Analysis
-
max time kernel
1059s -
max time network
1060s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-06-2024 23:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1xvVueF4gLi2-3zQcy3U2PIeXj6Au6is2/view?usp=drive_link
Resource
win11-20240611-en
Errors
General
-
Target
https://drive.google.com/file/d/1xvVueF4gLi2-3zQcy3U2PIeXj6Au6is2/view?usp=drive_link
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
WinXP.Horror.Destructive.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "0" WinXP.Horror.Destructive.exe -
Processes:
WinXP.Horror.Destructive.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WinXP.Horror.Destructive.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
WinXP.Horror.Destructive.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WinXP.Horror.Destructive.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 5 IoCs
Processes:
npp.8.6.8.Installer.x64.exenotepad++.exegup.exenotepad++.exeLegacyUpdate-1.9.exepid process 4632 npp.8.6.8.Installer.x64.exe 2128 notepad++.exe 2056 gup.exe 3052 notepad++.exe 2404 LegacyUpdate-1.9.exe -
Loads dropped DLL 22 IoCs
Processes:
npp.8.6.8.Installer.x64.exeregsvr32.exeregsvr32.exegup.exenotepad++.exeLegacyUpdate-1.9.exeregsvr32.exeregsvr32.exerundll32.exerundll32.exeIEXPLORE.EXEpid process 4632 npp.8.6.8.Installer.x64.exe 4632 npp.8.6.8.Installer.x64.exe 4632 npp.8.6.8.Installer.x64.exe 4632 npp.8.6.8.Installer.x64.exe 4632 npp.8.6.8.Installer.x64.exe 4632 npp.8.6.8.Installer.x64.exe 2516 regsvr32.exe 2948 regsvr32.exe 2056 gup.exe 2128 notepad++.exe 2128 notepad++.exe 2128 notepad++.exe 2128 notepad++.exe 2128 notepad++.exe 2128 notepad++.exe 2404 LegacyUpdate-1.9.exe 2404 LegacyUpdate-1.9.exe 4112 regsvr32.exe 5064 regsvr32.exe 1004 rundll32.exe 1212 rundll32.exe 6072 IEXPLORE.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
Processes:
flow ioc 4 drive.google.com 7 drive.google.com 9 drive.google.com 260 discord.com 351 discord.com 2 drive.google.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
WinXP.Horror.Destructive.exedescription ioc process File opened for modification \??\PhysicalDrive0 WinXP.Horror.Destructive.exe -
Drops file in System32 directory 7 IoCs
Processes:
mmc.exeutilman.exeMagnify.exedescription ioc process File opened for modification C:\Windows\system32\devmgmt.msc mmc.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF mmc.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF mmc.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_904E4BDBDE3143198707E7E75A41B8AC.dat utilman.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_904E4BDBDE3143198707E7E75A41B8AC.dat utilman.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\speech\Microsoft\Speech\Files\UserLexicons\SP_E79DF5D2258541A394FFA2335B56D14B.dat Magnify.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\speech\Microsoft\Speech\Files\UserLexicons\SP_E79DF5D2258541A394FFA2335B56D14B.dat Magnify.exe -
Drops file in Program Files directory 64 IoCs
Processes:
npp.8.6.8.Installer.x64.exedescription ioc process File created C:\Program Files\Notepad++\autoCompletion\cmake.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\raku.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\contextMenu\NppShell.dll npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\change.log npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\themes\Zenburn.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\uninstall.exe npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\cobol.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\updater\gup.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\contextMenu.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\css.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\lisp.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\perl.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\perl.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\nsis.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\readme.txt npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\cs.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\cobol-free.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\nppLogNulContentCorruptionIssue.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\notepad++.exe npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\rc.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\nsis.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\cobol.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\java.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\overrideMap.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\python.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\haskell.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\themes\MossyLawn.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\ada.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\localization\spanish.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\themes\DarkModeDefault.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\lua.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\ini.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\xml.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\xml.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\fortran.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\updater\README.md npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\c.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\themes\Solarized.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\themes\DansLeRuSH-Dark.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\contextMenu\NppShell.msix npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\tex.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\fortran77.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\plugins\NppExport\NppExport.dll npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\themes\Twilight.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\c.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\vb.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\actionscript.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\autoit.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\cpp.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\themes\Choco.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\sql.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\go.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\java.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\themes\khaki.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\themes\Plastic Code Wrap.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\themes\Navajo.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\javascript.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\batch.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\hollywood.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\krl.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\functionList\universe_basic.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\stylers.model.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\themes\Ruby Blue.xml npp.8.6.8.Installer.x64.exe File created C:\Program Files\Notepad++\autoCompletion\vhdl.xml npp.8.6.8.Installer.x64.exe -
Drops file in Windows directory 60 IoCs
Processes:
mmc.exedescription ioc process File created C:\Windows\INF\c_scmdisk.PNF mmc.exe File created C:\Windows\INF\c_apo.PNF mmc.exe File created C:\Windows\INF\c_volume.PNF mmc.exe File created C:\Windows\INF\c_cashdrawer.PNF mmc.exe File created C:\Windows\INF\c_holographic.PNF mmc.exe File created C:\Windows\INF\c_display.PNF mmc.exe File created C:\Windows\INF\c_scmvolume.PNF mmc.exe File created C:\Windows\INF\PerceptionSimulationSixDof.PNF mmc.exe File created C:\Windows\INF\c_barcodescanner.PNF mmc.exe File created C:\Windows\INF\digitalmediadevice.PNF mmc.exe File created C:\Windows\INF\c_firmware.PNF mmc.exe File created C:\Windows\INF\c_proximity.PNF mmc.exe File created C:\Windows\INF\c_fscfsmetadataserver.PNF mmc.exe File created C:\Windows\INF\c_fshsm.PNF mmc.exe File created C:\Windows\INF\c_fscontinuousbackup.PNF mmc.exe File created C:\Windows\INF\c_fsundelete.PNF mmc.exe File created C:\Windows\INF\c_sslaccel.PNF mmc.exe File created C:\Windows\INF\c_magneticstripereader.PNF mmc.exe File created C:\Windows\INF\c_media.PNF mmc.exe File created C:\Windows\INF\c_fssystem.PNF mmc.exe File created C:\Windows\INF\c_primitive.PNF mmc.exe File created C:\Windows\INF\c_processor.PNF mmc.exe File created C:\Windows\INF\c_swcomponent.PNF mmc.exe File created C:\Windows\INF\xusb22.PNF mmc.exe File created C:\Windows\INF\c_fsvirtualization.PNF mmc.exe File opened for modification C:\Windows\INF\setupapi.dev.log mmc.exe File created C:\Windows\INF\c_linedisplay.PNF mmc.exe File created C:\Windows\INF\c_smrdisk.PNF mmc.exe File created C:\Windows\INF\c_fsphysicalquotamgmt.PNF mmc.exe File created C:\Windows\INF\c_fsquotamgmt.PNF mmc.exe File created C:\Windows\INF\c_fsinfrastructure.PNF mmc.exe File created C:\Windows\INF\c_diskdrive.PNF mmc.exe File created C:\Windows\INF\oposdrv.PNF mmc.exe File created C:\Windows\INF\c_nvmedisk.PNF mmc.exe File created C:\Windows\INF\c_fscompression.PNF mmc.exe File created C:\Windows\INF\c_monitor.PNF mmc.exe File created C:\Windows\INF\c_camera.PNF mmc.exe File created C:\Windows\INF\c_fsopenfilebackup.PNF mmc.exe File created C:\Windows\INF\rawsilo.PNF mmc.exe File created C:\Windows\INF\c_netdriver.PNF mmc.exe File created C:\Windows\INF\c_fsantivirus.PNF mmc.exe File created C:\Windows\INF\wsdprint.PNF mmc.exe File created C:\Windows\INF\c_fssystemrecovery.PNF mmc.exe File created C:\Windows\INF\c_fscopyprotection.PNF mmc.exe File created C:\Windows\INF\c_fssecurityenhancer.PNF mmc.exe File created C:\Windows\INF\miradisp.PNF mmc.exe File created C:\Windows\INF\c_fsencryption.PNF mmc.exe File created C:\Windows\INF\c_mcx.PNF mmc.exe File created C:\Windows\INF\c_fsreplication.PNF mmc.exe File created C:\Windows\INF\remoteposdrv.PNF mmc.exe File created C:\Windows\INF\c_smrvolume.PNF mmc.exe File created C:\Windows\INF\ts_generic.PNF mmc.exe File created C:\Windows\INF\c_fsactivitymonitor.PNF mmc.exe File created C:\Windows\INF\c_extension.PNF mmc.exe File created C:\Windows\INF\c_computeaccelerator.PNF mmc.exe File created C:\Windows\INF\c_fscontentscreener.PNF mmc.exe File created C:\Windows\INF\rdcameradriver.PNF mmc.exe File created C:\Windows\INF\c_receiptprinter.PNF mmc.exe File created C:\Windows\INF\c_ucm.PNF mmc.exe File created C:\Windows\INF\dc1-controller.PNF mmc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Checks SCSI registry key(s) 3 TTPs 35 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exemmc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ mmc.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exeWINWORD.EXEtaskmgr.exefirefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
WINWORD.EXEchrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTSR" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url1 = 7b5b364143cbda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TypedURLs\url2 = "http://discord.com/" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TypedURLs iexplore.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.whatismybrowser.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "13103" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url3 = 0000000000000000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\discord.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\GPU\SubSysId = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.22000.1\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\Suggested Sites\MigrationTime = 6bf71a1983bcda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url1 = 589bdd4c43cbda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url2 = 7b5b364143cbda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\whatismybrowser.com\Total = "13074" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TypedURLs\url1 = "http://discord.com/" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TypedURLs\url4 = "http://go.microsoft.com/fwlink/p/?LinkId=255141" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "9" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTLogoURL = "http://go.microsoft.com/fwlink/?LinkID=403856&language={language}&scale={scalelevel}&contrast={contrast}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\whatismybrowser.com\Total = "12990" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.whatismybrowser.com\ = "13074" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.whatismybrowser.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\GPU\SoftwareFallback = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\User Preferences\3DB9590C4C4C26C4CCBDD94ECAD790359708C3267B = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\Main\SyncHomePage Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\SearchScopes\Version = "5" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURLFallback = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IE11SS&market={language}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionHigh = "268435456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TypedURLs\url1 = "http://whatismybrowser.com/" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TypedURLsTime iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\User Preferences\3DB9590C4C4C26C4CCBDD94ECAD790359708C3267B = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url2 = 0000000000000000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TypedURLsTime\url4 = 0000000000000000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "268435456" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\TypedURLs\url3 = "http://whatismybrowser.com/" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\Recovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\Suggested Sites iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "43" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "13085" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\User Preferences\3DB9590C4C4C26C4CCBDD94ECAD790359708C3267B = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\whatismybrowser.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "13001" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "18" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\DOMStorage\discord.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "395196024" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\Main\ImageStoreRandomFolder = "jnstxt4" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURLFallback = "http://www.bing.com/favicon.ico" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IE11SS&market={language}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "13" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
iexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://go.microsoft.com/fwlink/p/?LinkId=255141" iexplore.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
LogonUI.exeLogonUI.exeLogonUI.exeatbroker.exeMagnify.exeLogonUI.exeutilman.exeatbroker.exeatbroker.exeatbroker.exeosk.exeatbroker.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\CTF\SORTORDER\ASSEMBLYITEM\0X00000409\{34745C63-B2F0-4784-8B67-5E12C8701A31} LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\AssemblyItem\0x00000409\{34745C63-B2F0-4784-8B67-5E12C8701A31}\00000000 LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\Language LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" atbroker.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\magnifierpane\SpeechSpeed = "10" Magnify.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\CTF\SORTORDER\LANGUAGE LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\zSMeVgHcAfbzUDAeuvXxdIs04rvNIEuvZVZUFpWUe20\HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech_OneCore\PhoneConverters utilman.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Recognizers\Tokens\MS-1033-110-WINMO-DNN\Lts Magnify.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Voices\Tokens\MSTTS_V110_enUS_MarkM\Attributes Magnify.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" atbroker.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\PhoneConverters\Tokens\TraditionalChinese\CLSID = "{C6FABB24-E332-46FB-BC91-FF331B2D51F0}" Magnify.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Recognizers\Tokens\MS-1033-110-WINMO-DNN\Attributes\Name = "MS-1033-110-WINMO-DNN" Magnify.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Voices\Tokens\MSTTS_V110_enUS_MarkM\Attributes\Age = "Adult" Magnify.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\magnifierpane\ShowMagnifier = "1" atbroker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\AssemblyItem\0x00000409\{34745C63-B2F0-4784-8B67-5E12C8701A31}\00000000 LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\PhoneConverters\Tokens\English\ = "English Phone Converter" Magnify.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Recognizers\Tokens\MS-1033-110-WINMO-DNN\Attributes\Revision = "1" Magnify.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\zSMeVgHcAfbzUDAeuvXxdIs04rvNIEuvZVZUFpWUe20\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Voices\Tokens\MSTTS_V110_enUS_MarkM\Attributes utilman.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\magnifierpane\FollowFocus = "1" atbroker.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\magnifierpane\FullScreenTrackingMode = "0" atbroker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\zSMeVgHcAfbzUDAeuvXxdIs04rvNIEuvZVZUFpWUe20\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\PhoneConverters\Tokens\Spanish utilman.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Voices\Tokens\MSTTS_V110_enUS_MarkM\CLSID = "{179F3D56-1B0B-42B2-A962-59B7EF59FE1B}" Magnify.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" atbroker.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\PhoneConverters\Tokens\Chinese\CLSID = "{C6FABB24-E332-46FB-BC91-FF331B2D51F0}" Magnify.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\UXLanguages\Tokens\en-US\CortanaVoiceGender = "1" Magnify.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\CTF\SORTORDER\LANGUAGE LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Control Panel\International\User Profile\ShowCasing = "1" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\CTF\SORTORDER\ASSEMBLYITEM\0X00000409\{34745C63-B2F0-4784-8B67-5E12C8701A31} LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Recognizers\Tokens\MS-1033-110-WINMO-DNN\Models\1033\L1033\AMs\AI041033 = "%windir%\\Speech_OneCore\\Engines\\SR\\en-US-N\\AI041033" Magnify.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech\CurrentUserLexicon\ = "Current User Lexicon" Magnify.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Osk\UseMouse = "0" osk.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\zSMeVgHcAfbzUDAeuvXxdIs04rvNIEuvZVZUFpWUe20\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\AudioInput\TokenEnums\MMAudioIn\CLSID = "{14E74C62-DC97-43B0-8F2F-581496A65D60}" utilman.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\osk\WindowLeft = "148" atbroker.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\UXLanguages\Tokens\en-US\Language = "1033" Magnify.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\Audio\ScreenReaderDuckingPreference = "0" Magnify.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\osk\HoverPeriod = "1000" atbroker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\PhoneConverters\Tokens\Japanese\Attributes Magnify.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\magnifierpane\Invert = "0" atbroker.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\magnifierpane\ModifierKey = "1" atbroker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\PhoneConverters\Tokens\German Magnify.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent Magnify.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\PhoneConverters\Tokens Magnify.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\CTF\SortOrder\Language LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\zSMeVgHcAfbzUDAeuvXxdIs04rvNIEuvZVZUFpWUe20\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\PhoneConverters\Tokens\French\Attributes\Language = "40C" utilman.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Osk\UseTextPrediction = "1" osk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\osk\WindowLeft = "148" atbroker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\magnifierpane\FullScreenTrackingMode = "0" Magnify.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\AudioInput\DefaultDefaultTokenId = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\AudioInput\\TokenEnums\\MMAudioIn\\" Magnify.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\magnifierpane\MagnifierUIWindowMinimized = "0" atbroker.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\osk\ModeHeightNavigation = "0" atbroker.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" atbroker.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\CTF\SORTORDER\ASSEMBLYITEM\0X00000409\{34745C63-B2F0-4784-8B67-5E12C8701A31} LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech_OneCore\PhoneConverters\DefaultTokenId = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\PhoneConverters\\Tokens\\English" Magnify.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\zSMeVgHcAfbzUDAeuvXxdIs04rvNIEuvZVZUFpWUe20\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\PhoneConverters\Tokens\Spanish\Attributes utilman.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ScreenMagnifier\SpeechSpeed = "10" Magnify.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\I8CEPNc2O095rF1HBB_7eVJctVQf5cQVIEOsIcIRzO4\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\SpeechUXPlugins\Tokens\DebugPlugin\Attributes\Enabled = "0" Magnify.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Speech_OneCore\Isolated\zSMeVgHcAfbzUDAeuvXxdIs04rvNIEuvZVZUFpWUe20\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Voices\Tokens\MSTTS_V110_enUS_DavidM\ = "Microsoft David - English (United States)" utilman.exe -
Modifies registry class 64 IoCs
Processes:
firefox.exeregsvr32.exeLegacyUpdate-1.9.exeregsvr32.exeregsvr32.exeMiniSearchHost.exechrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{D0A82CD0-B6F0-4101-83ED-DA47D0D04830}\DllSurrogate regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F}\Control regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F}\MiscStatus regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FFBE8D44-E9CF-4DD8-9FD6-976802C94D9C}\DefaultIcon\ = "\"C:\\Program Files\\Legacy Update\\LegacyUpdate.dll\",-201" LegacyUpdate-1.9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{84F517AD-6438-478F-BEA8-F0B808DC257F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C33085BB-C3E1-4D27-A214-AF01953DF5E5}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LegacyUpdate.Control.1\ = "LegacyUpdateCtrl Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F}\MiscStatus\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7B875A2F-2DFB-4D38-91F5-5C0BFB74C377}\MiscStatus\1\ = "131473" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F}\MiscStatus\1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F}\MiscStatus\1\ = "132497" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4524BFBF-70BD-4EAC-AD33-6BADA4FB0638}\NumMethods\ = "9" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0000000001000000ffffffff firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7B875A2F-2DFB-4D38-91F5-5C0BFB74C377}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F}\VersionIndependentProgID\ = "LegacyUpdate.Control" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LegacyUpdate.ProgressBar.1\CLSID\ = "{7B875A2F-2DFB-4D38-91F5-5C0BFB74C377}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7B875A2F-2DFB-4D38-91F5-5C0BFB74C377}\MiscStatus\1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F}\ = "Legacy Update Control" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3236E684-0E4B-4780-9F31-F1983F5AB78D}\ProxyStubClsid32\ = "{3236E684-0E4B-4780-9F31-F1983F5AB78D}" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\ANotepad++64\ = "Notepad++ Context menu" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C33085BB-C3E1-4D27-A214-AF01953DF5E5}\TypeLib\ = "{05D22F33-C7C3-4C90-BDD9-CEDC86EA8FBE}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84F517AD-6438-478F-BEA8-F0B808DC257F}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID LegacyUpdate-1.9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FFBE8D44-E9CF-4DD8-9FD6-976802C94D9C}\Shell\Open LegacyUpdate-1.9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LegacyUpdate.Control\CurVer\ = "LegacyUpdate.Control.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3236E684-0E4B-4780-9F31-F1983F5AB78D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7B875A2F-2DFB-4D38-91F5-5C0BFB74C377}\MiscStatus\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\LegacyUpdate.ElevationHelper.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LegacyUpdate.Control.1\CLSID\ = "{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7B875A2F-2DFB-4D38-91F5-5C0BFB74C377}\ = "Legacy Update Progress Bar Control" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7B875A2F-2DFB-4D38-91F5-5C0BFB74C377}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7B875A2F-2DFB-4D38-91F5-5C0BFB74C377}\TypeLib\ = "{05D22F33-C7C3-4C90-BDD9-CEDC86EA8FBE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4524BFBF-70BD-4EAC-AD33-6BADA4FB0638}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7B875A2F-2DFB-4D38-91F5-5C0BFB74C377}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{84F517AD-6438-478F-BEA8-F0B808DC257F}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F}\TypeLib regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" firefox.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-423582142-4191893794-1888535462-1000\{1B6DCEA2-9A04-4E49-89B2-1EDFB982F670} chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FFBE8D44-E9CF-4DD8-9FD6-976802C94D9C}\System.ApplicationName = "LegacyUpdate" LegacyUpdate-1.9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05D22F33-C7C3-4C90-BDD9-CEDC86EA8FBE}\1.0\0\win64 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LegacyUpdate.ElevationHelper.1\CLSID\ = "{84F517AD-6438-478F-BEA8-F0B808DC257F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FFBE8D44-E9CF-4DD8-9FD6-976802C94D9C}\InfoTip = "@\"C:\\Program Files\\Legacy Update\\LegacyUpdate.dll\",-4" LegacyUpdate-1.9.exe Key created \Registry\User\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\NotificationData firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FFBE8D44-E9CF-4DD8-9FD6-976802C94D9C}\ = "Legacy Update" LegacyUpdate-1.9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7B875A2F-2DFB-4D38-91F5-5C0BFB74C377}\InprocServer32\ = "C:\\Program Files\\Legacy Update\\LegacyUpdate.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\LegacyUpdate.dll\AppID = "{D0A82CD0-B6F0-4101-83ED-DA47D0D04830}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LegacyUpdate.ProgressBar.1\ = "ProgressBarControl Class" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LegacyUpdate.ProgressBar.1\ = "ProgressBarControl Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7B875A2F-2DFB-4D38-91F5-5C0BFB74C377}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AD28E0DF-5F5A-40B5-9432-85EFD97D1F9F}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4524BFBF-70BD-4EAC-AD33-6BADA4FB0638}\ProxyStubClsid32 regsvr32.exe -
