Analysis
-
max time kernel
2700s -
max time network
2701s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-07-2024 09:22
Behavioral task
behavioral1
Sample
sv.exe
Resource
win11-20240611-en
General
-
Target
sv.exe
-
Size
63KB
-
MD5
c095a62b525e62244cad230e696028cf
-
SHA1
67232c186d3efe248b540f1f2fe3382770b5074a
-
SHA256
a5728f8fd33c77818782d3eef567b77d1586b1927696affced63d494691edbe6
-
SHA512
5ba859d89a9277d9b6243f461991cc6472d001cdea52d9fcfba3cbead88fbc69d9dfce076b1fdeaf0d1cd21fe4cace54f1cefe1c352d70cc8fa2898fe1b61fb0
-
SSDEEP
1536:unjFXblMp3wgDkbivVSm16KTOKjLIJXc:unrAwgDkbicmbOKj0JM
Malware Config
Extracted
xworm
amount-acceptance.gl.at.ply.gg:7420
-
Install_directory
%ProgramData%
-
install_file
svhost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1220-1-0x00000000008F0000-0x0000000000906000-memory.dmp family_xworm C:\ProgramData\svhost.exe family_xworm -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Program Files (x86)\\Windows\\Error file remover\\fatalerror.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Program Files (x86)\\Windows\\Error file remover\\fatalerror.exe" msiexec.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to get system information.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 6736 powershell.exe 1156 powershell.exe 4700 powershell.exe 932 powershell.exe 3816 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 4 IoCs
Processes:
DrvInst.exeDrvInst.exeDrvInst.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\System32\drivers\UMDF\mm.dll DrvInst.exe File opened for modification C:\Windows\System32\drivers\parsecvusba.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\parsecvirtualds.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\parsecvirtualds.sys DrvInst.exe -
Modifies Windows Firewall 2 TTPs 4 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exepid process 1556 netsh.exe 5088 netsh.exe 2940 netsh.exe 5376 netsh.exe -
Drops startup file 2 IoCs
Processes:
sv.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.lnk sv.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svhost.lnk sv.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 64 IoCs
Processes:
svhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exeDiscordSetup.exeUpdate.exeDiscord.exeDiscord.exeUpdate.exeDiscord.exeDiscord.exesvhost.exeOneDriveSetup.exeOneDriveSetup.exeFileSyncConfig.exeOneDrive.exesvhost.exesvhost.exesvhost.exeparsec-windows.exesvhost.exepservice.exeparsec-vud.exenefconc.exenefconw.exenefconw.exenefconw.exeparsec-vdd.exenefconw.exenefconw.exenefconw.exeparsecd.exeparsecd.exeparsecd.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exepid process 4108 svhost.exe 2324 svhost.exe 3232 svhost.exe 1532 svhost.exe 3704 svhost.exe 3420 svhost.exe 4832 svhost.exe 3232 svhost.exe 2748 svhost.exe 4000 svhost.exe 3892 svhost.exe 3000 svhost.exe 1908 svhost.exe 3284 svhost.exe 2380 DiscordSetup.exe 1920 Update.exe 2024 Discord.exe 2324 Discord.exe 5052 Update.exe 2836 Discord.exe 2616 Discord.exe 4888 svhost.exe 3056 OneDriveSetup.exe 4588 OneDriveSetup.exe 5296 FileSyncConfig.exe 5364 OneDrive.exe 3212 svhost.exe 1256 svhost.exe 5428 svhost.exe 3668 parsec-windows.exe 5400 svhost.exe 5888 pservice.exe 2328 parsec-vud.exe 3928 nefconc.exe 5008 nefconw.exe 5908 nefconw.exe 5244 nefconw.exe 3572 parsec-vdd.exe 228 nefconw.exe 3276 nefconw.exe 6120 nefconw.exe 5304 parsecd.exe 3468 parsecd.exe 492 parsecd.exe 2920 svhost.exe 4756 svhost.exe 128 svhost.exe 428 svhost.exe 776 svhost.exe 2224 svhost.exe 3128 svhost.exe 2236 svhost.exe 1604 svhost.exe 5344 svhost.exe 1780 svhost.exe 2416 svhost.exe 2788 svhost.exe 5860 svhost.exe 5952 svhost.exe 3196 svhost.exe 3948 svhost.exe 1456 svhost.exe 1104 svhost.exe 5352 svhost.exe -
Loads dropped DLL 64 IoCs
Processes:
Discord.exeDiscord.exeDiscord.exeDiscord.exeFileSyncConfig.exeOneDrive.exeDllHost.exeDllHost.exeDllHost.exeDllHost.exeDllHost.exeparsec-windows.exeparsec-vud.exeparsec-vdd.exepid process 2024 Discord.exe 2324 Discord.exe 2836 Discord.exe 2616 Discord.exe 2836 Discord.exe 2836 Discord.exe 2836 Discord.exe 2836 Discord.exe 5296 FileSyncConfig.exe 5296 FileSyncConfig.exe 5296 FileSyncConfig.exe 5296 FileSyncConfig.exe 5296 FileSyncConfig.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5932 DllHost.exe 5196 DllHost.exe 244 DllHost.exe 5332 DllHost.exe 1776 DllHost.exe 3668 parsec-windows.exe 3668 parsec-windows.exe 3668 parsec-windows.exe 3668 parsec-windows.exe 2328 parsec-vud.exe 2328 parsec-vud.exe 2328 parsec-vud.exe 2328 parsec-vud.exe 3668 parsec-windows.exe 3572 parsec-vdd.exe 3572 parsec-vdd.exe 3572 parsec-vdd.exe 3572 parsec-vdd.exe 3572 parsec-vdd.exe -
Modifies system executable filetype association 2 TTPs 7 IoCs
Processes:
OneDrive.exeOneDrive.exeOneDriveSetup.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx\ = "{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx\ = "{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx\ = "{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDrive.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
sv.exereg.exeOneDriveSetup.exenefconw.exeparsecd.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Windows\CurrentVersion\Run\svhost = "C:\\ProgramData\\svhost.exe" sv.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Windows\CurrentVersion\Run\Discord = "\"C:\\Users\\Admin\\AppData\\Local\\Discord\\Update.exe\" --processStart Discord.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Delete Cached Update Binary = "C:\\Windows\\system32\\cmd.exe /q /c del /q \"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\Update\\OneDriveSetup.exe\"" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Delete Cached Standalone Update Binary = "C:\\Windows\\system32\\cmd.exe /q /c del /q \"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\StandaloneUpdater\\OneDriveSetup.exe\"" OneDriveSetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" nefconw.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parsec.App.0 = "C:\\Program Files\\Parsec\\parsecd.exe app_silent=1" parsecd.exe -
Blocklisted process makes network request 2 IoCs
Processes:
MsiExec.exeMsiExec.exeflow pid process 1166 5024 MsiExec.exe 1168 6056 MsiExec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
Processes:
Telegram.exeFileSyncConfig.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Telegram.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini FileSyncConfig.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exeofzhtx.exemsiexec.exewckjxu.exemsiexec.exedescription ioc process File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: ofzhtx.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: wckjxu.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: ofzhtx.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: wckjxu.exe File opened (read-only) \??\Y: wckjxu.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\K: wckjxu.exe File opened (read-only) \??\X: wckjxu.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: wckjxu.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: ofzhtx.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\T: wckjxu.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: ofzhtx.exe File opened (read-only) \??\Z: ofzhtx.exe File opened (read-only) \??\Q: wckjxu.exe File opened (read-only) \??\B: ofzhtx.exe File opened (read-only) \??\R: ofzhtx.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\E: ofzhtx.exe File opened (read-only) \??\G: ofzhtx.exe File opened (read-only) \??\I: ofzhtx.exe File opened (read-only) \??\H: wckjxu.exe File opened (read-only) \??\V: wckjxu.exe File opened (read-only) \??\U: ofzhtx.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: wckjxu.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\H: ofzhtx.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: wckjxu.exe File opened (read-only) \??\S: wckjxu.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\V: ofzhtx.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: ofzhtx.exe File opened (read-only) \??\S: ofzhtx.exe File opened (read-only) \??\Z: wckjxu.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: ofzhtx.exe File opened (read-only) \??\N: ofzhtx.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Checks system information in the registry 2 TTPs 6 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
OneDriveSetup.exeOneDriveSetup.exeOneDrive.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName OneDriveSetup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer OneDriveSetup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName OneDriveSetup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer OneDrive.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName OneDrive.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer OneDriveSetup.exe -
Drops file in System32 directory 54 IoCs
Processes:
DrvInst.exeDrvInst.exeDrvInst.exepservice.exeDrvInst.exeDrvInst.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\System32\DriverStore\Temp\{d01912c4-ed5d-d34b-ad24-729bb7aab79f}\parsecvusba.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\parsecvusba.inf_amd64_dae154cc0d6f64e9\parsecvusba.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{20945e35-0b26-284c-975e-877adeeba874}\SET6C92.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{20945e35-0b26-284c-975e-877adeeba874}\SET6CA4.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b68047bc-15c6-ee45-be14-a7d3b95a6132}\mm.dll DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141 pservice.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d01912c4-ed5d-d34b-ad24-729bb7aab79f}\parsecvusba.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{20945e35-0b26-284c-975e-877adeeba874}\SET6C93.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\mm.inf_amd64_615d17457058f652\mm.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b68047bc-15c6-ee45-be14-a7d3b95a6132}\SET732A.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\mm.inf_amd64_615d17457058f652\mm.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\parsecvusba.inf_amd64_dae154cc0d6f64e9\parsecvusba.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\parsecvirtualds.inf_amd64_dabce1c8ac909510\parsecvirtualds.inf DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB pservice.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d01912c4-ed5d-d34b-ad24-729bb7aab79f}\SET6B1D.tmp DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DD342DC083F9240614EBCF70523A8426 pservice.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\parsecvusba.inf_amd64_dae154cc0d6f64e9\parsecvusba.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{20945e35-0b26-284c-975e-877adeeba874}\parsecvirtualds.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b68047bc-15c6-ee45-be14-a7d3b95a6132}\SET732C.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{d01912c4-ed5d-d34b-ad24-729bb7aab79f}\SET6B0B.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\parsecvusba.inf_amd64_dae154cc0d6f64e9\parsecvusba.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{20945e35-0b26-284c-975e-877adeeba874}\SET6C92.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b68047bc-15c6-ee45-be14-a7d3b95a6132} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\mm.inf_amd64_615d17457058f652\mm.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d01912c4-ed5d-d34b-ad24-729bb7aab79f}\SET6B1C.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{d01912c4-ed5d-d34b-ad24-729bb7aab79f}\SET6B1C.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d01912c4-ed5d-d34b-ad24-729bb7aab79f}\parsecvusba.inf DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{20945e35-0b26-284c-975e-877adeeba874}\SET6CA4.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b68047bc-15c6-ee45-be14-a7d3b95a6132}\mm.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{d01912c4-ed5d-d34b-ad24-729bb7aab79f}\SET6B1D.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\parsecvirtualds.inf_amd64_dabce1c8ac909510\parsecvirtualds.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\parsecvirtualds.inf_amd64_dabce1c8ac909510\parsecvirtualds.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{20945e35-0b26-284c-975e-877adeeba874} DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{b68047bc-15c6-ee45-be14-a7d3b95a6132}\SET732A.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{20945e35-0b26-284c-975e-877adeeba874}\parsecvirtualds.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b68047bc-15c6-ee45-be14-a7d3b95a6132}\SET732B.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{b68047bc-15c6-ee45-be14-a7d3b95a6132}\SET732B.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b68047bc-15c6-ee45-be14-a7d3b95a6132}\mm.inf DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\mm.inf_amd64_615d17457058f652\mm.cat DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d01912c4-ed5d-d34b-ad24-729bb7aab79f}\SET6B0B.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{20945e35-0b26-284c-975e-877adeeba874}\SET6C93.tmp DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB pservice.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141 pservice.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DD342DC083F9240614EBCF70523A8426 pservice.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d01912c4-ed5d-d34b-ad24-729bb7aab79f} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{20945e35-0b26-284c-975e-877adeeba874}\parsecvirtualds.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\parsecvirtualds.inf_amd64_dabce1c8ac909510\parsecvirtualds.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{b68047bc-15c6-ee45-be14-a7d3b95a6132}\SET732C.tmp DrvInst.exe -
Drops file in Program Files directory 64 IoCs
Processes:
parsec-vud.exeparsec-vdd.exeSalad-1.6.0.exeparsec-windows.exemsiexec.exedescription ioc process File created C:\Program Files\Parsec Virtual USB Adapter Driver\nefconw.exe parsec-vud.exe File created C:\Program Files\Parsec Virtual Display Driver\vdduninstall.bat parsec-vdd.exe File created C:\Program Files\Salad\locales\gu.pak Salad-1.6.0.exe File created C:\Program Files\Salad\locales\kn.pak Salad-1.6.0.exe File opened for modification C:\Program Files\Salad\resources\app.asar.unpacked Salad-1.6.0.exe File created C:\Program Files\Salad\SaladBowl\Salad.MixPanel.Client.pdb Salad-1.6.0.exe File created C:\Program Files\Salad\SaladOverlay\gui_injector.exe Salad-1.6.0.exe File created C:\Program Files\Parsec\vdd\parsec-vdd.exe parsec-windows.exe File created C:\Program Files\Salad\snapshot_blob.bin Salad-1.6.0.exe File created C:\Program Files\Salad\locales\lv.pak Salad-1.6.0.exe File created C:\Program Files\Salad\locales\ru.pak Salad-1.6.0.exe File created C:\Program Files\Salad\resources\assets\icons\DegradedBackground.png Salad-1.6.0.exe File created C:\Program Files\Salad\SaladBowl\Salad.NamedPipes.pdb Salad-1.6.0.exe File created C:\Program Files\Salad\locales\sv.pak Salad-1.6.0.exe File created C:\Program Files\Parsec Virtual USB Adapter Driver\parsecvusba\parsecvusba.inf parsec-vud.exe File created C:\Program Files\Salad\locales\ca.pak Salad-1.6.0.exe File created C:\Program Files\Salad\locales\sw.pak Salad-1.6.0.exe File created C:\Program Files\Salad\locales\zh-CN.pak Salad-1.6.0.exe File created C:\Program Files\Salad\SaladBowl\Salad.Bowl.Service.dll.config Salad-1.6.0.exe File created C:\Program Files\Salad\SaladBowl\Salad.WorkloadLib.pdb Salad-1.6.0.exe File created C:\Program Files\Parsec\wscripts\service-install.vbs parsec-windows.exe File created C:\Program Files\Salad\icudtl.dat Salad-1.6.0.exe File created C:\Program Files\Salad\v8_context_snapshot.bin Salad-1.6.0.exe File created C:\Program Files\Salad\SaladBootstrapper\appsettings.json Salad-1.6.0.exe File created C:\Program Files\Salad\resources\assets\icons\PausedBackground.png Salad-1.6.0.exe File created C:\Program Files\Parsec\vusb\parsec-vud.exe parsec-windows.exe File created C:\Program Files\Salad\locales\af.pak Salad-1.6.0.exe File created C:\Program Files\Salad\locales\hu.pak Salad-1.6.0.exe File created C:\Program Files\Salad\locales\lt.pak Salad-1.6.0.exe File opened for modification C:\Program Files\Salad\resources\app.asar.unpacked\node_modules\win-verify-signature Salad-1.6.0.exe File opened for modification C:\Program Files\Salad\resources\app.asar.unpacked\node_modules\win-verify-signature\build\Release Salad-1.6.0.exe File created C:\Program Files\Salad\SaladOverlay\saladGUIlib.dll Salad-1.6.0.exe File created C:\Program Files\Salad\Salad.exe Salad-1.6.0.exe File created C:\Program Files\Salad\locales\ar.pak Salad-1.6.0.exe File created C:\Program Files\Salad\locales\ms.pak Salad-1.6.0.exe File created C:\Program Files\Salad\locales\sr.pak Salad-1.6.0.exe File opened for modification C:\Program Files\Salad\resources Salad-1.6.0.exe File opened for modification C:\Program Files\Salad\resources\assets Salad-1.6.0.exe File created C:\Program Files\Salad\SaladBowl\Salad.Bowl.Service.exe Salad-1.6.0.exe File created C:\Program Files\Salad\SaladBowl\web.config Salad-1.6.0.exe File created C:\Program Files\Parsec Virtual USB Adapter Driver\parsecvirtualds\parsecvirtualds.sys parsec-vud.exe File created C:\Program Files\Parsec Virtual Display Driver\vddinstall.bat parsec-vdd.exe File created C:\Program Files\Salad\locales\fil.pak Salad-1.6.0.exe File created C:\Program Files\Salad\locales\ko.pak Salad-1.6.0.exe File created C:\Program Files\Salad\locales\th.pak Salad-1.6.0.exe File created C:\Program Files\Salad\SaladBowl\Matrix.Grpc.Client.pdb Salad-1.6.0.exe File created C:\Program Files\Salad\SaladOverlay\PresentationNative_cor3.dll Salad-1.6.0.exe File created C:\Program Files (x86)\Windows\Error file remover\Windows Logoff Sound.wav msiexec.exe File created C:\Program Files\Salad\SaladBootstrapper\Salad.Lib.Bootstrap.pdb Salad-1.6.0.exe File created C:\Program Files\Salad\SaladOverlay\SaladMessage.exe Salad-1.6.0.exe File created C:\Program Files\Parsec Virtual USB Adapter Driver\uninstall.exe parsec-vud.exe File created C:\Program Files\Salad\locales\id.pak Salad-1.6.0.exe File created C:\Program Files\Salad\locales\mr.pak Salad-1.6.0.exe File created C:\Program Files\Salad\resources\app.asar Salad-1.6.0.exe File created C:\Program Files\Salad\resources\assets\icon.png Salad-1.6.0.exe File created C:\Program Files\Salad\resources\assets\icons\RunningBackground.png Salad-1.6.0.exe File opened for modification C:\Program Files (x86)\Windows\Error file remover\Windows Logoff Sound.wav msiexec.exe File created C:\Program Files\Parsec\wscripts\service-remove.vbs parsec-windows.exe File created C:\Program Files\Parsec Virtual Display Driver\nefconw.exe parsec-vdd.exe File created C:\Program Files\Salad\locales\el.pak Salad-1.6.0.exe File created C:\Program Files\Salad\locales\vi.pak Salad-1.6.0.exe File created C:\Program Files\Salad\resources\assets\icon.svg Salad-1.6.0.exe File created C:\Program Files\Salad\SaladBowl\Matrix.Rest.Client.pdb Salad-1.6.0.exe File created C:\Program Files\Salad\wsl\salad-enterprise-linux.tar.gz Salad-1.6.0.exe -
Drops file in Windows directory 64 IoCs
Processes:
