB
MD57bec181a21753498b6bd001c42a42722
SHA13249f233657dc66632c0539c47895bfcee5770cc
SHA25673da54b69911bdd08ea8bbbd508f815ef7cfa59c4684d75c1c602252ec88ee31
SHA512d671e25ae5e02a55f444d253f0e4a42af6a5362d9759fb243ad6d2c333976ab3e98669621ec0850ad915ee06acbe8e70d77b084128fc275462223f4f5ab401bc
-
Filesize
105KB
MD59484c04258830aa3c2f2a70eb041414c
SHA1b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA5129d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0
-
Filesize
140B
MD5a8ed45f8bfdc5303b7b52ae2cce03a14
SHA1fb9bee69ef99797ac15ba4d8a57988754f2c0c6b
SHA256375ecd89ee18d7f318cf73b34a4e15b9eb16bc9d825c165e103db392f4b2a68b
SHA51237917594f22d2a27b3541a666933c115813e9b34088eaeb3d74f77da79864f7d140094dfac5863778acf12f87ccda7f7255b7975066230911966b52986da2d5c
-
Filesize
99B
MD54de674e08ea9abd1273dde18b1197621
SHA17592a51cf654f0438f8947b5a2362c7053689fd8
SHA25656010f4c8f146425eb326c79cbad23367301e6a3bc1e91fdcd671ce9f5fc4b63
SHA512976d5772c2b42616cf948f215a78fa47d8154798abf1148f7f750545ed3de9ec1ecdf2e7e16b99c1459e5519a81301b9c1e6864e992a807b78257f0abaecc4c8
-
Filesize
76KB
MD532ff40a65ab92beb59102b5eaa083907
SHA1af2824feb55fb10ec14ebd604809a0d424d49442
SHA25607e91d8ed149d5cd6d48403268a773c664367bce707a99e51220e477fddeeb42
SHA5122cfc5c6cb4677ff61ec3b6e4ef8b8b7f1775cbe53b245d321c25cfec363b5b4975a53e26ef438e07a4a5b08ad1dde1387970d57d1837e653d03aef19a17d2b43
-
Filesize
279B
MD54877f2ce2833f1356ae3b534fce1b5e3
SHA17365c9ef5997324b73b1ff0ea67375a328a9646a
SHA2568ae1ed38bc650db8b14291e1b7298ee7580b31e15f8a6a84f78f048a542742ff
SHA512dd43ede5c3f95543bcc8086ec8209a27aadf1b61543c8ee1bb3eab9bc35b92c464e4132b228b12b244fb9625a45f5d4689a45761c4c5263aa919564664860c5e
-
Filesize
391KB
MD566996a076065ebdcdac85ff9637ceae0
SHA14a25632b66a9d30239a1a77c7e7ba81bb3aee9ce
SHA25616ca09ad70561f413376ad72550ae5664c89c6a76c85c872ffe2cb1e7f49e2aa
SHA512e42050e799cbee5aa4f60d4e2f42aae656ff98af0548308c8d7f0d681474a9da3ad7e89694670449cdfde30ebe2c47006fbdc57cfb6b357c82731aeebc50901c
-
Filesize
997KB
MD53f8f18c9c732151dcdd8e1d8fe655896
SHA1222cc49201aa06313d4d35a62c5d494af49d1a56
SHA256709936902951fb684d0a03a561fb7fd41c5e6f81ecd60d326809db66eb659331
SHA512398a83f030824011f102dbcf9b25d3ff7527c489df149e9acdb492602941409cf551d16f6f03c01bc6f63a2e94645ed1f36610bdaffc7891299a8d9f89c511f7
-
Filesize
472KB
MD5ce9216b52ded7e6fc63a50584b55a9b3
SHA127bb8882b228725e2a3793b4b4da3e154d6bb2ea
SHA2568e52ef01139dc448d1efd33d1d9532f852a74d05ee87e8e93c2bb0286a864e13
SHA512444946e5fc3ea33dd4a09b4cbf2d41f52d584eb5b620f5e144de9a79186e2c9d322d6076ed28b6f0f6d0df9ef4f7303e3901ff552ed086b70b6815abdfc23af7
-
Filesize
320KB
MD597ffaf46f04982c4bdb8464397ba2a23
SHA1f32e89d9651fd6e3af4844fd7616a7f263dc5510
SHA2565db33895923b7af9769ca08470d0462ed78eec432a4022ff0acc24fa2d4666e1
SHA5128c43872396f5dceb4ba153622665e21a9b52a087987eab523b1041031e294687012d7bf88a3da7998172010eae5f4cc577099980ecd6b75751e35cfc549de002
-
Filesize
65KB
MD5068ace391e3c5399b26cb9edfa9af12f
SHA1568482d214acf16e2f5522662b7b813679dcd4c7
SHA2562288f4f42373affffbaa63ce2fda9bb071fd7f14dbcd04f52d3af3a219b03485
SHA5120ba89fcdbb418ea6742eeb698f655206ed3b84c41ca53d49c06d30baed13ac4dfdb4662b53c05a28db0a2335aa4bc588635b3b205cfc36d8a55edfc720ac4b03
-
Filesize
320KB
MD548c35ed0a09855b29d43f11485f8423b
SHA146716282cc5e0f66cb96057e165fa4d8d60fbae2
SHA2567a0418b76d00665a71d13a30d838c3e086304bacd10d764650d2a5d2ec691008
SHA512779938ec9b0f33f4cbd5f1617bea7925c1b6d794e311737605e12cd7efa5a14bbc48bee85208651cf442b84133be26c4cc8a425d0a3b5b6ad2dc27227f524a99
-
Filesize
288KB
MD57303efb737685169328287a7e9449ab7
SHA147bfe724a9f71d40b5e56811ec2c688c944f3ce7
SHA256596f3235642c9c968650194065850ecb02c8c524d2bdcaf6341a01201e0d69be
SHA512e0d9cb9833725e0cdc7720e9d00859d93fc51a26470f01a0c08c10fa940ed23df360e093861cf85055b8a588bb2cac872d1be69844a6c754ac8ed5bfaf63eb03
-
Filesize
649B
MD56b13762a04e8d6fbc7637a09d0ae8525
SHA1bceb5058800fa3ba2b7cf1c15273492dd5e67e24
SHA256b75f5e709c377648fe5909738b94c027f2108abe92b6671780c1fb0fc14b6fc9