NTFS ADS 3 IoCs
Processes:
firefox.exechrome.exechrome.exedescription ioc process File created C:\Users\Admin\Downloads\npp.8.6.8.Installer.x64.exe:Zone.Identifier firefox.exe File opened for modification C:\Users\Admin\Downloads\LegacyUpdate-1.9.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\WinXP.Horror.Destructive.zip:Zone.Identifier chrome.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 6036 WINWORD.EXE 6036 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exetaskmgr.exeWinXP.Horror.Destructive.exepid process 1040 chrome.exe 1040 chrome.exe 4584 chrome.exe 4584 chrome.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe 5832 WinXP.Horror.Destructive.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
mmc.exeIEXPLORE.EXEpid process 5768 mmc.exe 6072 IEXPLORE.EXE -
Suspicious behavior: LoadsDriver 10 IoCs
Processes:
pid 4 4 4 4 4 660 4 4 4 4 -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
Processes:
chrome.exepid process 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
firefox.exenpp.8.6.8.Installer.x64.exeregsvr32.exechrome.exedescription pid process Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 1468 firefox.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 4632 npp.8.6.8.Installer.x64.exe Token: SeDebugPrivilege 2948 regsvr32.exe Token: SeDebugPrivilege 2948 regsvr32.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
firefox.exenpp.8.6.8.Installer.x64.exechrome.exepid process 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe 4632 npp.8.6.8.Installer.x64.exe 4632 npp.8.6.8.Installer.x64.exe 4632 npp.8.6.8.Installer.x64.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
firefox.exechrome.exetaskmgr.exepid process 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
firefox.exenpp.8.6.8.Installer.x64.exegup.exenotepad++.exenotepad++.exeMiniSearchHost.exeWINWORD.EXEosk.exechrome.exetaskmgr.exemmc.exeLegacyUpdate-1.9.exeiexplore.exepid process 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe 1468 firefox.exe 4632 npp.8.6.8.Installer.x64.exe 2056 gup.exe 2128 notepad++.exe 2128 notepad++.exe 3052 notepad++.exe 2128 notepad++.exe 2128 notepad++.exe 2500 MiniSearchHost.exe 6036 WINWORD.EXE 6036 WINWORD.EXE 6036 WINWORD.EXE 6036 WINWORD.EXE 6036 WINWORD.EXE 6036 WINWORD.EXE 6036 WINWORD.EXE 5068 osk.exe 5068 osk.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 5068 osk.exe 5068 osk.exe 5068 osk.exe 5068 osk.exe 5068 osk.exe 5068 osk.exe 5068 osk.exe 5068 osk.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 4952 taskmgr.exe 1040 chrome.exe 5768 mmc.exe 5768 mmc.exe 5768 mmc.exe 2404 LegacyUpdate-1.9.exe 5648 iexplore.exe 5648 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 4604 wrote to memory of 1468 4604 firefox.exe firefox.exe PID 4604 wrote to memory of 1468 4604 firefox.exe firefox.exe PID 4604 wrote to memory of 1468 4604 firefox.exe firefox.exe PID 4604 wrote to memory of 1468 4604 firefox.exe firefox.exe PID 4604 wrote to memory of 1468 4604 firefox.exe firefox.exe PID 4604 wrote to memory of 1468 4604 firefox.exe firefox.exe PID 4604 wrote to memory of 1468 4604 firefox.exe firefox.exe PID 4604 wrote to memory of 1468 4604 firefox.exe firefox.exe PID 4604 wrote to memory of 1468 4604 firefox.exe firefox.exe PID 4604 wrote to memory of 1468 4604 firefox.exe firefox.exe PID 4604 wrote to memory of 1468 4604 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 1580 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 236 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 236 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 236 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 236 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 236 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 236 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 236 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 236 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 236 1468 firefox.exe firefox.exe PID 1468 wrote to memory of 236 1468 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://drive.google.com/file/d/1xvVueF4gLi2-3zQcy3U2PIeXj6Au6is2/view?usp=drive_link"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://drive.google.com/file/d/1xvVueF4gLi2-3zQcy3U2PIeXj6Au6is2/view?usp=drive_link2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1468.0.1490381090\1371962160" -parentBuildID 20230214051806 -prefsHandle 1760 -prefMapHandle 1752 -prefsLen 22074 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d997ad2-261f-48f2-ae28-fe16d60b67c9} 1468 "\\.\pipe\gecko-crash-server-pipe.1468" 1852 2477ef0da58 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1468.1.2090004928\2039153509" -parentBuildID 20230214051806 -prefsHandle 2396 -prefMapHandle 2384 -prefsLen 22925 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed9a7b82-b68a-481c-bf92-37e510c98a95} 1468 "\\.\pipe\gecko-crash-server-pipe.1468" 2408 24772688658 socket3⤵
- Checks processor information in registry
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1468.2.747235634\1044027648" -childID 1 -isForBrowser -prefsHandle 2828 -prefMapHandle 2800 -prefsLen 22963 -prefMapSize 235121 -jsInitHandle 1068 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d3b07e3-abf2-4ca6-86ff-af60b0982888} 1468 "\\.\pipe\gecko-crash-server-pipe.1468" 2668 24709a3c558 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1468.3.720030350\787722710" -childID 2 -isForBrowser -prefsHandle 3552 -prefMapHandle 3548 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1068 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce4a4156-188b-43a2-9755-2b14c08a8bea} 1468 "\\.\pipe\gecko-crash-server-pipe.1468" 3588 2477267c958 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1468.4.1988024046\171040752" -childID 3 -isForBrowser -prefsHandle 5224 -prefMapHandle 5236 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1068 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8cd3422f-0afe-4b4c-b0f8-eae235e77435} 1468 "\\.\pipe\gecko-crash-server-pipe.1468" 5232 2470e9be358 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1468.5.579105001\921268555" -childID 4 -isForBrowser -prefsHandle 5456 -prefMapHandle 5452 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1068 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6bfc85f3-2d38-46b8-9e05-7e73ce2ad961} 1468 "\\.\pipe\gecko-crash-server-pipe.1468" 5464 2470e9bd758 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1468.6.919378385\610768163" -childID 5 -isForBrowser -prefsHandle 5608 -prefMapHandle 5616 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1068 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a1cce225-7fc5-4f81-a79b-7d084b9d4df8} 1468 "\\.\pipe\gecko-crash-server-pipe.1468" 5596 2470e9be658 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1468.7.719450304\1934751374" -childID 6 -isForBrowser -prefsHandle 5972 -prefMapHandle 5952 -prefsLen 27695 -prefMapSize 235121 -jsInitHandle 1068 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c275860-581c-40dc-995b-673fbc4b9f3a} 1468 "\\.\pipe\gecko-crash-server-pipe.1468" 6036 2470ecc1e58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1468.8.742364007\411412800" -childID 7 -isForBrowser -prefsHandle 2796 -prefMapHandle 2792 -prefsLen 28079 -prefMapSize 235121 -jsInitHandle 1068 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e94b1ec-0741-43b2-9945-472b13c2fbb2} 1468 "\\.\pipe\gecko-crash-server-pipe.1468" 2696 24709a8e658 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1468.9.1042740454\1878267249" -childID 8 -isForBrowser -prefsHandle 6780 -prefMapHandle 6764 -prefsLen 28215 -prefMapSize 235121 -jsInitHandle 1068 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {866aab66-518b-4c05-b8e1-6b3632224420} 1468 "\\.\pipe\gecko-crash-server-pipe.1468" 6656 247110b6b58 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1468.10.553383608\1308072661" -childID 9 -isForBrowser -prefsHandle 6920 -prefMapHandle 6924 -prefsLen 28215 -prefMapSize 235121 -jsInitHandle 1068 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {81a9d282-7a22-4840-a29a-f935a6ea75d1} 1468 "\\.\pipe\gecko-crash-server-pipe.1468" 6788 247110b4158 tab3⤵
-
C:\Users\Admin\Downloads\npp.8.6.8.Installer.x64.exe"C:\Users\Admin\Downloads\npp.8.6.8.Installer.x64.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Program Files\Notepad++\contextMenu\NppShell.dll"4⤵
- Loads dropped DLL
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files\Notepad++\contextMenu\NppShell.dll"5⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" "C:\Program Files\Notepad++\notepad++.exe"4⤵
-
C:\Program Files\Notepad++\notepad++.exe"C:\Program Files\Notepad++\notepad++.exe" "C:\Program Files\Notepad++\change.log"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
-
C:\Program Files\Notepad++\notepad++.exe"C:\Program Files\Notepad++\notepad++.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Notepad++\updater\gup.exe"C:\Program Files\Notepad++\updater\gup.exe" -v8.68 -px643⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffde8a6ab58,0x7ffde8a6ab68,0x7ffde8a6ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1512 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4216 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4400 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4548 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4424 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4840 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4992 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3908 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4120 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3420 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4344 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4972 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4988 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5776 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5916 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5920 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5912 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=5592 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=3308 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5864 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
- Modifies registry class
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=6056 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4356 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4872 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
- NTFS ADS
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4232 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5376 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\LegacyUpdate-1.9.exe"C:\Users\Admin\Downloads\LegacyUpdate-1.9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\Legacy Update\LegacyUpdate.dll"3⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\Legacy Update\LegacyUpdate32.dll"3⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe "C:\Program Files\Legacy Update\LegacyUpdate.dll",LaunchUpdateSite firstrun3⤵
- Loads dropped DLL
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe "C:\Program Files\Legacy Update\LegacyUpdate.dll",LaunchUpdateSite firstrun4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" user /delete LegacyUpdateTemp3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user /delete LegacyUpdateTemp4⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6800 --field-trial-handle=1804,i,9674979728912957153,14914230062323306450,131072 /prefetch:82⤵
- NTFS ADS
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\These.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\osk.exe"C:\Windows\system32\osk.exe"1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004DC1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe"1⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\devmgmt.msc"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" ms-settings:windowsupdate3⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5648 CREDAT:17410 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\osk.exe"C:\Windows\system32\osk.exe"1⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{60A90A2F-858D-42AF-8929-82BE9D99E8A1}1⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{60A90A2F-858D-42AF-8929-82BE9D99E8A1}1⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{60A90A2F-858D-42AF-8929-82BE9D99E8A1}1⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{60A90A2F-858D-42AF-8929-82BE9D99E8A1}1⤵