msiexec.exeMsiExec.exeDrvInst.exenefconw.exeDrvInst.exeDrvInst.exeDrvInst.exeDrvInst.exenefconw.exeDrvInst.exeMsiExec.exenefconw.exenefconw.exeDrvInst.exeSalad.exesvchost.exedescription ioc process File opened for modification C:\Windows\Installer\MSI157E.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFBFD628445BC1D590.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF752F031250DB881B.TMP msiexec.exe File created C:\Windows\SystemTemp\~DFB6A4005021BBB2A3.TMP msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIDA41.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF957D0E2506ADA0B1.TMP msiexec.exe File opened for modification C:\Windows\Tasks\sys.job MsiExec.exe File opened for modification C:\Windows\Installer\MSI1769.tmp msiexec.exe File created C:\Windows\inf\oem4.inf DrvInst.exe File created C:\Windows\INF\c_display.PNF nefconw.exe File created C:\Windows\Installer\SourceHash{C452D4E2-DE24-48B6-B5C3-ACB240A01606} msiexec.exe File opened for modification C:\Windows\inf\oem5.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSID916.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID9A4.tmp msiexec.exe File opened for modification C:\Windows\Installer\e7ed74b.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI163E.tmp msiexec.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\SystemTemp\~DFD305224E8AFEF959.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIDACF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI146E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI14CE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI15BE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID835.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID875.tmp msiexec.exe File created C:\Windows\inf\oem5.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSID905.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI150E.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log nefconw.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSID7A5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID8A5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID7F4.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF235D5780FD82BBF0.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSID945.tmp msiexec.exe File created C:\Windows\Installer\e7ed74b.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI149E.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem4.inf DrvInst.exe File created C:\Windows\Tasks\sys.job MsiExec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI15BD.tmp msiexec.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\Installer\e7ed747.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DF6A358AFDC1CFE03D.TMP msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log nefconw.exe File created C:\Windows\Installer\e7ed747.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI151F.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF914A5D2E7FC73916.TMP msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log nefconw.exe File opened for modification C:\Windows\Installer\MSID855.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\SystemTemp Salad.exe File opened for modification C:\Windows\Installer\MSID8F4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI15FF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI16CC.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI15DE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID815.tmp msiexec.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid process 128 sc.exe 3764 sc.exe 464 sc.exe 5140 sc.exe 5652 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exedescription ioc process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
nefconw.exenefconc.exeDrvInst.exenefconw.exeDrvInst.exeDrvInst.exesvchost.exeDrvInst.exeDrvInst.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID nefconw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 nefconc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 nefconw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom nefconw.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom nefconw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 nefconw.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs nefconw.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom nefconw.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs nefconw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 nefconw.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs nefconw.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom nefconw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom nefconw.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters DrvInst.exe -
Checks processor information in registry 2 TTPs 17 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
OneDrive.exeOfficeClickToRun.exeDiscord.exeOfficeClickToRun.exerunonce.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 OneDrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString Discord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Discord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz Discord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz OneDrive.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 OfficeClickToRun.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Discord.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Discord.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Discord.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 Discord.exe -
Enumerates system info in registry 2 TTPs 45 IoCs
Processes:
chrome.exemsedge.exemsedge.exeTelegram.exeTelegram.exeOfficeClickToRun.exeTelegram.exeTelegram.exeTelegram.exeOfficeClickToRun.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Telegram.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Telegram.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU OfficeClickToRun.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ Telegram.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ Telegram.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Telegram.exe -
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1604 taskkill.exe 5820 taskkill.exe 5152 taskkill.exe 5248 taskkill.exe -
Processes:
OneDrive.exeOneDrive.exeOneDriveSetup.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Internet Explorer\Main OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION OneDrive.exe Set value (int) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\OneDrive.exe = "11000" OneDriveSetup.exe Set value (int) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\OneDrive.exe = "11000" OneDrive.exe Set value (int) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" OneDrive.exe Set value (int) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\OneDrive.exe = "11000" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION OneDriveSetup.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
DrvInst.exepservice.exeparsecd.exeDrvInst.exeparsecd.exeDrvInst.exechrome.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates pservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates pservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates pservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs pservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs pservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs pservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates pservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs pservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed pservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root parsecd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs pservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates pservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs pservice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs pservice.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643011463381038" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe -
Modifies registry class 64 IoCs
Processes:
OneDrive.exeOneDrive.exeOneDriveSetup.exeparsec-windows.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{2692D1F2-2C7C-4AE0-8E73-8F37736C912D}\TypeLib\ = "{909A6CCD-6810-46C4-89DF-05BE7EB61E6C}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{b5c25645-7426-433f-8a5f-42b7ff27a7b2}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7} OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{EA23A664-A558-4548-A8FE-A6B94D37C3CF}\TypeLib OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\FileCoAuth.exe\"" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{2692D1F2-2C7C-4AE0-8E73-8F37736C912D}\ = "IFileSyncClient7" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\SyncEngineStorageProviderHandlerProxy.SyncEngineStorageProviderHandlerProxy.1\ = "SyncEngineStorageProviderHandlerProxy Class" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{0299ECA9-80B6-43C8-A79A-FB1C5F19E7D8}\ = "IFileSyncClient3" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{1B71F23B-E61F-45C9-83BA-235D55F50CF9}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{AEEBAD4E-3E0A-415B-9B94-19C499CD7B6A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Directory\shellex\ContextMenuHandlers\ FileSyncEx OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\ProgID OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{869BDA08-7ACF-42B8-91AE-4D8D597C0B33}\ = "ISyncEngineBandwidthLimiter" OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC} OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{0299ECA9-80B6-43C8-A79A-FB1C5F19E7D8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\TypeLib\{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}\1.0\FLAGS\ = "0" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\CLSID\{82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E}\InprocServer32\ThreadingModel = "Apartment" OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{e9de26a1-51b2-47b4-b1bf-c87059cc02a7}\TypeLib OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\SyncEngineStorageProviderHandlerProxy.SyncEngineStorageProviderHandlerProxy\CurVer\ = "SyncEngineStorageProviderHandlerProxy.SyncEngineStorageProviderHandlerProxy.1" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\VersionIndependentProgID\ = "SyncEngineFileInfoProvider.SyncEngineFileInfoProvider" OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_CLASSES\WOW6432NODE\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}\INPROCSERVER32 OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{5d65dd0d-81bf-4ff4-aeea-6effb445cb3f}\ProxyStubClsid32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{2F12C599-7AA5-407A-B898-09E6E4ED2D1E}\TypeLib\Version = "1.0" OneDrive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\parsecd\shell\open\command parsec-windows.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\odopen\DefaultIcon OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{0f872661-c863-47a4-863f-c065c182858a}\TypeLib OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\odopen\shell\open\command OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\FileSyncShell.dll" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}\InprocServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\CLSID\{47E6DCAF-41F8-441C-BD0E-A50D5FE6C4D1}\ProgID\ = "NucleusToastActivator.NucleusToastActivator.1" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{EE15BBBB-9E60-4C52-ABCB-7540FF3DF6B3}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{AF60000F-661D-472A-9588-F062F6DB7A0E} OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{8D3F8F15-1DE1-4662-BF93-762EABE988B2}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}\ = "FileSyncOutOfProcServices Class" OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_CLASSES\WOW6432NODE\INTERFACE\{0D4E4444-CB20-4C2B-B8B2-94E5656ECAE8}\PROXYSTUBCLSID32 OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{1196AE48-D92B-4BC7-85DE-664EC3F761F1} OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{9D613F8A-B30E-4938-8490-CB5677701EBF}\TypeLib\Version = "1.0" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{fac14b75-7862-4ceb-be41-f53945a61c17} OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\SyncEngineFileInfoProvider.SyncEngineFileInfoProvider\CLSID\ = "{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{2B865677-AC3A-43BD-B9E7-BF6FCD3F0596}\ = "IFileSyncClient11" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{AEEBAD4E-3E0A-415B-9B94-19C499CD7B6A}\TypeLib OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\FileSyncClient.AutoPlayHandler OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\CLSID\{82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\mssharepointclient OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{869BDA08-7ACF-42B8-91AE-4D8D597C0B33} OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\ProgID OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\TypeLib\{4B1C80DA-FA45-468F-B42B-46496BDBE0C5}\1.0\FLAGS OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{8D3F8F15-1DE1-4662-BF93-762EABE988B2} OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{2387C6BD-9A36-41A2-88ED-FF731E529384}\ProxyStubClsid32 OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{2F12C599-7AA5-407A-B898-09E6E4ED2D1E}\ProxyStubClsid32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\CLSID\{20894375-46AE-46E2-BAFD-CB38975CDCE6}\ = "ShareHandler Class" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{EA23A664-A558-4548-A8FE-A6B94D37C3CF}\TypeLib\Version = "1.0" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}\ = "UpToDateCloudOverlayHandler Class" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\TypeLib\{C9F3F6BB-3172-4CD8-9EB7-37C9BE601C87}\1.0\FLAGS\ = "0" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\21.220.1024.0005\\amd64\\FileSyncShell64.dll" OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\odopen\URL Protocol OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{2EB31403-EBE0-41EA-AE91-A1953104EA55}\TypeLib\Version = "1.0" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\odopen\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe\" /url:\"%1\"" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{8B9F14F4-9559-4A3F-B7D0-312E992B6D98} OneDriveSetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\Interface\{5d65dd0d-81bf-4ff4-aeea-6effb445cb3f}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{8D3F8F15-1DE1-4662-BF93-762EABE988B2}\TypeLib OneDrive.exe Key deleted \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\TypeLib\{C9F3F6BB-3172-4CD8-9EB7-37C9BE601C87} OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Interface\{869BDA08-7ACF-42B8-91AE-4D8D597C0B33}\ProxyStubClsid32 OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\WOW6432Node\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC}\TypeLib OneDrive.exe -
Modifies registry key 1 TTPs 5 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exepid process 4012 reg.exe 1908 reg.exe 3816 reg.exe 4416 reg.exe 3784 reg.exe -
NTFS ADS 64 IoCs
Processes:
Telegram.exemsedge.exemsedge.exemsedge.exemsedge.exechrome.exedescription ioc process File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_135116.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_120124.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_134432.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_120109.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_094443.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_094844.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_094846.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_094709.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_115921.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_134831.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_115910.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_120011.jpg:Zone.Identifier Telegram.exe File opened for modification C:\Users\Admin\Downloads\DiscordSetup.exe:Zone.Identifier msedge.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_094630.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_134654.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_120016.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_135111.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_135108.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_115903.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_134950.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_135059.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_094827.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_094901.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_115849.jpg:Zone.Identifier Telegram.exe File opened for modification C:\Users\Admin\Downloads\tportable-x64.5.2.0.zip:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\parsec-windows.exe:Zone.Identifier msedge.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_094645.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_115948.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_094651.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_094750.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_115927.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_094923.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_134652.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_120106.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_135057.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_120021.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_134933.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_120039.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_134439.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_120000.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_120028.jpg:Zone.Identifier Telegram.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 116763.crdownload:SmartScreen msedge.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_095041.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_094511.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_115931.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_115916.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_120004.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_094529.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_135106.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_134818.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_115859.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_120008.jpg:Zone.Identifier Telegram.exe File opened for modification C:\Users\Admin\Downloads\Salad-1.6.0.exe:Zone.Identifier chrome.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_135110.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_134655.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_134829.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_115925.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_115937.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_120115.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_115926.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_115906.jpg:Zone.Identifier Telegram.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_120034.jpg:Zone.Identifier Telegram.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 495541.crdownload:SmartScreen msedge.exe File created C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_115902.jpg:Zone.Identifier Telegram.exe -
Opens file in notepad (likely ransom note) 6 IoCs
Processes:
NOTEPAD.EXENOTEPAD.EXENOTEPAD.EXENOTEPAD.EXENOTEPAD.EXENOTEPAD.EXEpid process 5024 NOTEPAD.EXE 4628 NOTEPAD.EXE 4036 NOTEPAD.EXE 1776 NOTEPAD.EXE 5404 NOTEPAD.EXE 3148 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 10 IoCs
Processes:
Telegram.exeTelegram.exeTelegram.exeTelegram.exeOneDrive.exeOneDrive.exeparsecd.exeTelegram.exevlc.exepid process 2872 Telegram.exe 3616 Telegram.exe 4000 Telegram.exe 4548 Telegram.exe 1364 OneDrive.exe 5364 OneDrive.exe 492 parsecd.exe 492 parsecd.exe 5224 Telegram.exe 5976 vlc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exemsedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exeOneDrive.exeOneDriveSetup.exeOneDriveSetup.exeOneDrive.exemsedge.exepid process 1156 powershell.exe 1156 powershell.exe 4700 powershell.exe 4700 powershell.exe 932 powershell.exe 932 powershell.exe 3816 powershell.exe 3816 powershell.exe 2412 msedge.exe 2412 msedge.exe 664 msedge.exe 664 msedge.exe 1032 identity_helper.exe 1032 identity_helper.exe 1352 msedge.exe 1352 msedge.exe 4864 msedge.exe 4864 msedge.exe 2904 msedge.exe 2904 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4296 msedge.exe 4296 msedge.exe 1364 OneDrive.exe 1364 OneDrive.exe 3056 OneDriveSetup.exe 3056 OneDriveSetup.exe 3056 OneDriveSetup.exe 3056 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 4588 OneDriveSetup.exe 5364 OneDrive.exe 5364 OneDrive.exe 5948 msedge.exe 5948 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 8 IoCs
Processes:
Telegram.exeTelegram.exeTelegram.exeparsecd.exesv.exemsedge.exeTelegram.exevlc.exepid process 3616 Telegram.exe 4000 Telegram.exe 4548 Telegram.exe 492 parsecd.exe 1220 sv.exe 2412 msedge.exe 5224 Telegram.exe 5976 vlc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid 4 4 -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