SHA512475d4904f5e0082bf256116b734844b222b1ec68e614c35e496a94ea5bb828f7425cdccf29d000c0d329b85fbbeacc5feb79571b2b3573eae1755ab2f517300f
-
Filesize
158KB
MD583266658f29f5cb762001d5d9f6985a7
SHA19ff52157193e1e798944e6a3172d938183f5e550
SHA25660072b4eb6fc5f1f1214a34fcd55b3cbd1d05eddf778f85611f9b352c4c6452d
SHA51260b2a8749bb597b71c6cb7113c4ea6c430ab90c6f6a5f78a36ab5fbd2676fbc173ade236be939e862569c786fbdc8e0aa984f1ae4263e91de2ba681cc8ce5d66
-
Filesize
1KB
MD504e933467a039f0085df9a700d269e9d
SHA189fda2bf2a991d7d33ef9eeff59b291132e2f6c7
SHA25654f5a1c394e6fd43f6ae87eea4fedac163c2aeebab3820c6e512fe00568992a8
SHA51242fbe253c27715324920ceb7daf4e9f10f07f354e4600eb825a2b7fd00f45ccc46b9407b6384fc4722476b64a729a1662c8c5f2ee2d3eb4a17fc4f55e77fd910
-
Filesize
4KB
MD514c0268ee3f5938328aff7677bf1a6cd
SHA1892cd220df816bafa602f24ad2de88dadd2972c4
SHA256ad64c5c569ff7eba7b976969258b85de2666866b9f860c364ae09d6710b81e55
SHA5122d08389ad1a45971b65b5e4643c9d8d03e0ae3350c09c03ecc2f6d65982782e68c0f9ac605db120a11ea14910e71028d7a7ef348c85d4798ae991f43e98c8b1f
-
Filesize
1KB
MD53368a403501cd96ceb44a203eca6eb87
SHA1f7b18984cc9994deafa88b747b21d94a08cc3b59
SHA256fe11ce798818997bf3ed1e5b1760dacaa5e1f3007027a14565842f20c521d1a5
SHA512dbd423a96dcb810b85831cdd56f2dfa375afe58ae1e1078e6e5552891b7e4c4fa16755a05a13d3084220a073cfa3a03e1cae27fcd76216d76add11eee5499897
-
Filesize
17KB
MD5997e9e5b0976c2d5429185c8126c1a7a
SHA1c83be5a50e35026b299ea0ad17e7fc1f6f9c185e
SHA256cca7f13bed68c949eaa07d3b6377359900eaf409aef539a984a24ae7ab89ed23
SHA51232fd51dda0c0c7ae5d4cb1c716ad6badba74614a11f21c0b556d79325a28805143c6e81f9428ac2b0b758d430f5835e99821588179bf22f43b8393264c3f5b6f
-
Filesize
15KB
MD5432464d41f5057c44bed300fd15b21b3
SHA18bab0f774c113b0660ee65f925619920c129ee58
SHA25651d8d5a0fb9782ec402619ed68b67d30a621b6d2cc3edb1178d036317734af05
SHA5125c7cd5d0f3abc9666216a4b9fa2b168e4eb7b4603d705143b31538411dc0283aeeffb4883e82f9c67cc6cf46ebc64a2964bbea590a10c6cb4dd2f8afc4bb59fb
-
Filesize
11KB
MD504d0bcdb5fd33ef1ca444c0c232e98f7
SHA152421e0376c4a45620ac85a1ea7a799e46a294f0
SHA256c939dfd7fff5187d96e7a29dcdad2709d678adeb9f2f27f4c761eb79f346f418
SHA512cb0e47eb484bcaa73b56133ec36a1ca3a166a168cc5d0c66338c040fe58483286c906362d849f714bb3dc2e32d01ea4a1dc47f1c413f9c0c9541ed4b74917544
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
11KB
MD567167117f7bfd62bb014fa3a8df65d72
SHA17d8bd063f5d5e3d761f125a2d2e26443d025121a
SHA256927f64605f32f57ad99f0f198e70ca61c716284f471b73f9b83d1926a4adbc25
SHA5127af17ba97ee7badcf08e1800d63ec34f9fdec1c094145f81fbd675ef35395d2d6fd7c8366bdd2f91b2b00015c69ec740f4d155ff7eb0bb2f7a196b7f3d0cbb83
-
Filesize
11KB
MD599ce42879b3a405b4e1756cf9af04a34
SHA1b3a2c3cb097afe4118de960f7c238e7ea2160ef6
SHA2561867e07fb2e9a3851f915bfd04b520c9a9c5609c0da4f58f24123d147dad59b8
SHA512446062300140c18b6bac81a7e62d1d55a5eb54501af70f55191464a061f357ef1336de607743605a4947d68e5911bda3df00ea4b990a0a3c0d86cba61d671b27
-
Filesize
11KB
MD5726f727ac90f993a14f5bd0fe0a297bb
SHA13296fd5bbe5aba3e68544d5719a35ef6c932202f
SHA256a392c10e85a9fc066c146ec354c3ed8f778c41aaf29ddd784790171b63237e54
SHA5124d57d29996d42a0bdfc6846db7f05ea37dcce004630c2be83ce7be397cfc7b4f13fe342e713764406d7a7b77101584bbe5e55df665bf3436cf3e31a8a8949985
-
Filesize
11KB
MD5fb8e8640bae825b55191e455d92d2b28
SHA1c28cad8c2faec638d3ec429d85286430f1d271ce
SHA2569b75c026714114b6f5cac9fc88209ae9bd9e1f1610abcda479da5c01259e10f6
SHA512b037e4d43ffa192644341b6c9d6d7e8bb0ba78fea196ae8adf16aa70952d59135b622e8b5af314e41ae021c679f112f5287bf6531aa5218effb06beb0c0a68f8
-
Filesize
11KB
MD52ab6777fbc04fd00c9b2253001129a6c
SHA1823f84d91133cc54946ccc989715efc4322fafde
SHA25668f231172ef49c8898fece20ceee397ceebcb2788fefd3033ddd9e7d050e6532
SHA51268f8e9f854985141cbe6a2cdbbd4eee07e7ecca522ec2e2cb0ada08a9726c0afa6ab72da56e9fe655585a2b92445b2fa1d79a82faa5b4f4dcb366c3cfb7844ee
-
Filesize
12KB
MD525b20a9b2576c8fb73b8b4da052aebee
SHA19980110c3e24eac44ec2043d02fe3ec2ea83648a