-
C:\Users\Admin\Downloads\WinXP.Horror.Destructive\WinXP.Horror.Destructive.exe"C:\Users\Admin\Downloads\WinXP.Horror.Destructive\WinXP.Horror.Destructive.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa39b7055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\atbroker.exeatbroker.exe1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\Sethc.exe"C:\Windows\System32\Sethc.exe" /AccessibilitySoundAgent2⤵
-
C:\Windows\system32\utilman.exeutilman.exe /debug1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\System32\osk.exe"C:\Windows\System32\osk.exe"2⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\atbroker.exeatbroker.exe1⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3940055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\atbroker.exeatbroker.exe1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\Sethc.exe"C:\Windows\System32\Sethc.exe" /AccessibilitySoundAgent2⤵
-
C:\Windows\system32\atbroker.exeatbroker.exe1⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3942855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\atbroker.exeatbroker.exe1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\Sethc.exe"C:\Windows\System32\Sethc.exe" /AccessibilitySoundAgent2⤵
-
C:\Windows\system32\utilman.exeutilman.exe /debug1⤵
-
C:\Windows\System32\Magnify.exe"C:\Windows\System32\Magnify.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\system32\atbroker.exeatbroker.exe1⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3950855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\atbroker.exeatbroker.exe1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\Sethc.exe"C:\Windows\System32\Sethc.exe" /AccessibilitySoundAgent2⤵
-
C:\Windows\system32\atbroker.exeatbroker.exe1⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
2Accessibility Features
1Component Object Model Hijacking
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
2Accessibility Features
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
4Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Notepad++\change.logFilesize
1KB
MD54d40de53fd437fcd71324b93e55a592f
SHA169bb82c62486c0bddf49a7767869b563d7c47955
SHA2560d29d7d2e46307e51548d7184d36091fb17c696da8e0d14b873dde07ed19d646
SHA5121a6159e559bde6137084addf40b958f4d4412e4b3c4efce8012268278bc4fc2360743f4e07574897a95bdebaba0e708a4585ab2ed97f492b100224a87cba0d93
-
C:\Program Files\Notepad++\contextMenu\NppShell.dllFilesize
375KB
MD5f0e9aeb16febf9b93e8b009627233bcd
SHA183bcff9f19ce9bbdbf317d0110ef40b1f88f8849
SHA25613ae3f131636bc11438fabbeeddf0bb2dc2e66fe7747e6add82f95cd5e1cb795
SHA5125a8a87e5bf50bbb9f7ee9fe395d8b77bdfe1feb86a118dee8a63248b160a8e40de61799276cca9001e220833ace05eeef1bd2997d6ca315573d7a6eb30ea6f42
-
C:\Program Files\Notepad++\langs.model.xmlFilesize
460KB
MD56dc18e98260a6d648c591200f14c9bf6
SHA1c5d3343d3f91dbfe4db4abfe8ca762104b32b995
SHA256e3c7749a2caf5ed7d5ad3ee5b6e341d1dcd5cbffe56d2ac9c910ee4bf7e8814e
SHA5126c0fa09b4712f6aa2397927a7261a7c06fad4d528d8be1aca94bdb065614b83d070e91b484c1133bb9de9180a2f48724d5108c7e43da0aa65917cd7e543b66db
-
C:\Program Files\Notepad++\notepad++.exeFilesize
7.1MB
MD5e64efd5e853763cd9a17c9677f1753c7
SHA1b4fb61430e6af6f1bd95c26c6123ba077960b079
SHA256faa189d14b6a2b3a1f584a0fb966dc70045fe98b45e0ba1d67e7ecb87ae3f323
SHA512574c930e96dc920cb614e4061957e5b4096f715bb436a661bcc2b9e164523fff2c456e64d32ca2b08e9585ae165b2616a228e85cd48fda8fffc7f98f75003670
-
C:\Program Files\Notepad++\plugins\Config\nppPluginList.dllFilesize
204KB
MD58cfb0c8708ef2d51fa71a3ceafc853a4
SHA1071402b76b7cbdeb2f4c38f3986e1c413a899e09
SHA2564f27f40993a7d0e4feec2ad4d171e3f41751b67293fbb62d1b22039a4fe6af7b
SHA512d91e688ecd5452a1fe27bc1168a587f34b92259be94a90e8ee6a080f72392d177a65f02d7c4291a0f3d3c59a9a03de7d1bd05af359c869c78b0faffb047f4ed5
-
C:\Program Files\Notepad++\plugins\NppConverter\NppConverter.dllFilesize
198KB
MD57ed625f8bee3a9fdb809769c76ea9ccd
SHA103ec7b995b5d9650f5c68c231d2d1f5bb6be87c5
SHA2569c6880765e64a7d8bbb9c2a360f3a58679bc20f761eb3a1af284c7877672f081
SHA512b80ebdbd4950f148964e2e480f3072aeb5178cd4149e9f6042fc9449d7e15fd4071053c397c818449028c0bdc8528fe8dc226d041a49bc53b7bde54260eebe8a
-
C:\Program Files\Notepad++\plugins\NppExport\NppExport.dllFilesize
153KB
MD5ed3c2c518f2cac99450e6c53a45d7b88
SHA1831bcfe8f6469abc78696e370ed556f09cbca558
SHA256944712505177c2845c38b4a7c856f9dc9ac9f4463119a5ffc2675f1b090eb0fb
SHA5122622a48043a10fe5ad200674cb4be8ca6eac1ebe4888c714c30597682c98eae6ebe7cf790642311c4c9d5007581d2865d4a53ccde271158a1d3b5194a9e3b714
-
C:\Program Files\Notepad++\plugins\mimeTools\mimeTools.dllFilesize
145KB
MD504bffc997203c4ffae747e55387bdc6e
SHA1111f109fdd448a11cf7738a7705249dd74d091f9
SHA2563e56aa34b7a25bf89d78f2bb3c35bb9aceea28eb2c8c81260517c9ca71b0d6c8
SHA51277d293fb617ae1e7c8c945b339fab50dc95e518a3f6cfb291e91be761a734a242fe7ca3cf14bda948176970ce4f4e6531ce95bfcc2f3f3bbb0d3cde7dc728e9d
-
C:\Program Files\Notepad++\shortcuts.xmlFilesize
3KB
MD5fb573784b83033dd4361f52006d02cb8
SHA10a2923a44ec1bd5e7e8bc7cace15857ae03bf63c
SHA25637a24662cd55b627807bc2bb7cbba5bbf2abaf6da4dd7bbb949bfaa7903eae9c
SHA512753b44b5e8bea858cf5cc5ddfdc38098a2f3f921949cf98706ead95bdfa1de7ab0c115e9d69237623a03c422969480204c69d3ba277141527458c68230d0c67c
-
C:\Program Files\Notepad++\stylers.model.xmlFilesize
190KB
MD59ff5fb88c47ac8e7c99f9f340f2d909a
SHA15c4abd414ed87fc4f16eb9f9b39c690f3cd1ca22
SHA256070a560ecd7ab3f787bd7674bdde50aa906e895553f07beb74fd140b193627fb
SHA5128c1af565b19803ee665147ee7d5dab420f591e2faba8d7f6db95e9e9b911bdf9586fca20851f04152fe4f7c98b354e3e16f84140dcab9aac22e0b2233c4cf4fc
-
C:\Program Files\Notepad++\updater\gup.exeFilesize
784KB
MD5773c362e58e96c892eacb85ca37d6ec9
SHA181789add8556450c23485a1fa234fd63450bd04d
SHA25635de3d372fff37e13962e5f006718db8390f91a85ec40a28255113e3ded701bd
SHA512967df83f887688ffe456d29b177b2067c827738f746db4fe60dad21581545b70a29438410339e9b0cb5c78ebf2690ea4ecb69d0334e41b52b6a7b7a69facebd0
-
C:\Program Files\Notepad++\updater\gup.xmlFilesize
4KB
MD5abde55a0b1cb4a904e622c02f559dcd1
SHA11662f8445a000bbf7c61c40e39266658f169bf13
SHA25692717951aae89e960b142cef3d273f104051896a3d527a78ca4a88c22b5216a5
SHA5128fe75fb468f87be1153a6a0d70c0583a355f355bfe988027c88d154b500e97f2c5241d9557ebb981067205e2f23ad07b6a49c669cd3e94eaa728201173b235a0
-
C:\Program Files\Notepad++\updater\libcurl.dllFilesize
732KB
MD5243ebd041638ee5e04700350d29c9317
SHA187e8263b983157e8b9e81178c8fb7f880b3b9ec7
SHA256cc07e5c497a04310f8cbfc89a77c04973f8ed1176c0c4ac035146d4455dcd834
SHA5127c246ba4aabc7bacc26689865e74e2f833feb52b4392afd46c5371c16908e3483f5ffd981d8920ab9432c98a87bafac0b1e8de73602c1f71c452b2fbd8a60203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.icoFilesize
4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000008Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000009Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000057Filesize
41KB
MD5cfd2fdfedddc08d2932df2d665e36745
SHA1b3ddd2ea3ff672a4f0babe49ed656b33800e79d0
SHA256576cff014b4dea0ff3a0c7a4044503b758bceb6a30c2678a1177446f456a4536
SHA512394c2f25b002b77fd5c12a4872fd669a0ef10c663b2803eb66e2cdaee48ca386e1f76fe552200535c30b05b7f21091a472a50271cd9620131dfb2317276dbe6c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD57c8c3ffe1f490efd18520e9cace97a91
SHA188dd179b0cbc3393ac3929655cb61dd04f81a99e
SHA256dc49a3d4d802052c2ea4670126a1eeae24b074e373dde60ea925bf991febd934
SHA5123191da15a4d1df2c0bffd41fade138ff92057b98cbe5884ffaeec30513cde4027c367412db6750d31fedf0db73de068cce86f8572c39e13c008a939788533f86
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
168B
MD5fa61b3c580eb702b08b340aecfbde256
SHA12a793e3acd52cb57061de0610009b0259abf104e
SHA256f2be19cc5312b0243bbe8cca63a96700cadf88c21101d017806eb3e7025e44fc
SHA5121985f3627690e18e6686a5449bfe9916985bd1a93c84f6c79894558d84ece50f2749319c9314e4cfec3db0ce7e1bb6a01da87e9e5360f8a7e458049fc1ba8da8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD5de9b5c91bb5e2ee58407b2dc24c715ce
SHA1dc3fba5dfc7465b096772fd6aa8460b70f496c64
SHA2566c8b081dbc820df9dfd41d408d693ad0bd2e79df831294673aeaad39c0efd3fb
SHA512294e01e583a92ec89162ac7fe42cee7f4da77520b93d6fd9d32459cd154bcd2db8a59ff5187bbd4e687d6444053b9c66e199b486151518d944785eea8a275ba3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD5ffc379f8b5e7778df19ecd98f560aed3
SHA1772555c8f68a20b2ffc53c04a2cfac63bc29584d
SHA256877562337a6790bbb6e71a5ba2bec9e1b40f9da087d2b8d201dfffb4cd5d936d
SHA51216c035d52b3ec4755dd0afafbb467dbf79f4916564a7247ef73214ad4369c645ec0779c4e25a9ab05c8695ea0f429a47b252e1ec5bbb0a2703c124807fde85df
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD58ef6919a7c6826737b18e39f838bbd77
SHA1478fc627fa3173bb88ea4ec3a9c38c1626ae7221
SHA256eed70faea2cf907d423ef94504b1405f018920c1a96ba3a707b6ff14b81dee4c
SHA512785d67f666cb989392195655126b204169afda16c8f1bca533ba223943da85865e15ef747a33cf1307beade02304109264a3eed663447f81e675b04cf0b23ba5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
4KB
MD50142ecb8d7b43080302917a68b44c7f5
SHA1ea6f49093f1dea12f8649b630caf97d0df91f9b6
SHA2560f5a7db4cb4b5e1d91658b5deafdceed06db9fc19bcc4a1cb9bdb18098fec10e
SHA512520ac34b75cb9db25267ee9e6728f300d780f290973906c9752a1a2427222fafb536ba302ae4a71023e53f8580513aecf5397250d5a538227bc7f398a4bbbf29
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
7KB
MD5b02d0b3bd4577c604075ae5046f7d3fb
SHA15e8ee8491357f5948b08ce19ba939527f4f251ff
SHA25606527a6ab058aaa52b68de226f432994fe55dc3559d2fd29dca98bd0873a92ef
SHA5125c94a7a9ae3867b4f9b049dcc26a3f375b4e746e69c23e4216145c22b35f9c0893c865a82762fc5c613146ebabd2ea6a7bf5aa515d994343a336242ccc1b3a53
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
5KB
MD5120151081ba060d369f90074666a7e99
SHA16f97c77a56336b812c1acec85997e2d69b0c26dd
SHA2568bf1d9f5b5f31ce7c69eb2a04af7523514e303cea5d519c0087b7283e972a778
SHA5121ac115646cdd4fbb521d66f0035dac409dfdac65bc1b8cdaa64f49bd5d61f4fc9ff531ae4d2f8ee66bea3fe9a63027d1b63503760c90480e3688abd0512c7b3f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
7KB
MD5944d68364f7463539ce658bc4867bceb
SHA16ec3acc93b38ce110c942b998867027828c25afd
SHA256f81074cb948daad31497d4c9657d146060c9a6ffac87fcaa9e72c53a3a1de6a4
SHA5129258714a5848c069a2e93c52fcd313b1cfa33fd64819c28867bbc9428204ba863166941e679e44f5e7da92ffe929aabcf820968e66a8ec287d6451ccab502224
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
5KB
MD5e757d248315269951aeb863f05cef0fb
SHA1e994a303ab17882c4b0408121a71e8a407a348d0
SHA2566cbe0025142e21b4ed41c0a71f8e372e57bafdcf21e45717f3aedecfdcbeefde
SHA512d4725eb29f1e407b3119d3f994bc45f3308781da2ee767270e1d41cf611edb02e15fb3455ff500de14ba38f08089c25c2cbc7ffde2bc744ed53e6133ceabea74
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD524c1f4726aac3dd35cd2261eb4c6d595
SHA15d0386083effa74f9de26c217d1ba50c30ce914c
SHA25676c5206a2bcb22f00ce45e275ff5a620163f999206eb1057cff3d24210edf272
SHA5125591d93c3df7c4d601b796fac18154b19b4dd6a92cc9aaa15f3e908af979068e3c0b42ad505ce77638116cf6a063c963a9f3a0355c5618ddbb2dd3bdead2105f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
356B
MD58a97292d167051c034ae0e025a583fd2
SHA1a19fae4bff1c8c3dd3857b0d99a6c54e5d38ac90
SHA256d21e723a435c530c5dea5ff3743e3cb284ec451159356a45bc24dbc7f7a92c55
SHA5127136e1b094bd4fb5d07188190ba60a5a72d1044e35d0655abbcbcece4c10f20ee2df4e1cfae876ceba4fa799f4424dabcec600fa4021a3abb2a41350bf854ddc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
692B
MD516d3f4e49040afb39d0250d486815ffe
SHA12de8fcc0a233d43a81912fc6f9d38a10f3a963d4
SHA256030f5a4317863aa4a2b959e46c55a753d6a6712c648eaf142ed2071a49898ced
SHA512ad428b6ab54de1ed07e73fe01c9545d38a37eae8c323400c0613d60ef66b2739f53b369e7cd5ab17e3624cee0baf8773f1cb08aedf83a7939270cce5e9f69a8a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5ab4f18f499c9d8977d0a823485c6ebc1
SHA15d1ce4f029cbff8a0274e2d8c9245a5486d8829b
SHA256ad590716da1f0359bbef91ce6f02336f9b50a982fd59da2f6e20687e95df4861
SHA51250be7a6a62ca3b776bfb10842d3657eaf6b9f9c54150fe1a6e4d64efce447a44f070dd236b8e28956a20db82590b1acb6a0aa229e217ac1bc2e882e6f6f8fd09
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5f51e11403eb59d29b1bda479773a78e0
SHA1734b8312df3d984a3f6c1d2c71b79ba7c8759a52
SHA2562dac24e8240bb1840319c5e0cd2bb407597b3448206b264946b104a3881890a1
SHA512015d4f518593e337c880a7ca8b99c0a9769a0e0dca1cdad0bb3ab1af6d410950c902a8c1c8c7c0b77f76220dd82aee1893a376a4f2c38db52f52592d0233534f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5204676bd23cd52f455f6e64b06ad8381
SHA15d9927f3b920a05ebfb00d36aad307b894b1d1d9
SHA256db752341cb91632bc884d6afe01f76c1c5d19142841ded4b371739348be00543
SHA512d04ce996b930e363581d119adc2360543dd1ce25e7d73e5e4c8322d5b8414bc196526c59d6705d64e46eb8faa7aec20835b519088c7b43d4eb9dade009896c18
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
356B
MD583532d0f272c0c7b811b6dd0cbd8c515
SHA1c0f7066b40392785e6d09aa23b4c7738b3dd438d
SHA25651600b2ea1b245c272d17b58cac4e25fe895ca1e7434cd318c2156e8af9f4d10
SHA512315a1dd28ef9e9aac7114bf3ebc3984400a9e0f57de40f6009c29dd6b499bc6def9c9d6460c1ddf0c6e4050113b6149768b4539811fdb2db8c9bb6ade885473f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD53de1f66e3eb71733764a62f2fc2fd2f7
SHA1cea15647156b0a9f84eac615fde53b4e5859ba51
SHA2560c912791f8d4d80eede9e4be7edf0f5a906c8f6e685e365b7f0bae53c839a9d8
SHA512dbfe0efc72a74f2a47d8f4002b68a8f258409b479c99746fbf6ac29c17903f492d8527c225f9daa950f3d5bf682471b9c43f9c437e7a849a6d8bcdefa78ab6a9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD594f3df412cde17715ea17f4e75f0ff2c