Processes:
msedge.exechrome.exepid process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 2412 msedge.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe 252 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
sv.exepowershell.exepowershell.exepowershell.exepowershell.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exesvhost.exeAUDIODG.EXEsvhost.exesvhost.exesvhost.exesvhost.exesvhost.exeDiscord.exesvhost.exeOneDriveSetup.exeOneDriveSetup.exesvhost.exesvchost.exesvhost.exesvhost.exesvhost.exetaskkill.exesvchost.exenefconw.exeDrvInst.exeDrvInst.exeDrvInst.exewevtutil.exewevtutil.exenefconw.exeDrvInst.exewevtutil.exewevtutil.exeAUDIODG.EXEparsecd.exesvhost.exedescription pid process Token: SeDebugPrivilege 1220 sv.exe Token: SeDebugPrivilege 1156 powershell.exe Token: SeDebugPrivilege 4700 powershell.exe Token: SeDebugPrivilege 932 powershell.exe Token: SeDebugPrivilege 3816 powershell.exe Token: SeDebugPrivilege 1220 sv.exe Token: SeDebugPrivilege 4108 svhost.exe Token: SeDebugPrivilege 2324 svhost.exe Token: SeDebugPrivilege 3232 svhost.exe Token: SeDebugPrivilege 1532 svhost.exe Token: SeDebugPrivilege 3704 svhost.exe Token: SeDebugPrivilege 3420 svhost.exe Token: SeDebugPrivilege 4832 svhost.exe Token: SeDebugPrivilege 3232 svhost.exe Token: SeDebugPrivilege 2748 svhost.exe Token: 33 1864 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1864 AUDIODG.EXE Token: SeDebugPrivilege 4000 svhost.exe Token: SeDebugPrivilege 3892 svhost.exe Token: SeDebugPrivilege 3000 svhost.exe Token: SeDebugPrivilege 1908 svhost.exe Token: SeDebugPrivilege 3284 svhost.exe Token: SeShutdownPrivilege 2024 Discord.exe Token: SeCreatePagefilePrivilege 2024 Discord.exe Token: SeDebugPrivilege 4888 svhost.exe Token: SeIncreaseQuotaPrivilege 3056 OneDriveSetup.exe Token: SeIncreaseQuotaPrivilege 4588 OneDriveSetup.exe Token: SeDebugPrivilege 3212 svhost.exe Token: SeManageVolumePrivilege 5032 svchost.exe Token: SeDebugPrivilege 1256 svhost.exe Token: SeDebugPrivilege 5428 svhost.exe Token: SeDebugPrivilege 5400 svhost.exe Token: SeDebugPrivilege 1604 taskkill.exe Token: SeAuditPrivilege 5860 svchost.exe Token: SeSecurityPrivilege 5860 svchost.exe Token: SeLoadDriverPrivilege 5908 nefconw.exe Token: SeRestorePrivilege 3820 DrvInst.exe Token: SeBackupPrivilege 3820 DrvInst.exe Token: SeLoadDriverPrivilege 3820 DrvInst.exe Token: SeLoadDriverPrivilege 3820 DrvInst.exe Token: SeLoadDriverPrivilege 3820 DrvInst.exe Token: SeRestorePrivilege 4428 DrvInst.exe Token: SeBackupPrivilege 4428 DrvInst.exe Token: SeRestorePrivilege 1164 DrvInst.exe Token: SeBackupPrivilege 1164 DrvInst.exe Token: SeSecurityPrivilege 6040 wevtutil.exe Token: SeBackupPrivilege 6040 wevtutil.exe Token: SeSecurityPrivilege 4924 wevtutil.exe Token: SeBackupPrivilege 4924 wevtutil.exe Token: SeLoadDriverPrivilege 6120 nefconw.exe Token: SeRestorePrivilege 5440 DrvInst.exe Token: SeBackupPrivilege 5440 DrvInst.exe Token: SeLoadDriverPrivilege 5440 DrvInst.exe Token: SeLoadDriverPrivilege 5440 DrvInst.exe Token: SeLoadDriverPrivilege 5440 DrvInst.exe Token: SeSecurityPrivilege 4428 wevtutil.exe Token: SeBackupPrivilege 4428 wevtutil.exe Token: SeSecurityPrivilege 5736 wevtutil.exe Token: SeBackupPrivilege 5736 wevtutil.exe Token: 33 5896 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5896 AUDIODG.EXE Token: 33 492 parsecd.exe Token: SeIncBasePriorityPrivilege 492 parsecd.exe Token: SeDebugPrivilege 2920 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exeTelegram.exeTelegram.exepid process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2872 Telegram.exe 2872 Telegram.exe 2872 Telegram.exe 2872 Telegram.exe 2872 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
msedge.exeTelegram.exeTelegram.exepid process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2872 Telegram.exe 2872 Telegram.exe 2872 Telegram.exe 2872 Telegram.exe 2872 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
Processes:
MiniSearchHost.exeTelegram.exeTelegram.exeTelegram.exeTelegram.exeOneDrive.exeOneDrive.exeOfficeClickToRun.exeOfficeClickToRun.exeparsec-windows.exeparsec-vud.exenefconc.exenefconw.exenefconw.exenefconw.exeparsec-vdd.exenefconw.exenefconw.exenefconw.exeparsecd.exeparsecd.exeTelegram.exevlc.exeSalad-1.6.0.exeSalad.Bowl.Service.exepid process 932 MiniSearchHost.exe 2872 Telegram.exe 2872 Telegram.exe 3616 Telegram.exe 3616 Telegram.exe 4000 Telegram.exe 4000 Telegram.exe 4000 Telegram.exe 4000 Telegram.exe 4548 Telegram.exe 4548 Telegram.exe 1364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 5364 OneDrive.exe 236 OfficeClickToRun.exe 2500 OfficeClickToRun.exe 3668 parsec-windows.exe 2328 parsec-vud.exe 3928 nefconc.exe 5008 nefconw.exe 5908 nefconw.exe 5244 nefconw.exe 3572 parsec-vdd.exe 228 nefconw.exe 3276 nefconw.exe 6120 nefconw.exe 5304 parsecd.exe 492 parsecd.exe 5224 Telegram.exe 5224 Telegram.exe 5224 Telegram.exe 5224 Telegram.exe 5976 vlc.exe 6040 Salad-1.6.0.exe 2848 Salad.Bowl.Service.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
sv.exemsedge.exedescription pid process target process PID 1220 wrote to memory of 1156 1220 sv.exe powershell.exe PID 1220 wrote to memory of 1156 1220 sv.exe powershell.exe PID 1220 wrote to memory of 4700 1220 sv.exe powershell.exe PID 1220 wrote to memory of 4700 1220 sv.exe powershell.exe PID 1220 wrote to memory of 932 1220 sv.exe powershell.exe PID 1220 wrote to memory of 932 1220 sv.exe powershell.exe PID 1220 wrote to memory of 3816 1220 sv.exe powershell.exe PID 1220 wrote to memory of 3816 1220 sv.exe powershell.exe PID 1220 wrote to memory of 2860 1220 sv.exe schtasks.exe PID 1220 wrote to memory of 2860 1220 sv.exe schtasks.exe PID 2412 wrote to memory of 4768 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 4768 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 2028 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 664 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 664 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 3712 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 3712 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 3712 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 3712 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 3712 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 3712 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 3712 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 3712 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 3712 2412 msedge.exe msedge.exe PID 2412 wrote to memory of 3712 2412 msedge.exe msedge.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\sv.exe"C:\Users\Admin\AppData\Local\Temp\sv.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\sv.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'sv.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svhost" /tr "C:\ProgramData\svhost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://exmple.com/2⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8ddd23cb8,0x7ff8ddd23cc8,0x7ff8ddd23cd83⤵
-
C:\Users\Admin\AppData\Local\Temp\wckjxu.exe"C:\Users\Admin\AppData\Local\Temp\wckjxu.exe"2⤵
- Enumerates connected drives
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\wckjxu.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "3⤵
- Enumerates connected drives
-
C:\Users\Admin\AppData\Local\Temp\ofzhtx.exe"C:\Users\Admin\AppData\Local\Temp\ofzhtx.exe"2⤵
- Enumerates connected drives
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\ofzhtx.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "3⤵
- Enumerates connected drives
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8ddd23cb8,0x7ff8ddd23cc8,0x7ff8ddd23cd82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1880 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3428 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3848 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6376 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6648 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1232 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1988 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6620 /prefetch:12⤵
-
C:\Users\Admin\Desktop\Telegram\Telegram.exe"C:\Users\Admin\Desktop\Telegram\Telegram.exe" -- "tg://resolve/?domain=CopilotOfficialBot"2⤵
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6788 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6920 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6104 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7032 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\DiscordSetup.exe"C:\Users\Admin\Downloads\DiscordSetup.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe"C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe" --install .3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Discord\app-1.0.9152\Discord.exe"C:\Users\Admin\AppData\Local\Discord\app-1.0.9152\Discord.exe" --squirrel-install 1.0.91524⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Discord\app-1.0.9152\Discord.exeC:\Users\Admin\AppData\Local\Discord\app-1.0.9152\Discord.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\discord /prefetch:4 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\discord\Crashpad --url=https://f.a.k/e --annotation=_productName=discord --annotation=_version=1.0.9152 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=30.1.0 --initial-client-data=0x52c,0x534,0x538,0x520,0x53c,0x7ff6b29f9218,0x7ff6b29f9224,0x7ff6b29f92305⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Discord\Update.exeC:\Users\Admin\AppData\Local\Discord\Update.exe --createShortcut Discord.exe --setupIcon C:\Users\Admin\AppData\Local\Discord\app.ico5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Discord\app-1.0.9152\Discord.exe"C:\Users\Admin\AppData\Local\Discord\app-1.0.9152\Discord.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1880,i,7750342338854941562,9044964173219208517,262144 --enable-features=kWebSQLAccess --disable-features=HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1892 /prefetch:25⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Discord\app-1.0.9152\Discord.exe"C:\Users\Admin\AppData\Local\Discord\app-1.0.9152\Discord.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\discord" --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --field-trial-handle=2252,i,7750342338854941562,9044964173219208517,262144 --enable-features=kWebSQLAccess --disable-features=HardwareMediaKeyHandling,MediaSessionService,SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2248 /prefetch:35⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Discord /d "\"C:\Users\Admin\AppData\Local\Discord\Update.exe\" --processStart Discord.exe" /f5⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord /ve /d "URL:Discord Protocol" /f5⤵
- Modifies registry key
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord /v "URL Protocol" /f5⤵
- Modifies registry key
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord\DefaultIcon /ve /d "\"C:\Users\Admin\AppData\Local\Discord\app-1.0.9152\Discord.exe\",-1" /f5⤵
- Modifies registry key
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe add HKCU\Software\Classes\Discord\shell\open\command /ve /d "\"C:\Users\Admin\AppData\Local\Discord\app-1.0.9152\Discord.exe\" --url -- \"%1\"" /f5⤵
- Modifies registry key
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3084 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6940 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6700 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7084 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7356 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7060 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7440 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6752 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3456 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6904 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\parsec-windows.exe"C:\Users\Admin\Downloads\parsec-windows.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\system32\wscript.exe" "C:\Program Files\Parsec\wscripts\service-kill-parsec.vbs"3⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" control Parsec 2004⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /IM parsecd.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\system32\wscript.exe" "C:\Program Files\Parsec\wscripts\service-remove.vbs"3⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" stop Parsec4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" delete Parsec4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\system32\wscript.exe" "C:\Program Files\Parsec\wscripts\firewall-remove.vbs"3⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall delete rule name=Parsec4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall delete rule name=parsec.exe4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall delete rule name=parsecd.exe4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\system32\wscript.exe" "C:\Program Files\Parsec\wscripts\legacy-cleanup.vbs"3⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /tn ParsecTeams /f4⤵
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\system32\wscript.exe" "C:\Program Files\Parsec\wscripts\service-install.vbs" "C:\Program Files\Parsec\pservice.exe"3⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create Parsec binPath= "\"C:\Program Files\Parsec\pservice.exe\"" start= auto type= interact type= own4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start Parsec4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\system32\wscript.exe" "C:\Program Files\Parsec\wscripts\firewall-add.vbs" "C:\Program Files\Parsec\parsecd.exe"3⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name=Parsec dir=in action=allow program="C:\Program Files\Parsec\parsecd.exe" enable=yes profile=public,private,domain4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Program Files\Parsec\vusb\parsec-vud.exe" /S3⤵
-
C:\Program Files\Parsec\vusb\parsec-vud.exe"C:\Program Files\Parsec\vusb\parsec-vud.exe" /S4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Program Files\Parsec Virtual USB Adapter Driver\nefconc.exe" --find-hwid --hardware-id VUSBA5⤵
-
C:\Program Files\Parsec Virtual USB Adapter Driver\nefconc.exe"C:\Program Files\Parsec Virtual USB Adapter Driver\nefconc.exe" --find-hwid --hardware-id VUSBA6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Parsec Virtual USB Adapter Driver\vusbinstall.bat""5⤵
-
C:\Program Files\Parsec Virtual USB Adapter Driver\nefconw.exenefconw.exe --create-device-node --hardware-id Root\Parsec\VUSBA --class-name USB --class-guid "36fc9e60-c465-11cf-8056-444553540000"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Parsec Virtual USB Adapter Driver\nefconw.exenefconw.exe --install-driver --inf-path ".\parsecvusba\parsecvusba.inf"6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Parsec Virtual USB Adapter Driver\nefconw.exenefconw.exe --inf-default-install --inf-path ".\parsecvirtualds\parsecvirtualds.inf"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r7⤵
- Checks processor information in registry
-
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o8⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Program Files\Parsec\vdd\parsec-vdd.exe" /S3⤵
-
C:\Program Files\Parsec\vdd\parsec-vdd.exe"C:\Program Files\Parsec\vdd\parsec-vdd.exe" /S4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\wevtutil.exewevtutil um "C:\Program Files\Parsec Virtual Display Driver\mm.man"5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\wevtutil.exewevtutil um "C:\Program Files\Parsec Virtual Display Driver\mm.man" /fromwow646⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Parsec Virtual Display Driver\vddinstall.bat""5⤵
-
C:\Program Files\Parsec Virtual Display Driver\nefconw.exe.\nefconw.exe --remove-device-node --hardware-id Root\Parsec\VDA --class-guid "4D36E968-E325-11CE-BFC1-08002BE10318"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Parsec Virtual Display Driver\nefconw.exe.\nefconw.exe --create-device-node --class-name Display --class-guid "4D36E968-E325-11CE-BFC1-08002BE10318" --hardware-id Root\Parsec\VDA6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Parsec Virtual Display Driver\nefconw.exe.\nefconw.exe --install-driver --inf-path ".\driver\mm.inf"6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\wevtutil.exewevtutil im "C:\Program Files\Parsec Virtual Display Driver\mm.man"5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\wevtutil.exewevtutil im "C:\Program Files\Parsec Virtual Display Driver\mm.man" /fromwow646⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Parsec\parsecd.exe"C:\Program Files\Parsec\parsecd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7304 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7904 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7612 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6896 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=64 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7796 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=65 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1232 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=67 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8152 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=68 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=69 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,3270999643199435324,16677345031288354869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=70 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8104 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Desktop\Telegram\Telegram.exe"C:\Users\Admin\Desktop\Telegram\Telegram.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Desktop\Telegram\Telegram.exe"C:\Users\Admin\Desktop\Telegram\Telegram.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://uquiz.com/quiz/fevhEE?p=49458802⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8ddd23cb8,0x7ff8ddd23cc8,0x7ff8ddd23cd83⤵
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E8 0x00000000000004D41⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Desktop\Telegram\Telegram.exe"C:\Users\Admin\Desktop\Telegram\Telegram.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"1⤵
- Modifies system executable filetype association
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe" /update /restart2⤵
- Executes dropped EXE
- Checks system information in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe /update /restart /peruser /childprocess /extractFilesWithLessThreadCount /renameReplaceOneDriveExe /renameReplaceODSUExe /removeNonCurrentVersions /enableODSUReportingMode3⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Checks system information in the registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe/updateInstalled /background4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Checks system information in the registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
- Loads dropped DLL
-
C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe"C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exeOfficeClickToRun.exe platform=2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.OneDriveSync_8wekyb3d8bbwe1⤵
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
- Loads dropped DLL
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
- Loads dropped DLL
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Parsec\pservice.exe"C:\Program Files\Parsec\pservice.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Program Files\Parsec\parsecd.exe"C:\Program Files\Parsec\parsecd.exe" SERVICE_LAUNCHED_V92⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies data under HKEY_USERS
-
C:\Program Files\Parsec\parsecd.exe"C:\Program Files\Parsec\parsecd.exe" SERVICE_LAUNCHED_V92⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\rundll32.exerundll32 url.dll,FileProtocolHandler https://dash.parsec.app/signup3⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dash.parsec.app/signup4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8ddd23cb8,0x7ff8ddd23cc8,0x7ff8ddd23cd85⤵
-