SHA2566bca5f94425c46dc158643c0381fae9532cc57c88423983e642d61a8d8d8aa48
SHA51218b48550d092efe9b58e8950dbd5a597e296fc334e7f6dea271bdbaf6cf4d5987731ff51a07b3bc426634518fe2418316907a49c49af0ee83be4f733d3cda378
-
Filesize
12KB
MD5188da9b7bcd1f430ef382b2e0d0b5db0
SHA11304e33a96a964928e3e86420a14e0cf057269f6
SHA2564f582e03ff0962e7c3810c45d3cd4b6f96811cca6d70bfcb94b31a1d52e465b5
SHA51276f5648ff6140014d487edc7fa4e9f202dc8674914637c412a7b7c6bc96dc323d43a4c7d9ff0249157d35d859b97254bf4de9cb3745ef0dc1e560a7610b3a8b4
-
Filesize
12KB
MD5ecf60539cfacc5f16351b9cfbce8c77f
SHA17e68698fb7d80e514e9a0c7aeebf6a13fc6e6328
SHA2566ccbb3e2f72ebbf973ca5c5fa78cc3bbd5d70a8ea3a484da0290fd3774e802f9
SHA51238a4bf3825ce9d9826eeb4718cac635e834da09a0b5898d483ad8c39f9238a801e40927065214136401d18e7213d10d8390ac9b5341afbd3db006dc52051edfa
-
Filesize
12KB
MD5a0d8f0e98aa63c334bd8b8381822b404
SHA1316d505b95ee7ddff54971cf15fb828fe38f4f7d
SHA2567e0c3316dd35320c2df75ec104edd13a95c3422c997748ddd36ca8dfe150d2a6
SHA512bb72d1e228611da8cfc372ec34aeb73ffd7b69b05a494abc8119c0623e8e844528c0310e4c643b67cb412d6b649e3b14defe1140c5a5b6a160de50870e02e67a
-
Filesize
12KB
MD5ce3ea6235ef09a0d03217086a9c460e4
SHA158f13cb3212dd81a5df2640a21d44917296f8b57
SHA256ed4c067f615530ef84118b888ab9f613219344a46af806e1c0b57606a0739e3f
SHA512091b1244056382fa21ac40713aff7726c79574993c01fa8894c9d776a76db57fc32cd9d719afa3f712a9141c0b90f32896ce91e20a51e6e4db645273612646fc
-
Filesize
12KB
MD53b40ee9145281e1ca4347d974b4c612b
SHA10716e53cfa1fcf8e091bdf949ffd38cf46063b09
SHA2564bd618e3503828db1d0e5472d9fee5750142fc2c521778aedf9cf1b96c675194
SHA51257023bf9cfe3ade9d38d0e60f9a679829caeda94e93011cdc2a9c596f35a68f7f60bc6c1535a1ae224f598256c092da0e80c2b349439a1d2480f1a34db75c253
-
Filesize
12KB
MD5262411afdfc295139b5a6057dbc3ed4a
SHA12db2667860913397d21fa0cabde94994cf1fb08d
SHA256647552d196ca2ecbebc0ad2139b12c7e93fab35c3d4e58d1e8001cbaa2c3eaf4
SHA512ef3b817304d5ede549e430c7a32dbe597cc6b6faa97038318df9a6b2714ae7c3c1a5143dc6bec9aeef6c0c2473715c2f809a3b027a7ffaf91c8f4c975e93298a
-
Filesize
11KB
MD562871864e116cd05c4ef20c0066e1f0d
SHA1ac1b783398642472dc58ad37d526185eada1013c
SHA256be74b478af1e727b850a7453e0d710328a91aa941ae94d4e0f33dbd699e7d503
SHA512a6fcc2e0cf4bf96ff2f263f3d6bd238eaf7707d6cd137a55fa7709e1351cfb3855295c66ae735b66b83511bc0e40665dcd02abe2847a2adb715d8391a8c4f69c
-
Filesize
11KB
MD5998c17c7da0d1f83e4a55b48c10fddae
SHA11e8ce3cac202c0cec8be7ce45af98025150eaec6
SHA2569d8aa390c6f3366b289db04b536cefa6b8e71f488a95a1b90925562115471751
SHA5129c539ac6ceaf21fd3225b3ca4cfdda7a022ea1e5bcd0f1ea16b0e5bacb0d8f47fe517b677ebcd7e9241ea1bce0e3839b7424b4bf1be0fcc988cb4623b9972d11
-
Filesize
18KB
MD58057e0ce00fb911a9cb9c8447560c7dc
SHA13e167089c1ce280248866e50047edf04367667fe
SHA25604beedeab2844dfc61e501a1c0392b8546564c6d4beb21690b0dfacfc89375e3
SHA5121b921bb988e4004729b9bcfcd147b42310735e786e8a7fa956df27b94860080fd20b079cf4f4331bab5f9d3cb90786d961be40712a3b34c6f48e6522671f1df8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD578ff0f6e2f50c6b9b1335d575106ab56
SHA18ce311d6db87b25f509c615351f69d3e3e8c1892
SHA256cbd9eaff680eaa6c0d98bc8237f69a7b26356ad086f32139696001957d67307e
SHA512eafc43164f63eac2bc195d61aa05a12c13a82d84240f8f4f544c089566dde3d46302a23fdc7e48d431e41910fc26c10cb69cbb289c51dad78b972c0148404da3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f750.TMP
Filesize48B
MD5d163f104fd9383b2252584c4b51fbff9
SHA1c33dd8327d1a000d549b43360e741f6f5b6f8c66
SHA256642dd100f210cb2685ec0f496b0eaef4f0d8802350dd067d3cc89b394e7070f7
SHA5120977994eb5aa3a6bf920672989c023a7cd30f23e68730d8b52e923a4245679484dee19d838e51ce2d69ea708c88c36c549c47bdbc14d7d9cf34bd0c27645dc48
-
Filesize
76B
MD5a7a2f6dbe4e14a9267f786d0d5e06097
SHA15513aebb0bda58551acacbfc338d903316851a7b
SHA256dd9045ea2f3beaf0282320db70fdf395854071bf212ad747e8765837ec390cbc
SHA512aa5d81e7ee3a646afec55aee5435dc84fe06d84d3e7e1c45c934f258292c0c4dc2f2853a13d2f2b37a98fe2f1dcc7639eacf51b09e7dcccb2e29c2cbd3ba1835