SHA18fe74f4137aaa9f74be5b571ad69b0e8f76b7cd7
SHA25638215ef75e2d54f74acbba5e8b74f499b0c72dcbf1a866c2db9f1b29a1c3e082
SHA512ff23184e6473405dfb229629cefbb50331220d4644e70d8142fa28fada8c10f866da8371b07def37cd30f2ace4ef247d583dcd44cf7a5aa0343b37d329d60e31
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD50485ecff3a83a59c40261f2dfa533ffe
SHA18b8e3013745947218f247f601440257174929009
SHA256457a5ed17582a68c453dee07b901d74e65a7a30c143a5152fc1460f06615571a
SHA5128b148a8ef3f9ace8410041239fcea645923add032c0d08eb2a62be4d5defa36f6e7d50d5fe058b56e2053831541a5c7a717cab8bd0bd430c40d7e772e73c627b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD59b0fb80261796706a63726655c33e402
SHA168f1a18c3f0be256d82a771a397f3d2323ef4c16
SHA25640ab46ff654997cb95aaca34562e539cb0f2d4308234b9a8fefe0ee01d7d37b4
SHA512ae82836ab7965ef8e161998a911849c23156ba1afc2ced973fb627c0ad1c5236ab45a3657a616b672c401cc6f39f3d5631b9076c2798beb19c47eef456391cf7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD53bba6898341dbc70ee246d370f6547d5
SHA18c7350bdd7c4c6b10c7118db37ee9e6e081150d2
SHA256fa696faa818f3ff2dff66cef7220853ad9999953bfcadbdf07d2464f5f1b4976
SHA5122999a5b59a9b260ae89d8e4e64c41e3d6a29e486a5550a6e6007ed4385c32f11d80e7c665d01e06fd2919703b0a488f3abc4737f97da01e490e65a078de250b1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD550bf863add2d0f5cb49ee8cecd126518
SHA1d3c132274d32f05b736dcff5ff17cc26e43e763a
SHA256fac63d49e5347dc54658fcb5bdc64f7f6eb8fb11a01426cce2ff81e36e8c906f
SHA51292a1799ff05409be7aaa7f9e2c44687a357e241f64cee9f38ba5c09531884044ee698675132f59a4e345a7c6dbf866fe2e8f6f224414ed1bb7ac9edd8ada5c8d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD58f4867ad3cd3da167d11442185e51757
SHA1f1b141740c8ffb8834c57b48fb15eedfa3ea6ef4
SHA256d2462e3fcfb1624230e8f38a7315ac945210228f7025c88f890a55821fd79478
SHA512c1c95cb3476e0baddcce87a4c56dd0e640b951c64fcc83c738f74b23072b9142de2bf28a85e9c8147f138b92e530f1497b9ac64f35506e3b9e767b7a8de79046
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5bc0b3b146dbf72324db8c300dfdc086c
SHA130adb1a11607d2b0401088ca3de90492ffca5b0b
SHA2562d1dcbca1ff254eb329997a7859f8b57eebaa79f27495d865c392415315906e0
SHA51247477607a77fa2efa0a4030547b965faacc820a18a7de5ec3c1a57285c811ebd18aaf7866cee58e63fa720e37fcc6b665e9ae3107edfc9b9d4d907ac3c93e5b0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD543d9084798bf7802e573b081f4051167
SHA19918ba481777409c2ce2fac734f37604dd28635b
SHA25670003cdf7809893b1c8473a2159d364e3f4d7799c29ee4d9031b1237ac44a7e3
SHA5126a7414cf542d539ae1eb357534d71d83622e0607f8ff1e0e96468aed071dc91c88d23db8c575bcd17f1280b4c4d9eaf47d2bf7c9793b061d09f38f05e021227c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5a3d0c3fc8750a15593780fdd2b9b0979
SHA167c8db453e6311817c488753fec40d69c5320c26
SHA2563dbcdeca50655d413f0ba53217e400e0898e67db52243c6138e67823175c6920
SHA512ee37751bef6670ea15702e4d3828e86b677efc0d6197dc1fe625ff8a0f94205887346efa871c5beb3aabfe21f062a5b0490fdc4fe72069d0e6663a7e6031a2bf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD53ee24ba78e62d237b26d28a64c417c3e
SHA1765db76814c4207bd24f310a6e8f04c84e6fa9c5
SHA25640372ba54c6200e03da7c17d9c6b920744aa52268dce20ef539117f13bd82f66
SHA512c5d9d7f43eaef9ebb1773a841e8494352b10a2d54df61ff343ce684504fc70e8364d35ad79ffc75bf1b85febe7421f027c48e0b94a710d83cfbf699d8dac0be9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD53f7da5bbf9c2fd7bb9a6650f18d45e0a
SHA14ec9ddca4c5c84f36974822719fb93e3dda49044
SHA256ed4d32a7356b6b450175376a255b48a72e39574cfbe8758ccb02d4cedd6aad7b
SHA512226e70c5f671f09a6df3b9b4ea44b61987e97bce875461ff4224f66bcf1cff657b8f682a96de725c2cad38d8565b0333d23730ae591448b1f5f702f130c8883e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD537d083737607396e035fbac107a00f76
SHA1b5c69403814d2e176079df45289d5fff4d2d484f
SHA256845f1626760c5a6b65af18941b15b11f18cc3b10303bea810e40b6ac0a04ef70
SHA51252d4353b5a58245145c2f37d0200a1332cebec1b6938d32cc03f60f7e3f0715ac9f0fabe22a4307335f216f28fc067f271f680392a52d2e360e731ad894f0fec
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD5ca2eb1823c2ad2533c7777e0c4314f22
SHA1009b4c618abf040957dc1b6811411f76cc6a645e
SHA2568d21b7e18b000ced46b0541a74c9d9f7ccb637e86ca66bdf4b29c70448434571
SHA512b740e5762a3fc19f272f1ed9413dcacecd38c84802472ea489710b629ab2b213f2ed8453dc48e3d9dca1707314859a2485272bbc24c766554352bfddc4f1a020
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\32cadb2b6d359d069dd3f3d132c212a43d223701\index.txtFilesize
74B
MD587bd13eedc7b01a1f71192392a44a812
SHA1b14c0dd59aceb96c9ba8f602df2bc489f60049f9
SHA256bf94bfe69e25738996d13974073c7f1e5d0fb2959bd8a954eedf7a8a850c0542
SHA512ced2d7bdb1b2eec86b8b0a9efef4f167d1789f85823f3407bd93535f34a5c38c1e781b1725b62c81f60b75cc5afa3e6fd38fe39defecbe0c45e42da164f1352f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\32cadb2b6d359d069dd3f3d132c212a43d223701\index.txt~RFe613826.TMPFilesize
138B
MD58a3a5a1702b539765885146a15487666
SHA1c97abf3c1b0a5012857e92296e1bedf7562480da
SHA2567a95dcc077130a631f1dafbef8ba0d87272588f7a54574f20cb7b114145196e4
SHA51241325ee964b67918bcba01863a1e2a1bfa625e58c2ae2f728f8174727f4cfbc25569eba5af260999da75a5ef0ffa5e5f0b8d29528fd8f2c205c83273007a0f25
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
281KB
MD597669efb68638be5a5c6684c0db2f2a3
SHA121c98ad1edf2b4d4875b4531cfcecf5f168c5714
SHA256a3b03c7e4eb4fcc81a0e6d8d28d5d097ed8f4924c09288bc7f1272b8ed8cb15c
SHA5125dbd21422dfd709588420b25dce3f0840da043e84841e83e78dee0f17da3351360fffe303d7fad3f6976ce56e52aa41eed6b35518b149a4bbe020af19de92e3c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
281KB
MD5a890fc5c9436ec64a4eca62d7a461a0f
SHA14ef2e2712b616c4bceabc9ac030dcdb79ab92924
SHA25683d8a3584d8cdb74be49d8e8913fded9bee257683e5998e17a4f5826c981940d
SHA51257ffb39ff756c6781918f476b5791ad3f3b26c3e27039d93cc51a5c0204362a0563723b377be1b386849de9cc73ff840b4fd78122352f5ea8c7d86f18feac3ae
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
281KB
MD5096b2f5f6952629b738012a3e6500ae2
SHA158c7a08f3990ee8b736f01832728c4a90b8f2963
SHA25629993398bdb548c14a86fb275902ba217b13c8c19edcd74ea660b58070a030f3
SHA512d23fc3efb3c5f482ffa1ac145078e4b15b3f8b61432dee48ac01c1d5d9ff10126f803ef7e257ed8980443d50895a2baf243a51aebb285dc0691f717cf9b2dcfc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
281KB
MD53bccf07783f51394a068517b06421190
SHA1581c00f89aab5faf7a7e4c51559305339fbb31fd
SHA2569451575fc52d87addad8eea6ed6ebc9e9cc109136be386cf6c3eaa78ac4fab59
SHA512da56adfbc37d415a5f72ea09d40584031b26f6bd323b603884847aeaa89ba2b78cec8b228e3a226bb6b1a455f3c6953a921e0a717ca64c1a4aa8f75df7748d7c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
281KB
MD5aa7f26c2331346a1c3cb8cddd3260b74
SHA188a26fad16bd849fd95b884674066890b4f134e0
SHA2567bcb83d497fcbdc2df7929669c0efa06edb3645422510c6f75fef4f840ad38f1
SHA512b5f5ad085e38fd418142283d67fb35786ab6a871f11ee2f753e75a0d83fcda77f1d16b62973f368850b780315251004531da603d2c5a297128d2a85e5e835b78
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
96KB
MD5e0ec923ab49e53cad82c92520e0e06a0
SHA18f9fff760192a71c21da4834a63dbcc715df0639
SHA256ae6add004fabaf54f6cab367d7cf24c23294880dda793540ab8f404cc0f37268
SHA5126b3b1909873f906e9864404647fb900868cadebaeef23659d047df02a1978a8594341633c08c8c20bc801e4e3957b5941e5b63dc80b549433a34efe481add884
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
107KB
MD5bacba5df50c8cbbd69e80a68d1dd2d79
SHA1e837fca487c01d41e856657688f00698b41c9b48
SHA256d817933c7be4dca484a483e129294a5c5f5fdd4bf0eea3b4e8d18a404b60ce2d
SHA512ac1611858b498689401c259d29435ce0756e80df6f8995ef0d80b6253d0c47b7f9e95690ccc553a8b7207e2380a4534fa548e518872070053e322c2041055d6f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
84KB
MD5ec7d9d7a7db0ea85e8dd03f67ff44d88
SHA12b7e39b05fc4d4e7949cd6e38f5c6d8b7386e12a
SHA2565de4a5bfcacec433fdbd7263490b26b2d0375324724f04381caf129de34402e1
SHA5120ec2dc9565f2c90f3aef676dcdb84a297139725860e5472a4ab468dba62766cf299892ca7fc5a0511e3e72f39706e7d8b27e15a60a920ec8d04a096e6d9ba699
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
92KB
MD52021392c618266ae9ca2156626013f37
SHA1121825ce4e02462f1f90915f8703e74e9ba615ab
SHA2565b186b5e298d7ce7cd157f8a20b63066ec2997785c35296549d66ef7f0d8e597
SHA512fbd749057e7c81817153cb744f0672fb78a9ea5a7cdf696e81e05499e6816d217a7b079ccb16291f57b80b5d1c6890ab2cdc6a65a8421227aa6062a74322a95d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5a5a27.TMPFilesize
83KB
MD5f8458ae4875a4327765c8e32fd2fe458
SHA1efd346d215bb9fdbe8499c381bfc78f10c7d1ac8
SHA25654fdfa9dc1972e95ec0c10379a7ce52a2948a9ae3e14df9809759269512c8dbe
SHA512fffec14edea7e7405ce3618f90ab2a5ae106ea8510ac7a23b51bf372dbf47acd9fdc47e4fe7c7514ce766c0634b5e1236d5ff59bcf183d8135959b690f24395b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\2R8I9K5U\www.google[1].xmlFilesize
92B
MD51dd98c022be193c252e3ecf327985021
SHA10fb4790516238f3bec17e467fa5b26df1645e6cc
SHA256336b0d82c08fb2e2f4c34a65f9475d21da9b71fc225516b0c1083fed47f6d358
SHA512e76420bce69ee4d87941f051a6b34848939f3f43414d4a91f84e013f93b6e634e326c2cabb2f3e2027e52ea4d8db40ad5fa5db9eb8cb4cab15815e57ab2befb3
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\42WJCCML\www.whatismybrowser[1].xmlFilesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\42WJCCML\www.whatismybrowser[1].xmlFilesize
15KB
MD575e0ab820dde579ecd6f4261fd949f18
SHA1cfb9abe4386ba5f384cdef677340cbdc1d1dbb8b
SHA256bd75855d48c2af12d37dc00208e2f5a5132520fbf09e55909013ae919f13514e
SHA512a516b37a4d30eeb041f194cf7b1ee0348fe9a5a7b67b376581f85a315feaa0a285cbd0b6ea46b22aef431b7a7876fa2c47388643b66e16e43ff9ad03e42da69c
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jnstxt4\imagestore.datFilesize
43KB
MD5cf95c8bd73f664cf183f2293ab6c7883
SHA1df9a5930b9e6a2d0dd3a265917e97808a3599f4c
SHA256b4f6f0fa3a3450ec2477afc5bd11732e05e0c11a8483783c6a8a8f68ef488229
SHA512b8398c6854150f2bb669c1a6e77b671e28213b60071c56722b76efaaf298cbf1f513f2ade8db2d3f696861edad40e84ee002402d25149c9d75f30a2512faf597
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.dbFilesize
14KB
MD5e133104ae5fc557855281cd079a8c370
SHA1e300f1764a3945d4c788418fbe511959b38f07c2
SHA256a365d58e6397ca348374ddf4e816aab24d660dc3526be4b84542cec854b7cef5
SHA5127146196e927de8bfeb910c711942e2719d1ccfc04b671d2dfe0260b715a1122ac5714985227e668db4f7bd2a2495081a1bb2f3ff760b9ee547f3f1e29f0d6833
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DBUR0MI\PIE[1].htcFilesize
1KB
MD5f4fdecac94d2330ea53a755284a0c725
SHA1fa1b8abb9521a65289be5ed41045fab66d552a24
SHA256141e8429f7f398165bb01fc8463364dd347272a904999d42117544c6c65f5683
SHA5124f9969b9caf4265adb23bb820f9a2bee61b689f4a51a61be9cca9dfc83323a2b300e1b31edb1bae2c8bd3c64f02c10893f4d6b4667cf597e2d40a424e9bf8e6d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DBUR0MI\commontop[1].jsFilesize
23KB
MD5bbc711d195fe21b4d2b7f70891eda9b6
SHA146268405c7b778ca9e33ddfeb8eb7740b2065412
SHA2564f460ba7f78d1df0d077835bde52f26ab12498ed823466b92496ad88d7426b75
SHA51239f235d0955c27fc329a42421b3a0a76b7ca859fa7532a4cef0f881c52994e1bb9f49c290a2d30f8a19e821006b6d2f79c8e4f500e54071386eeb3b193c98496
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DBUR0MI\content[1].cssFilesize
8KB
MD5a216ae4ef5a6bca8e8ad97b98e1eaa4d
SHA12d478ba24950157a29a6aca6ad4d7014bde02be3
SHA2568f148af0380b6660bc0eb0ee7fe6e8c35ff7b4ac81541a4fd2b9b3d9f2f08749
SHA512bbe660ee0f14a85e1ecc3d0fb14361f5bcaf2f11a41d84b0e58e0c57ab15b39cabfc3ac28bd361d48cc4315475686adc06cd372499a75b71feed9244b2a7e8dd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DBUR0MI\qsml[1].xmlFilesize
512B
MD554928a18b0533b7eb2a26fce448d2e2b
SHA16bb0be1f779301b0183c30aa089e5b1a579d33e8
SHA256b2e99e5568fb0c3a83be1446dcfd92f2ff044c69ab4ff5cf91309c74ef21f661
SHA512d7ecc7ec642eb5263c3813d53751274935fd21d531f88a8c132e4b5305a2f434b49d4014bf2ec7a1a8bafb46cb19edc4b59f48297696ed4de5987c189f1ac1ab
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DBUR0MI\qsml[2].xmlFilesize
604B
MD5a7d989a209365ee0e498e9b38e62bfba
SHA130046d9de47fc2428ebc57ba2dfad7e2af99b934
SHA256664cca3f76fb1a8f0c2a2f611409dded6cf40565bf5618812ae648932acea325
SHA51261b54c0e7451037a6c57e884310dfa1d1706cd76b13140b1199781306be4525083900c2eee34e74717e3dc439c6cd34eff0f7fd6392671eb91579ddfe781b27f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DBUR0MI\qsml[3].xmlFilesize
620B
MD510ed3ebdaa4c43b473ea718cb07f41d6
SHA1b22c9928e556efa6373e14e0f2ae11a5dbef2de8
SHA256efc19d3ac80068f61154ec9c27e8b73d2a53631ad82ca1f14f3138a1d4445b46
SHA5122fc1294f766d551d73f23c708022443024c104c31b5741fd387b7fca6993bbfed48024e1d098fc5d249e958dd4f61007b210846738fe6bc7d0111d14809fed13
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DBUR0MI\qsml[4].xmlFilesize
528B
MD5de1603a72dd51aa3e1c6dd7437060cd0
SHA1634566c55d56d661780b8e7ff76988943ce73c91
SHA25618beafef4f93cf62edbcab8f05d7d3b456ffbbc5d9c6e99e85cb1ac534061978
SHA5127b3726792f6aec5d3f486b1eaa9462faee3da45273aeb5748d786251ec58d48b220c0dacab2422659290f8ed911fa566ec4dfadc6bf59a33a0675f17f519367f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DBUR0MI\qsml[5].xmlFilesize
507B
MD5ec998be14fdae4cfe07e0bdf77bb0140
SHA10a5fabae2dac014d60aaadf0e203905af37f481e
SHA256268768faaf13a5fe0980191aaa4f97503b8073aced7c5b2c2baa98ebd1b68403
SHA512f4c111bf7c529ccf943ad25cb5c9442a3da0070e5ddbb6f39063c12729c737d841075bc9f27b5173ca7d2a381ca7e108605a2a7b5053668d2b8bf805be856240
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DBUR0MI\qsml[6].xmlFilesize
536B
MD5ba509464094277383ed1822068739f94