C:\Windows\system32\rundll32.exerundll32 url.dll,FileProtocolHandler https://dash.parsec.app/forgot3⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dash.parsec.app/forgot4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xa0,0x10c,0x7ff8ddd23cb8,0x7ff8ddd23cc8,0x7ff8ddd23cd85⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{19835dde-db14-d24b-8ae5-19ee549e9d51}\parsecvusba.inf" "9" "464910f03" "0000000000000150" "WinSta0\Default" "0000000000000160" "208" "C:\Program Files\Parsec Virtual USB Adapter Driver\parsecvusba"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "201" "ROOT\USB\0000" "C:\Windows\System32\DriverStore\FileRepository\parsecvusba.inf_amd64_dae154cc0d6f64e9\parsecvusba.inf" "oem3.inf:*:*:0.2.8.0:Root\Parsec\VUSBA," "464910f03" "0000000000000150" "afe2"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{2c067fa6-bd61-be46-951f-26ad8e549183}\parsecvirtualds.inf" "9" "43799a85b" "0000000000000150" "WinSta0\Default" "0000000000000170" "208" "C:\Program Files\Parsec Virtual USB Adapter Driver\parsecvirtualds"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "8" "4" "C:\Windows\System32\DriverStore\FileRepository\parsecvirtualds.inf_amd64_dabce1c8ac909510\parsecvirtualds.inf" "0" "43799a85b" "0000000000000170" "WinSta0\Default"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "8" "4" "C:\Windows\System32\DriverStore\FileRepository\parsecvirtualds.inf_amd64_dabce1c8ac909510\parsecvirtualds.inf" "0" "4fea13f63" "0000000000000164" "WinSta0\Default"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{ff4ffc0c-edaa-0b40-9a7a-b4742b56a5be}\mm.inf" "9" "484386e17" "0000000000000180" "WinSta0\Default" "000000000000015C" "208" "C:\Program Files\Parsec Virtual Display Driver\driver"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "201" "ROOT\DISPLAY\0000" "C:\Windows\System32\DriverStore\FileRepository\mm.inf_amd64_615d17457058f652\mm.inf" "oem5.inf:*:*:0.45.0.0:Root\Parsec\VDA," "484386e17" "0000000000000180" "afe2"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E8 0x00000000000004D41⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\rmail.txt1⤵
- Opens file in notepad (likely ransom note)
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\rmail.txt1⤵
- Opens file in notepad (likely ransom note)
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\rmail.txt1⤵
- Opens file in notepad (likely ransom note)
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\rmail.txt1⤵
- Opens file in notepad (likely ransom note)
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\rmail.txt1⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8e065ab58,0x7ff8e065ab68,0x7ff8e065ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4296 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4456 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4432 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4756 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4952 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4176 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4840 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3444 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2600 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2436 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3436 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3372 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=1472 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=3260 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=4180 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3468 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=4228 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=3432 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=3508 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=4200 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3300 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=3404 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5608 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5812 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2936 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
- NTFS ADS
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4728 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4116 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1472 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\Salad-1.6.0.exe"C:\Users\Admin\Downloads\Salad-1.6.0.exe"2⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Salad.Bootstrapper.exe" /f3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Salad.Bowl.Service.exe" /f3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Salad.exe" /f3⤵
- Kills process with taskkill
-
C:\Program Files\Salad\SaladBowl\Salad.Bowl.Service.exe"C:\Program Files\Salad\SaladBowl\Salad.Bowl.Service.exe" --post-install3⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --mojo-platform-channel-handle=4328 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --mojo-platform-channel-handle=5220 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --mojo-platform-channel-handle=4556 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6112 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6224 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4204 --field-trial-handle=1732,i,11296968728325762130,6325718655756176804,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
-
C:\Users\Admin\Desktop\Telegram\Telegram.exe"C:\Users\Admin\Desktop\Telegram\Telegram.exe"1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RedoJoin.avi"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\rmail.txt1⤵
- Opens file in notepad (likely ransom note)
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
- Executes dropped EXE
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
-
C:\Program Files\Salad\SaladBootstrapper\Salad.Bootstrapper.exe"C:\Program Files\Salad\SaladBootstrapper\Salad.Bootstrapper.exe" --sb "C:\Program Files\Salad\SaladBowl\Salad.Bowl.Service.exe"1⤵
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
-
C:\Program Files\Salad\Salad.exe"C:\Program Files\Salad\Salad.exe"1⤵
- Drops file in Windows directory
-
C:\Program Files\Salad\Salad.exe"C:\Program Files\Salad\Salad.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Salad" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1844 --field-trial-handle=1848,i,8234380293587280007,6677220953803442268,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
-
C:\Program Files\Salad\Salad.exe"C:\Program Files\Salad\Salad.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Salad" --mojo-platform-channel-handle=2348 --field-trial-handle=1848,i,8234380293587280007,6677220953803442268,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
-
C:\Program Files\Salad\Salad.exe"C:\Program Files\Salad\Salad.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Salad" --app-user-model-id=salad-technologies-desktop-app --app-path="C:\Program Files\Salad\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2408 --field-trial-handle=1848,i,8234380293587280007,6677220953803442268,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKU""2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKU"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Lxss""2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Lxss"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKU\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Lxss""2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKU\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Lxss"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKU\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Lxss""2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKU\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Lxss"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKU\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Windows\CurrentVersion\Lxss""2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKU\S-1-5-21-952492217-3293592999-1071733403-1000\Software\Microsoft\Windows\CurrentVersion\Lxss"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKU\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Lxss""2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKU\S-1-5-21-952492217-3293592999-1071733403-1000_Classes\Software\Microsoft\Windows\CurrentVersion\Lxss"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Lxss""2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Lxss"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v PathName"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v PathName3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v InstallPath"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v InstallPath3⤵
-
C:\Windows\system32\where.exewhere powershell2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "Get-CimInstance -ClassName Win32_LogicalDisk | Select-Object Caption, FreeSpace, Size"2⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Program Files\Salad\Salad.exe"C:\Program Files\Salad\Salad.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Salad" --app-user-model-id=salad-technologies-desktop-app --app-path="C:\Program Files\Salad\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3448 --field-trial-handle=1848,i,8234380293587280007,6677220953803442268,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
-
C:\Program Files\Salad\Salad.exe"C:\Program Files\Salad\Salad.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Salad" --app-user-model-id=salad-technologies-desktop-app --app-path="C:\Program Files\Salad\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3524 --field-trial-handle=1848,i,8234380293587280007,6677220953803442268,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
-
C:\Program Files\Salad\Salad.exe"C:\Program Files\Salad\Salad.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\Salad" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1220 --field-trial-handle=1848,i,8234380293587280007,6677220953803442268,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8ddd23cb8,0x7ff8ddd23cc8,0x7ff8ddd23cd82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,1082141770244020366,13740035956446868411,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,1082141770244020366,13740035956446868411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,1082141770244020366,13740035956446868411,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,1082141770244020366,13740035956446868411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,1082141770244020366,13740035956446868411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Modifies WinLogon for persistence
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 92A9A897C0DEB8E83097517C797F923F2⤵
- Blocklisted process makes network request
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 491E15CECB56CC02AC743C5EC11EDA6F E Global\MSI00002⤵
- Drops file in Windows directory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D491BE5FCCAADEAA42138B5A96F8DF612⤵
- Blocklisted process makes network request
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 207136FB355E25D22B0A5DC6E67771B0 E Global\MSI00002⤵
- Drops file in Windows directory
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
-
C:\Windows\SysWOW64\DllHost.exe"C:\Windows\SysWOW64\DllHost.exe" /Processid:{5250E46F-BB09-D602-5891-F476DC89B700}1⤵
-
C:\ProgramData\svhost.exeC:\ProgramData\svhost.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
3Change Default File Association
1Netsh Helper DLL
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
3Change Default File Association
1Netsh Helper DLL
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
5Impair Defenses
2Disable or Modify System Firewall
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Config.Msi\e7ed74a.rbsFilesize
99KB
MD5760d9581881ce7563b805e94fa98a5a2
SHA1b313ed1f9516ef92acb87cec7c8302c5c6da009e
SHA2561642039e9ad758d2f36e77e276f40c764f2378f38af33238d8da697d5fabc068
SHA5128da7faf11dbe1ef89597d60db58cdd7998867a39a2e6f62d6b1c517b3ec166e3397835b0fecd7ee159ee23091ce148d128f2bf6cd49ae7d99ab87c0cb1a994fd
-
C:\Config.Msi\e7ed74e.rbsFilesize
101KB
MD53d93a7454a2665841ade1e53dac5cad1
SHA1d6ad79f30109b6e1609a67eb34494df58d051891
SHA256ed1b7dc5703e7b5b7fd960c75a77b0878241e285ddd0d69b06eeeffd811bde9c
SHA512565ba5ae649ff1c0bf7be48ab4c2315e5a8ffdbd6c0f4515dbad6e124982c62ffa5021f6aa47ad6fb9326ee7ad6db3bb33d6fc3d5c4400dfc361f6964e5dbffc
-
C:\Program Files (x86)\Windows\Error file remover\Windows Logoff Sound.wavFilesize
724KB
MD5bab1293f4cf987216af8051acddaf97f
SHA100abe5cfb050b4276c3dd2426e883cd9e1cde683
SHA256bc26b1b97eeb45995bbd5f854db19f994cce1bb9ac9fb625eb207302dccdf344
SHA5123b44371756f069be4f70113a09761a855d80e96c23c8cd76d0c19a43e93d1a159af079ba5189b88b5ee2c093099a02b00ea4dc20a498c9c0c2df7dc95e5ddd49
-
C:\Program Files (x86)\Windows\Error file remover\fatalerror.exeFilesize
24KB
MD5e579c5b3c386262e3dd4150eb2b13898
SHA15ab7b37956511ea618bf8552abc88f8e652827d3
SHA256e9573a3041e5a45ed8133576d199eb8d12f8922bbe47d194fef9ac166a96b9e2
SHA5129cf947bad87a701f0e0ad970681767e64b7588089cd9064c72bf24ba6ca0a922988f95b141b29a68ae0e0097f03a66d9b25b9d52197ff71f6e369cde0438e0bb
-
C:\Program Files\Parsec Virtual Display Driver\nefconw.exeFilesize
574KB
MD5e9f2bc8c82ac755f47c7f89d1530f1a1
SHA17ce5938c4b8a3eb4de49f7a7e34972f5f2acfcb5
SHA256cf746d1b0bbb713993d4a90dccd774c78d9fff8c2ba5a054b6c8f56c77e1eee1
SHA51286ed0a391d22631da9bdc7eb9cb096ba4de4c6619c6c4326030cb03d196b63e5aa156bac264a48d5b4cda7401844a3b5050259b41859d32e0c4d39b96913c2ce
-
C:\Program Files\Parsec\parsecd.exeFilesize
454KB
MD562beb668110b4c5ddad09bb20d921cb6
SHA1f3706372c01d1e607ff8c605307de6ef2c26c1a4
SHA2566f1be9e26e403a885cc3b1ff0e4dbecbc96c0821119d25990c3e211564f215d5
SHA5128994c3f1c78b0a816ecf30e463af8d6ddfd0a0ce7b962cbf13e9bbd360d37a024b8ee69c76745f4c332a4786dbfb9216667b1d03c32c60a7c06e85359a2186ee
-
C:\Program Files\Salad\chrome_100_percent.pakFilesize
132KB
MD5e4cbb48c438622a4298c7bdd75cc04f6
SHA16f756d31ef95fd745ba0e9c22aadb506f3a78471
SHA25624d92bbeb63d06b01010fe230c1e3a31e667a159be7e570a8efe68f83ed9ad40
SHA5128d3ea1b5ca74c20a336eaa29630fd76ecd32f5a56bb66e8cef2bce0fa19024ea917562fd31365081f7027dde9c8464742b833d08c8f41fdddc5bd1a74b9bc766
-
C:\Program Files\Salad\libGLESv2.dllFilesize
7.1MB
MD547fd3da85f490e65b3252c83c76e63a9
SHA16f799b2d5f1768682cb6d8c2407110410142444e
SHA25649ace76d838e02994a03354e557ae65a305d9c5c8441774fa174177451e26dc9
SHA5128df107a48ff17000ff0a59139fc545276a12355a052658d933a2681172d5bbabde48b2e17925680a80006587c318876d494096d27f0c41b281e39a5bdbd14fb7
-
C:\Program Files\Salad\resources\assets\installerSidebar.bmpFilesize
150KB
MD577137bc909d3a872633248381a9f9584
SHA1fea49878d99bf5a7c05e5e6dd775bdc0403f70a1
SHA25645ed7e9d75b327eaf2cc2a7edad29d0983e0b4574f81965184127b07851e2907
SHA5121606332a9d25490c62dd2b70a8ef73ce38f02404fc5306ee4d5df6d49856112c84d4c3be190d4e3fe3299a105fc92c2e132f7727611e9d2072140e53d44e3b01
-
C:\Program Files\Salad\vk_swiftshader.dllFilesize
4.9MB
MD5e53fd0779465c910b275f93abafa6e3e
SHA1f38f2711805d08b4b6d29b0a49253db0da939fcd
SHA25658e2b5ab33366550207ed8e1f420b24c94b19fbe8e753f5a6c038beb829533a7
SHA512934e8e68042d1adcf17efc1fbe728930ecb2d6cbc0fd60ad064e28e18ed2a57fffc7331b2eb807f6972c0c37bb9acc69c97a137b264efab67e180a8fe0d1cdc3
-
C:\ProgramData\svhost.exeFilesize
63KB
MD5c095a62b525e62244cad230e696028cf
SHA167232c186d3efe248b540f1f2fe3382770b5074a
SHA256a5728f8fd33c77818782d3eef567b77d1586b1927696affced63d494691edbe6
SHA5125ba859d89a9277d9b6243f461991cc6472d001cdea52d9fcfba3cbead88fbc69d9dfce076b1fdeaf0d1cd21fe4cace54f1cefe1c352d70cc8fa2898fe1b61fb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000006Filesize
59KB
MD51d5f57b36984d3bc13513937212f7c85
SHA16962d480bc6216080b90505c9f25c8a3ed4c8df0
SHA2567c5544c2101aa4a9ab3bd0ed98d6d1126457f802c8073333d2e7fb7be273dc30
SHA512dcb01342a2eb9ff3ed03a23b7e0914ccb626e1136c2a24dc4e8144cd785c90acdbffc877408a922519055f0a375b4a31172e3120744de656d55dcd83b84a4f4a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000034Filesize
28KB
MD57f5a5d45ee4ea0bd1ccf5178c63f43c0
SHA171cafbec33de805f8c65c04ab40a7fc072420df1
SHA256e47f30921e1d3fda22de0ed56c9847b80e379396ea95d3fe60e04cf9e4c9773a
SHA51211dcabf8a16fd008783be04cf72e9ebcdc3b37a9a92c0769daa32fcec0a7ac5f1380d5e7636dca14eee05e5787419d2f5782726c94846c39085b325099c123d5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000046Filesize
69KB
MD52280e0e4c8efa0f5fc1c10980425f5cf
SHA11d78ccb26fef7f1bf5bf29de100811e1ac8bda23
SHA256b9225cb1f0df94ebe87b9eb2ad8c63cf664d2dfdb47aeaff785de6c7ce01aa74
SHA512b759fcbf578947c0290ab703652df9f37abb1f9f5cf6140acaa8c4d4ee655ee0ee1f9bee9d4fd210d9e12585a51358b52e0e9c0878abf2713e6fd69a496ac624
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000047Filesize
329KB
MD54bdb35f3f515f0cf3044e6a9684843b1
SHA112c960465daf100b06c58c271420a6be3dc508ae
SHA256b835bd77e17447a2dacfce2645a5e812733fe5a777a5e45d9daa56d28675cbef
SHA5129fa600b87843759b632c2d384596109cf1fb149a5ab38524cf43cab5833cb25c355479aee90d60462764200108cde5ec71f0988504c97ad09e25975cac65bfe5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000048Filesize
105KB
MD5b9295fe93f7bb58d97cc858e302878a9
SHA134c6b1246cad4841aa1522cbd41146f9a547e8c5
SHA256c0233c9b273aae7df532a992e710aaec409455b4b413b89a25854e9fb215c36c
SHA5124c44ddbd35807653a60e2718dbd2ea85f09d7107b270045bcc2484e2a0ba977fbbb5739236ce7edb71d584c8f68df31fa3bdd03229eeace60c19662469adafc5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
576B
MD5d8d0ca306022aa30014f9aa3a04d6225
SHA1a4724908c0167d1c18cc045f00faff92a0d04730
SHA2567d33d7a62c1dd8fbe66cc4b858e151bd92a85a9215a4f416e55806a7d8a72213
SHA51276845dde725e772121d17d87f5c0c3bc8d961e32503e6c00680e24b537379e7ffde6df77cb558cf949fe360c3f909a6f21bf38deee3aa8e4a9de01639631dba2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
504B
MD5b28c3588d42b66033deff44a7c8021d3
SHA139ba7eb7c74debd5823b3bbb0298549f001bbbe4
SHA25643f3a1c1e121f65cf4fc9ed7d01cb378e8254ebac2de746614153bfed5dfa5f9
SHA5124a8d15ffc093143339835e4fbf1442e1c171a41299cc4264c60323be920f88d0e86182a8f0d56bcfc0e255dd4a1e5fa041291d86852ab21b037777438b54ee61
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
3KB
MD53c0fbc811a6cfd29e4031ce8b38925d8
SHA18521cd02474d8ca444108175c010540628ac2674
SHA2563c45f92bde7c7641dd7a6b1f6ccefcc5a160a976a8f54f0d0b5c7f5f9a8cc748
SHA512fcc1b3791b613b0e01299f1775f3732eb9452e0b9b5621baa175427a29aa5a3a1a6403015326d29f4382a23fe06f2072bf008eb1b32d6fd4d60f09b4f4e27b5f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\21072730-be56-4338-bf41-0e35a65958f6.tmpFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
4KB
MD5e805fd6f2b1054ddfca93ffa290f3ea6
SHA1556b0d3a8dff5fd56d9e0fc9b2b0738702deee1c
SHA256378e37d10e0e8cf4870f538c5e6a2612d189917b2c8e4e4247518022b68f696c
SHA5128c52c202aa07bf4513d28538b28dfb8a0f3c5b49894054d7406357d717141f6a6fed4abdef11a9067663467f03cc1f590316c9cda008efdc60acb7a787342486
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
13KB
MD5fa25eeb7efe71b3654ac7e93a7cfd1ef
SHA17d84210c2191ccdfe5d1b186dd08a7e60d4d2099
SHA256460e2279915ef5502059531d87c3c6bb7a1d59d301cf97abb3aa26bd93b9841f
SHA512a896ee1a25464ab02ff63ac8bb0a013d6290bfccbcaac4a1979a1e52eae5184b599597560a6085ea26a9d6357290c2f1efd06d270e7bff91b6f8467003b1c411
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
14KB
MD56efb20e801ee10c893be8f4106361dcc
SHA1b3a3ae684e5d89363d317c4b986933b80425da77
SHA25686e5e8e53c0925910fb3626fb373f08c2b4bb9d1a7de7410b3f72024fa7f69a0
SHA512d572b6496e57ceb170a1471e4b9a1d009e44dc00a7b68e39c42f55dba658955fb8cc0a497032eb09ad9889c8d77d4cfd939d8cd70aeb79ea70e587a3ed8f003b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD5a47f784b038577733c6e13da8192b649
SHA1a359240c26ea022c8fef31543642b1edab995b2d
SHA2562ecfdebd94aa99e5f6b3cdae86ecb98a11053dbc14733b9b896c3816067d26a1
SHA512103aa4f805497a061b5b5f1ada6b805b29cd7f7705d79c93bfe43c6da11135efba7900e1ef76aeeba8b168f9981be94469f7eed57cbc84dc04a2936eba117fca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5af2c87657d89ef531281e9fe733bd209
SHA1a62237301f40d55282b8a8299cd2bc413b85c662
SHA25600322d49b0394a6b215d7cd945a43cfd9f8c0adcd5cd121170041b1fa3f4abbe