-
Filesize
140B
MD55f6d8388908d96a1be36f3061dea6a7f
SHA14e1e18013315511088eb76f38819afcf6907eed9
SHA2569cc764c3ecf1c6a7b9f94b878b1460c202569fc16da1b07c3104d87cb9c9ce33
SHA512dc794e73b4e01a8f00676e800ea4e22869bd3a4a08923a1ae250d69ac425e0062aa75b13588de57aa56187a1926cbe983704c495974bfb06086bd49ae7294016
-
Filesize
140B
MD5a9a0db6992ebcafd9e2b06d5e0e411ed
SHA1d54806ce9b2edbf266bd85d0aad621ebca1ef2a8
SHA25605448d9b65e0aecd9d8a3e46fbc5bd194f8d6f553bb4f4afedfcd5902f1c2132
SHA512cb5995ea9cb7b82cfda8fda37f463e3d770345a78b9c13e5f4c13ebca29292dcef2bcad27f21d7df99d73e78fb8d66cad8f40a6f7081bfd6f04ed1a9d9a255c2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe5b19dd.TMP
Filesize140B
MD579d4421c3598f123545e249310918af5
SHA1b03363c31a773f0ba0b0d2de41d4caef8031fac7
SHA256bfed5b2adb9b488eb337331833608d04cd6615e0fc07d7d6a72452bed8f6e212
SHA51274713728182452f6e3bdc3ebeae46537bf9f74c3d07f8d33bb3762e793ff3d9a14866583e374ea8e5728a13e3c1a3659f86d73e301d2e576df8f998e5892b5b1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\IndexedDB\indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\IndexedDB\indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
153KB
MD57a1e12fa44af454d6131c40ed34d660b
SHA16ddef784c7a196f7eb300866885a27403b87ffa4
SHA256476cd694337952a066a24e9e82c5b5f364241eed588e6d04a6a794d87ae75d46
SHA51246c028f99ce210403211a875538e22803c40027e659ae3b6309509ce36403413581818f80d0038717fb6ea0a08688adb34fe69db9508cfee08da5f65059a52d2
-
Filesize
154KB
MD50ee1b36784bcd3113866dc3171437749
SHA13eeb854aa918d032090bb02f59faeba3fa218334
SHA2569823fc1a50dedcf7e59d51c0299a24c9e95fe8e70728cae65bc2049dae421e7a
SHA5123ff05aba1507f560e5702b211ebc250e697bb0aa6698605455e208cb7ba5bbebc3723cf30e1eff0805de41a67df1abeec95cee4fb8659fc5099c79a771b46db5
-
Filesize
80KB
MD5feebe706cb9f62cb34120d2c3a7dac78
SHA1c0e9eea2e8064686ccbc3d5d8f3e77bd1676a9d9
SHA256075ace3007c15fca8f8e5199a800b613ea46136daa39e6ffc8587d1c4b8faa43
SHA512012301366bd6ba8426e8233e9535360d322b6faa2bd6434d82b0556f4c8ff744f7ac42ebc747c193952c3742e3be9c2158cff4fdba2f95b9a4cfd18269996ab9
-
Filesize
153KB
MD5474b4646fc3a2e35c4bada9db667b064
SHA10de4d8b531e330569ec0360118293d25874a008f
SHA25645483884ceceb4b825cdab57e8f7406312dcc5b8aaf23a2f9a58cfbb6504db31
SHA512bd8bd8dcb1178b9a679694495058331b931bcfa08c73cb7921c9f072cfaf5e8cf6d1784c3c1b3343136895a65a1369e3b2d4ac0757cd21000ad4cc89660fb7d9
-
Filesize
280B
MD5049e5a246ed025dee243db0ba8e2984c
SHA115ec2d2b28dcfc17c1cfb5d0c13482d0706f942d
SHA25633071ca42c472861a2fabd0f82f8b03ef0daaa6796b24b83f3df02587e4c3d12
SHA512bc5f6fa6a8cae20ab40eae4552650d75f38ebb158c95288a79d9f332623bb507946513c39d19c00a5aee323df01f0f1a51c54594ef1c293289baf45f4ae2145b
-
Filesize
280B
MD54facd0ff10154cde70c99baa7df81001
SHA165267ea75bcb63edd2905e288d7b96b543708205
SHA256a13534df0cd0a79a3a1b91085a6d575b47d5a9aad7fc6d712fd2616c0e95a23b
SHA512ad8d2b965851c0ddc23e92ae151b3b0b2bcda850c446f4278bdb0754d6b42ead8fc034b394749578a27b33ad7e4ab0633f974dfd4773fbe4d93ae477f00b73f2
-
Filesize
280B
MD5ecc7b8ac4194023c7465038c410f8ce0
SHA1682c7ba813b284d6103aa30e1267d7a6f1d27925
SHA2567297ec941dfb26c41143cfd9189404df8716eb18b64187454a85e6728dbea145
SHA5126c3140024f56ddebc4acebdd12fc3513ebf6942748698c97bc9ea4693799b186fbedca88db1753f5bc7b4e1a7f6f7169fb81c94e8179f68e6addd24839866537
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5a260bf0c92365f71a6d792005a770461
SHA105ceed15405ca143a2e69e6e9a9debb891b1be47
SHA256ebde94ce89588c6625ebed6ee5c322eab6ba707cd05bd01c178462182b953490
SHA512d867b6935491b09dc6e3f38c2be866b41c6acdb533bbdab54e1b27fefaa2c931643712df06bf03037767d3ab9d3eb7b45f57cc989ea624bf225d20186aa54efc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe58fbb1.TMP
Filesize3KB
MD561daaa6f6d1dd3e0e5ce0e9645b7f6de
SHA14105573f169af5cb24eda88d1a85a412b8e84fc4
SHA25625dfa12cb0aee52e8f8304fafd9fa3bc5623450555ba34b785c417fba76e5abd
SHA512887a3d7ea0dad17d0fd68109d312fb33b68e0869e163ed2c6fd803ce9dee9c027f8eddf4737c993ff80694709c072094e0665ea6d6ad98e578f3ddbf81392f22