SHA1b5ff8ee4aa3c23e64fd21634d02cd3fd6ce1605f
SHA2567d6972968c63d97816f9e55d9c40f969e85dfa436857e55979a9f2039eb6d309
SHA512c9f90a30b31437bb6447423c650c05213d25a8763f694c71aff0f5a19a21677e4754365409821a3d977592bf1812a0f39f262d3da158a3d8f064db4222935d96
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DBUR0MI\site.min[1].jsFilesize
43KB
MD527eac8aa941f62a61c9bcd9f730830ee
SHA122eaca299365b7cf762202c931c370dbff7c3bf0
SHA2564306ed6f7a38f8bc5219926388c951ec0a2eaeb09c9098fd8219fdd16d6ffd2e
SHA512f59c3caf5abe0886d3b6e8b9cac399ad278416eb98e1858f5d7a5b8976a84b5cb43132ff971ab3f5a11a5deb1fc1235e5c703a7dc7460e224d489f1b90bbe262
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DBUR0MI\style-metro[1].cssFilesize
1KB
MD5ad2c63b8ec16e8af221acaa76bf28eeb
SHA1e971ccfea924fea1d129de742fd86cda6588ad74
SHA256e96d26ecafd88f61f13f089e398b5b1b77f496c80379343c4bc3e0abd0f1601f
SHA512497dea079070a5e1b20841b3f24574c282ff28d0014276c8926a7a9369070c700c2d55042bced605b145172a551f7c96f6037ff9bf7df55077a4b5e844e5be16
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DBUR0MI\style-zune[1].cssFilesize
1KB
MD50cd6bef97b5cf7dc73948fca165c9de1
SHA15c07e81d955e2c03c268440e30d390ee13998191
SHA256ef54a278d26cfb92ae404fcec554e0a2f015e2c619461a2a6af4cf9f124c2d0f
SHA512b2fbc70f9c91c17abbe0c2951bbedd2034a989a6378c7324102c1e4527689a2de90db2637a38cd12b30e3dc916155ff48b8102f80abe72e9ce86209de0525743
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DBUR0MI\toc[1].jsFilesize
8KB
MD5156af0c6fee743405d1082db323827b5
SHA15be0021f2a88c7caf539a613a34b95c3c0a3e1d2
SHA25674daeb7f237f6ae2fea1911050bcbf750cd4f3497bea66e8bd6196880272521b
SHA51272384e771624ccbb095cb46def10acd792e97ef191df45c5a63d0e13fb9647108f24da77a84c13b12ca00a270173e247340d7396618e80a39e5dd95a028e9099
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\PIE_IE678[1].jsFilesize
70KB
MD5f45c3447832243eb7d7c3e8c2ab12639
SHA1daea0a59eb60e65c31c3220de593edd0d8bebe59
SHA256aa558d5402d544d7249408af9e87bc735ca4f8a9f9687d7dcf7d8783d0c9312f
SHA512bbfed42135e53f0454a05ce97c00ce9a1be3f17ac4cd27e90e42081c483ee9783e763ac2a251defb500d47dd0fc37609d09a0285f6c1febef12fe9895e662dc0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\content[1].jsFilesize
16KB
MD5d15a2ccf8881f5adab05ba81934ca26f
SHA13e9636a79021b88caeaf513c67b8bb96fce71877
SHA2562230ab0f972bb84b778cadfd912a732cc500e5eeef563a3d040a62f5e8027134
SHA512421bdccad290ca9a600955532796239d903dc5de35f165f7467dc40f9d61d31034e3f366a99f56bb9266fdfb100985ee8d8282257fc05b9a1f2bbc2e0a3a4462
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\favicon[1].icoFilesize
14KB
MD5234bff2200db4dd16e96bcb6ae5da9f0
SHA1d348cd7dd3ab3b86cbd2548203186d0db6d4884e
SHA25648282bd4c2ef47c6c51bab7011c8cef46395138d05ab83ac55b0415d64bcd277
SHA5123bf1867fba4d0b0d9e1f30d0fadd71cdc3de964da7743d0ad2129aa0a7e96f6c057070bb8a122dab8fefdfa72324c4149db97e5fd622fd018fbb08ce17d9edfe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\favicon[2].icoFilesize
5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\global[1].jsFilesize
12KB
MD51ad8a5a4b8954c6a7c72593c7131eb09
SHA1503830405a8e040078f66d7fdbca38c26b0a1e81
SHA2565980f111aaaed463f5a8365fe5925d6e905879c55cddee2c113d7b4a0b5558c2
SHA512c8cc3522af003ffd05b07eabb4d041fcaaafc474c8dc0e4f56beeaeaa97c68ed86e6d05f58aff0404b9c0809460c8c74267fa2b579fc1ba854c11fa65acab004
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\qsml[1].xmlFilesize
538B
MD502e0bf01a2f456464f6b82c70bd06a6f
SHA106d5b46bf28d0420985599d17b6cb94929f2c9a1
SHA256d71eb46b8168645070c836c329385654c812d4935a9a507679b3dfb689a4857e
SHA512d802ad222193fc12dd865892092479edf8212aee5e8444647ed218cdb8538c56c8557e63d55af5431efa78144e623dbc8292119ed10a99bd480e4d579695f4b5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\qsml[2].xmlFilesize
606B
MD569b297b32c9ce447342ad28dde543088
SHA1f6eb00045340c88b930d9df4b62ee41fea4c9d6c
SHA2564d6d840296e03a24980139a5bf63a802dfe202a03a54f34299938e0eb4220c88
SHA512d726cc90964f86f118cd67f50dff052491f60f65a7234319715ace2ccd7a7d3a30202d365136d59445791e64242b1819a577df2de35035eb55e62db141482c28
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\qsml[3].xmlFilesize
622B
MD598219aacc87c51ce71fe1ea0406cdbde
SHA1da99d7ddf0274ed7e4c46c16e791f8da33b050dd
SHA2568f5ec74145d53b9f0e13b2c6f359d34a17318c9a54ffc06a19750bf5802b7938
SHA512a914d5070f06cd7ee20023e308f134fd2220a3797804bd580915b6963a37d4017b3cbe3fc87aeda33b8ecdd1d1e2ac0ac5ce05c1d46590911e4f975ba2ba26c7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\qsml[4].xmlFilesize
530B
MD5a25995385e228b7aed07dc879720e9ba
SHA1ac4a06754819ab7f70a0f2a148bc8456354de7f3
SHA256f39db79d0e060d256793fbb9d079f9e8fb0ba72458607144a3073fbafa0b1381
SHA5121fe045142f8ff72d644333be03d484d1bb17007b0d4c7afe00dc5153a2eaa7e8789a64ffe7d8fb1f4e01af830a836b7dd6ebf653707bdf434575ba4e0bacb5a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\qsml[5].xmlFilesize
501B
MD509062c3393da4ea8459e8569dc4e4839
SHA1a8e271fd6c93ab7ae9263c43333b0cbdb6c38625
SHA256fe04967789fc9848aca04609639f4f2f3531a439f14c6fcad5ebebed266f48ee
SHA512fce3249b6dace1505240767bd687a6eea6764081985d1899994c9323dc50c646a3a7c05b53456b8f19bcfd04cc42ca99572e36b0a984eef9745e37a4b48e34b5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\qsml[6].xmlFilesize
501B
MD57799474b23a68baf80c7308d8de83f26
SHA170b1e45896333eac78663f0f4d353216647e1a1f
SHA25639effe9c0b718a3b015a5db242528afcccbf24d609055de5cb6e6ad8fb7c88bd
SHA512414c5471c1001a80c0ce3665beedcebc73c033ff65a831aeaaebace7cef20b131f4abd6cc4d2b51da761937450a3de4e1f79f96aeb998ff8860f56557590a509
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\qsml[8].xmlFilesize
556B
MD528c6b298c642c172f4c23a7b5bbde271
SHA1c3a380a932bc010bf6da90cf5a432b80d7d3be03
SHA2566a7fb3c0346370a75a6577bfe1d324a928c75c21fc1410efef0ac088708309c9
SHA512767f4f084fa3ede4fc23c2f0b5a5573662248e5ef7623f8c8145e6b3a4df253cddf8da7eb82e0b60e121ff000ce68bb3dddb6a6784c1cee672b9300e0f3b44e9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\spupdateids[1].jsFilesize
2KB
MD5b87ced810b93b29fc1c09c70f2f5be8d
SHA1770d1d910e367c2e83ae8b9278774f5d7c4be103
SHA2562daad84790f63d09e00fb5de35497b7dc1abe117c37bd32b5230d7b14402dd4e
SHA512e90f7884caf57c1c2c21ba41c3e2505f46f2be5b07aa3565b8127b4103f00ada60406a68a79e96c9ff920452e46d2b51f63cac68fdc5360815141872ecc8c26c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\style-royale[1].cssFilesize
1KB
MD5088ab54e87e94f964e764c08802187b1
SHA1660ca4ce8fdc7b97bd11ff823025f90c2f9d1bd7
SHA256f10ef0c73d3ff3191cc017380c1af48c5e6423f907a0c9850bb01aaeed967e69
SHA512071bd5c17885a6c7f57b7b934a21eeea926855cfc73ee7f79d63b2b0803b0f27886951339e3c2512755760791ba93e32cdca0a5fe8c0e2c3eb5ac3e858694c99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\style-vista[1].cssFilesize
1KB
MD512a383cf308aada39935174e30af45c2
SHA1b81e0879626e6c244eac17521a7a9d6f8e7f35c7
SHA256a3416a4b380ec3f88e14ca57875ee87dc8b6b5d4e5dd8fd64da32d268287275b
SHA5121f92a522cbe1f33387a8458e2eb6ecb25e284e32de54d13df6359c0eda2be88bd9b0d3cb00e6366d587f4730dfbac0f1ded8be21a8cf9238a25880de3301b943
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LORQEBI2\style-wuv4[1].cssFilesize
960B
MD5b5251fcc2b7accd86e20635dcf9164ac
SHA1211cbf50586fc2632c023db72f4701d7102b9bb4
SHA2566494773c58456be056b662523adda16003e052105529797b8924e24498c96249
SHA512b162aaad534529b0a010120960c720b711ca9fd9b24ac75b5957989dfa3dc235c3ca728483be708ca365d253d242604aeb6947a2d4486e7fe63d745f67dfb011
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\62fddf0fde45a8baedcc7ee5_847541504914fd33810e70a0ea73177e%20(2)-1[1].pngFilesize
557B
MD5c309ae41848547064c2ddb7dc66b6215
SHA16d9801822541e4be3ed25137c4e53a249c85ba2a
SHA25611848b5f1c8a7f294c6211c2f0d0dc83a8a28bfe1ef0829a8dacfdf475c5e5a2
SHA5123ef32b52e7070ca0fa9a8cf06e49fe43d67da63fd3a0cd0985363f6223c758440a44e65c3eebc7d6cee0b1ca3aedc4c6ee78b7167fc4136d90539d6ba18d030f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\652737c319ba7da75394c4b9_ggsans-BoldItalic[1].eotFilesize
87KB
MD5829b5bd09a7c123f48d3eaf05b822d81
SHA1ddb84be1e4ba00e603dbe9acb5daba3d76fb11d4
SHA25609126fcd7dff721fdc23724e29931429e92befabc22c4f653847adda720f3ee3
SHA51236973e23d4fb54dde084c25881dccda7491496fc8fc78b57db3f09f29d7a47401e35ab75f825be8dfbb780c221a3141f5812a7441d76803f92adf21fdcb3de34
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\errorinformation[1].htmFilesize
2KB
MD5df67cdad4af805d963a6f3b71e6a0dac
SHA16e53ca07d1210624b7579822f147a8a2119fa279
SHA256652cca25d0da136f61122ae90696bd8357365ab88a0bb072d69407ceb99d01d4
SHA512070dc7d415875135d9728af3a77a1b4e40151d1d9109baf8d52bffd46a1f491c5b1c793a08916e1901eb8a842450392e61ebada3eaba16d1f93921eb5f52967f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\jquery[1].jsFilesize
70KB
MD522908d2d066727233ea83577b8ca3d6e
SHA14bf08abceaf9cbd5051c680a4ffe4e2743bf872b
SHA2566d86da74024f310af997471ad3fc7a1701049e946e2e69a92d3caeebbecd9d8d
SHA512ead6a59dc42ee56e3ae7c5169ec760eec54dc65aefff87828fa22383fc922f0bdf7ef083b0e61d4c05eb6a40f89573d333ce87350fdf4e770658a2e291a37a3f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\qsml[1].xmlFilesize
538B
MD51927ec99e78e745c2c2b531305ba9cdc
SHA1f543ae073564d8566a12418fdeba58d6cc063150
SHA2563cd611c544de1b31a6912d69cc238aef2095617f53aac9aeca6ef7aa43723846
SHA51201d32402287bf1cf5d7c3f223205644db929f3dbb8cd20db20f4e25167d479ed8dbb15d263f7151dc4c3cc8afdf63377dc29e1db730048d1229b91d50f0b0aef
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\qsml[2].xmlFilesize
605B
MD5d2ac4af9118c30159d52c9f08fa19e51
SHA1596527eb63bcee3e51dac1cdaab47a482a4e8914
SHA256c2fd559eb72c1d33d6986ae432c5f6eecb019e7ab74cf1c303bba066598a3f1c
SHA5129b5c1f16025876e21a57f3ded81150700b59f972a561a8c0042a51b11f616af1222e95329124929d15aa076ca94b6b56cdd34281f0e8030a290bad732c8945c9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\qsml[3].xmlFilesize
529B
MD5dae1570bebd652f70f2c835c0050ffad
SHA1cb1ba278a07bf0d65021cee585daa126aa10eb64
SHA256d7c2881584db8c4c96c6aa5911c1ec0c4dad887fec5745f68d74f87f4d6df0cd
SHA512e94f26d18d610a2aa8614dd504cc2238dcba79cd9ab1c5888a0016748e6a700c9ec618a30f2733cbe52852f9bc9a51d8b186467876f45bef9500f9eccde1544f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\qsml[3].xmlFilesize
487B
MD5ec20b2c0f80a5430e0ed5510481f7941
SHA124c1829b792225cd4acbe54c253b70d095578838
SHA25656a94552fb2eb3bf82cf9388adf6578a016e3f5dbce71f35f7b2f5a6cda402e2
SHA512f85eb7a393f23270754df1a8218143a0d49c53eafc8ac93b7e646afab0224983b3f1e0d84397b8a63adfece0fa205b0ac757db3a1d2571bbd2267e43627886ff
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\qsml[4].xmlFilesize
508B
MD5abdef15028e5eee805f082e5a7c9d7ef
SHA135577b38694ccae5eaf65d2d3c6de26615ca5e84
SHA2566a061c55eca0bf81a6a3a052d33e6ad954710da3e9371fb797dbb17a96e184a9
SHA5129f3b719ab179f229a87c404188585230264e22016a3752e97620c85d4baec59b9801006495f71ad478c6815fd0dfce9fc81bb4a8d8e1b4699de43c19a5980bc5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\qsml[5].xmlFilesize
555B
MD553fe6a827452173810ecb321c667f5a8
SHA10479ba240178414bf3cf50eb6313003cdab5ee27
SHA256220b4e5f7d2ead207f82f714b00ee37b57e71396646f3d97899edd17d0fc4dca
SHA5128f4f346cc32080178e1d62c57f50fa51bbf1d2a52113f308040e47315cbb9a22a3641ede284d3d0358ec3041154f33c887deeca4d3a0adbc07532b9c4213109e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\qsml[6].xmlFilesize
509B
MD5fc54e565ba685c1c97d3f9b40ab9ee3e
SHA1fe4a599e0e10cea59c8878c11a1b9fb20fa8a4c4
SHA25670c8455397321127841ad83944485f66e20d1755ccc7bcbb567735dbc7e1ceab
SHA51206d6aa72bb1770edb6e23c880da56660a7abc0f871df45b91a717e02d247a2a1b35f826edcc35cd1e3d196ae4e0de3502fdb27f6d2afd87dc25342db69041c63
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\qsml[7].xmlFilesize
536B
MD5a63a109ab46d7c3d81dd6d1733543181
SHA129c10b2c233968aa837daf8dddcdea41d0874607
SHA2563280073ea4456486c3284309f5b1c56aaee60bfdac6afb84e7efc8295df03f68
SHA5127145fda3a0ac10985569bfdf7b91e5dd77b4ee8f6eb53727d990072190ee71dc5f8376e146f10275f26474453b19b7a589d4d68af865e6ff7701d75720c0dc2d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\style-classic[1].cssFilesize
522B
MD58186d039f11014c411b7b53b9bbaa29e
SHA1089d51229a849c891aacc7faef7a4e6f13a512ba
SHA256b30cec47101fe83ffa4614d983c1603a11bdaa7e63c36d754a6e17b81ff4eeef
SHA512369d54398958c5fcc99e54107631d03b051f142b5fa39583d06642aa9477464edc67f10c3966b35583626b781702ffa88463b9699dc210979d13ef62862f3407
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\style-embedded[1].cssFilesize
894B
MD5f52a423e082a22335f8f2ce3c10428d2
SHA1a2df8920b9aef6b26ee235b6b76bc87d0f641619
SHA2566c24693671fa9341bf768c5b57f1fba711c917a0a6d312532f15d1c1985e198b
SHA5123ed831cb0952d55e7db1f11b328651ab4d98ace61d15be445d1a70aab5c9d43ccc72dd25f4673845070ce3dbb12748e6980958645b9be265cacdec2dc7a67e35
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\style-olive[1].cssFilesize
1KB
MD56ca170f0064ac9ce2a0435d2e396c70d
SHA1e3f823aa3af3d73819597109a6fbbcfe31ef0eee
SHA256f09bac297fbbfbcdaf1c87653e2c2028069fcef30801eea9408d24cbaa27a6b0
SHA51213244b335dfd8a8d39f25c407071e7f7950ce88744011df579a344efd84b7b983ab771bb7e8fdb370a2c85ec063b3616adce8f000e161a9777f12ced96806c5e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\style[1].cssFilesize
14KB
MD5b07b9c75f096c5e3d6d5f1f541373a4f
SHA12d016de85c6bac97ad917e01928922be7b45d966
SHA256aa521dfc3c44cf22dada6b9e91399e3efeebc0318886265516ea683e1f151095
SHA512692c6550ae1574d4232b565ba50a805c79a212cc7144cc3ce0523ca7c3114bbdeb8ed8227d96df72b71f5b0ead7d0851a5b873b8811b00c421dafdcdf638af89