SHA51275fdf8f6603ec5445258bb2b5e7eae33756b03abe0d40fe4f92713297b1d043cd7fcd5206609db8c52ff8433830c6f4027ca1612dcb91acbbe5c8556f36f5cbe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5a95e690c2fde3788e3f323f80b1fb08e
SHA1408c4f718543012ab0808f12bd0f067ebcd654c7
SHA256db898a3d97bdb0cd88e7dbfe3b0f9b2d0360b6273b87800d7d8f0d658da18ab8
SHA512e17d683e9fea515c07e9c8885649c07f4a54a7c34c2d72266299d4c9dba72a79bdf7063a6299fffa53a58242068343f7ef44593b93713175f81d07a0e1230ff9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD595b4026988eb0839a08a10aab4c5d228
SHA13a670b762dfb2d906248a6ef24775e53c3a9dd27
SHA2569a32cda156492151383a73cb9f038a7397d2887b5b4abb5ee0ad41faa6e8b84f
SHA5122494964946d2cfed2c7c6843ef9f44cd91b9070f6680803b87ca36c48ffc791e46a0aca2fbd61bf299ab3705f9ad3761833c8a514ce574534eb76cb07b9f2434
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
524B
MD5dc8513dc4770c8a3fe3fd68cb661ca1d
SHA107f9b889999356d0cd6d5f2bc915f110d40ec942
SHA256acd67df7089586c00479af2e325fc51b133dd5405fa8021f72a8fd7dd9c94453
SHA512ab1f20ee542ec48e167f4126d6c7179324f8972375b38ed3e3569f75624e25e1ede4694f7bcf89db47b6ede9bae41303ffe5d213f57d137a16eb929b08eb9902
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
858B
MD517bf7678be7f7e736a00bcec2743b885
SHA17afe6e76ff589cf6e3d7117d78d89d298f7ff2f3
SHA2568f7a4be26fba637aabddb5438cf02b6b785c028bb8d8992d1d48c06fc7afb3f1
SHA512a03e4b4e7ef4702cda0ea9406b264ed305adc14edbd4e9b82ee8f686a904f5c072688acf70ba0ab6787b54c834fea8b82f81133c20757e00d1390e8883e614bd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
858B
MD5982820e33ac5d492f09a374ccd24c4ef
SHA1e3795309ab03debc4e64e7f2ab66e7d8da34c66e
SHA2569b859289b19c3f70d65e4db798a9c60793c421d8f20a3bbb823cdb4e43681456
SHA512a5c28ca62d5d530d1767bb1f1eeeecb5febf3a3c0abe85ef089c133333fd8278ea09cdff4237dd7cd517c44e45df265e9dd64a797db2c53923dec69df7b0785c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD51576e9712dbd786f47fba820998ae29e
SHA1cb5cdde67c2e85fd512ed0efebb820b90e40ad33
SHA256169bef18ef73c029e03ab703dfc8ce7cd169b6e7502298089cc9a68722883685
SHA512edcd489405fd07dca6362d00576e9df228fa7494582fab084122ce43e001301126e4a1709710a1d31625549d13ea11acb7f757d295259354048d4954bd75f21c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5c99af52a85072f31bb6a4c5485065960
SHA144b630003928c4c00fbfaf626a564d27b4c0b065
SHA2560fbe000b22fab6d5d756d92d7f6859a921914734f9056f3ec9b6074d44a26f3a
SHA5122adaef52758c48ea09716b12c85beb9139881c76140ad82d49703164f78f0827056bbe6ecdf71be66b88726a03d72f14d2be68ece12840cb8a14adf739291b4c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD55746802372680c0b04be40e6bdece60f
SHA1e769fc784d810bc6dc287c44bb83d0813853f411
SHA2561dd2d57198b628d3b7fa1a137c489b6d47ee21646f8df2a18cf374c102336c59
SHA5127c97fbca28b4f7f0ba11d43b1cb2dc2ac9deb274a4e9f4d852e98a3ad42d7e76532fc46264401547b935928221e459fb22ae0488a644f4717103c8616301c115
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5a458673cce391ee9f035cdbb8790465c
SHA1947fe30eb1f3e26d666c5c18e0c0fa3ae0655116
SHA256a3d978aac60c7f100cb5ac625865eb4eb12b6397ea1b76b983d7a62e066cb6b2
SHA5128818580edd75b76dd6f2db9ab0d5099dfd3410464917142efde8a10ae927c14967581411421194cb848dcdc76dd4f467756555efb9c66684d1e6dba799e23644
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD57dda02393b84069401a71e2c29bcba5d
SHA1d82323668ea6aecbc3882b7313d7185626a6e962
SHA256a187767c95703945856f729b75a8ba63f0ee822864bc953f017ffd2a2121fccc
SHA5125a8191dd3029e089b27ed4c9b53fac5c8653422fb4391877cbcee03e53cf4c2a745c09806650649a57feb009b9a8e637f1afd9dd1b4dc12bc7c32b7af4d1a79c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD52415d4db6631f4e14f362749a443ed91
SHA14f1b66d1633ad8fd2cb9c188c2eacccf1e467892
SHA256fab9e350d4c5cd17bd30ee6b9a275721532fe962e6ca47ef52f1f25cafaee53b
SHA512da4263238ddc92426ae244b723b221909769dc955444e109f49b485e372e573280c2c2c32c12b551b24eaca5a49612455c63fa8d28630cfd33b6bdca9eb1608a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD53a06a08a5f53c25adc155e344e24ec62
SHA1f807b700317568c86655e1c1d2121b94d6ad6880
SHA25652534cbb509f978bac7d8cb283655c06bfd0d5c18280b3117a02d88512be346e
SHA512ca830ccb6d04c7bda10ad99158fca63e03bb742242e12ca821795bba8dfde04c59fcfe57a5e6452ae21c269910fac658664ae1fa39d8231f6867f432516dea96
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5dbbf82ecff0219e13b00eeb37c81cf89
SHA1ed62f291dae79d1e8fabce575f1de4767123c535
SHA2563148db5c688d8024bd9e6e0d39366058244790e3f5374350d4f801739c93dc90
SHA5129f65c8547f788f2433dc49a78fb447f9b0b0ed1980d809bec6a94c7042a358fcfa834a5c151077149a31ffefb9e4d49483cdbf401ecca84b9fbad25dc5537cc5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD51cb81cc4e6cfcbbb52eb51fc6e7bf897
SHA16b48e46308d30bac028d03f3650074ee6b1986db
SHA256a90a6e20340f9aad227014552c34801c500438e3cd4e1bba98d660907b575bc3
SHA5129eb902a95c348de8483bc408a592d49355019f48931aeaf2ed0fe79eb79c53502578dade870f5c781f25e0020bf4d0485903d5078d17ab80214a42a4f6850939
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD59db997bb17ee48822a7177b7f907f411
SHA1088c608662fa5f34f984ca9b0214616f962a50c6
SHA256217d5612bf804a1c928cc7715df87268409fcfa95077b9f1acc88146efc904bd
SHA512228882bc470c3f025b5b7cb09fb85fae1ab8be697d79c57ffccc715c8f28ffa761bdfefea4ee3358eded0300e65aff1122f7262c393c8e56bd2d7efccc0aa28f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD519c937110f0509994412650b10186ebb
SHA15ae33862129ef021c37f47ced926c642fb72c1f4
SHA256ebf06c6972700e4c7dd547a1cf80c359aaa3a38803cc7762d0c927908efb7aa2
SHA5124438ffcb9e62eb15468c9d882a41ef4501253389c641f6c82c6851aba4ab391a71a08b636e8c773fb02dbe7dfcbfc4c849a201b4a49c1bf42c66ef2c6551d244
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD522e9a1dddb8bfefc647a32b55055dc5b
SHA1a7a7c3db9c1157f876f0d340563a404e6060dc6c
SHA256d75674329595aaf77023e8f079a3ff692ff7e398cdf350f7f5704a571ae15aaa
SHA51265713c89231799e8f0d5cddd171286ebef9d6fb607cc83c3bcd41396d0b1bdfbe5fad3a75a86a382e8b19fb2943d46c18ca13d1af290db6d94fe78e45a57ce8e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
56B
MD5b6f48def1ad0dc727f479ce8ffec8a6b
SHA1488a3d7c23f20d7c90d9cd3010d31836d67b4028
SHA25688b9c140ca5cdbc682401e0cd009ef606ef17510c596d69c12b629f720543aec
SHA512ff657c31fa12c36894ac6002bbc33c3263739b9727aa255687ff9299087d47b2a6b390cd0bb6ce588b992c245e497f5e9178de97bec3c72a2d696160dd9f3a9a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe753b80.TMPFilesize
120B
MD5aea349a42bde7653b1fa956b0cc8ab45
SHA116e0e61053f07d4fe3259860c2bd09ed8b8c4509
SHA25684852767347605e09deef1d8c461d30a4536255856d26112d62ce8407b37212b
SHA512c2b650703c4398f22db817b2853a84fda5d35bd5a67bd98bca3f2299941114d2ff699038b1b860d5e3b87b80aa8bcffaadebdf75f841969f31cba308592a7122
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\9fb28eacc8cd5eb65e9f9f177e77f1b0cab86165\3e60aa63-7a9e-4dce-8ce9-529d12432e81\indexFilesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\9fb28eacc8cd5eb65e9f9f177e77f1b0cab86165\index.txtFilesize
186B
MD5c9d7fca01087e9a84604c9c40f8de8b7
SHA1b978fbc286db189fe801a387168de3660f16b55c
SHA256faaef8d14fbc03cd2e73719aaf88f5c42a4e9a484b8da8ae17260cf3d4bce00d
SHA5120d7f0afa99ffc8ab5e7aeed04b87be91399c69e952cd8bdbe1f5ca2f864da2e2332b6f044fabc3ef64527f98b80cdcb22c56ae4a1cb056d6151b503c3ac5d8c0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\9fb28eacc8cd5eb65e9f9f177e77f1b0cab86165\index.txtFilesize
179B
MD5d088b40dd23895b872d213dfa27c7fbf
SHA141c65619e61d858a0496bbdbca7c30d3a824fd90
SHA256d2223a7cb7948ea8ed8bb70e46d977ce6f36d3d2fb5a343ee109798677b66480
SHA51275b24ca25547a9d234b3984c762fdf8e58bc904dabc95648b3ad04e33f34c185f83a15a5ce7fbed8200ce3a28f43190b6df3417718ac2b757d9bd9ddfd62e699
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\9fb28eacc8cd5eb65e9f9f177e77f1b0cab86165\index.txt~RFe751480.TMPFilesize
120B
MD5ce0f748b541c614413ae6534b71a11a4
SHA117d47c6e338cadfe3630179e34461ed53cbcb21a
SHA2563ef64a3551b0605fddcc3a7826906ed7998fc73e1cbe1075748097ee56ccb8e6
SHA5121df89d3c89b49a932f29d320d9ae26a700d81a727f46a8bef5a9374aee2aca1c6b5b9312c18a65f357816bc2e18cb12f13011847279b0154ad920c4915ebea4f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
120B
MD5defeb7a0d190484e99f6cb3a53336fa3
SHA1a99374cae467f915c3c869c26013634a8a3d2c8c
SHA256f2e9bd280cf1cc6aa7252d6e2a84774437aba65e7d609ae76de6a98130d6821a
SHA5123e53403a4a80495cf26290b21774c1440f9530ca664af8c6a9266e093762688f306c715c89232e27abcf641db531662fe01f09b4a30022a38a171623671e8664
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
278KB
MD55575bd33e4c36867fe6c4ff455b8f71e
SHA1fcc52160f3223daf149722114e92a06d40f90122
SHA256fde12513d7578bdf430ea5b54aff28bd795fc79dd20bcf1adfa74f490c2e782c
SHA5122d5e429d701dab364e4727429b1001d202f13a6b1984eaf0c99ee9ebd3f23bf466753bdbc10aa9536427ef5b0a9079624d1e0b3b0aa65708dcc313c65ddf5956
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
278KB
MD5bf643361ad859d102dc147a8bb1acbee
SHA18fd1cfd5ea1ee8982fda2394414cc4a8fcc1ccd1
SHA256047049b52031f8dadfdad06f4c18266814f551f10ed0097b011bab0b4b9b28d7
SHA512d83a5ea338ee87a791371321dfc1e99e63ec409663a3374e2ac56cb7243cbd041a3f794ebe7b91f8f9daf63e1bbf409b34550d18ca735b707611739220d9e5fe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
278KB
MD5f72232ad8751b08533139aa81feb139d
SHA15bf9c87298e91e3147f768574d14d4f8e5acbd52
SHA2561eb4157d358f7f75130add165a17765881e253a7e1180bf732f2483c61ad3096
SHA512772fd51ee32e0ddf81e7a8634d385da82c057963e16ccac765e9792259fffe80dea3514309a35a1beb5b00df4160c93ba16d29592fa67786238c87550845603c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
278KB
MD5e01c8c5945f8aeec79611b1de3a0ce42
SHA1e6b23d94cd6576a865f0d30c3863bac69057ef61
SHA256bb61191693ae8e6a32363160107d85c289d3d5cb076aa8b9404def4fd3506160
SHA512700d4bab1ff70e93b4e54f61605ccc4a1f52d24f77e89bd3538d3b753bf31f70f8b38a8de87c077b2ef6fb22c58ad7d34eaf567532b3b6bdc45543955695860c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
278KB
MD565cf85fdbd8a9d456bcbc39f0e13ca17
SHA116184b56bbbb594a27f1e935c3378f5e335c0770
SHA2560e836d57af1a498758ec72321401047e951573dd964aad8b9f591d4f39134b46
SHA512a67995615d5ebd85fa368c8e1aa40ad80bed82f529ec614d24d83f1ad0c2a5a0c0c31ea3b98662b443cef6a971e86c9aed39ffdea47eaf1401552fe3ba0cf82f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
103KB
MD5bb3093fa054d0fa7849dea7d7619d19d
SHA12a21fd0423f88660fe1ea56d894df3e8979cf876
SHA2561f15cc6e0fcf7807307b4628710cb750c3b000ba32768c2f99c4898cb818b195
SHA51235edb8b295c83ef2304b33b80b70ce0401a153ac2e5d5430868ae3708ebf32750333174e9c49bbd45163e270f918c3a3109637655052cc4e15dc07c7289e000b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
88KB
MD53f2d4f8a06d652e2102ba6af1de23cc3
SHA197d6ebf24b5f9a7c507482a460e3b5738b0e8b13
SHA256b3a55a14e9e5b4b70475f0dc633a38c91bd481397ccb145002ca9739253c2ba1
SHA5121f8585b5dffd5e90b275f1ea79b2ac86db29f87a6e4a5585a44abf492c6a491c09a816648afade53cc3046fdc54106b5a398a2547846309e21a7e19c0fa961b2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
106KB
MD5400c48281e0d3b0fce2e6be254326761
SHA1b2a191e60a25c2e56e50e63bb5bcc5ca0ae23010
SHA256a818a72975ae3e2aa711c27fcc1634416a1c9fc723526fad7142cb0b56ba445b
SHA512768c203559d56fc89bfa8c9c1401aa8b11fe038b362b81466600b0ffbcc6fd63337124d725f4a09e4d1920e6ccd970b0aa715fa6c43914c58ed7655221b4a6ab
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe757acb.TMPFilesize
83KB
MD59e0bf58c2c91ddecee1570ff277bcb65
SHA18993233723a19a46ea4ec5009f9260c8dd4746c1
SHA256d26f11be1c9fef75a5921f868801bdf642511f36b34ea225c9986698d10b29dd
SHA512ef75622080acf1a15a65498e8e351c0244e52270f79d02928b1ebbc3e692defd9d176ce8f656f8ad41290897f78c38a9397e58356a1f6785364f03e2ef9ee636
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svhost.exe.logFilesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD56486ee9e961a437dadb68ff1544d18a8
SHA105f4daccca0bc1ce73fe71ad2325ba5dadd3df25
SHA2569a98b4686c9e90672a548c873943b3027fb111f7992263111d912318429f5834
SHA512ee3659f68a46f37f340f98b85a7aa289e700c5ced2a4f0104673bb5f18cc82d1e9b838ec0278407213c6ed2073998e7aad78a7a39390b7e460c8e26dfa91d0e9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD52dfecbb576ee9795c5284da8a2a3c7f5
SHA1f1f0a6a97850aca2b4ab267a017564af02f24948
SHA256dca6901942fa748fc01339192c0738a06847d8497c9c61298f1e5df1f8352fb0
SHA512d664cc261113427810dd0b2d32763ddd08611a528fe6b285782d6b8ac03304b72a90fe7f3f7142e825ab8d948d5c9cf52f420546f3796b2ac23f3d00f3c17389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD537ec86eb8cafbbcb6d721f1dde8dbe8d
SHA1bb4046142f567ae355c94703b75448f3e9899a7f
SHA25606227af1255cadbf60b3364bb0ceb11c57bbb6b903e1ead381ca65aa23a81812
SHA5121138584066517d26628b845233c7fee59d84bae9bc587cceeb676ec5c4fc08b879f75a3e2516a48c48f8a90f294eb550534472073147d5678bf819caf56edfa5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003Filesize
67KB
MD59e3f75f0eac6a6d237054f7b98301754
SHA180a6cb454163c3c11449e3988ad04d6ad6d2b432
SHA25633a84dec02c65acb6918a1ae82afa05664ee27ad2f07760e8b008636510fd5bf
SHA5125cea53f27a4fdbd32355235c90ce3d9b39f550a1b070574cbc4ea892e9901ab0acace0f8eeb5814515ca6ff2970bc3cc0559a0c87075ac4bb3251bc8eaee6236
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005Filesize
41KB
MD5b15016a51bd29539b8dcbb0ce3c70a1b
SHA14eab6d31dea4a783aae6cabe29babe070bd6f6f0
SHA256e72c68736ce86ec9e3785a89f0d547b4993d5a2522a33104eeb7954eff7f488a
SHA5121c74e4d2895651b9ab86158396bcce27a04acfb5655a32a28c37ee0ebd66cd044c3c895db7e14acc41a93db55463310425c188a7c503f0308ce894cf93df219f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008Filesize
88KB
MD5b38fbbd0b5c8e8b4452b33d6f85df7dc
SHA1386ba241790252df01a6a028b3238de2f995a559
SHA256b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd
SHA512546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000009Filesize
1.2MB
MD5620dd00003f691e6bda9ff44e1fc313f
SHA1aaf106bb2767308c1056dee17ab2e92b9374fb00
SHA256eea7813cba41e7062794087d5d4c820d7b30b699af3ec37cb545665940725586
SHA5123e245851bfa901632ea796ddd5c64b86eda217ec5cd0587406f5c28328b5cb98c5d8089d868e409e40560c279332ba85dd8ce1159ae98e8588e35ed61da2f006
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000bFilesize
32KB
MD52448f641fbbbdd88f0606efa966b052e
SHA125825aef444654fdc036bb425f79fd1c6fc6916e
SHA25603f060bf37ba360360d6a7413d98e485e7d8e6f69e6a1de300c788d439b78d02
SHA512d56e3b19d3f4c6d6663117000b99071cc453b6fd93f708bb8cb92d5adfa0eaab749d8d6cef4f19fbba548d31edaecfd0a74ca55dbca7d5f5f1fe66879b27b9d0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000cFilesize
74KB
MD5b07f576446fc2d6b9923828d656cadff
SHA135b2a39b66c3de60e7ec273bdf5e71a7c1f4b103
SHA256d261915939a3b9c6e9b877d3a71a3783ed5504d3492ef3f64e0cb508fee59496
SHA5127358cbb9ddd472a97240bd43e9cc4f659ff0f24bf7c2b39c608f8d4832da001a95e21764160c8c66efd107c55ff1666a48ecc1ad4a0d72f995c0301325e1b1df
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000050Filesize
17KB
MD582b84d85e4f28abe25e8512268beba49
SHA14be6d61cd560f134841b142ffe5bf4d96525fb8e
SHA256236491fc190bf639aa9622307d00bed2336ea525c2384b5d56e5dfd4f941b38c
SHA51246319401b3a64a66af0fd79dd89de3451c86b2a9c99d50bee279ee9cc8e77442bab0f0a14c0805b1641d8ead9f625dbed036e1601800951c59ac4a6fd0f923cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000051Filesize
18KB
MD577c5b945282d38d109a3595bfe691acc
SHA1f3ea4781cfefbc143cfbd4f0d6323760a853cf92
SHA256ad8ce03e73ae8e217b26a5e3c2e4c8762c7fc55558302afce43c8bd8db826729
SHA512a526934278e49c3328b1c7ace056b23555ef89e4dc06ca8f2ce9e4270afe9cc7d9de48740a3fecd0f7d396e8bbdd454643a2e807f2d6590273807ba8f011706e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000054Filesize
27KB
MD502fc1fcc1b0d741ccec589e0fd5db66c
SHA1df8c98abb27de5106d9cb553a98b9ac6f0bc2842
SHA256a7c399d1e630167be6d4f9b6ff712b7d2c62e929f063c873d4d9b1265c9ae86e
SHA512f6a70f270b8eb5ad875e0ef5c3d88b26d358fc5cc8432e6aa08a464bd38e8c782da1ed461c798cec16c50c3ebe1e581374f8ed227f82353c4098915c806cf5e8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000056Filesize
32KB
MD5af8ddb76287dd8fd8d40da7d053450ab
SHA13edabaa86cf14c931231c9e6d352fcf302a1c3d2
SHA256a1223d43c99224535ef6e08628c3929e30b473b80ff5bd927e904fb65ba6fcd8
SHA5123c0a77e002c52342affd8b75bc4f0afcc6f76df3ee781c7295804ec6e52f3cdee1b3b9557405655c1ec76990af06384c77a86f7963ce58a95afc06507279e0da
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000057Filesize
44KB
MD57d8be7053213c656f55471a44ef5f6bc
SHA1e8ed803088975dd4d785ab6002f74e784790f1e9
SHA256b123939b8c08287691899073f7dad7b0e20fa4ae0dd948bf7e1a99585c7b8fe3
SHA512024797cf45f1c69892ae7791b5db2c1448a299d5b9952a3211d0430849e6a2e5be4f7e9544f503a9366f80d4f19b0ff118fd497e8d4b0483918496cb42eb9a04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000058Filesize
41KB
MD5537090c7b5911eaa7e2857d71252f152
SHA12b3e7823601b4546c1c2c1d53821c5429c0990c0
SHA2566bda0fcef9c7a966b1c061264405546d300ca607aab6db977dd16efcd94b1a11
SHA512dddfaa9fbc8ffb043dedba2e86e61616606a49604ced1e4b241691821eeebfeca57255183c07fdab03ba2b0b21422f540615b3312e64b6c47a08841c2b5c0171
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00005bFilesize
97KB
MD52bec38ff8dc7da04f7a4cf9ae3065541
SHA160913a58ee4e831fce0a26241c73f31f184b0196
SHA256f94526cb842c831f9b56a239e05e2c54d76255d762fca5b7031f3803f010d682
SHA5122b0575542a2e08e4f89f6c8e7bf6320237d6fb3f857e21684a5d49ee2d86a018d1d0ad531b963489f905be85bc9a5022d85c0e30a4446b1d423be3d443dbc8a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000060Filesize
25KB
MD5b66589100ab0a321c8129fa1d967f471
SHA108c06b7bf4efc46150aabf04cdf902f8af506439
SHA256f5bdd531792db0e4db3769879099a138e3054eaa7c67b4661defc9945599835a
SHA512af6561916574c17f3b6bcb69f006e2bec6e08ba654e99e6e6767424c713a4819c8df13bc9d6e9a3804acbcb7b29791200d97745a8cd7512fc7997dbfae4ba01e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000061Filesize
23KB
MD59156b4906b6eead34e1bf678712492ea
SHA13e1830d36dd26add863a5de1aadadeaf12dbf5eb
SHA2560530f5b08d3276e3c14e920e0c19506c2130d73a9da585799cd9ee5de4b20b64
SHA5120e330f5057fa6968e97d64869a9f4c157c9db31511b6bd0eb454a7714f6139fb05f883e64ba4c8503ba140a648e874269aebab157a4b375731d1406c6b7514a1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000067Filesize
124KB
MD5c87f2109aea1d1a4f039548e684e04c7
SHA19292df3789d2b73e03f0ccd5f8166d42e9619715
SHA256653d5f0532503ad4ff01ed821c2ac36824bdc3d640807167a3706c852d7b5493
SHA51219a3c86dbd611558d61e98e75247c7a1ee8adc1d7e26638f185793cc73d4fe61ef3c423a01af03e2ef447406b49e45587eae83ce8b8f1e5200688ada26a8115a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000068Filesize
85KB
MD5160b06b07ff6e19a177f6602ad553934
SHA1046ef0a98aa1dfb89bc1d33731c77e4ccdb13a5e
SHA25686779925102a02bc8dc9e23a0526c464ddcf5d5237cad55d3ef2201ab1e507e9
SHA512a956e0ce0fba91f4f23b978c3fcc31dcde41134d72ca7ebf1e74030c6122847163b02fbd69a344691aeaf22b1fe74e395584e704971aac89a7ad64c5ef2ee6fe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00006aFilesize
101KB
MD507b44919e4829d966e01bd4d42407cd7
SHA16b6758693417fafae665e5ba09c39cd4f5a9ab23
SHA25680f4d1706eac5871c023c14e7ab0c97a6abc0b724f2e24c0de16e3df1df4b690
SHA51235140486e116a564307d784cfb58f6b3be9fb0ebe3bd4c4599214eb437bdd2cddb2a3d36720f75baaab85e66ec4e64cb12754b49872b6775fcfc9c03db40b023
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00006bFilesize
17KB
MD5c804b2ca38187682ae2c8ced9630c3d4
SHA1a528eb4f1f8b0f14afc7efb7af843d0357540216
SHA25647067b07f289f16c381ce2760279dbbbecc17ba7931eaae22110cc72799b0a36
SHA51263392807e63d5454e3ef21d24ac7122e5b49865a52c0447ecd28cfc244844df508f4d72082643fa541af3837340b4e3cf8a4360d29a90202a135223ac0ed457b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00006cFilesize
92KB
MD5a4f2587a2b004d6b1041392bb38af229
SHA18d250c13b12cc110d264ab8444b7482515bcc635
SHA2569739b72b9091a3a72123c3c2ffc5f75aee4c338b9337e83cea9953abe4c794b0
SHA51258aef69ab180d469b729ec7d6d927404e38a6beb526bfb348eba5a4cf4ddfd39064af4f4cc4de2fe24bd7c4bac90b1f09c354c5ef1489637ee7f8f8d2026f851
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00006dFilesize
91KB
MD58a6be390530213345e50f0d5d1d9eaa4
SHA13050fc8d75d5c5359e6c016bfead6eab3448447e
SHA2561d07e5b600945a5dbff82c47896e51b8f948c6b596e548d74772fe993d3b4ff4
SHA5128ffab01811e914520259d3b77094f3eda64ec39c518ea36cace9fc0008280306a24acd5715cd0aa8b42399d02d540ab9487756fb4ec05a86e3370a2a0b4984a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00006eFilesize
18KB
MD53c7d3f81b2d430b5989e8a82309cbd97
SHA1a2d2c3c6164aedc42fb286b08e1f4af64340d6bc
SHA2566d58847dd14db9afb693c4581c2abcff13dec7fd40584c6ba617942b2a9ac751
SHA51214d11b44b5068cae7e80b0bdf58f4ee43b02de16c99e6cf6f0370c4303b6da0e1bff0c221b18a2cf23109735c96707feb4f9c286ff94c77ecf5da1a16f683f18