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
3KB
MD529912a2b77ed21e2ce58a880a8078bdc
SHA16b3b0b3ad832d4d8154ae4f710931737c8cd283f
SHA2560bc3efd1e320d784601d0db03acb17990067646bc2879c5370afe435580fb43d
SHA512395037ab87d12a1b4c2b17b5e09a621605de1a9c6773a29f15423fdc3088c751c7888ca4b02473c577af8beca9042e25671f8051e1fb4fb6300309923e34d06b
-
Filesize
14KB
MD5c2a02cc814f9301c2f35c16e6629a5a2
SHA14314dbcbf15bbe1c873ca71d491c467e9990188c
SHA256f53ce6951d3db7187bd838d8bbc26e4af3d65ff29c70d0da7d82be9881553378
SHA51248a78323677a62cc8cc64874b693710a76a2f63035129ce9a4308fefd5dd8c27fc25c30d50398cdb844a5d67337be5d24ec87506efaed63796a50f05c9b25bed
-
Filesize
13KB
MD5e7bd6c53bec83e5440db3ad2fae48b52
SHA1b99b558160aee91808a947684c17e9b23b740d86
SHA25607125f850e32a80ff2277be819708c85da5c16d7367159ca9d5fe749a3b8c68c
SHA5129c06825aaa61af04766b1fa276a5fcc3ed5e1e56a9ef03da5d4d7407879f9a23d0661acb6149ea6766e3434334887c4d5a5be85f38a41188104e5237f90abc55
-
Filesize
36KB
MD5d1d41d8b03df1f04eca54b760f23e448
SHA1830af859a8e3471d36dc0aa0d799594e54eae7b7
SHA256a07a8b489c460038fa3c21ddfb37986735b978c5366db4905456e311ddd622d4
SHA512bf070ca72f3a44e70465e925461ad094fcdc7bb3bf810ce5248c6aeca39d10654cc6a4562104b183e232236a529826c7391fcfe210ecb3ecd61c0a1c156d68f9
-
Filesize
4KB
MD56710d976a9df6624cf44c3eb0d75d83f
SHA16339ce40fae288d05957f793237e9ca32ac4424f
SHA2561cc250d89d5fa8443546107439117f95df56cfa500cbc442b3f2e16673e620d3
SHA5121fb6f2dc38f72996999e9325ead3430e8317aa9435ff4f94f44d30ea3909b46393123cbff583ad5e09f0430f68eaf8da9c51aeb4cc126cfa90bc4c474eedb69e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b99b7a57-4811-424d-922f-ee687847ee6e.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
30KB
MD5c55052fa6cd0cdf42d10d58c14df96d8
SHA1529e335d5b267130d828dc261577236ce5c00d29
SHA2567cb143d58559831f96a2e1ba0d737646884999a5b466175ffad4ee1a54fb0559
SHA51222b5d53fdf3510feb387c81b4033a06531c50dd0b4a892a2abd7a384d32f7ac0fe040880dc0f50b9aeadb0fb0f13f39fc709eec067d8602731355c265b906fd6
-
Filesize
36KB
MD5aad9eab5728e4000b7c208c6141f4c66
SHA15d7d7b58cb6b74c719a701f5be7609fdfac9b1fb
SHA256ffc4cf765a9790aea12636228df9fa3b39df0535f66c1344922d610cb4c0ef8a
SHA512d065831a8eb1049224d76952088b3daf81a208cea4c20be9f6b7b63baf9e656bde0192048f80fcdb3ce8e8005fa0ee960093ef9a29ca5d0e89dadafef3ab3165
-
Filesize
6KB
MD5334bdc2e2d90e49d872af80efb1dac9a
SHA1bff13782d9bab3562db603eb3efca2925fb158f0
SHA2560c56a26c32c2716e5b551aa9505d73e93f3a57becb66a5b13e7a1a5a2497d6a4
SHA51274955c94f65060c3ff0122e6dae062f9565b434db9bc1cf0ea620ce0d64ce4c4dca8b24f06bcb867c0bd75369afa9f58862f8df00b0d230c911c167a585e8722
-
Filesize
7KB
MD59cd80be29fbfe86f12e29388f23b46d3
SHA143b37bf2f44afc8f583b21a9f201d061f857cf34
SHA25615277dee9a923f7b071dd243391ee807111839f5c8b5c8c7e943733bc340a6d0
SHA512ef0c26a1f4da54540dc195b450d16236fa77d3a67df157eba7de644502872ff5e29875b9e6091a1bfa17bf092f13b37b26e2082c40ef23898ee10a3677eadc98
-
Filesize
384KB
MD59cbabbeef9ad4cbf8668fca80fe6b923
SHA1ef6e08801906caa9c662e90d19f038f5dc9c502d
SHA25605864130aec8fd12f94e0a2d9c1ac4d3225b66c8fa9bc75d063af638e20ab3c6
SHA512574048a6b9c438e272a8ee701a134e6f9a0f82d77c3955ae28d4799e81701dac174d6d9d4e4950c6708a00b8f74354902db7cd9264372638def44e4eeddc170b
-
Filesize
1024KB
MD5878bea877cb0b649de568d9dcb2b7745
SHA12bf15d3011cc448ea70ce057c4e2018d3ebdfddb
SHA2565ef4d0aa542e7951e3add01e85f884e40ddd9fa6ab4ac03f792784b6a70bf0ee
SHA5121533285759dfaf745446c732ecc86f244f72ead7bf1b69febe75ef9e63f78d5caf5fb32d998330e0132bd379fc6651c93f521f0f0292c0a544e9a7eb785bdf78
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD55132ee63a29202f4b286f94ccd2969ae
SHA13196b4404c556dcf965eb0162ffb39b5ef895810
SHA256cdfa3bd5a2a9ba3f04d4af57a3dc7ff5e17172b99e44e1d3cfa5f7fa14d76a1e
SHA512f926118cbe41b7e8eff1d28d7041e2c66a1db9bc12021da2277129669663b40cf60b774b845208b99393c96664e57a427cfab7e4b1567a752d6414a24f09a3ce
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