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\webcomtop[1].jsFilesize
39KB
MD5158d135c7505807d162b496f7f7862fe
SHA12dbe06cc6188441f61c817cdbd0a7328137b0271
SHA256747b893668fb1ff0932185a94a6540e9abe989b43c7966e43e10c06e2be82799
SHA512eea7a256530d5455dfbdd2875a959bc8926f62c90a00432468f41b502c19df55d35eb67cbc5b989741cfd12683f8c9eb75ddac21251233b8229b9cc9df61d280
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PIYE1NLF\wimb-192[1].pngFilesize
27KB
MD57e2fec8dc239675f5cde03dad8c91cc0
SHA1db5fa78e31a982c3b5ddcb6e66bf17d93519e259
SHA256a23923685b76b9256f071a4048f949a8ee42a25f8ca8338240f760be042b8e8d
SHA512581eef9d4d93208afc4e0406c91061a01dfd8349a1b863a8862d2566755e5e2a69434e8b21a9744637a72352f2dcb25340d9ed29d3b69de5990936746411f6ec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\activex[1].jsFilesize
1KB
MD5597babac39df030c306cd5103ca94eff
SHA15c8f0ab4551a82c7c1210c3e2fd9d9381630ee81
SHA25606814b1b18a43774db48d4d72bf8e1633ca481b3ef69bc402055b4bc7ce5d34e
SHA512ed16463dd9715c8231651ab8adde1af00122c3c8d1ec9157a1f0e12cae90fcb08f63763be569817ce60636699afc5db8509a8ae154f97a6c79ecb4c1aa25d5e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\hcp[1].cssFilesize
1KB
MD5a63f386e1ba003b91423268be1028555
SHA12ed8faf1c534c05f67d4b4735579a4f19ca2ed07
SHA2565eff6f683a98d669166e54357318f86780c0b4374973f2e65b0dd81187c9f343
SHA512e402b142b7713ef1c510a4b1a4b7657a19e84cc2692b17aba90b47a7cb63afc86a3f0be4b079e2a68b44887655192fd7fab448da41bf71e2f1e3473f8bd24e40
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\qsml[1].xmlFilesize
527B
MD573c27ebf4015a5fd8f27f984b1482900
SHA15d6e6ebbbf6826862865b4a692f40f52e76d0f99
SHA25672e2c0e7ad90491195f27a3219afcb6159492281c46a3baa38175caa156dee31
SHA5126ad1d9ee7d84b3a8243f19fd8224f021872743c92a4ea1c7c4319724ca008aa906cf99a2287442e4b589c7307dcaf17636f930a45cbd29a279a48ffa17256a5f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\qsml[2].xmlFilesize
539B
MD5d27125e63bc92888f35d54be62719e20
SHA1f13d7fe60c399b0cf08cad8b17055323bce61fb8
SHA2567918aa7df7fe06bb90d2173e812d8dd15d50a22d8a16eb41473b722f3b1539e3
SHA512bb54a0f5409574aa088d6e684fd593a0abf0b539ea9e68384cb6916de8993159fcb7352c590eaf297600d89ae8ff998d890df2ed7e18593d6bcd931da60a1416
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\qsml[3].xmlFilesize
608B
MD5fbc5f1ed4e97557f497c7a47932ea471
SHA19306d8e7d1b1df8df3f87eba137252a1989c4be2
SHA25677239f64e2024134ad7452e523f9f81513d3171f15404916fbcc7a2008fe4c4b
SHA512de117fc73d5e4e14f68fd7865a15011abbf873704d95aae607c5b5a19edb0005ac65249b96bbd852123135eae2e34fc0d770a59af14e40a49d3499efb0791991
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\qsml[4].xmlFilesize
572B
MD5bc9a3ddf02bfb13458aa1597014651f8
SHA1974d9b6b0fed3320791caf4a01fc1d7dc84295b8
SHA256f7b7996bb39a195ba5ce958fafa2fb1e1cdac13c66ea65b50260876b779d4a64
SHA51208aa9ae36f45af464a195aae39fb168f8002a4cf15a3d2c6f694916097d5a477b6b994b6af3b014d93d7703d49f9f5a8189fd20790732fd0cdc451c7bbfa7d23
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\qsml[5].xmlFilesize
501B
MD566b073d7eb387e34df7ad709f8430e77
SHA166036d1723ac3034a78e490633e652bb5df791e3
SHA256f6b68421bdc553c43b2c533ef489b321f355673b7785f577765545ca38380562
SHA512b710b648b161ede28fc7beb5e3ee34935f0509544fc8bc84ed41a7f1c2a43cc924ea06f6468ba3f24ae5f33fa7319e89259f47b913cae03578a030f26de729b2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\qsml[6].xmlFilesize
554B
MD58e7581700aa0c40b91ff31017809880e
SHA149a0ff3c4c00f3f716dd42f15bc9d1889de45a6c
SHA256ec075dea30bdf8a6287ae5863c6e9e0a2f0311636a6de5d956c6df8eecb29f50
SHA512ab759b93db005421290f8b6f5fc30300bbd6c38f889251242f04cfad6b580bde37cbe071ae9bcb92055fabff99e67b22b00b397406acfb1b69ab94a730593545
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\qsml[7].xmlFilesize
505B
MD580aee466d0129d4a2492989d489426c5
SHA108f0dca391a6bbbf2d793edefb9d829d9be062f3
SHA256d6f02caf5c9d184e0e5657ed0912e8dd97146c424958868776b26e6a8717495b
SHA512c784bcbbff82a4ac187912e8d3a8857cde4e3283ce5afb652c50f12c16d3ccba9795ecc69603ab1b7e5459f3deea186ccd71eab9ee50c47bcd2b6fe48b4d2c4e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\qsml[8].xmlFilesize
535B
MD5b9e43ed5e8baa3b29cbd982a57274b89
SHA1c2adc54b7a248c6ea116605d7ff24781e1d1e015
SHA2569581fed23da33f1425a5d27bd52ad7fffdc1b3cf0168cbf7fe070adefd9e5efc
SHA512397c5de7dedf9be6a2f983b5f3a0d3d74b5b1864afa821a2fd40c61ba148235a24e7d78dd196dafecb5f6c69153cf0e39938475ac7bf34952fb397eef6e427a5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\resultslist[1].jsFilesize
43KB
MD5d6c5f11b9752523d2656e496dcbf046c
SHA19ffea5b3610d8db4cf8265c378faf5b3b2ca2ecc
SHA2569bff37b6a1ed669c99e1e06826c7e0d8bc280a1bb6d7abfd8c5bfb4270634216
SHA51253c70f6db2dd99f8ac051366ddc31f93ac203c65ede707415d8ea08bb97f2406657eff289b4c9e416bf1604854b49aa4f4fb1e2c9755f8dc633f29e9bd237142
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\style-aero[1].cssFilesize
1KB
MD5b8ae26e5346ceff8504e84d24107fa3c
SHA10d133a9ca0664e9a238f8c4897c2c6bf697c2a9b
SHA2563845d238579f1ff061d827f4492fb533af22152a3d1c3ec58162733b203459bb
SHA5120821cef74ab20643ca11ed1f2454e8d5fad8a4ab890ed3694767cb6bc1661541d9d488776135688ae2b17196e91871af1ff2d821ffd8c978206056f686962906
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\style-fluent[1].cssFilesize
1KB
MD5a81d5d24c90d39cbe7b822aeec3e71ff
SHA1b9819fc92de0f730502d8927adf05b098e01ecd4
SHA2564ec14bad808f325ff9d298b93351bb387b9aab24f391790c85e43acb5121ea60
SHA512125f8adfab3fac568e240dfefa15e2615317a0e4541a14c2b02c9050d00f234a41028f6658607f3f651e05b145369a7ea3535faeee47751b98a31c1b3159b329
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\style-royalenoir[1].cssFilesize
1KB
MD5b1650bf9d94423c3c18efb83ded0be07
SHA1edd172e33ed088d2d6b98a290255fa890648d93e
SHA256a808dd2fd3180395ca1e4dc4e2cc9abc68ea77ad2526646c0d555590708e8b57
SHA51248eec246b43ab3b8744af45f9b037fefff613b38114d0e37da4cdee52911286fe490b63c67479c1d7a74e4a8dfc9ea9a7f1022849e664e1719cbc838cf018774
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PKJJTT7F\style-silver[1].cssFilesize
1KB
MD5977729ff7de456df06b5df46f59c7508
SHA1341aabf60ed4c05ee887d37e9896b1660f234c41
SHA25654da442d36d3f989b096e23586ca1a117d3cd602f30491fbd323a16a52d2b257
SHA512cadfa1d2ae45af86b0d6e4f1f63bbb87cd9688cb18b878afa12db93c5ab54e21e028dd889dd3303be5d36e17b9c4df68ac1aa73821a2e728c37e873119cc77da
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\fy0o2joj.default-release\activity-stream.discovery_stream.json.tmpFilesize
26KB
MD57d41ca0366fc4822f189550ccc5d43ce
SHA16cc83f5d2179fb804367b9796c6eb4b2e83f8946
SHA2565d75f8d909411b134204fb8006a1737e711944484995d6356a647ddc8296c7b4
SHA5128c54e434b9ce1cd1404e2134b8cf27298919dbbbc84e8ef1cdf13c4924ccd2b7120e74690998e05578d2edfa846a2979d04680120bec83a21ca3c1838de63544
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\fy0o2joj.default-release\cache2\doomed\17618Filesize
23KB
MD5dedee498c041bdce5bf7d790671390cc
SHA168b01b2e9d8b40b341a8690b5c6abbb0d25745fa
SHA25625f2bf2b3cfbceaf1f870b4af579a24199fcdacd97348df74d631029332f3005
SHA51251ca06314eaa415f13a4f86446b622a3c66a8a6af24efd5c1278998dca2c2b3e7ea61d5671d821fe19524a300cf453937e4688b75fec1c8e3e723ed3766b8c6f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\fy0o2joj.default-release\cache2\doomed\28885Filesize
44KB
MD5f6f5a1d9996c73c6ae68656b75dda140
SHA11b9e8f723c97cc4b44d49672f668b1939dbe5bc3
SHA2560847ee8dbdc87c443e3e3b7ee56b9ac2946914d8625015b03d003a978ace46fb
SHA5129c6394b160c52914dde330ec41667b49988623b77c301e1c730c7b7041a57f45a6cb1258df992f2a9e5ee9d67d5d0352de67fa04d0542e9fca3a45e3a3436634
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\fy0o2joj.default-release\cache2\doomed\9394Filesize
9KB
MD59c25ad489d608f329f2e764eb6155743
SHA184651c416cbde442bb97f13bb08474dc28717aea
SHA25649daeec2b04ffbc6fa5dd2c1329e60e55a88c2e3157af82380560f23e441dc09
SHA512e647f8e7176e19e77c02f0dd1572e808342bdfbdf850a76659fc11e9fab7e562d8887597c7b660babb4025dae3d896df1ff4f86d70dabf75d7bcce3f1474f059
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.datFilesize
10KB
MD52363933703f4e6a9a66a461be23eb223
SHA16b3ae453e05170f7905342705584ed2de0529904
SHA256cab95a86a3034698a9463ec66bbb9f46658f61a27eb43029c0dbfc9117e81d61
SHA512094a178da17684e71dcbac60316b3c231172cd9847be4e4e528b95cec28035cec95974e34e6d6b99488e589b044c89fff4f3e262f34a678f25663610d5866bf7
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.datFilesize
10KB
MD571b27cbbf1553f8f11b7c05366b795c5
SHA1dfa883544fb07042ca66c8fb69dae3cfb1564af7
SHA2566abc0b74aab88c1fd8e2233e4a5fbeb2abb1085c6ef788e0b5b9745f139324d7
SHA51240d9336af45fc2096dcd0c6aba56a0e772c24e1d471d28e799c7300cd7692f49c6a309c6f9fc8147f153a1dac8b7087d1ab816e8478aa404b0802e15bd6fc6ab
-
C:\Users\Admin\AppData\Local\Temp\Kno9C20.tmpFilesize
88KB
MD5002d5646771d31d1e7c57990cc020150
SHA1a28ec731f9106c252f313cca349a68ef94ee3de9
SHA2561e2e25bf730ff20c89d57aa38f7f34be7690820e8279b20127d0014dd27b743f
SHA512689e90e7d83eef054a168b98ba2b8d05ab6ff8564e199d4089215ad3fe33440908e687aa9ad7d94468f9f57a4cc19842d53a9cd2f17758bdadf0503df63629c6
-
C:\Users\Admin\AppData\Local\Temp\TCD1D50.tmp\sist02.xslFilesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
C:\Users\Admin\AppData\Local\Temp\nsdA6EB.tmp\InstallOptions.dllFilesize
15KB
MD5d095b082b7c5ba4665d40d9c5042af6d
SHA12220277304af105ca6c56219f56f04e894b28d27
SHA256b2091205e225fc07daf1101218c64ce62a4690cacac9c3d0644d12e93e4c213c
SHA51261fb5cf84028437d8a63d0fda53d9fe0f521d8fe04e96853a5b7a22050c4c4fb5528ff0cdbb3ae6bc74a5033563fc417fc7537e4778227c9fd6633ae844c47d9
-
C:\Users\Admin\AppData\Local\Temp\nsdA6EB.tmp\LangDLL.dllFilesize
5KB
MD550016010fb0d8db2bc4cd258ceb43be5
SHA144ba95ee12e69da72478cf358c93533a9c7a01dc
SHA25632230128c18574c1e860dfe4b17fe0334f685740e27bc182e0d525a8948c9c2e
SHA512ed4cf49f756fbf673449dca20e63dce6d3a612b61f294efc9c3ccebeffa6a1372667932468816d3a7afdb7e5a652760689d8c6d3f331cedee7247404c879a233
-
C:\Users\Admin\AppData\Local\Temp\nsdA6EB.tmp\System.dllFilesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d
-
C:\Users\Admin\AppData\Local\Temp\nsdA6EB.tmp\UserInfo.dllFilesize
4KB
MD5d458b8251443536e4a334147e0170e95
SHA1ba8d4d580f1bc0bb2eaa8b9b02ee9e91b8b50fc3
SHA2564913d4cccf84cd0534069107cff3e8e2f427160cad841547db9019310ac86cc7
SHA5126ff523a74c3670b8b5cd92f62dcc6ea50b65a5d0d6e67ee1079bdb8a623b27dd10b9036a41aa8ec928200c85323c1a1f3b5c0948b59c0671de183617b65a96b1
-
C:\Users\Admin\AppData\Local\Temp\nsdA6EB.tmp\gupLocalization\spanish.xmlFilesize
2KB
MD52652446ec6716cb6d2ae83a3ccc81f2c
SHA14175fbf3e3a83ca13fbc059d07d6950e70e91407
SHA2567f14456df2d1d7389458c6c02dc3c4a0a4f0cec34c322ed8cad12e9d0ba87b5f
SHA512d5cc5d71aeace7208e0f917b84e55e630f5ac9b42dcfd29797fd3b4dfa38a307e731c7b94610501ab3f49fa077a56f4884fe6aa7bc1f730bc7320410692ab3f8
-
C:\Users\Admin\AppData\Local\Temp\nsdA6EB.tmp\ioSpecial.iniFilesize
1KB
MD5e7f41023b7887f7592fcf018819dc929
SHA1e0c501288285bff0ac4567f4e22ca3108bc388be
SHA2568ba3078728fe3702747aa68ca6050d10ff24ca8dd5104b5cf80620947e76d56c
SHA512fdf8561a8c131f4143ce20d653a9e623b511afd063a2ffca318eaec6575055aaa6949d77e41a7a5762c6fd9742d413e1052b3a9d0e57257942c8a94e003a26c1
-
C:\Users\Admin\AppData\Local\Temp\nsdA6EB.tmp\ioSpecial.iniFilesize
1KB
MD57a0395ecab0bed02b2067d5050eb2899
SHA109412423196dae525083e44b580b357a1eb5bdac
SHA256b8997db13b5553565421108513f285ea6dd7f17a44868b1556c15dd2fd20745b
SHA512f3c3028f691aeba9d693f88e8f8f55e96f614da26fff6883c894fa52f2de008e05a72bdeb2d497c89e208c8e50a431f436c5bba565a9790d217135e20a09dd4d
-
C:\Users\Admin\AppData\Local\Temp\nsdA6EB.tmp\nppLocalization\spanish.xmlFilesize
102KB
MD510167de4084557bb12b54e03cb905441
SHA15d8911f1a2ccc38b1d03b37e4ba76dfbe4003a0b
SHA2566beb17cda5d7c20fa33441c46d4ebc8247ebf39600c0a2e4c6e49194009502ba
SHA512fe43cbf88bfff9ce30ee763446b7a9e25e34e52fab3d9d82bf733abe0a751bd8acc44cd7a51b4cd03e59b2fc2edb39d72953bf4dcf1785d8f94b99f3a9c6d823
-
C:\Users\Admin\AppData\Local\Temp\nsdA6EB.tmp\nsDialogs.dllFilesize
9KB
MD51d8f01a83ddd259bc339902c1d33c8f1
SHA19f7806af462c94c39e2ec6cc9c7ad05c44eba04e
SHA2564b7d17da290f41ebe244827cc295ce7e580da2f7e9f7cc3efc1abc6898e3c9ed
SHA51228bf647374b4b500a0f3dbced70c2b256f93940e2b39160512e6e486ac31d1d90945acecef578f61b0a501f27c7106b6ffc3deab2ec3bfb3d9af24c9449a1567
-
C:\Users\Admin\AppData\Local\Temp\nst7ABF.tmp\LegacyUpdateNSIS.dllFilesize
68KB
MD5c61309f21ae08b3215e10e40e4bb12c5
SHA15a5a167a1d6bef28f2b51676ee8fdfded53aa0ad
SHA256890f79e630fceaf2a73ffbf0c574a4f0d05cfbbe7e753a6ad135ae551fcdc2cd
SHA51241b1280860a1183f5f48dc74ab14368830e137c50e3dd3ce82ad9cf640e15d0836c9cc241b9828fe189aabd7e165bc68bc286555bf277f257d68c73a3b89c92a
-
C:\Users\Admin\AppData\Local\Temp\nst7ABF.tmp\System.dllFilesize
50KB
MD5333b39e1661ee18d4491227b81c1177f
SHA1bdd08b0bb139e9402f3f04d8f0c08ae35ce6f4f9
SHA2569ecbf208493200375185dafc2d2036048925a051493e4a4eed3e12acd875376c
SHA51249f240e6789e5d0be962fc8773e912563a39b6a2523a84670264beaa004ae7a8b05ae80d98ced7c8bf3e9d2cb83a437724cb2ab4eb8cec24ab7e7333141469d8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.datFilesize
202B
MD54566d1d70073cd75fe35acb78ff9d082
SHA1f602ecc057a3c19aa07671b34b4fdd662aa033cc
SHA256fe33f57205e2ebb981c4744d5a4ddc231f587a9a0589e6565c52e1051eadb0c0
SHA512b9584ebfdd25cc588162dd6525a399c72ac03bf0c61709b96a19feba7217d840ae2c60d7b0d3b43307a2776f497a388e79ef8a646c12ae59a7f5cc4789bbf3c8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-msFilesize
9KB
MD5966710c18ab45657204994d532998680
SHA128985a4e3b94f1065f5ebebb5680ee7ffd60f5a1
SHA25678c078fe746c8d2d3e5c1f27a44dd8ce77bee06ae7b9178d95ae554b259f6c07