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000071Filesize
36KB
MD543edfa7784c4a34b201504d8592854b0
SHA15b787c2cbb0d51d04036b6e1af3956bfbed315b7
SHA256aba3c530e9e99ca494faab706ef3c5314800631069a861f91f978e272e07cdca
SHA512d7d604a69a74f58846c2779bb496c9721baf3ae6a8356f947b16b1740f54ccc6643ce7d9898841f28d44e17db1dd751376b6d233c080d7e023f15652c956b261
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000072Filesize
44KB
MD57dc62333a2c1a40a5b2dd162d7d46d64
SHA170c5d3890395ca582540bcb2d68882b413a43082
SHA256e53f1d922eabf93353f9586c3406e716ae92b97e391256fcbd2f275743dc2d95
SHA5123346df74402a4699ccb478228d92ebabb6eb5ad187ba38b80ffbd6723628dab0a805c2c5b2a629ee792f9351b672006d05317d76e8140feab465b161408c4b6a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000073Filesize
371KB
MD561b274cd423096412f2959cc68c51845
SHA1fdfaf798f816a450698aefd5636f678bb3f5467f
SHA25652c944ec0a52bfd766653528d1a7724b6c8bbf1904da24739a2781d8a54eb790
SHA51249d50b05001cbf46fe5245cae2ee76fb76a4889ea2ebb1277c6d3346d772d37dc05ef1efb1ed7e0ac18983d04f2e0fa2a9114d0b7afb507a95849889215a07d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000075Filesize
82KB
MD523a977fc083643da7c382ef083b42708
SHA16705bae34e831c8e9c0ce34dd77824ea096abfe6
SHA2564350e1f4b6031fc0f210252ab204559ecd53ce1ef596e4a2a609ec783fb7c251
SHA512d2178e977d5618e368449a347baf774affe926035fdef635472834d0e90412c490e9228d677d543d8d8e18a6bcc2090448f9f5967387c7e16763dc1426620c12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000076Filesize
81KB
MD55d70a7db9f6e1b6961e338141faefc0f
SHA1a517acaec813a7048b61986fbf82e931323a0c9a
SHA25656060422ed692fc2b3b4c7ac0fe0bc0ec1094dac05f3ceb7385e2efb75af29f1
SHA512a827adfeb62020c7301559fe07eacc6a97338a17c81243a6279e4b6c52027cfe71193666d83ab9712a9db5d7452cb35de22e51ff71080246969756964e76d3ec
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000077Filesize
129KB
MD5f3d58ac3f66007ffd7f57037fc01ffd8
SHA172927285f96d6a5b27c6ad61fa9d103619c830b2
SHA2565fd4de94624cdece32a823264f7e209c88a02cb7c0a30d41f645857483ac0c16
SHA51261ea7d5b2b7038b137923c91cb71df99a7652252ecf2a01497e6dca20e454adece9c146e3f0739d979ccf023735fab6492fbf06d401f6f8ba18ff1f020f71339
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000079Filesize
837KB
MD56b48e25b266701e7cb2080f30eadb893
SHA1946eebdf52b91d1c57706a981e0bc9c0fae0aaf3
SHA256242e825a603f072d589d276354e3491a91fdeb44717eec52264ba1d3cb80852c
SHA5123dc11f9b97d78ed964030f351ada8e216e0d20c087552cfe7b377ac278f567f36c47783f530a135e68a4ca5d23c82bc64958f462001674d29143b6c6a6cfcfcc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00007bFilesize
149KB
MD55a2bd9f1d16fd85c82ce07d23441d6c3
SHA1443a843b1435cd56ee2f319aa42126c34b56aa1b
SHA256f901df7daa254d3a97993d0143f5dadff757f6fc7c747d66b886dbe611605a17
SHA5122c5c0e4212b6c57d64c36704fa6d5468b841298d54ac85d8158b00fb25145d0be8cdcad80a48def7bdb66655ac2f857f164af6d9de88b6ebe9ddd357e751ce9f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00007cFilesize
23KB
MD599911d95e69d1863295186bb7aa8294e
SHA1bd8148f5bf0ab37f144fa660a81c75478167db43
SHA256ee9f9d37302d94e97a594f502ab83427c5bba82490fe1c142ffd7c4a1ee32fab
SHA51211a8426b9b5a21893cfd88f1ff7a997040340be150c961ab2c0b63d8733e6385f1cae6a23337c184925db0a32f99d2231283ebbddc21aa7afe77b4ce6474cfa4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00007fFilesize
96KB
MD578cd27d71ac6019b3b96781dd11c96ea
SHA17bf2ff88e996342c0c4c866feababa4eb4b70a5a
SHA256d1861968639a0f3022e2e9ea5b2d6fb7447f5d81926c40fcc70231945550ef09
SHA512c353132ba63ae4b7a953c9d4963d7b71579f7c66ff1a3be32de8fcb37c08ba01a50877805e6cef13d4c63af3859d4f1a5b9f9f7581cd7e4d9cd7f7d29d3600e7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000080Filesize
38KB
MD566d703692351fd795259532bd19ca3b2
SHA1ac131b897b21ef5d5b78b2ff49a5969398298040
SHA2567d78050995e745a55daa395b82522133a306754e16d9cfd6c4a15ee763281a77
SHA5128efc74c04a9f5a55c2a8caae3680f32b3474c23c378515f445b0552c1c7f91ad763b4c00be36c19fd323e2bf2508327998a3c33707a16489d15c0be318669aff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000081Filesize
86KB
MD5e77b18e99b59f547910b8403db7fc338
SHA155e887ee14d8e9d93cfbbdc56bd3c2180990ca8a
SHA256821934b63fa565753e89e35a18698d42a4f9387342ba10b2b96f1f8b449e5c47
SHA512763ef520cde828bf87e780c6b4b3656f4d83a439a6af61b52017647eebad4bc4744bd855dac90b78adca7cba9ea0bc4f17761680bef5d9929836ec8003ac1b55
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\0b93f7f9990ac49d_0Filesize
346KB
MD53bffdfdb09c43047dd31c4254275eeb5
SHA105e8e3bde68f11eaa66f038db3e4755519206250
SHA2561021165a7fb5aa52ee376dd6e3146722a40115edfd9d049bff51c98ea2e375db
SHA5129ad537f214a531e87cd3d837dda22e280266a199650af085747c442edd5701407f3d721fe0f6626a9fd5909bdb15a618f1b177f8c4d46934e914c28da0377848
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\2abc4809518aaeba_0Filesize
278B
MD5909d0e541427083dd74141a156b580a6
SHA1b1b7a782aec9ed2fc536b5597c2fad52158c0c02
SHA256ba0620c18115b40e022cacc0505d8d4be384989b1336d4562d897879ba65db09
SHA512551414e3aa5dde8b6ca3a481fdb926dc41b56c557f780ffe648b16ad2449e92bf622dbba6a4d58ca8e1cec2c9147ebe77b6592cf0fd0892ad43fbcae1d9b9b24
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\37ceafcc4cf4f0fc_0Filesize
32KB
MD55b16d4fc25a22e12e92bb4ed32200ae6
SHA1cf3dcce85092f5018592558764b06c9533d25e8a
SHA25644efe15752bed07497db02aae156f1a31f12042fcc771686d267262ff3a981d5
SHA51275d3ca9567afaae5f71a9a982c124fd4853d41c27a154604e0cf58254d30c4f6fcf3e13918339274a31eb0a97efb56c9a3853870c8e84d6f4bcbf2c4ccf1492e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\3de593d6dd10ba23_0Filesize
353KB
MD5f0e5c25faabf320ff9b988db2e687e4d
SHA1c18d5e071ce50a4446916afea46c9389ef55653d
SHA256dc6206937493d7a9cd9ea9206f2761b7cd1420db811b8759858b34bb5d2aad66
SHA512eef25458a56d046570bcc3e49a518eb0cdcf3088db81b021d62c65f10cdca9b3c4e151cd9a6de51b700395cb646dd2c5d45b5ad807fe75777ca61257b8bd0f3a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\3eb5000493e08ec7_0Filesize
26KB
MD50d3ec350fbeb27a61d6311e06b63b04b
SHA195d3051bcae3668951be263a0ac0ffc66091f635
SHA256a2660ef88d9ba0cc281921f8d7b591ec3f080914f0378c6c49cc98022a1fc677
SHA512950cce66ac6ee281c219e4421fd2afe10b24c695cc6f2ba3fb28ab7c946c1d55a183b0c03af2d40e5aaba17dc17214a67842f811ed850d03e80e8c324b3f8d42
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\401ee8c1ac04ae17_0Filesize
271B
MD5cdbe9292072dc7c7e4bf5537c4e8a5fb
SHA1b29e8f088ac82a324b0427c60dae9768f7af5c2b
SHA256b2df90e8e37774629dfc954b97d62faa0bb38b3e8bf0620eda7bbc9361a9e68e
SHA51276077984b670b284889dca847a952bc55ec1221535b6c10d0cd2613f762088354cd80e409debae879857767d5d212cfb3a2b58064e42beb1a8650ef10dee743c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\438b4e0073fe674c_0Filesize
287B
MD5504f23f6136916498cb6cfd58b7b101b
SHA1df969bb30b7be515ef6794f6fb302d8e349b60fa
SHA25671ab585f7f8c884805d57e37d2c8d1a55114864a929d4e51aed22c12723b173f
SHA512355026aab79d6c418cd6d0beef7299e0af0c2105ce9c2b64c8622faba0ca4c12f43616c2011e907b9fa08ea64aac2ccff1ce6e1a7f7cfc62b23aaa23f9171eea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\45a16ff6d0d9ab5f_0Filesize
1KB
MD50696c6f0ce81631010c7b79af2dc6897
SHA1df029373ef0f846f152ee5c7698f7ccfbd10982d
SHA25658d9f8ee5bef8a8264fdc9df0bf191d23cd26e856fb05fa2eea44796732e9880
SHA5120057953a3ba90207345e8887888c9369444be2f0db1090878780b78f091611df71a77fe762eaf483808341ee77b2dc96c6ac144f55ec8b0d7ed49e1164f0ad32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\4d27e66db31de343_0Filesize
259B
MD5be0ec36a1cf07716e72d415eea6c2c8a
SHA1dc6fc7daf0dd2f82c8e7595ca739ed183d26854b
SHA256c716a81752cd645563785b77441f0b5b2927aa440d0e82a64b41b0e51932a163
SHA5129ae80afb6b46076b01728fe9e562538ae0b7bec335d5daff1849ff673f747491f8bf0e4c77564a75d9fdfeb6c93198781353121b01987368eca8f20f6f3c5df7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\5d0dcd1b9389fa67_0Filesize
48KB
MD5a32c90217240514f093b07191c08aeb3
SHA193f49f22a3799e0c780a80a0e7073b3291a2482f
SHA256aaec65214a6899a02cff4c9ea1daaf69666cfcd6a594fee4e08b1597c6340fee
SHA512fcb7e65d6934552f9e968a909001d11a7c1be7cddd0842cef72b3ca087cc1ea5d1fb6f0ca0f5a63345ccca124c52888a367eb26727710dd3d6b1e3cdc72d22a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\74b88724f60b0383_0Filesize
1KB
MD5be0a4f581df1b0669a0e8473256c5b49
SHA17da4b1d27a221988f392ff194790fc872ffb81ff
SHA256271a5659b892ab155a7bea5afce56b7b26fe2fc61d6f6f6e1c02086e2edc0aa8
SHA512f0fac190d4fa12ca87f35b6cbda0e5abdc3a2d52ffc1a0b70c6b7d2f580fc1c313537f47cf499329b81febadf0c7fc1e0282a72b9188afba4f347501b19bd29a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\8f3257cf4200d85f_0Filesize
365KB
MD5017ae385e706db3f5ba4695541f5412f
SHA1a40e4bae50039ea43c9c65e6a6920d69404667ee
SHA256197f3b0cd2dfef1b38728766783fde5cedee0277983b7e2d4f2907fb5331c514
SHA512cb3626f219af72da5f165fd578a7f3c0f276b2f605d31efa71430b4fc9efc503c486dfc304a499626c8cb7b12ef48715fa0d95b01b25dae0227efd6030687cc3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\9412c8b664751f90_0Filesize
1KB
MD54b1c8f0e4e275bd8e3bb1ec934040f0c
SHA11b91cf2b8a1093e44879b3210c0c49561786e304
SHA256cc495505b22a122942592cc2786bc2ce2b10a8d251b564c30e23ba5d7689ef40
SHA5125d397421786b0cf986de75bc447f8181ea65dd8e7fe3b28cc527c0fa114f60d4fe7cb1be953cf5d5860320d7a92cd1e5641a94eea9117b8b9170659d1441c64e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\acdcf005853c9a1e_0Filesize
287B
MD5f5490aa57141c2e6fe9ce041f98c82e1
SHA146278c785c73f47fa97194f635b8836912626f6d
SHA2564f5ea06f5a9c16f74ea4971335834c7e3dc18ee5c53722d7be8ab772bf89b2a7
SHA512786e75251821f07604e15269c8a90e215712d141b08c635efeb803310fd3ba747fc0d2b823bd15d1766b3c47be6c1d06361d9ef7f26417cf578b5bf91a53b4eb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\ae8c49fb15b8bbb1_0Filesize
84KB
MD5bafba6b77af3f3c22d5d506db15e4d19
SHA1079982b11c84aa4c3e85d2f9c469d157f8e2077e
SHA256c5c2fb5110433f9a1bde20409f30b718e63810d5c9d9c2582a79869b07b49647
SHA5120f28387161b22432d72bb0eb60449523648a8cb39f0bb64ca311e016cc77bd9fea367203b66cb5bf02ee032a758b1840e58b32dcbb0b529a986631c8f8f6bdfc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\b9920a354881cbce_0Filesize
558KB
MD54d7c53f8cd590e22a50555877569d899
SHA1e1aca8ac4bee0323fcecdf6bbf83bb37d485acfa
SHA256d852fa98b8a7791794e7b066f3fdc8962a97949ab527dad743be2ae01a3eb4c0
SHA5122f75a0819ee55590589d2966ddc05ffb8d56e5dcba201c632fbe93bd212e8d223c6c71977f1f6bb41a5618132a9a94edc205dc1902f87596dfd43cd9d863de8d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\cbe82211b3fc8934_0Filesize
65KB
MD538ed009b1e94e616f9b0c01a03702a10
SHA1f71f857aee0358d9b9f587e82b36fd2bba31b210
SHA256fd2646883ddcd07f30badd9700fa46fe67e11c857e3d9007ff54a68e94c44132
SHA512faceaf058da75abd71aa97bddccfe8f1678caa12d678e666db2454ae00dc62a341862441851fbb0d7b0c606684f730fff827e9782b989e21af8650c5860549b9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\d894d6112e3c8090_0Filesize
272B
MD520fed2267883ee8a404a514dade65c70
SHA1764f0f176ab82ed646890129dfa8686e1536e207
SHA256873647356c09480f820c957a59b182fee95c056e6cba6ea124ceb6dceec3808c
SHA5127923f31a7e13d697f23c577f38cc66f3dea588482090b3e9b1d92a46a738ecb295797f21005fcb8fe1fa017d9f5821af05c1b75d88b616520e9dc839e6d70c04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\dc0ae73633c6720f_0Filesize
307KB
MD56fcef26d7f1f9a9cfa2d2b03eb1bfd49
SHA1311de743e7ba5dbe62db3e64d9ceb634478ecf44
SHA256ec7eecbe92c993995d87800c317019318cfb3bd2aa1d07e3c3c4c09284215a86
SHA51286f97b0d7059ba74c64500401025a51c94f12d5f20a0662bc9dcf4a7a8108ed241c6c648881c506ea0405bc6e666f4fd1973d34f13652cbabc543da6794b5845
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\e1201395e4898926_0Filesize
255B
MD5c70c5465aa11d0fa8d529747e0c7d527
SHA16baa6a8050bda68e957e59d8adab8c1faf2401f5
SHA2563595ec224f03e693aa2bece0ebb284bb661ca7f404efcfb09ee47ecd7d2538c2
SHA5129cca359b37f0c9642ea55b37d1ea72e800c9bf4ba560ba5581732ff743e5f7eb0a5e3df52f4b9cd945fb1c9c7b3da013be078424be74d653e538439f7944c50f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\f015012a313a11cd_0Filesize
61KB
MD572760500a902765b24dc9a9d3aa11d96
SHA1b111a59a9adc70c39523c0bfa7a275ccb6a361e3
SHA256190b21dc14835024896c62d0d71efa7a709c673e392f66aaae23aeb46b4da1ef
SHA512058738f7cb451b506df702a8bbe1c3dd0b0259ea6c02f92b27a79c82f0c8fdec470d0da97529788ea065353acf08feab2b2404ba09212e251f8494ad594134c9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD56694f09d141c564904a076881c573988
SHA16de43dcdc0a3ca831623356dba4c02add16fe5d1
SHA256f8b9e0edcf9153b8bbe136c9e172389d79d9cda7e06706d164c7ef133a35849d
SHA512a71066fceb27ec0ea4f898e2c0702932614e681f29577547cb24b377a756aa143026d0587bdd36cefeb21cf2089747eb622f3206850b5bf5a9fb783ad54ac108
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD54d48b43bc06ddc8a2d32663727538342
SHA10d6b2e0a4d8eba02a8ef8fc5e8ddb6bb7dad7a34
SHA2561d79eb3f7c6f1d7c489564fe447008b3208ae08732c6fea704f03ee88bb78c24
SHA51245ea6edfe1787490bf10a450fe78dc2739c11919d437ab72b6d3b0f5d2e51766b116d4a36992924f365447d6b580476fa86cd5e35a64b3e75663b169488b4516
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD5afa23f110d95709437872a761c2209fe
SHA110d0989eb61e7107e0f336470bddf26e5fcf2b14
SHA2562f372aa439d4a90b4382118c78e9e2ba0ddea0f473c95288b6665ef80931f431
SHA51271967643752ee9c0b3bc741a745d18997c4a4b4bea57d00be05daef59af64954e6cfba57307f18742aac702d08dac11f33b269a165dc020279a11d7a0377ce30
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD5e6d4a4584cffb0c8718f3f3b306b6ffc
SHA175c58cc7dc578d9ccd86bad39336effd7db19783
SHA2566a620172d22a815da67af4dfbf16cb0f2bc40932787eaaee62b538767a7c650b
SHA512924e7675379b4301fc78a71871b438eae9897819d0fe0afcd8d40ce81d81a316574510cdf5ef282196f8a03e8c0332e06c4e89455510d44c17cdac8da19949f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD5cf4aeb5149b69fe7e0691fbce4043fd7
SHA1d520982982e7745f0827588ea0d463820bdb6b4e
SHA2565c86ea053b6db65ddc964ca35a9a6b62ce5d58dcb741d27a64d310c25cad2bfa
SHA512735492255fdf066f87e6d180f49d456acef2eaf69e6d959bcbe4f02a88eb3e4b622f4cf66fb53b42fd253c382143fea3f1819660cdfafd4afe5cc73af1e7ecdf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
4KB
MD59d0450ee851c40e209d3bb79efcbd7fb
SHA14b8b3e16bea1065cfd05ebbce97f92a928fbea7c
SHA2569430d484af3a21c224400e37ab8a8029925aaca7e8ad537a54743caa922f16e0
SHA5126003bade7f1f3b4e99be338926dbfeec84815507a33b62e31d8d0ad9369353179614397a8d686bbbc471f2908fdd6bf8cd381aab6ef08b49edd6b6859260303e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD5ec8d3efc6425345280dfa85e5173cf52
SHA1627732aec6050df42b66c4f3ab961c24737de998
SHA256659af3508232f129640ae866bee5ee6f7c749a4a27e6d7ada1392d75c473afe4
SHA5127831b74e46fcb86031d5f1395131f05e968b26941fdec6af91c0d7bf30b506446447539f01f22d6721799d61d176730951a97c31050d68efaf6906adeb470882
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD58470752560e8b19075249170189b88f8
SHA1ea6295458e5a67baaa89b717413da83c4559286a
SHA25617012ee2e6338bd37d7592a769b7a3d198a270e5d8a0cd45e0c6d13293087c20
SHA512741b03ea7e86cbe220f60f43e66e1e73feb795749eac57a6f0ed2ec2e9998cdf8ad2253703e2d185010d44ace06a27ba9abc787fbd1b213ff48c956f4991d277
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
3KB
MD5439d6698f0de7d447b3d6506eb93d5a7
SHA13bc71406982e0a5ecc855d8a92ab3bb3597c22e7
SHA25619b500f5a05a64ad2445d6e3c66e9ca00df280cbe77c96635c01ff50a358dee9
SHA512c8d54aafa36e6ea67a9231007358479c911c25a1ff1aa6062338dd45ec39ab7c0f392e8656a85239f2849a725cde18a40ceee62b6b6ea5321fe16b606faecef8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD5191c4ab941c34b4b7f90ae4452c43382
SHA10be202e0135cb2477cacef8d47c8acfc6e1dbfe2
SHA256de7b2eeddbcc05afac0a75de7a2a09c651fe90c69abfe505aabc259a1ff92f05
SHA512296bada85026351ca804ef10c465064951b1cce2345924661c2fe630805ad889f1df9ad1161a380a53dd72ec1be49b18fe4ec3edb000d693e6525a3ae7f976fb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD52efa0559d6336cdc6d02e7d3af46284d
SHA10c112db5682dee9c3a6d5b05cd31462404492de0
SHA2565ea8e1115032fbcd7c43b2216763ce471b705e01228cfb3c3c02e91cacd01001
SHA512115fc73d2aaa8a359f67fee9d945cc89dbffe6b2cd6cdac5ee296b2698dd53e5a71994ff4979412e40f08dc6af14b60155c3a5bd64e7e505e25bf86ac295a667
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
920B
MD579e17821abef95eef011b498c1fa84b9
SHA163a0e491465dd831d42c8d88149b713209f31f32
SHA256b33993ea05d20b23c77efb662143f9bbb79257e65a7c749fc4df8e02cb72c860
SHA512b572e997c0854df6cd62e186b2e2d669b249f94409c979713d70c715fa69d9d5342723541c89900344b753feeeca908d28339e73fd7454883119a9871486d385
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
920B
MD517767c154f67c5d1247c5b84d8e0c0d7
SHA1ec536f4dfd284e589a9337bb4abe9cafcd82c2b4
SHA25643de59b490072f901a98ef77f223034bb6a8adea1806c727a0edc1ab1e639e1d
SHA51243e94e69b58b15199b42058bf386e6781d97c827555dd20ff87a67165e4711edddf64446939b08e9ab4e7d53c6489dc7c57910da678b7a928af50a3b8821b997
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
4KB
MD5899827658c1c55781affc36576711c4a
SHA1c75d4193713da8652d634282e69646b755b290ee
SHA25660bdd9ea5b0883f18d8d087b178ede50a4f8ba069b44158a90a199d9b814a7a2
SHA5120412185bfdcfec9cd986d4d8ca3a8e5a8ccf86e8d5b1097200d6416307c58650e46accbc21f0e4951797ef258de7122e88ddc140e8e1e453b8f3e51ec8fff005
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
2KB
MD5c26731e62570e8e5924ad6713cd618fc
SHA1a3005cd570ce544efe641c939b7c0c778e58ba76
SHA2562c093c61598fd75c02dd13034778ec886a15645aa387a19e99fd2a9fe19f8bdf
SHA512c80e8ed1bf3dc64793140d5e03a692dc42912a7c1ced344854756e775578f180dc5703298a47590558bec88af68ff742fb302b30fcc677e9cbc2b3b6ee8bbfe6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
554B
MD5b2e915702e7ea2b1beb030d0d9e81034
SHA1c1618fefeba1b7894b93c70474cab2fae1881f15
SHA2565b4e5035a9bbd0981ddeea24e672ea763fada274e50a9d01d151aeba87a24ab7
SHA512c8b6d2e8589fa020936034b70a38b95385fdcb066297eb761bd69d82e86a35d1822e1a2d0406a6ff64b726372bfc497afcda8baaf8e3245215a17a680b924d27
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
8KB
MD52f97aff41053b6f5dce760bdf4d7b2a7
SHA150b3c8d5c056159b61a931c8dd16d7a05dfb83b7
SHA25693666c84b8d728664beaede994d1b4b2c2ef155942612bf6ac77aecda755003c
SHA51287be1059f8b3e46cb7f0fe0aa040560f97ca636187947439ad019840f5446d8e07c65ec52ff87ad416497399d6385993bf73fb16c9a12033736bdb5fe6079dab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
4KB
MD5c1061019a428506b7e63d165d7715cf8
SHA1b67fc9e8cfabd0956beb6011236a3a377f3f34e6
SHA256163f67a44a0dfda3ae6f47112b0c0610e145001e49c6dbdc851eef849b3f5d05
SHA512cefbb5c9356f592040f80653bc58ef0317779fb5330e617b9133f2662f3336672d80bc5f50e2300729cfb9e13862d0a09023f6f8296b958bb7bd3fe312a23aed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
8KB
MD53a1dd4b3b67fd7d7abd911fcf7dedb53
SHA1029eb2d0dd3215eb34c9ddb4ced34fee35537608
SHA25666d29b65622591aab359fb81c084ab72e517d77ea5ca7701adf98c01651d4ae7
SHA512519405d7391a6eee70e1955119dcd480a49ac5498e578bca5a6ef42f12043ce19468f96dc326f425b4386f873497b5c8a0983193c8231152a08fd74f20be72b8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
8KB
MD53cf267433859e5aafbcd6a16ee014bb8
SHA175bc32ff9d7320152397c2f65e89177302533b1d
SHA25694369e7d25c88e5f31a26ded8a8eff9297a24f3f6b5c835950aa3b431c687225
SHA512c21ad6cfbb2e75477fbdaaea62892c05e44037868b42259b22d355911975bec8c5b25ce9071136b7125b7dfee13c2e3359a2f0d782cd3fe285b4ca63d4af589c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5a9e4ecad601d57fe0f2af75c3db9654d
SHA14d7626d4c97aaba3179ddf8dab1f77d8cf45be10
SHA256cd4c1583bc98798c7ecb4f84c76d79db32d3b83f50308761725ac4f3db26cb08
SHA5122a710d253d806d33b8c6cdcdbb8f38dade05c44e7a5a60a4360782a6be640e3f9b6a622bdaf230e9a46451b3f24e2bfa39b0a1138485e093fe0b9b7ca32dbcc4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD58c89c10dbce2f231b1cdc5c0101e4255
SHA1e8fdbfc466f5edbc8a6bcb5822f0e75334ae6059
SHA256428fbfea0ac381dfb4b92d4ef7847f10256627ab80ea51ef72f63a74fae6b3c3
SHA512da2ddaa799dd94de87c6aa63852ec9def548b0a4f41808628be529638b8a7cc163afd39fb314160084a417a52ec570672c0b9ddeddf9c64d26d3544b337b2b32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD54f14eb6bac6630b2166ab838f96a1d3e
SHA1c46f97207bc1406201808ec19b5097bc7a996185
SHA25616a01b86fb11581bab1911a65a6b3c617ff7c45d5cf418a3f8cbd89a7260fffd
SHA5126832becd41ce837a3b106af57672ad2cfaa4d350ce096a46e067637fc457ce3119f5a5bd2329f82a8afa263fb181bacc3d288cb3895c8b3e88e091ee28ffd759
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD507ed3294957cc948471fd7f106c3d728
SHA1d006eafd1a8a55d115558f4806b515b885524186
SHA25696debdd30ce481366f36d92a7be7f585f3feeeb8175519f1d7dcc547c1abd4d1