8.0MB
MD58e15b605349e149d4385675afff04ebf
SHA1f346a886dd4cb0fbbd2dff1a43d9dfde7fce348b
SHA256803f930cdd94198bdd2e9a51aa962cc864748067373f11b2e9215404bd662cee
SHA5128bf957ef72465fe103dbf83411df9082433eead022f0beccab59c9e406bbd1e4edb701fd0bc91f195312943ad1890fee34b4e734578298bb60bb81ed6fa9a46d
-
Filesize
8.0MB
MD5596cb5d019dec2c57cda897287895614
SHA16b12ea8427fdbee9a510160ff77d5e9d6fa99dfa
SHA256e1c89d9348aea185b0b0e80263c9e0bf14aa462294a5d13009363140a88df3ff
SHA5128f5fc432fd2fc75e2f84d4c7d21c23dd1f78475214c761418cf13b0e043ba1e0fc28df52afd9149332a2134fe5d54abc7e8676916100e10f374ef6cdecff7a20
-
Filesize
8.0MB
MD57c8328586cdff4481b7f3d14659150ae
SHA1b55ffa83c7d4323a08ea5fabf5e1c93666fead5c
SHA2565eec15c6ed08995e4aaffa9beeeaf3d1d3a3d19f7f4890a63ddc5845930016cc
SHA512aa4220217d3af263352f8b7d34bd8f27d3e2c219c673889bc759a019e3e77a313b0713fd7b88700d57913e2564d097e15ffc47e5cf8f4899ba0de75d215f661d
-
Filesize
8.0MB
MD54f398982d0c53a7b4d12ae83d5955cce
SHA109dc6b6b6290a3352bd39f16f2df3b03fb8a85dc
SHA256fee4d861c7302f378e7ce58f4e2ead1f2143168b7ca50205952e032c451d68f2
SHA51273d9f7c22cf2502654e9cd6cd5d749e85ea41ce49fd022378df1e9d07e36ae2dde81f0b9fc25210a9860032ecda64320ec0aaf431bcd6cefba286328efcfb913
-
Filesize
8.0MB
MD594e0d650dcf3be9ab9ea5f8554bdcb9d
SHA121e38207f5dee33152e3a61e64b88d3c5066bf49
SHA256026893ba15b76f01e12f3ef540686db8f52761dcaf0f91dcdc732c10e8f6da0e
SHA512039ccf6979831f692ea3b5e3c5df532f16c5cf395731864345c28938003139a167689a4e1acef1f444db1fe7fd3023680d877f132e17bf9d7b275cfc5f673ac3
-
Filesize
1.8MB
MD5b3b7f6b0fb38fc4aa08f0559e42305a2
SHA1a66542f84ece3b2481c43cd4c08484dc32688eaf
SHA2567fb63fca12ef039ad446482e3ce38abe79bdf8fc6987763fe337e63a1e29b30b
SHA5120f4156f90e34a4c26e1314fc0c43367ad61d64c8d286e25629d56823d7466f413956962e2075756a4334914d47d69e20bb9b5a5b50c46eca4ef8173c27824e6c
-
Filesize
73KB
MD581e5c8596a7e4e98117f5c5143293020
SHA145b7fe0989e2df1b4dfd227f8f3b73b6b7df9081
SHA2567d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004
SHA51205b1e9eef13f7c140eb21f6dcb705ee3aaafabe94857aa86252afa4844de231815078a72e63d43725f6074aa5fefe765feb93a6b9cd510ee067291526bb95ec6
-
Filesize
40KB
MD548c00a7493b28139cbf197ccc8d1f9ed
SHA1a25243b06d4bb83f66b7cd738e79fccf9a02b33b
SHA256905cb1a15eccaa9b79926ee7cfe3629a6f1c6b24bdd6cea9ccb9ebc9eaa92ff7
SHA512c0b0a410ded92adc24c0f347a57d37e7465e50310011a9d636c5224d91fbc5d103920ab5ef86f29168e325b189d2f74659f153595df10eef3a9d348bb595d830
-
Filesize
28KB
MD50cbf0f4c9e54d12d34cd1a772ba799e1
SHA140e55eb54394d17d2d11ca0089b84e97c19634a7
SHA2566b0b57e5b27d901f4f106b236c58d0b2551b384531a8f3dad6c06ed4261424b1
SHA512bfdb6e8387ffbba3b07869cb3e1c8ca0b2d3336aa474bd19a35e4e3a3a90427e49b4b45c09d8873d9954d0f42b525ed18070b949c6047f4e4cdb096f9c5ae5d5
-
Filesize
8KB
MD5466d35e6a22924dd846a043bc7dd94b8
SHA135e5b7439e3d49cb9dc57e7ef895a3cd8d80fb10
SHA256e4ccf06706e68621bb69add3dd88fed82d30ad8778a55907d33f6d093ac16801
SHA51223b64ed68a8f1df4d942b5a08a6b6296ec5499a13bb48536e8426d9795771dbcef253be738bf6dc7158a5815f8dcc65feb92fadf89ea8054544bb54fc83aa247
-
Filesize
2KB
MD5e4a499b9e1fe33991dbcfb4e926c8821
SHA1951d4750b05ea6a63951a7667566467d01cb2d42
SHA25649e6b848f5a708d161f795157333d7e1c7103455a2f47f50895683ef6a1abe4d
SHA512a291bb986293197a16f75b2473297286525ac5674c08a92c87b5cc1f0f2e62254ea27d626b30898e7857281bdb502f188c365311c99bda5c2dd76da0c82c554a
-
Filesize
28KB
MD5f1656b80eaae5e5201dcbfbcd3523691
SHA16f93d71c210eb59416e31f12e4cc6a0da48de85b
SHA2563f8adc1e332dd5c252bbcf92bf6079b38a74d360d94979169206db34e6a24cd2
SHA512e9c216b9725bd419414155cfdd917f998aa41c463bc46a39e0c025aa030bc02a60c28ac00d03643c24472ffe20b8bbb5447c1a55ff07db3a41d6118b647a0003
-
Filesize
7KB
MD5b127d9187c6dbb1b948053c7c9a6811f
SHA1b3073c8cad22c87dd9b8f76b6ffd0c4d0a2010d9
SHA256bd1295d19d010d4866c9d6d87877913eee69e279d4d089e5756ba285f3424e00
SHA51288e447dd4db40e852d77016cfd24e09063490456c1426a779d33d8a06124569e26597bb1e46a3a2bbf78d9bffee46402c41f0ceb44970d92c69002880ddc0476