SHA512f229a037323303c5da99250da0ce7093f2917d1c80bb2e37a9442ea243200d2a76caf0f40fc8e86404e4e78f2f47a1f8fbaf7f9d2c463ce7566cdc06185e4e29
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-msFilesize
9KB
MD5b27de6b563d08af59b86d6bb7ce47c46
SHA11807ce7bfe1f0f7f83d74773ff47c0c4efa6b9a3
SHA256be345b7fb58cf101df07e75b4493d42533309e4cd4cd1ead2cd923ccebb743e5
SHA512bdeaaa80c87558d783511660e2f6ee29205a4db895ee0f84b9d79a5366c2ec59fc1da1eea7f426476f0533ee4947e4045ddae1879864d977e93a16903b9b5a00
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-msFilesize
11KB
MD5abe9f214b8dab61c25d32d7675e7c316
SHA17ccca0fe7459b6a3eb2e78a8f5c18e4731f07764
SHA2565a7f2f0550f03c1411b38741f0af88702273b69639151206924940cfab388288
SHA512998d2e61ac5ec13be6008c1e5fef9c8c70771adf3c2a2175aa975d0ba3464e5025fbc49c64ef35eb70e2f7293fabffda87e186e4c4e86c1e38b4693cbef8d84a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-msFilesize
3KB
MD542047a11cfe3d4bc77ec46ee0ad0ff48
SHA147006400e5a709d64f0a4b0f804b89833f9b79ba
SHA256dba5534597bdae725ac839a097fcc7ef3fc8b564cb2203f04075558e70f47158
SHA512ce38540fdc7ec3f66d4bb381f0487083680be2ac8e5f66187877df14fcad3ad62876281630d327a98284556a022136c5a1c0b5dcfd1ee14320aa66c665fd0228
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fy0o2joj.default-release\prefs-1.jsFilesize
7KB
MD5c5619f798e19f2ea8f62342c9679d0ea
SHA11bfa8e2448f24e7aa10a38ea401d64a8df53e7ff
SHA2569189272e8f1dd9de4775e18369f4e4a8e7e50d6e551f8075323ce57cb9b6a0f8
SHA5123de175a81ea538b272e0f06007e713eb75a67bf661654fd874b81a885cb510748a26cd6b13c9f9f3e19234b58de78b9b7022cd54377bf13a8a58ae89200899aa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fy0o2joj.default-release\prefs-1.jsFilesize
7KB
MD56feebf5d9344e081429d24a6c5a04539
SHA16cd806a45068c3f2a2acd373c4348fcf673729b3
SHA2567f99d3a346ebc4ef4d89ff8aeda484227cd34eeeb5dd1b3320240a55c60a1f21
SHA5129175ef0816b416d2c7681fccf7fda223d098d8ac880269f7c742e3beb51e50e9a3307ab11919bc93d510675d4c43a7591304a18873f792ed05cac3efaff392a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fy0o2joj.default-release\prefs.jsFilesize
7KB
MD5b8c2cd6207d38b22ab69e4818b2a0aed
SHA1c24379ae10d2fd34b6851cf8836dec736d393486
SHA256844e629eff999b7bdd533311ce30970c62fcf86f0030175e80040f5f3186ac83
SHA5128489603c67be4270bd6f1cc86af5554f9223b8be62f4fbf3d542134a400f2d6c051585d5357e61e37a2b9bacb7a9951763e0c40805e9424e3cad6e78cfef4850
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fy0o2joj.default-release\prefs.jsFilesize
7KB
MD50ca171e5b878f24bdafedbd69ad0bf8c
SHA199df6e5ec2a10ffe07c7065f6e209d0a986d3f6c
SHA2568119cbbba139ec8f1900eb11bb6d53483d9b91511db222b455885f8e63757224
SHA512951bbc78635a8ebfec4ae7b91518a2b654d0d7cccc3f9af9f3c30566a2116a7dd2fd248a4d8b1baf0dd2842581b8489374f97522debb3d9d89f91318f59ef348
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fy0o2joj.default-release\sessionstore-backups\recovery.jsonlz4Filesize
1019B
MD50c0f425dfcc611926a01a7df1964b5d5
SHA1c4caa6af6de79b2597501545a012355b40d1f5cd
SHA2564855e3d6df94d9bd438ac9a82f2287ffde85a5a82c9adce0134f359d8d60af10
SHA5124265b992527150f42e820ba5884904457d0b78b2985cc3b3c53297c85abe2655b423a8418d086eb2d82ba7efaf4751b28689d8b537aeb00b72560dd4e6b1e73f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fy0o2joj.default-release\sessionstore-backups\recovery.jsonlz4Filesize
5KB
MD53bb9b0eb28b1b68ce37a36afb75c8536
SHA12878f562f63dbbe008aa7d3268d0207e36c64999
SHA256937f55913e0ba786b4c126077f362d0bf3b59b7d6be6b9933aaeb495f5441761
SHA5123e8afa56d5ef348d8e96465a5f527948482abcdc5b8d57981e74aa07e2eaed64fce3e70bdf3837b5104ba77326f0a33bdef3dbcaa9ad9327e5d61b4934f769ed
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fy0o2joj.default-release\sessionstore-backups\recovery.jsonlz4Filesize
4KB
MD50f80f3c40e8ccd6179c56b83bdc975b0
SHA1a49a80617dfea1c8aa39c6b658ceab2c5d7b4e09
SHA2564d1cf1fb3f0fadd4233cd1b79578a70fe70dee23c98bb14fface72bfc87fc705
SHA5124ef65754e7e9f34f2a70090122efb9191dd35b5f5ace6bb1dfc9091706800a799da0179a8f1666b1b58aa9f716fec3c81fc6da47a72296aaf8b240cb7f50ec71
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fy0o2joj.default-release\sessionstore-backups\recovery.jsonlz4Filesize
2KB
MD599aa8765874dd7252c5e0bd370cdafe5
SHA1c7b34fa7e1411b4d0c342315db7185551c1716bd
SHA25613efe7dcfcecc71a1641236c0f07db4d77b6ea091c70a78e709bda1de9ab79a1
SHA5128b239738a3de5a6d378aaa7169b066d75ae031c93fb301c40544e1ccd416f01e46fa412a0e05bdbd2849df9a776619fc1f4f6f25b5c9e6228f07e4a26e3762f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fy0o2joj.default-release\sessionstore-backups\recovery.jsonlz4Filesize
6KB
MD574899f378f27dd654e5ac84fe83a41db
SHA164c63cb388e942e64e7ab1ac156dc2410aba01d8
SHA2565b4d411c445b32bc158e7970430f995c82dafdb542796b8a7033a8e570429169
SHA512423816026fd20c0e145dbd1c73b5eae2e610bcbf18aaffcbfc9d462f7c05d8718363b8cb56b90db96779216f795e4e14b054a2a198c80448ca758c4c08abf1ee
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fy0o2joj.default-release\sessionstore-backups\recovery.jsonlz4Filesize
5KB
MD56f0efafbac6b6d6d3216a5fc382d90c3
SHA14e9f1a4826a92deffaae487410769b9f4851a9f6
SHA2560ac9efc10d2bf82d402792073f5ed789091138f415612bfe5fc8897a8ec3b73d
SHA512887d9efaa15795d828b16ab7eebdc8054e516ad5727db96baea214d27e49d4cdbd94d08f960ac3d7812bcc32ed853ff27075f2bb1fdde2e81e562b89af18e504
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fy0o2joj.default-release\sessionstore-backups\recovery.jsonlz4Filesize
5KB
MD549119bc0071c5911fb6bfd24330796a6
SHA1a5f3b170566549ad2a7e3a6536908f5229ad6009
SHA256b14036455e3f5829565a74a93e3da17bfd19e41ddca1a7f3e466280f71ad1376
SHA51247a1303949b38730423317ca51250af70906932d2dc181a8fd4a559c37d2e5029b43ad3fb4fe75e8173b973a25d5373848787c9debd11f87b54a6f9abd5c8459
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fy0o2joj.default-release\sessionstore.jsonlz4Filesize
5KB
MD50bfb53018779da81b14d0de8b524e7ca
SHA10731248651f7f24457fecb1e4bf737cd293f2fcb
SHA2564826d10be71475e0f07f34c659967e785461e1cb385de1bfa4b4660de0003484
SHA5125cc548bd6e0982d1cacd2f76bddefce8b42669a03d709f581b2f7cdd5cf48cd27f9eb11d3f41283e2f240ac440445b853fac10d01cd4b89481611a0e51d79505
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fy0o2joj.default-release\storage\default\https+++www.virustotal.com\cache\morgue\178\{54b87721-6fff-4644-afb7-b443c7665bb2}.finalFilesize
48KB
MD5c9ee1aa54c38d36a939f6187c21c8095
SHA1eedacc6c381104f253b8c0ce3eb446ebcc7559a2
SHA25668cab4a07508efe1a8b625a0c1d11bc8eba3b018456ac6dcd3e0f46cab8fb98e
SHA512a2c7dbd3aaa7502733a401a27efb89f1dac6a5b2b352d9baadcc7903356fade5e532650bcf6e98a7237d92eca4c42444e323f84c8d15ec432e2b7d57879b6380
-
C:\Users\Admin\AppData\Roaming\Notepad++\backup\nuevo1@2024-06-30_230428Filesize
26B
MD579e7dc3d4539c88fb5dd3a077a22caee
SHA15c07e4ca317f80494713f5d6afd8b5b3ab077acd
SHA256059b89b631a32c9a1197c99c0b3499f26a868d54727d423a8c4ddda1221d3418
SHA512ac9b657a80b0d27dcbfea7cbe78730985ff2dee787f92df9a90ade09ad659e5af829ec13f5bb844183ff6105bad32aae5787edf295a7fac988b23b8da56d8323
-
C:\Users\Admin\AppData\Roaming\Notepad++\backup\nuevo1@2024-06-30_230428Filesize
20B
MD5ee65544c02ff9befd0eca9e3065b10bf
SHA17b26ef7cb40e290d8bb1f1199898c23f027be672
SHA25648998f498e7037e1aa0b032bc1963cd3e823bcebac3352316114398386f3ccab
SHA51218c52591e29dfd57cf4c4f276f6158882363d01083d013a6df263c7732acbcab97e986cad2f51c9f457dbf23d17713637c28fabb0f59b84319668dee495eda83
-
C:\Users\Admin\AppData\Roaming\Notepad++\contextMenu.xmlFilesize
4KB
MD5fde4cc09d1c18c6cd7c1a4878e89d27e
SHA122fba21b254fed1a60da5de2b8af3cf6e132b647
SHA25643ac0b7ba9b1f91fd8d4841b8119344e6212b307a1decccf61658f31d38bb425
SHA512fcc87b93cb4dd0949e82edb7d2788d7abd317f9f4c5f046ceba1cd85a64b12b29c6baba3e8646265db02a48a2dc20c3b5e893a1334d9b1e91d26692b4e9c2d29
-
C:\Users\Admin\AppData\Roaming\Notepad++\plugins\config\converter.iniFilesize
646B
MD5f07150054a6afff4d8e9d58899167722
SHA1e092cd960ab728667d91b37d64a02d7f6821518b
SHA2565b0a08439e8e93817772f84e1098f14152d9da36c2601a0600ddaae6f61359d0
SHA5128c86aa4c058a8ab5fd26f21cacc8ddaffa8ce6012bb329d3c5b817da00b4b43018a575c768d1921c6eeab7537f172c7cb3de658b014365ea52fb3c87547182b9
-
C:\Users\Admin\AppData\Roaming\Notepad++\session.xmlFilesize
1KB
MD577e730e0bdc4800ce6f4275674217910
SHA1a036fbce149b3dd6334245215b7ed2ce2a28821a
SHA256914d778d797de69a2d45cb64442583ab4933fd93459de9d1ee9a2acce1cc2151
SHA5126b445130a79d7f30cf6c81d45e48143a8306aba3b4f14c5b29f137f6e1eea09cfa613af233733dc3fefb3bf49e543cffb12b0d80aff91b671185c7b3fc447efe
-
C:\Users\Admin\AppData\Roaming\Notepad++\toolbarIcons.xmlFilesize
2KB
MD5bc4b775a277672fc7edf956120576ecb
SHA1fe7c2db5b4d4c5a3f5603cf56c4d71cc9ee2d71d
SHA2564ec98de37193f41242c1a47507bcc4c1af555e71154f7354272bc3e664e19877
SHA512f87dc3ce52831ee308fbfa2b1b94c07e2811e7028360f046e012f8ea5a8f0ebcd362de7a663dee810c3da0791474c1485b1a2626c7867e76236156b125ff39b2
-
C:\Users\Admin\AppData\Roaming\Notepad++\userDefineLangs\markdown._preinstalled.udl.xmlFilesize
6KB
MD5672e6d5f89887666ec94711e442644e0
SHA18d069ae93347316eff0dcf7aff4d22da18a62af2
SHA256b34fe6811dacfe49d77d434123867e866daf6e0e27387a0446887dabe8943f04
SHA5128fc5e9bbe027826304fa6f329fb16e4c9e4e7a597d87e9c691ed6a9f505b7bc1967339b43c6426105432a030260b0654468ab8fcbb4312b2fb6ed6c6aa537edc
-
C:\Users\Admin\AppData\Roaming\Notepad++\userDefineLangs\markdown._preinstalled_DM.udl.xmlFilesize
6KB
MD53690cef1865e32fe6be1b2ec7656539a
SHA1bc043bec63c310a60d9e242810036460c467945d
SHA256e45e49f0895249d951df2c07e0f06ca1242e05c961dd921e5aa2781ae2e7ff25
SHA512c2be869d96baec2018e13dcf5934dd9cf74146541e852cc2eedb4d83a8af23e2577cde7a0158fefaa11056416ff039df3a7725e320620193e9bfe72c8067c051
-
C:\Users\Admin\Documents\~WRD0000.tmpFilesize
11KB
MD5feea9b88ce99323a278469b18b15fb7d
SHA1d3338bc7bb19cc55927d3a4b5f84269698d44ef9
SHA25661fabf47eb3f105d77f3f2cd760f91341bc12a1f2a8b49ba0e43cbb418bbbeed
SHA5128c30b142ff050ba724046cd2bfd7dccf676f35f576e4f95e51d87f3ef2a1fc3107c64c62438e50b00f5402c7fdef0e26daedcd3e6cf4c28c7cd90ea98a1a871d
-
C:\Users\Admin\Downloads\npp.8.6.8.Installer.x64.exeFilesize
4.8MB
MD5610cc0eab1102a9f619d32107f2dc874
SHA168f91f1b62d6127076eb0e70a78d8c3101b33ef5
SHA256d9fd6944595083644a4711f0b18611d4547f0c75c89c944bb9de196d74375008
SHA5125d884997e80b733792be860f1936ab9413203b50991cf9b34ad4cd6f630e274c0b99514ed543a4ca9ce6bb40a77e2db3aaea46f324f38b1945f888d22a1db5db
-
C:\Users\Admin\Downloads\npp.8.6.8.Installer.x64.exe:Zone.IdentifierFilesize
237B
MD5bfa85ddbf3c3d52c1a30e4bec4bd3900
SHA1d7920496a2a1305f3072197b2b6438e631341882
SHA256a671294b0c7298551f4b5cb1008eca9272b990326911db1f3b20575a3206666f
SHA5128dad8e1ec4c124e4c8c2bc59234de163fd54fd2ae4a498d8b6bf392dbf42b497140c9a6a3b73a8da4280a65ebad0a0aa5df999aed5639f6b40364262c82d34fd
-
C:\Windows\System32\config\systemprofile\AppData\Local\speech\Microsoft\Speech\Files\UserLexicons\SP_E79DF5D2258541A394FFA2335B56D14B.datFilesize
940B
MD5504174f13becbe5913faa16a127fece1
SHA1d2fbc627e21c5e1a0c052eb4506e2f7e92588dc4
SHA25607f13ed04e660d478ae87d5366ea4877571e1deebca6b32ca3d1112bf2eec9c6
SHA512d66767ade0c5b84af9e333019013ad6eb658a6ad70c7046ea4cdd662d472d9e840ad6289983220e679e5f9fbfbf31629f0b1d1f211ad0dd151464ec5f2266bc8
-
\??\pipe\crashpad_1040_DJVMLTSIOCUIGGLJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2404-3141-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/2404-3142-0x0000000073EE0000-0x0000000073EF2000-memory.dmpFilesize
72KB
-
memory/4952-2817-0x0000021C2CAA0000-0x0000021C2CAA1000-memory.dmpFilesize
4KB
-
memory/4952-2820-0x0000021C2CAA0000-0x0000021C2CAA1000-memory.dmpFilesize
4KB
-
memory/4952-2812-0x0000021C2CAA0000-0x0000021C2CAA1000-memory.dmpFilesize
4KB
-
memory/4952-2811-0x0000021C2CAA0000-0x0000021C2CAA1000-memory.dmpFilesize
4KB
-
memory/4952-2810-0x0000021C2CAA0000-0x0000021C2CAA1000-memory.dmpFilesize
4KB
-
memory/4952-2822-0x0000021C2CAA0000-0x0000021C2CAA1000-memory.dmpFilesize
4KB
-
memory/4952-2816-0x0000021C2CAA0000-0x0000021C2CAA1000-memory.dmpFilesize
4KB
-
memory/4952-2821-0x0000021C2CAA0000-0x0000021C2CAA1000-memory.dmpFilesize
4KB
-
memory/4952-2818-0x0000021C2CAA0000-0x0000021C2CAA1000-memory.dmpFilesize
4KB
-
memory/4952-2819-0x0000021C2CAA0000-0x0000021C2CAA1000-memory.dmpFilesize
4KB
-
memory/5832-4442-0x0000000000400000-0x0000000003DF3000-memory.dmpFilesize
57.9MB
-
memory/5832-4441-0x0000000000400000-0x0000000003DF3000-memory.dmpFilesize
57.9MB
-
memory/5832-4437-0x0000000000400000-0x0000000003DF3000-memory.dmpFilesize
57.9MB
-
memory/5832-4443-0x0000000000400000-0x0000000003DF3000-memory.dmpFilesize
57.9MB
-
memory/5832-4455-0x0000000000400000-0x0000000003DF3000-memory.dmpFilesize
57.9MB
-
memory/6036-2193-0x00007FFDB8170000-0x00007FFDB8180000-memory.dmpFilesize
64KB
-
memory/6036-2191-0x00007FFDB8170000-0x00007FFDB8180000-memory.dmpFilesize
64KB
-
memory/6036-2789-0x00007FFDB8170000-0x00007FFDB8180000-memory.dmpFilesize
64KB
-
memory/6036-2790-0x00007FFDB8170000-0x00007FFDB8180000-memory.dmpFilesize
64KB
-
memory/6036-2788-0x00007FFDB8170000-0x00007FFDB8180000-memory.dmpFilesize
64KB
-
memory/6036-2192-0x00007FFDB8170000-0x00007FFDB8180000-memory.dmpFilesize
64KB
-
memory/6036-2189-0x00007FFDB8170000-0x00007FFDB8180000-memory.dmpFilesize
64KB
-
memory/6036-2213-0x00007FFDB5F50000-0x00007FFDB5F60000-memory.dmpFilesize
64KB
-
memory/6036-2194-0x00007FFDB5F50000-0x00007FFDB5F60000-memory.dmpFilesize
64KB
-
memory/6036-2787-0x00007FFDB8170000-0x00007FFDB8180000-memory.dmpFilesize
64KB
-
memory/6036-2190-0x00007FFDB8170000-0x00007FFDB8180000-memory.dmpFilesize
64KB