SHA51270d5b07aeed2a629c7c2ffe5d635462827ff2b33a864ee03861c2fda8783f028436f7fe6112e374e1dea1a525639ea189d6196d3a61b2b9fb8180586791b72b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5a4d4ed974138989fb56c33650ced7204
SHA115fa467043e8ff1c2d536fd827b79496e7884210
SHA25619f565423818a605211567c234a6948a910f742705b381590db567091ab807e4
SHA5120cf30728ffa569b8df7868bbadda1b1f35a258537defad1f201208f76d4e9fbe3ff57e1455a3064b3f199974f4bfb7799228874a89a8e4efc7c9b45e94683b51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
8KB
MD5fe896f70075894d2e7bb24b0b434619e
SHA10cea045d0ebe28a1129758388e7d59eea791d3d1
SHA2566bc1b46371873779fe41f713961749acffb37392c201dc6917e36dd81be55f39
SHA512beb26ec5faabce94df7d33c09bb16373cedabc448621b5871cbca0ae306ac00872a46fb4bebd251c1e70f32184ffbd3b8232b3f418bbce3152bfa12931554808
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
10KB
MD53c4e5e35d62ee3e1feb4c2120120894f
SHA17bd92ccdb958f2c2c6c412cf1bc354716d0e7649
SHA256e1755f7a5ee8d6b8c743aebbcf607c7db2d55c10fd123f4de6a2981fadd8358e
SHA512b277a76aa4b92122ab15667fd78756762ee2786f11fbcc6f19d72de0ccb75dfec326c8ca80cc06f3689144577c18d41a23d2d019101a827cf75502e241c4ddde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD50aeb077f264017b0e2f41d7dc2a25751
SHA12be4e8d0c369509c9c4ed5aa60c93c4743513b2a
SHA2568823cd94501525fa7824abe5b63dded6e091ee3698f63e40fcf2e5df73f15710
SHA512d5ed27a4c0a04107dd65c5d876115127776e3a864be4935d56f8bf38c4486e2d0130e97b5324ab128f7decd01a456423438b79cfaa757fcd9c52a6c3d16f4fe8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD522b28e08cd677ec45b7f177b3df7ab8c
SHA1bf7f1198ce4fc6a15b3538c67c4070efc63ebd3f
SHA25668bc3d95a2fe6d5fa88c615e58e7ff545dfd1e6e0dd24ec9d28adebe003ac5ef
SHA5124cf164641c78925d9f2ed36174007412b0b0e34b7aea380348eb724db509df85479f3126eed36f509e02d017932043757009ae428cc784e08f0c6f1cdd2531bf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD51b60b8b71d43fe50a65f748716f54835
SHA1d1332182dfbc79354fbc416adc9a8cfd41e4a367
SHA256e71441d31a5a0e331e3f73d83f05f5dee02b5071c17bf4ff83e88152fb12205d
SHA5129bd1322f81928f6919376ea801a6481d9f0ffc5a5486dc346e474d0ba79ab9a8a13e94b7d1df575ca9e9d20a3030a7322557d0f37353742914e01d9af68db9cc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
10KB
MD589e179a590e0f0867389fba0c2d65920
SHA1060a1bc662553adeff1cad11db8b3bea75a34eef
SHA256f48ae3a7210015131e9d60a3f4410f64a2cb33157054e7a9ca8b1cdb1c24746f
SHA512e5c60de751adfdb8b1e26e1d1b75a8e08aa6e53da55e324eb001dae081ce12cfa964a09e1639b887fb1692dc191c024ef0d653978190113be09cc462d9db2fc6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD58ea669ba90aea3143b9688720c67a068
SHA119eefa2286a1a2f3e4eafc3688679305fdc3d892
SHA2560862ec206901c3e01fe227c8b65c34e296dcb68879b2a0f079093b2cf9f8297e
SHA512cded23343ff5ca643841acca52fe5813b051cbe66a659e3c59a80c78f4644dbbf2f7b02076c478b3f931bb739c08cbf15d9f8a6dc58b9165d597854d263db572
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD50de6ecdc01a9e877c5d1ae0ffc3ad6cc
SHA131d379e21f100456bcf54fd9f1c412ba1db7ded3
SHA2561028b083d11e091c262547251adb720bbd42e0de1434a48f092b7af99d6a3050
SHA512d54c2e88fc86f540b4ae9e237f8b044601d0c094d4c70de38be5a2a80c524f3534b1e9fc1d4557592628e87069e637671c3b2676c63c9f87463cbe69f541da93
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD55916e29d7a59282f2cc2e254e63413f3
SHA1491808d87ebc8cefed5becb0da44e3de98680562
SHA2567659d5bcd5747040090949cc0f5987cc4063547cbf4c71a58184e2ec0585264f
SHA512761cd797bb51c76ba12efe6f217835c08921b6cd4c2e8caabd6d16917178101bd0f4f2babb9cbad70b9f7a99683db13ade02c3b4255c401a87ea7352388ef9fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
8KB
MD54c5d4719fd8a3fbcd42f20f25c3c010f
SHA14b3b917a2a89919cc89005438754b7a2454a6ce1
SHA256d025b142b59e779d7d17732ad9c02a87dbacaede3dc57cd0f02dbf1f453799f7
SHA512d64f512340d5ef5dd32f87871b906cc365a1c19e12c4b0a9d1644dee7022f48dec1ded995376f240615e6833ab037730ca323d138390ae58db47f5e808596a80
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD554bcfe992d2e7ea2053864bd96d77e86
SHA1c32c52282e560171126f0aef6afb148cc6c1d5ad
SHA2564d59de1b12e109bb9051d352a5cd6a1ecd59aa4c7a5a82e9a8b9c2966ca312a3
SHA512763dfb8fc4c46acbb3184bc5185521e5981ed6b412e3caadc38fbd59cfc552f0292e001a526c9b73a9968e6acd97b85172f0a1be37eb83892e1d896411bf3893
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5168ce6ba4515275e9bbf849f6f45e412
SHA15029bf22945a9eaf10db86de4e50bac131fb4be5
SHA25601b651b859844e0492855327822322bb44777cd7265de8abf957a142c16e8645
SHA51239075a1a3e42b4e54d6ad4f68bc37eb07ed9e7966faa97eac627c1ace9bd167967789a87fc27dad5016636c27ae8688468650668c150ccaf05e7ff9253d25c36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD55d74e9361790b44fbf8cec4ced588a12
SHA162c73ded1780f676e8e2af971bb3627eb97f5082
SHA256d3d0b93013c768caa03931cc2fdf1f681e4aa4097bb95395ec15a85e7d8b910d
SHA512f9da2478f1d9889159076fdb539dcedfd868a04322661dfc13f951ad55e72009a48be25deec53ed69c6664af64d5ae86a3b9e583ef93fb828900de46670dbd45
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD5c5d7c9d93ee6206aa4be4807cec645e5
SHA1ade848cf066cd8c8d6a021f7bfee2694ea020087
SHA256b832734966034b950ca72c551f55cff9accc17698e25a4eb341c27130ee9c277
SHA5121e7edecaa2d5104daccf70183c49bdf34ab36297b95adb2ce7a2e573feef2cef08009c2b7f5537f15e327fcb51591524da0518ebc57b77941e0c248152abdfaa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD514a4434bab837aa336a08d6610e11262
SHA11fb919c1e13e061a5fdcb25b78e30292ee1ba5cb
SHA256598beb6ca1b63e6a605e6f2adf3037b5c5aa69635ce4797699db1f29cb6774e3
SHA512333044503af8c8051e1dcaea34f29583f7d67de84c01cd34fa6172fc55e19b08ebe01858d10421ad124439d42f06e62ac930fcba594479dcb24f4083ec864f71
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD5a664cb11c5e761fd7f76d3902ae35e12
SHA129a628366cda003e19a31a52a91210d101f3b60f
SHA256a3240f6ac9f2f6becd8ccb81d34b77ecfacbba0d0a3f42ff7a5aba78a645c113
SHA512f053f61da8be0d9a35ae3b2c7e34a52001e20e7b3a17a88fa9db5439e5b4f58e91f36e656398ccb986286ce14a627e2cec3fd9cdfa10d9bdebaafa4c41d5877b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD5fd34dbb49f1fa3d62d92a963a7e65c13
SHA1079b14377b3a22087774e93b1a625890e973e7a2
SHA256a8dca3672306d968af9c5c3086fa45e3eaf8a66c241f3b78c10161130b02884d
SHA512524c1a8e543101fcb2dde2cbd111b9a4a37227bd65c7afb8fa3845804839b87158767d23e0dc96707d8642582ee9a662756cc293cfce56a5ba2e884a1dd9370e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD5eb8dc0930c139ea884797da2ed0f1f0d
SHA1c1646d8a49f888656feed52bf40a3756b575a2f1
SHA25634195940ec23121d7af9877bed957dc08265cc9267d55b4f20a027916855e6de
SHA51290948fb99788c57610bae08dade04678bd528d78044512d7b6be6f1d934d6a28bafe087873eab425300728b135dc243005c2c8cfa199ca580b51305c0db435ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
10KB
MD56d70ea02b99e7eddf6d22f3a67c44a66
SHA10c1892dbe510361632a0ae975a8615395d3462a7
SHA2565a0b94f89a17d675b1298df9b778b8639d92725eab20f53bc0542be378356c67
SHA512fbed2cefed30da1a0ef9bef16323743b7713ceea286b159a92c74bf45860dbe4e90d58817db406c1dcfc17a23030f99264cc7e7fd31bcb39068e05035640cc46
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD52d65f3a80775258162d91ea8e71bc32f
SHA1809c2bda9af4d12dfc2259f9c5dfdd026e31df0c
SHA256b51f46acb65e2ebac456d0ee085efa663c6513588432eed93b4c8d31d9ff7308
SHA512ffaf7faaf3e7be73070d9813625bff088d39fbff9a51de7e5738b652ef603096dbcfe72b99576069b846522d8c0d0827b9a3d299d87417f7319dbca8c7975b10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD5ea758f7778dd844d8592bcdc8acc02c1
SHA16bb9ee6376fdb29f028c257d14506f96a4b60de4
SHA25674487890dcf2c60f262930ba68b957858a30455e870d1b55c8fb46bcba526d38
SHA512bc3617ece6c965e928b89bb37e9831157bdd7346cf4aaf0f719a871b3239e8d51fe6e0c67f54a40b4b2182bab828fc987ef045d9fb1769382430ff7d261307b4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD56b906f471bc43bb3aca202f8ae126714
SHA1f339583009117883ed068bd10c234ae46b231676
SHA2564b7ae298a4c2aa22a99e3c3fbec2916a16770e57d7876e749a06ad447db5516b
SHA51291e86061d62eb5d638854481d37df582f861b447464aec9b9c366405e520e7978d653ba5f58d9419b8c7101636256aa4648e47e85117e2bb8cb31f07b7df8829
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
5KB
MD55b662a35a2bba8080e3d6c9552760b67
SHA11655a8319b0d6bc5ee9ae5c339098c92d6968803
SHA2566dc7c9ff92e6b6aa72e1586750b738cefa15ad2bd9e35f8c5b1f3381898be7cd
SHA512547d1fffb69878d1f7a7ba6e19f95f7ffd4bcdfcac051ea627dc558f6cb9f9a1b1cdbf564dba5f42ce01042619cdedb5c7a32003f468d05aa46e2386cb725080
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
6KB
MD5c2f02fa179af5c6455a49f9446bea4c0
SHA10370ccf4cddf3d06b0705ba504f3c2d27d778a31
SHA2568a5981acb42ac7848ea364b528ec5ad9247cbfa935c39db253cff684fb1c4441
SHA51276dd9d02a82307145525f4b8bcc34e5c9972682406214b2e22d0644fc5911df1511fbda3679f4b49de0bab97a9ec7ca8826989d48171cb7aab12af8391dfcce8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
6KB
MD566507901ce4ca93eac206d32901e0377
SHA1ad64b2f20966f661dd17b11e7e4695bf1cc6f6ac
SHA2568d2bdcd0d227b6fb23fde2deef293f9040474f97efbe483f36b0c4cfe11f65b3
SHA51207da625fa83dcb90c2523c20405d02ea45e6237d382892b592f5ccd3ef558f4633a9238b83095320d47bdc9ed781408d2a2565a3c8c9a43ab8081d0686b9ea8e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
2KB
MD50e07e4c4593c3a767861f75134627a64
SHA1d704515de58f8ae853882b78035d291438814d61
SHA256f817364e1771e42568a505b5c03324ecf9d39c681116e29fb88785741f58c638
SHA512990d2740759da01bc652695f01aa263eeb92f16f224fff180d95a575864821d1dfeed32b2484cbf656fd7dfd0c2e60c666e44aa7f8ccf3d001916ded7d9e5b00
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
2KB
MD54fccebd13f40b1515b2bc8385c4eabf6
SHA1571d60df5d2b5f7f2ba230c7e718e29dba1dd20b
SHA25618587b2ac95062b7815c4d595e24ea486529823b1e5a0bac3a9fc95ff8b27698
SHA51287dc88ea923a6019912ce0b4493b6ad385b5de414918bbb3cba5f6871e214f78104b1917f84a61506fd8ad8208df88a4e885c4a5e9d0e23c27a21af0b5694c21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
6KB
MD51e30614d5d546d9faed6461bf6367d33
SHA1abdd3c4970c7e65695436319945a7c099c1aac14
SHA2562fa3257c33114567ecd2209d2424bb32436b07ccae797ba6666e656bfa050a2e
SHA512733a1953d595269e3cafe3080a45df33dad8a3426184f0d0ea11f530878864a9818b011ebe4af94e01ff199bdcae0f6b092cc4e1fdde5a9d2bef04e2608242e5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD555041cc089136cdad509ae27d9ef4c0d
SHA180cce17ac7ed4531e06db4b67fd13bf577b09c0d
SHA256adfebce36d6b17ab001fce28b2c385edc59eff826539b11c40f6a2cf9dfd60f3
SHA51200db172d458052af507a3bd50c8984773c2051ca6508de32d5e2e2dc9f81106df421f6e9c196cde4fe33e69802ec80d2505c2bf6c434cb4574d23be47e89c729
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
6KB
MD5581b33760f0d4303dae6309b98db6803
SHA11cc57789ea43cbeb53266d943b91563c5cb6029e
SHA2561c7ce91efddad5f91018b41edf9a9e83ddcfbed576dce781036accd9d1537394
SHA512edb580a3e18fa080ea2663bb481acabd6365126434391f9d7860273c3167cd0386ffadab5ca14aa20010401c4dc66d13fc4ffa059615746b6bf5163e51c7b3e4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
5KB
MD5ff539cb7726fe6b4c4b96da519d2ebc5
SHA1b309ebbe07601b389cbf30941d60c7ee752eb077
SHA25694dcd4bd78695d614a0a58f34beb0045e72781f43f0ae496a727295811ea1e7c
SHA5121fcc814eb8735161d0da24796ed743fdda7a99cbe797d199bfcdd2543c25752185ea361e379868b8cadb7eb09cd58c69f2627c6277739c803e6194675941f547
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
6KB
MD596d140c73b2ddc3446ada70ca8c355a0
SHA181ed1ad18e93bec1e54d0ef14dec15098496519e
SHA256046a16ed273419741fdc5dcf83e470801831096345ba3208053fb3d65de577dd
SHA512ba659c33664f98f3408a6fde30749cbee378b8effb198ae175f5665283c8257930aa8881ddbf008a000f4f62972aa2f9b0b2bf02efc7f1c691ae3d478c1d0c7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
6KB
MD5173a90114005fc503e952ef734b7aed5
SHA17078f7bd95ce220b990ec7c115eafead3e1900e3
SHA256fa31fdc3664ef48236727dc6667def086adb75632e876c22303684e786ab9bd2
SHA5129332e600ac133236b93db901fb3c8941072e80c6967ea79040775c8bc636688aace22e32f9ed97f6652ce46ab1316746c71e65ca21729e73c332369071add4a6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
3KB
MD52db0e31c0194eec8aadcd451d91bc96b
SHA1a788ce9eb58f1b1ca7566074e745ff9758181c4f
SHA256648baad42ee920595a7dcce0dd68b867c7b825739c2fe7ab792b695751e36d20
SHA512cf1809647e5096ee7be56fa9ddebcfb3640ab6acc5581f51ef92cc5942951663359a6b32c65d8c665bc10976bd67725fab2a3905e7bcd1d2a1fe01e142ea33c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
6KB
MD596360987a594eedbabebaef5a9a7e565
SHA1ba9c784ef1ba963cfa3c699eff724270959b0169
SHA256db301723740cb5777bc6a92472a3cd9526044d7e1683be705daf35fe7811ab72
SHA512ee0cce1992b22828f573791a5586781644b3d0704b668df8218b6bae2404cabf9f5d481619f6fd2636f23757d1de32b30260047308db0c40df7cf3aa950c6b49
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
6KB
MD553aaadc13b59c85cf818bac8d985c653
SHA139d9b783f38ecd2a02c70610a060a957ce5c8cc8
SHA256b11d877973c14231465a2a34eb988b8a885dc075b87caf3f30b4a5423f875ddb
SHA512db1d548606ed5ca88c93928f88f6c6332a10025a0f91dce24125b4763be92551f508abae1ff7abfe136ef8524e6a5cead3b15895dacbd461e122ded018174254
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
6KB
MD565ea6713029660d4004754c6602cdf93
SHA1655c0130c547d63a780639044d8707c9eeab356f
SHA2561666662089c367bc213c22ca5f73ed80c18df6f436161b60d5937c0b4d0cfc3c
SHA5123339ede25b6f0fb9da9725f4d4cd07d900ba7d66dfa65a3aef49055820707a88a8d01b35ec28e7abc07aa66081ca017fb04797ba9a76a17b4b1a7d96f754fb2a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
5KB
MD51ae5fd282ffec110aafd701eb2c121ac
SHA1397ea46ef2afdd6c88aa1fef914515951b51d242
SHA256b089264be107d334bfcb93e0c5340b581db9b8287ee955ea1a671c0f532ba076
SHA512a2308f4e9d744d7fda147a9529732bf81406c8e2012bd40f2e886b5c52ccd8a0d2644d515406bbf19f97390d7c585408b6e85a58510f7b40828230b116ca28e6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5cce06.TMPFilesize
1KB
MD5d272b776dbd86c6404a1857678d7d17c
SHA1624baa8ea2c5c9343663f8b0f063be0e71ccc21f
SHA256aa0ae2bf1f7c62a61bc7a59a8685fc00d3b378537a5879ceff3a6bf52f3675b6
SHA512a601b7675db1324cd549f149a47e5eeda1edf913e88139262816a4027da4a86eb67ff4b8d4fce8abd955f125371b4f3e13860ee1e3c19c811149491999d1fed9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ab8379a3-1fc0-410d-bf6e-35b6722a8de7.tmpFilesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\f_000012Filesize
26KB
MD58235f98068f731038d8520df4727c625
SHA16ef1e3ca36d59de490e593ec195b632e8e09565d
SHA25698280dcf81e7ed7a29b2d383c12027481bf771aa6358012ee5ffcc8b3af21e38
SHA512d75d4b688898ee9c9ee07f7be6e9dafd0154518ac54042270666969dd15dbc3b7c8cf92997c510f42f20a5ad8270d5324dd8f2ef91666a9d6d0450d60bacfd83
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD515db95574578af941e22203a2aefbe68
SHA11e109c144e933618187eb9dc8b5efca8895283d6
SHA256de1cdc3fb9b05b165459ad3febd95ccb36a37ce090829fbddd2848d179701979
SHA5120017e927ca3531783a2efb78aee829d33e8f355db7c2852826d3cfea91e262a00d416ffc8803fe9cb3b7f387e1fd0b0979e1326c17576a65b102de72ebc8352d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5ea6281e018adf0330ef5ef8ff21abe53
SHA14f10e2d80fe1d92f0b3ae1838ae5da193fd4e719
SHA256b8260e41738085c4c9f8225fefc835927eb91e9bbb3abebc7d484c5ef60f80e4
SHA51263fe53d62cae5b25d9a8bdabc075018d81e3279712347e558e0d29c024079f2ed41d46e017f81d08f1ca2fb9988e154e5fd1857b16b24333056699e00d73051f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5d85f4f1d6ec0c12c6cad28d57f05be53
SHA1265f0a96b478d2a8e45e3ea76d77e21c53112eb0
SHA256ad690e4bf092fbee86390848f7441c1bc1d9af2430c85cf0a49139f2b0526342
SHA51239f4263d1f598b27e897fb8fd09b1bda4033b83a27dc24723c8e2fdf7711a2b28345d18274c0f8b715cf55380fd25863c65ccd2f0a6078d0229efc2da7f5f500
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD568faa355e6d249b33b85c51693be686c
SHA19660ce9da647c20f851fb514791d4043558c290a
SHA25698f4783c316ab30e70e45b85a53378593691fa3a167af80020dd81c32fa45656
SHA512ed0273f1a7d04329677b4094eca3ced68bda57168a54c5790026de17caaeca0671f460cb11f01dea77fa83c8a758e8ad67ef9aae5d7eaaa0ea041d8617d1fc1f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD524a42b8ede02883d2ac8e34901f3ebb6
SHA1bb7c65f7cb2d81d286d76937803e9c2e1531f72a
SHA2568413f7a8673c83aba7a6393601b87b8f0bba6991845011ca1a0cd43a43c394d5
SHA512dc79a8d5323801bc9054c572f91cc440fc5ece31b0e94ef1984059059cf98f1021f34cd7d5f5f0d140cc4a9f94d1b5c549e43557a8aeedf33d77089577948531
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD50bd2f786eff7b6fb34036c2da88ab89d
SHA1a4f0afca0d79fb9faf015b5d57dd20c6596a88f7
SHA256916023f986b4cdd4f4746f2f0bd23788048b50fe6a0792415a05d4dc8f61b269
SHA512f89b85e80ec98e6ffb0dc6d4346b482e53e24579b49cd4f8859153b5a15250c87e67ce93cbbde1fea2085b868852f3fc1bec1651452292355f581743acaecbe2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5918173ac67b7f5c18391880e2ca7aefc
SHA14f1c1c7196b0a4f7481859e7585720a17ca77911
SHA256b9e6c6abe516af02aa324ee6616ded9dddca3ededf93a9f3045dd959e454b26b
SHA512d1fb19a01b6d903e3f01b6f6734c51c589c1f1a479c9b4d16dde32b79a7a9152c7d0185bc7e9ca7c4bd15330de0a8a12ad9200e64602c177525e4a2fa4b5621d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5095751fd27d3c94d26e7343772a1aea1
SHA17729f724689ba31575a312db3a47318ffb2bada6
SHA25668f77c5e1bdafdc568cc3a7b7df6039dec76e46fb78ad70d65cf5af31b24699d
SHA51209b06f2ae5ce8526ebf1e3463dfb942656c788723be22d91802fe36f611364759df13e35b85015a4cfb4104c3230e12774ef2c50e79bb19cb825bab824760faa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD53952d473ee3eced7f42cf59cb8126b40
SHA13072c73fe821576ce9a0f848542786aae2b86a03
SHA25618e6433362083bcfb9bd962621a84cf9fe5483573321d5e45ba8690fee457376
SHA5123083f5256ee03bb961b6e70d13f89dfcf6b61524e7509b9438648f0a44910238447204aaa0941b4c12e40f2102bb731ac1a26b8c1bbdd29a1e9feb9313f0f3e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5eb582c3f1f5697ae5ea8a37906f7a45f
SHA1e2c3cab265988497fb9ce2877b3fae79d13c1c37
SHA256907c937debbb043d6cdcd0e1a5aa93fb3a7229cfcd403d9602194d39eca6681d
SHA512ac5c487a520d5cc92fd410ea9bb5170297259f02117643f6fd5e9c3940f3c558a01e278986543ca433889007e3c80bfcec578bc988bef05c3410d1772d12c4ff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD597e46c21250a46e131b18bb74bd7d8df
SHA12c4ed6dc516b2b94430319fec4fac4f8dca5a6e0
SHA2567992a34e6a4352685e2995ed2c0be49f5a36b528221ee44cf83e7b5458b44ba4
SHA512b61b3d5f16d3a452720f1fe3912784e922a15b7b7292dc274de88a53dd5151ad29aa513d363f17eedad13daff284c4d303334164f863429c76bdca5daeffe4aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5e0de2419d813bb409cdb0797c751b285
SHA156c44d41b11a5142ce0d7a9e3737e6323201dde4
SHA256270eed6543d061bf6b65a9cc6f276e95224b713d37662761392dcefa87dd89a3
SHA5123560aa3efc34923b8eb45a5cd7c6884751eb216cb1de53a3990258e5fd20209ce93f5f74b4afcf642538edae6d7c7335233382fba980047cb0236c1745689e1c
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exeFilesize
553KB
MD557bd9bd545af2b0f2ce14a33ca57ece9
SHA115b4b5afff9abba2de64cbd4f0989f1b2fbc4bf1
SHA256a3a4b648e4dcf3a4e5f7d13cc3d21b0353e496da75f83246cc8a15fada463bdf
SHA512d134f9881312ddbd0d61f39fd62af5443a4947d3de010fef3b0f6ebf17829bd4c2f13f6299d2a7aad35c868bb451ef6991c5093c2809e6be791f05f137324b39
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-100.pngFilesize
1KB
MD572747c27b2f2a08700ece584c576af89
SHA15301ca4813cd5ff2f8457635bc3c8944c1fb9f33
SHA2566f028542f6faeaaf1f564eab2605bedb20a2ee72cdd9930bde1a3539344d721b
SHA5123e7f84d3483a25a52a036bf7fd87aac74ac5af327bb8e4695e39dada60c4d6607d1c04e7769a808be260db2af6e91b789008d276ccc6b7e13c80eb97e2818aba
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-125.pngFilesize
1KB
MD5b83ac69831fd735d5f3811cc214c7c43
SHA15b549067fdd64dcb425b88fabe1b1ca46a9a8124
SHA256cbdcf248f8a0fcd583b475562a7cdcb58f8d01236c7d06e4cdbfe28e08b2a185
SHA5124b2ee6b3987c048ab7cc827879b38fb3c216dab8e794239d189d1ba71122a74fdaa90336e2ea33abd06ba04f37ded967eb98fd742a02463b6eb68ab917155600
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-150.pngFilesize
2KB
MD5771bc7583fe704745a763cd3f46d75d2
SHA1e38f9d7466eefc6d3d2aaa327f1bd42c5a5c7752
SHA25636a6aad9a9947ab3f6ac6af900192f5a55870d798bca70c46770ccf2108fd62d
SHA512959ea603abec708895b7f4ef0639c3f2d270cfdd38d77ac9bab8289918cbd4dbac3c36c11bb52c6f01b0adae597b647bb784bba513d77875979270f4962b7884
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-200.pngFilesize
2KB
MD509773d7bb374aeec469367708fcfe442
SHA12bfb6905321c0c1fd35e1b1161d2a7663e5203d6
SHA25667d1bb54fcb19c174de1936d08b5dbdb31b98cfdd280bcc5122fb0693675e4f2
SHA512f500ea4a87a24437b60b0dc3ec69fcc5edbc39c2967743ddb41093b824d0845ffddd2df420a12e17e4594df39f63adad5abb69a29f8456fed03045a6b42388bc
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-400.pngFilesize