-
Filesize
76KB
MD5e7cd26405293ee866fefdd715fc8b5e5
SHA16326412d0ea86add8355c76f09dfc5e7942f9c11
SHA256647f7534aaaedffa93534e4cb9b24bfcf91524828ff0364d88973be58139e255
SHA5121114c5f275ecebd5be330aa53ba24d2e7d38fc20bb3bdfa1b872288783ea87a7464d2ab032b542989dee6263499e4e93ca378f9a7d2260aebccbba7fe7f53999
-
Filesize
2KB
MD57210d5407a2d2f52e851604666403024
SHA1242fde2a7c6a3eff245f06813a2e1bdcaa9f16d9
SHA256337d2fb5252fc532b7bf67476b5979d158ca2ac589e49c6810e2e1afebe296af
SHA5121755a26fa018429aea00ebcc786bb41b0d6c4d26d56cd3b88d886b0c0773d863094797334e72d770635ed29b98d4c8c7f0ec717a23a22adef705a1ccf46b3f68
-
Filesize
4KB
MD54be7661c89897eaa9b28dae290c3922f
SHA14c9d25195093fea7c139167f0c5a40e13f3000f2
SHA256e5e9f7c8dbd47134815e155ed1c7b261805eda6fddea6fa4ea78e0e4fb4f7fb5
SHA5122035b0d35a5b72f5ea5d5d0d959e8c36fc7ac37def40fa8653c45a49434cbe5e1c73aaf144cbfbefc5f832e362b63d00fc3157ca8a1627c3c1494c13a308fc7f
-
Filesize
29KB
MD5c3e8aeabd1b692a9a6c5246f8dcaa7c9
SHA14567ea5044a3cef9cb803210a70866d83535ed31
SHA25638ae07eeb7909bda291d302848b8fe5f11849cf0d597f0e5b300bfed465aed4e
SHA512f74218681bd9d526b68876331b22080f30507898b6a6ebdf173490ca84b696f06f4c97f894cb6052e926b1eee4b28264db1ead28f3bc9f627b4569c1ddcd2d3e
-
Filesize
11KB
MD580d09149ca264c93e7d810aac6411d1d
SHA196e8ddc1d257097991f9cc9aaf38c77add3d6118
SHA256382d745e10944b507a8d9c69ae2e4affd4acf045729a19ac143fa8d9613ccb42
SHA5128813303cd6559e2cc726921838293377e84f9b5902603dac69d93e217ff3153b82b241d51d15808641b5c4fb99613b83912e9deda9d787b4c8ccfbd6afa56bc9
-
Filesize
2KB
MD50a250bb34cfa851e3dd1804251c93f25
SHA1c10e47a593c37dbb7226f65ad490ff65d9c73a34
SHA25685189df1c141ef5d86c93b1142e65bf03db126d12d24e18b93dd4cc9f3e438ae
SHA5128e056f4aa718221afab91c4307ff87db611faa51149310d990db296f979842d57c0653cb23d53fea54a69c99c4e5087a2eb37daa794ba62e6f08a8da41255795
-
Filesize
40KB
MD51587bf2e99abeeae856f33bf98d3512e
SHA1aa0f2a25fa5fc9edb4124e9aa906a52eb787bea9
SHA256c9106198ecbd3a9cab8c2feff07f16d6bb1adfa19550148fc96076f0f28a37b0
SHA51243161c65f2838aa0e8a9be5f3f73d4a6c78ad8605a6503aae16147a73f63fe985b17c17aedc3a4d0010d5216e04800d749b2625182acc84b905c344f0409765a
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1892_1253683036\CRX_INSTALL\_locales\en_US\messages.json
Filesize1KB
MD564eaeb92cb15bf128429c2354ef22977
SHA145ec549acaa1fda7c664d3906835ced6295ee752
SHA2564f70eca8e28541855a11ec7a4e6b3bc6dd16c672ff9b596ecfb7715bb3b5898c
SHA512f63ee02159812146eee84c4eb2034edfc2858a287119cc34a8b38c309c1b98953e14ca1ca6304d6b32b715754b15ba1b3aa4b46976631b5944d50581b2f49def
-
Filesize
854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1KB
MD52a738ca67be8dd698c70974c9d4bb21b
SHA145a4086c876d276954ffce187af2ebe3dc667b5f
SHA256b08d566a5705247ddc9abf5e970fc93034970b02cf4cb3d5ccc90e1a1f8c816e
SHA512f72b9190f9f2b1acc52f7fbb920d48797a96e62dfc0659c418edbbc0299dccf1931f6c508b86c940b976016745b9877f88f2ee081d3e3d5dcdcc2cc7e7884492
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
1KB
MD50b5af2490a319ed6b40055b2e10c8d20
SHA1e1f0148a6aca0bc611dc6273c0b706e9e5807f8a
SHA25602f71eaab21150a8a1eb4c7cae70e2a1413329c4069b34822f579446ae2c54be
SHA51289e98526c6c0170c20b3471896a7671886a2e816397ad40602462a833d25cc1a80c3dc79cae7901686d0d1eb80f67009bd5556f03ea5365ccb76c0dee5b52d2e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize3KB
MD53e3b3467c3c64a362a102fba4c50a5ea
SHA1fdb03bd006370eeed37b8707fa78d96adad01952
SHA25697ab9e64c0530b39487593d77d3d90f08eba9c71f5f8643b7ca8bc981d27d3be
SHA51225e323e3f17188fe1a924eff4023052f18c8d987b17d1167904b3718b3bea6e54ace47da1808628004fc16e7934ff766c7ec704bc3cf34efd14e20b5db890760
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize1KB
MD54f50e38cdef40a9c68e000b59a8bfdf0
SHA1ceae6579eb0bd5b6492fe11e0976c4ec0ab40e67
SHA256ea6b23a8fdfdec05f1b7b44d88b21414f3e6dbda8cdcb5d1ad35614393ea143c
SHA51250da3e1da43211b72b8a00746fca0e93ba53a470e31d8b15708484de361252a1d4e3cfc03561d6aa65b09a3acea58e9bb53538c8ae8fd344df764b8180f62757
-
Filesize
49.8MB
MD565259c11e1ff8d040f9ec58524a47f02
SHA12d5a24f7cadd10140dd6d3dd0dc6d0f02c2d40fd
SHA256755bd7f1fc6e93c3a69a1125dd74735895bdbac9b7cabad0506195a066bdde42
SHA51237096eeb1ab0e11466c084a9ce78057e250f856b919cb9ef3920dad29b2bb2292daabbee15c64dc7bc2a48dd930a52a2fb9294943da2c1c3692863cec2bae03d
-
Filesize
552KB
MD5497fd4a8f5c4fcdaaac1f761a92a366a
SHA181617006e93f8a171b2c47581c1d67fac463dc93
SHA25691cd76f9fa3b25008decb12c005c194bdf66c8d6526a954de7051bec9aae462a
SHA51273d11a309d8f1a6624520a0bf56d539cb07adee6d46f2049a86919f5ce3556dc031437f797e3296311fe780a8a11a1a37b4a404de337d009e9ed961f75664a25
-
Filesize
1.2MB
MD5ed98e67fa8cc190aad0757cd620e6b77
SHA10317b10cdb8ac080ba2919e2c04058f1b6f2f94d
SHA256e0beb19c3536561f603474e3d5e3c3dff341745d317bc4d1463e2abf182bb18d
SHA512ec9c3a71ca9324644d4a2d458e9ba86f90deb9137d0a35793e0932c2aa297877ed7f1ab75729fda96690914e047f1336f100b6809cbc7a33baa1391ed588d7f0
-
Filesize
160KB
MD5237e13b95ab37d0141cf0bc585b8db94
SHA1102c6164c21de1f3e0b7d487dd5dc4c5249e0994
SHA256d19b6b7c57bcee7239526339e683f62d9c2f9690947d0a446001377f0b56103a
SHA5129d0a68a806be25d2eeedba8be1acc2542d44ecd8ba4d9d123543d0f7c4732e1e490bad31cad830f788c81395f6b21d5a277c0bed251c9854440a662ac36ac4cb
-
Filesize
64KB
MD57c5aefb11e797129c9e90f279fbdf71b
SHA1cb9d9cbfbebb5aed6810a4e424a295c27520576e
SHA256394a17150b8774e507b8f368c2c248c10fce50fc43184b744e771f0e79ecafed
SHA512df59a30704d62fa2d598a5824aa04b4b4298f6192a01d93d437b46c4f907c90a1bad357199c51a62beb87cd724a30af55a619baef9ecf2cba032c5290938022a
-
Filesize
60KB
MD5a334bbf5f5a19b3bdb5b7f1703363981
SHA16cb50b15c0e7d9401364c0fafeef65774f5d1a2c
SHA256c33beaba130f8b740dddb9980fe9012f9322ac6e94f36a6aa6086851c51b98de
SHA5121fa170f643054c0957ed1257c4d7778976c59748670afa877d625aaa006325404bc17c41b47be2906dd3f1e229870d54eb7aba4a412de5adedbd5387e24abf46
-
Filesize
60KB
MD54fbbaac42cf2ecb83543f262973d07c0
SHA1ab1b302d7cce10443dfc14a2eba528a0431e1718
SHA2566550582e41fc53b8a7ccdf9ac603216937c6ff2a28e9538610adb7e67d782ab5
SHA5124146999b4bec85bcd2774ac242cb50797134e5180a3b3df627106cdfa28f61aeea75a7530094a9b408bc9699572cae8cf998108bde51b57a6690d44f0b34b69e
-
Filesize
36KB
MD5b4ac608ebf5a8fdefa2d635e83b7c0e8
SHA1d92a2861d5d1eb67ab434ff2bd0a11029b3bd9a9
SHA2568414dfe399813b7426c235ba1e625bd2b5635c8140da0d0cfc947f6565fe415f
SHA5122c42daade24c3ff01c551a223ee183301518357990a9cb2cc2dd7bf411b7059ff8e0bf1d1aee2d268eca58db25902a8048050bdb3cb48ae8be1e4c2631e3d9b4
-
Filesize
60KB
MD59fafb9d0591f2be4c2a846f63d82d301
SHA11df97aa4f3722b6695eac457e207a76a6b7457be
SHA256e78e74c24d468284639faf9dcfdba855f3e4f00b2f26db6b2c491fa51da8916d
SHA512ac0d97833beec2010f79cb1fbdb370d3a812042957f4643657e15eed714b9117c18339c737d3fd95011f873cda46ae195a5a67ae40ff2a5bcbee54d1007f110a
-
Filesize
268KB
MD55c91bf20fe3594b81052d131db798575
SHA1eab3a7a678528b5b2c60d65b61e475f1b2f45baa
SHA256e8ce546196b6878a8c34da863a6c8a7e34af18fb9b509d4d36763734efa2d175
SHA512face50db7025e0eb2e67c4f8ec272413d13491f7438287664593636e3c7e3accaef76c3003a299a1c5873d388b618da9eaede5a675c91f4c1f570b640ac605d6
-
Filesize
5.0MB
MD51fd2907e2c74c9a908e2af5f948006b5
SHA1a390e9133bfd0d55ffda07d4714af538b6d50d3d
SHA256f3d4425238b5f68b4d41ed5be271d2f4118a245baf808a62dc1a9e6e619b2f95
SHA5128eede3e5e52209b8703706a3e3e63230ba01975348dcdc94ef87f91d7c833a505b177139683ca7a22d8082e72e961e823bc3ad1a84ab9c371f5111f530807171
-
Filesize
4.0MB
MD549654a47fadfd39414ddc654da7e3879
SHA19248c10cef8b54a1d8665dfc6067253b507b73ad
SHA256b8112187525051bfade06cb678390d52c79555c960202cc5bbf5901fbc0853c5
SHA512fa9cab60fadd13118bf8cb2005d186eb8fa43707cb983267a314116129371d1400b95d03fbf14dfdaba8266950a90224192e40555d910cf8a3afa4aaf4a8a32f
-
Filesize
52KB
MD5316999655fef30c52c3854751c663996
SHA1a7862202c3b075bdeb91c5e04fe5ff71907dae59
SHA256ea4ca740cd60d2c88280ff8115bf354876478ef27e9e676d8b66601b4e900ba0
SHA5125555673e9863127749fc240f09cf3fb46e2019b459ad198ba1dc356ba321c41e4295b6b2e2d67079421d7e6d2fb33542b81b0c7dae812fe8e1a87ded044edd44