6KB
MD5e01cdbbd97eebc41c63a280f65db28e9
SHA11c2657880dd1ea10caf86bd08312cd832a967be1
SHA2565cb8fd670585de8a7fc0ceede164847522d287ef17cd48806831ea18a0ceac1f
SHA512ffd928e289dc0e36fa406f0416fb07c2eb0f3725a9cdbb27225439d75b8582d68705ec508e3c4af1fc4982d06d70ef868cafbfc73a637724dee7f34828d14850
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-100.pngFilesize
2KB
MD519876b66df75a2c358c37be528f76991
SHA1181cab3db89f416f343bae9699bf868920240c8b
SHA256a024fc5dbe0973fd9267229da4ebfd8fc41d73ca27a2055715aafe0efb4f3425
SHA51278610a040bbbb026a165a5a50dfbaf4208ebef7407660eea1a20e95c30d0d42ef1d13f647802a2f0638443ae2253c49945ebe018c3499ddbf00cfdb1db42ced1
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-125.pngFilesize
3KB
MD58347d6f79f819fcf91e0c9d3791d6861
SHA15591cf408f0adaa3b86a5a30b0112863ec3d6d28
SHA256e8b30bfcee8041f1a70e61ca46764416fd1df2e6086ba4c280bfa2220c226750
SHA5129f658bc77131f4ac4f730ed56a44a406e09a3ceec215b7a0b2ed42d019d8b13d89ab117affb547a5107b5a84feb330329dc15e14644f2b52122acb063f2ba550
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-150.pngFilesize
3KB
MD5de5ba8348a73164c66750f70f4b59663
SHA11d7a04b74bd36ecac2f5dae6921465fc27812fec
SHA256a0bbe33b798c3adac36396e877908874cffaadb240244095c68dff840dcbbf73
SHA51285197e0b13a1ae48f51660525557cceaeed7d893dd081939f62e6e8921bb036c6501d3bb41250649048a286ff6bac6c9c1a426d2f58f3e3b41521db26ef6a17c
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-200.pngFilesize
4KB
MD5f1c75409c9a1b823e846cc746903e12c
SHA1f0e1f0cf35369544d88d8a2785570f55f6024779
SHA256fba9104432cbb8ebbd45c18ef1ba46a45dd374773e5aa37d411bb023ded8efd6
SHA512ed72eb547e0c03776f32e07191ce7022d08d4bcc66e7abca4772cdd8c22d8e7a423577805a4925c5e804ed6c15395f3df8aac7af62f1129e4982685d7e46bd85
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-400.pngFilesize
8KB
MD5adbbeb01272c8d8b14977481108400d6
SHA11cc6868eec36764b249de193f0ce44787ba9dd45
SHA2569250ef25efc2a9765cf1126524256fdfc963c8687edfdc4a2ecde50d748ada85
SHA512c15951cf2dc076ed508665cd7dac2251c8966c1550b78549b926e98c01899ad825535001bd65eeb2f8680cd6753cd47e95606ecf453919f5827ed12bca062887
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-100.pngFilesize
2KB
MD557a6876000151c4303f99e9a05ab4265
SHA11a63d3dd2b8bdc0061660d4add5a5b9af0ff0794
SHA2568acbdd41252595b7410ca2ed438d6d8ede10bd17fe3a18705eedc65f46e4c1c4
SHA512c6a2a9124bc6bcf70d2977aaca7e3060380a4d9428a624cc6e5624c75ebb6d6993c6186651d4e54edf32f3491d413714ef97a4cdc42bae94045cd804f0ad7cba
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-125.pngFilesize
4KB
MD5d03b7edafe4cb7889418f28af439c9c1
SHA116822a2ab6a15dda520f28472f6eeddb27f81178
SHA256a5294e3c7cd855815f8d916849d87bd2357f5165eb4372f248fdf8b988601665
SHA51259d99f0b9a7813b28bae3ea1ae5bdbbf0d87d32ff621ff20cbe1b900c52bb480c722dd428578dea5d5351cc36f1fa56b2c1712f2724344f026fe534232812962
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-150.pngFilesize
5KB
MD5a23c55ae34e1b8d81aa34514ea792540
SHA13b539dfb299d00b93525144fd2afd7dd9ba4ccbf
SHA2563df4590386671e0d6fee7108e457eb805370a189f5fdfeaf2f2c32d5adc76abd
SHA5121423a2534ae71174f34ee527fe3a0db38480a869cac50b08b60a2140b5587b3944967a95016f0b00e3ca9ced1f1452c613bb76c34d7ebd386290667084bce77d
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-200.pngFilesize
6KB
MD513e6baac125114e87f50c21017b9e010
SHA1561c84f767537d71c901a23a061213cf03b27a58
SHA2563384357b6110f418b175e2f0910cffe588c847c8e55f2fe3572d82999a62c18e
SHA512673c3bec7c2cd99c07ebfca0f4ab14cd6341086c8702fe9e8b5028aed0174398d7c8a94583da40c32cd0934d784062ad6db71f49391f64122459f8bb00222e08
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-400.pngFilesize
15KB
MD5e593676ee86a6183082112df974a4706
SHA1c4e91440312dea1f89777c2856cb11e45d95fe55
SHA256deb0ec0ee8f1c4f7ea4de2c28ff85087ee5ff8c7e3036c3b0a66d84bae32b6bb
SHA51211d7ed45f461f44fa566449bb50bcfce35f73fc775744c2d45ea80aeb364fe40a68a731a2152f10edc059dea16b8bab9c9a47da0c9ffe3d954f57da0ff714681
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-100.pngFilesize
783B
MD5f4e9f958ed6436aef6d16ee6868fa657
SHA1b14bc7aaca388f29570825010ebc17ca577b292f
SHA256292cac291af7b45f12404f968759afc7145b2189e778b14d681449132b14f06b
SHA512cd5d78317e82127e9a62366fd33d5420a6f25d0a6e55552335e64dc39932238abd707fe75d4f62472bc28a388d32b70ff08b6aa366c092a7ace3367896a2bd98
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-125.pngFilesize
1018B
MD52c7a9e323a69409f4b13b1c3244074c4
SHA13c77c1b013691fa3bdff5677c3a31b355d3e2205
SHA2568efeacefb92d64dfb1c4df2568165df6436777f176accfd24f4f7970605d16c2
SHA512087c12e225c1d791d7ad0bf7d3544b4bed8c4fb0daaa02aee0e379badae8954fe6120d61fdf1a11007cbcdb238b5a02c54f429b6cc692a145aa8fbd220c0cb2d
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-150.pngFilesize
1KB
MD5552b0304f2e25a1283709ad56c4b1a85
SHA192a9d0d795852ec45beae1d08f8327d02de8994e
SHA256262b9a30bb8db4fc59b5bc348aa3813c75e113066a087135d0946ad916f72535
SHA5129559895b66ef533486f43274f7346ad3059c15f735c9ce5351adf1403c95c2b787372153d4827b03b6eb530f75efcf9ae89db1e9c69189e86d6383138ab9c839
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-200.pngFilesize
1KB
MD522e17842b11cd1cb17b24aa743a74e67
SHA1f230cb9e5a6cb027e6561fabf11a909aa3ba0207
SHA2569833b80def72b73fca150af17d4b98c8cd484401f0e2d44320ecd75b5bb57c42
SHA5128332fc72cd411f9d9fd65950d58bf6440563dc4bd5ce3622775306575802e20c967f0ee6bab2092769a11e2a4ea228dab91a02534beeb8afde8239dd2b90f23a
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-400.pngFilesize
3KB
MD53c29933ab3beda6803c4b704fba48c53
SHA1056fe7770a2ba171a54bd60b3c29c4fbb6d42f0c
SHA2563a7ef7c0bda402fdaff19a479d6c18577c436a5f4e188da4c058a42ef09a7633
SHA51209408a000a6fa8046649c61ccef36afa1046869506f019f739f67f5c1c05d2e313b95a60bd43d9be882688df1610ad7979dd9d1f16a2170959b526ebd89b8ef7
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-100.pngFilesize
1KB
MD51f156044d43913efd88cad6aa6474d73
SHA11f6bd3e15a4bdb052746cf9840bdc13e7e8eda26
SHA2564e11167708801727891e8dd9257152b7391fc483d46688d61f44b96360f76816
SHA512df791d7c1e7a580e589613b5a56ba529005162d3564fffd4c8514e6afaa5eccea9cea9e1ac43bd9d74ee3971b2e94d985b103176db592e3c775d5feec7aac6d1
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-125.pngFilesize
2KB
MD509f3f8485e79f57f0a34abd5a67898ca
SHA1e68ae5685d5442c1b7acc567dc0b1939cad5f41a
SHA25669e432d1eec44bed4aad35f72a912e1f0036a4b501a50aec401c9fa260a523e3
SHA5120eafeaf735cedc322719049db6325ccbf5e92de229cace927b78a08317e842261b7adbda03ec192f71ee36e35eb9bf9624589de01beaec2c5597a605fc224130
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-150.pngFilesize
3KB
MD5ed306d8b1c42995188866a80d6b761de
SHA1eadc119bec9fad65019909e8229584cd6b7e0a2b
SHA2567e3f35d5eb05435be8d104a2eacf5bace8301853104a4ea4768601c607ddf301
SHA512972a42f7677d57fcb8c8cb0720b21a6ffe9303ea58dde276cfe2f26ee68fe4cc8ae6d29f3a21a400253de7c0a212edf29981e9e2bca49750b79dd439461c8335
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-200.pngFilesize
4KB
MD5d9d00ecb4bb933cdbb0cd1b5d511dcf5
SHA14e41b1eda56c4ebe5534eb49e826289ebff99dd9
SHA25685823f7a5a4ebf8274f790a88b981e92ede57bde0ba804f00b03416ee4feda89
SHA5128b53dec59bba8b4033e5c6b2ff77f9ba6b929c412000184928978f13b475cd691a854fee7d55026e48eab8ac84cf34fc7cb38e3766bbf743cf07c4d59afb98f4
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-400.pngFilesize
11KB
MD5096d0e769212718b8de5237b3427aacc
SHA14b912a0f2192f44824057832d9bb08c1a2c76e72
SHA2569a0b901e97abe02036c782eb6a2471e18160b89fd5141a5a9909f0baab67b1ef
SHA51299eb3d67e1a05ffa440e70b7e053b7d32e84326671b0b9d2fcfcea2633b8566155477b2a226521bf860b471c5926f8e1f8e3a52676cacb41b40e2b97cb3c1173
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDrive.VisualElementsManifest.xmlFilesize
344B
MD55ae2d05d894d1a55d9a1e4f593c68969
SHA1a983584f58d68552e639601538af960a34fa1da7
SHA256d21077ad0c29a4c939b8c25f1186e2b542d054bb787b1d3210e9cab48ec3080c
SHA512152949f5b661980f33608a0804dd8c43d70e056ae0336e409006e764664496fef6e60daa09fecb8d74523d3e7928c0dbd5d8272d8be1cf276852d88370954adc
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDrive.exeFilesize
2.3MB
MD5c2938eb5ff932c2540a1514cc82c197c
SHA12d7da1c3bfa4755ba0efec5317260d239cbb51c3
SHA2565d8273bf98397e4c5053f8f154e5f838c7e8a798b125fcad33cab16e2515b665
SHA5125deb54462615e39cf7871418871856094031a383e9ad82d5a5993f1e67b7ade7c2217055b657c0d127189792c3bcf6c1fcfbd3c5606f6134adfafcccfa176441
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDriveStandaloneUpdater.exeFilesize
2.9MB
MD59cdabfbf75fd35e615c9f85fedafce8a
SHA157b7fc9bf59cf09a9c19ad0ce0a159746554d682
SHA256969fbb03015dd9f33baf45f2750e36b77003a7e18c3954fab890cddc94046673
SHA512348923f497e615a5cd0ed428eb1e30a792dea310585645b721235d48f3f890398ad51d8955c1e483df0a712ba2c0a18ad99b977be64f5ee6768f955b12a4a236
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\Resources.priFilesize
4KB
MD57473be9c7899f2a2da99d09c596b2d6d
SHA10f76063651fe45bbc0b5c0532ad87d7dc7dc53ac
SHA256e1252527bc066da6838344d49660e4c6ff2d1ddfda036c5ec19b07fdfb90c8c3
SHA512a4a5c97856e314eedbad38411f250d139a668c2256d917788697c8a009d5408d559772e0836713853704e6a3755601ae7ee433e07a34bd0e7f130a3e28729c45
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exeFilesize
40.2MB
MD5fb4aa59c92c9b3263eb07e07b91568b5
SHA16071a3e3c4338b90d892a8416b6a92fbfe25bb67
SHA256e70e80dbbc9baba7ddcee70eda1bb8d0e6612dfb1d93827fe7b594a59f3b48b9
SHA51260aabbe2fd24c04c33e7892eab64f24f8c335a0dd9822eb01adc5459e850769fc200078c5ccee96c1f2013173bc41f5a2023def3f5fe36e380963db034924ace
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\Personal\logUploaderSettings_temp.iniFilesize
38B
MD5cc04d6015cd4395c9b980b280254156e
SHA187b176f1330dc08d4ffabe3f7e77da4121c8e749
SHA256884d272d16605590e511ae50c88842a8ce203a864f56061a3c554f8f8265866e
SHA512d3cb7853b69649c673814d5738247b5fbaaae5bb7b84e4c7b3ff5c4f1b1a85fc7261a35f0282d79076a9c862e5e1021d31a318d8b2e5a74b80500cb222642940
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\Personal\logUploaderSettings_temp.iniFilesize
108B
MD5339405a6578460499808dd97de23d504
SHA1f876310360086cf4eeaa56e40ffbd879124c141a
SHA256c13e890ec018fd7eb394062f0769cf1c9cb8e9289ebb23a3bc15e3b2ea0b53f2
SHA51207b77649c1d42c9e14736ab2d7d01e0d2ad0871122a593484b4277986cb9933f547a51967efd8dbb86887161805c52f0977606769d20dc42786885c3e4cf275a
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\PreSignInSettingsConfig.jsonFilesize
63KB
MD5e516a60bc980095e8d156b1a99ab5eee
SHA1238e243ffc12d4e012fd020c9822703109b987f6
SHA256543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7
SHA5129b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\setup\logs\DeviceHealthSummaryConfiguration.iniFilesize
77B
MD5f66410d87196bd4a1d7862843feea874
SHA1241cfe3d61886c7059f34ea43228eaccc5e1b3ab
SHA25652ed06ff47f73e65acefec4855acb3dab85fcf14d545524b591584b33b056e6d
SHA512b5a4fe15da6be3a07d138b39608e6bfeff179ab95fe8a068b56fedd53cb347b47c18357fddc0ee758adf1981dab5c38d35f73889e1df82210ed0543e74c7eae2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\L5RX1ZBN\update100[2].xmlFilesize
726B
MD553244e542ddf6d280a2b03e28f0646b7
SHA1d9925f810a95880c92974549deead18d56f19c37
SHA25636a6bd38a8a6f5a75b73caffae5ae66dfabcaefd83da65b493fa881ea8a64e7d
SHA5124aa71d92ea2c46df86565d97aac75395371d3e17877ab252a297b84dca2ab251d50aaffc62eab9961f0df48de6f12be04a1f4a2cbde75b9ae7bcce6eb5450c62
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD52e0391d00f5bfbc34be70790f14d5edf
SHA1fcb04d8599c23967de4f154a101be480933ab0d0
SHA2561c0c0c86d7c736fc9fb148ac7cd6e67565dc5b76fa116ae3b000a79e91855136
SHA512231b9cc6efb928f0748cef04f287d9204c4f7d2eb4bc27f345e9a1afc6d0675057978ca44d1a95334ee2380709aa6dbe74015fedff8f17611a64efcfb9f64d2a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5eb9dd0f1e84c3e70c5b401d33c439803
SHA136f90b3634d6b7c78140e762397d47845ffb944c
SHA256c1647b091931f45c019578e5215d837bffe70f8edafae1cee39025116e8fcfd4
SHA5121c5a3ee2a79f8653759a16f1a15ae62600ff4eedef66a16dfeab4504a1650c5222de8227a95215d42b3741d4d9ae1a985b9fbe594fffa4b2dfb969c3c5fdfab6
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.datFilesize
10KB
MD561a6c3dc4937c41295afb4e5ca47e2c8
SHA12b54601ff67115b1ae54a28c87e0516cd674b5ff
SHA256523d0ba0de562ae6413d214b396b6d572a8daf9a01ad2315e3bf3e590fa94387
SHA5129a23378d2f38a5d347fd7842efcce30e6abf8995e01d3ad993a4b5d21196d5c326403b427a3d544a0485a86f9fb1b50b9c65138ee21b87ded6436a7c46a0ec60
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.datFilesize
10KB
MD553a1060a6649ed152e5e149093e48d6f
SHA13fbe6e77f79cd9bce68f7ba128f92f265e46425f
SHA256c54c29d5950a7426d0cc55250df9255dc571c854ef61c9d379d8b5e875019fb2
SHA512a04bd95f3b4537eac294fc33cc86d87520c5ffc83f0a790711e483ba4d8098d26e81b08398c920748b27a638532c0df5f1d410992d9d301e7dd43687f7399e1c
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\tracking.iniFilesize
84B
MD54d233099cd7256ba92b1b9b98e0df655
SHA14db43fba9e4d60d40dc6c01c89160801d0b5480e
SHA256a8c1751b48bb50a60ab6ced422e0d76e47760d6760f736b52e64fc8a32c3b289
SHA5126ec28d68129c4089bd0388ee6ede84103d93d0b246309f199668308ee24bee3a0addb166a6552ee569ec2be5b7d0c605fc4864815fc7faae219129f6b4382724
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\tracking.iniFilesize
84B
MD5160ec496f4576fee4612f5d73743afb6
SHA1ffbef0a51791eccf1ecf45b3a9399a1b0fcb4a46
SHA2562e397b6c43ca8ac8717c2040144ab8bf4d3364b93369f0bba1ff0b4819a574a9
SHA51281acd5e8037d12a75fec48c512d11ae935d110aea33f71d6cf82f2186c8dfb560fb371f1313e370dd90852a551659d1324a1cfc766bde7708bc191f15820e06b
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\tracking.iniFilesize
84B
MD52764d9835c9c3887adb2f2e7808ffd32
SHA13bb27efa50767a3a6a953df8b0391c6201623d61
SHA256d98a072e82384ae9f6ffba46b0ea8b6a9eb2fa92e8f6b099c5791472e0dccdeb
SHA5126af302db3562c7e50d54e35c099bd6754e4ce72d2ab335e05dd5532fadd02fb48af45451ec9b8e0cb0cbe3ff27fa5fc20cfcbd966c68163939bee97f18f092d4
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\tracking.iniFilesize
26B
MD56bc190dd42a169dfa14515484427fc8e
SHA1b53bd614a834416e4a20292aa291a6d2fc221a5e
SHA256b3395b660eb1edb00ff91ece4596e3abe99fa558b149200f50aabf2cb77f5087
SHA5125b7011ed628b673217695809a38a800e9c8a42ceb0c54ab6f8bc39dba0745297a4fbd66d6b09188fcc952c08217152844dfc3ada7cf468c3aafcec379c0b16b6
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{07EF1EA7-8A05-4B3C-9E0E-19F0FBBD1A11}.sessionFilesize
3KB
MD5dc24450b2628ea708b3b79cd80e5ed0e
SHA1715b3913a53d78f8b61c8cd62334676bf2d14d02
SHA25677cc3345d9b2d0f7ec649768094c01375dfc1239f226db3436f58dc5f82005d7
SHA5127d232ecaf61b596f40a5040dc047d11e745c7e5ab7c3dfdd7377e5121747f42e3422db9f44c02bbb244a04addd1f6b43cb42405868c8f876fe5603b2de6d4ba9
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{07EF1EA7-8A05-4B3C-9E0E-19F0FBBD1A11}.sessionFilesize
4KB
MD5053cff2e3e5a9cc1a0261e9380138caf
SHA139d71568bc1cbc6b167e10630a474633e8aa2e23
SHA2563f07137081df36497da6a6ad28c6ee452d92fbd58b431940f65685978be6dfe2
SHA5120d610a49606bdac538d6151ddd9144b012b60dbeee9da84ab28511f530c82546cedafe687f51b72ee5bf0a7debc826753eb990b0c4023e16563a2c41e203404a
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{D3FC78F8-6297-4E9C-A11B-A7F1E18A6A8B}.sessionFilesize
4KB
MD55aaf43b1f0aa1b288bf96a4ff29b265f
SHA16fba57283cf95fda72f1c00b98c8ddee63b15e60
SHA25632a85ce61b913018361058229b7d1d99cefaa92057a1d3ce4c0061bfc7bfac46
SHA5123ffc19a9a84091e5627007e157f3a28bab131d53ed89028a7fa63458ab1c3a835f60de8ec67081a243333fd658569f58a2934b2723d4a4331146b626ed4142dd
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xrbwibnl.jmi.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\nsc680F.tmp\System.dllFilesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
C:\Users\Admin\AppData\Local\Temp\nsc680F.tmp\UserInfo.dllFilesize
4KB
MD52f69afa9d17a5245ec9b5bb03d56f63c
SHA1e0a133222136b3d4783e965513a690c23826aec9
SHA256e54989d2b83e7282d0bec56b098635146aab5d5a283f1f89486816851ef885a0
SHA512bfd4af50e41ebc56e30355c722c2a55540a5bbddb68f1522ef7aabfe4f5f2a20e87fa9677ee3cdb3c0bf5bd3988b89d1224d32c9f23342a16e46c542d8dc0926
-
C:\Users\Admin\AppData\Local\Temp\nsc680F.tmp\nsExec.dllFilesize
7KB
MD5675c4948e1efc929edcabfe67148eddd
SHA1f5bdd2c4329ed2732ecfe3423c3cc482606eb28e
SHA2561076ca39c449ed1a968021b76ef31f22a5692dfafeea29460e8d970a63c59906
SHA51261737021f86f54279d0a4e35db0d0808e9a55d89784a31d597f2e4b65b7bbeec99aa6c79d65258259130eeda2e5b2820f4f1247777a3010f2dc53e30c612a683
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\LICENSE.electron.txtFilesize
1KB
MD54d42118d35941e0f664dddbd83f633c5
SHA12b21ec5f20fe961d15f2b58efb1368e66d202e5c
SHA2565154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d
SHA5123ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\LICENSES.chromium.htmlFilesize
8.4MB
MD5e400cd908b8fb7c13985e2f5cc7a7044
SHA1bbafebdf5b067a7d7da130025851eaa52ec3c9d7
SHA256ee3b1ab8794c749673ce9bd2dd302f12d69f0a1a4adfe40a64247746cc311829
SHA512e7ca440f0e042d7fcfa99367426bf19899a2b227c6d7b6e2c25d4f1a40113250f21ebeaaf91067d8569dfbad1415d4fe3e5626d7254722f2778497fcb22e5d6e
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\chrome_200_percent.pakFilesize
191KB
MD599b95d59d6817b46e9572e3354c97317
SHA16809db4ca8e10edd316261a3490d5fc657372c12
SHA25655d873a9f3ac69bbf6eb6940443df8331ebd7aa57138681d615f3b89902447e7
SHA5123071cfeb74d5058c4b7c01bfe3c6717d9bb426f3354c4d8a35bd3e16e15cde2f2c48238cb6382b0703b1cc257d87fcecfb84fbf4f597f58e64463ceede4366dd
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\d3dcompiler_47.dllFilesize
4.7MB
MD52191e768cc2e19009dad20dc999135a3
SHA1f49a46ba0e954e657aaed1c9019a53d194272b6a
SHA2567353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d
SHA5125adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\ffmpeg.dllFilesize
2.7MB
MD5ce613fb05afd722fac05a28d6e935cd4
SHA1d96ae5969cb134a8686d8ae72be304848a4d1f0e
SHA256742c956f892ad0833a5b8c52d19aa69940bc15bedbb42890598df61b263f6fed
SHA512c886e1e1e24e4b3320842127a7464a1baae93b0f791c7fff06af3ae1d7c312ae490f7d5f41c6d857b1be9da39c63e468b7ac6493ba7ee9e2ebf5e6344acda7d3
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\icudtl.datFilesize
10.1MB
MD562880b7d351a9f547b62b8da6c97ce25
SHA1057f11003013cfb3f1c63e6bdd4f2f9949ff0104
SHA2567c40c811d30d459dbf04a04c141b60eb4247cd58a008fb836605317df665748f
SHA5120d6f83175a91d90f4cc3ec4d9071b7acd0cd8ebbcc592322e46fde2adb7198e035af62c45a11a622f2a908e26d4dd8b8d1af023e634a74d0824d02c791ba3c1a
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\libEGL.dllFilesize
469KB
MD5874b49121773393e5ab748e52c630089
SHA1f35c93744cd2f0c178fc250116588654772d1339
SHA256d9773c57e821ef87891375d687c68c0be75222316a666e8c49640aad80f60959
SHA512ac8a09d44d7242d0e897ea84fa8f3f3c1d0e203fc3c03d5e62fba75f0c5e88189037145fb3548eba54c6c657af9126da96b6fa224dcbebbaa51f84f74dfa427b
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\af.pakFilesize
425KB
MD5d16ef573959cf5cf0a6eea20136b9c0b
SHA1e3384ae3ee92e1dae47a48e45589372e940aab33
SHA25673a8401e6dc17c4daf86b42c65b81359348f7e6b4d62d8637138e747bb3ff0ae
SHA512064c2912f766f10ec042adf82709ac9582cb8430e3550690fc17343c380dcbabadc0084e08aa5f3eb6faf79a652d26e1fe2606625a180b7f47808df07a566933
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\am.pakFilesize
693KB
MD539a396fce4d93f744b3c786d62d2686c
SHA17ec8176e652b666b6ab9fffb6cb9b7dcfdd1a2a2
SHA2560b1d326be9dabcda8e37740017383f2d8f1bec7a8fdb1f11ebe538c3632453fd
SHA512798063b51f745fc2c9e7f852f72ce55939ed41305d070d1844c790755f7ab42a6830406ba2485237d37a0c46b804512e7dc37c65b7f03249c28741a4f706017a
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\ar.pakFilesize
758KB
MD514b15761cb9d4e1956812df8b42c2aea
SHA17c25580d892711b9eff1a3ace4e6699ea64e0706
SHA256c8d405127b032587e6ae6426a35cb766139bae26170ca08d811354486ab667f8
SHA512ec9a6e6e715c817726ad744fadca4d1af3015d95421774ccfe54d616225b7a17e862e086fe0aebb3a903d2ebfb27779cffcd713d3042ecdf9761c24c5a56cdcf
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\bg.pakFilesize
788KB
MD501dfb1a7815613fa0a5411235f45b27b
SHA13bf1ea5597ac77b26bd30caa1efea7cb4f7a1b19
SHA25613d08d2c4972cd18bb8ea8a57587dad29684c2336f73282dd3284b0649377cf8
SHA5125d8a65e5a17aa163fb679e003e1837ea96e515b105c9977029a5ca4854845289de5d65c0edfd473cb74410c5cacdb5b360f25a69776705fb05f48688d92680da
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\bn.pakFilesize
1019KB
MD5ff4f966849b4107535e41d037d9144c7
SHA13a973857b061914e8905bda7e8f2bdafa384588e
SHA2562dc26dee345271f4606650912b0b7b5df68f621f2920864e0e36c1d1b22459b1
SHA51298772f266f9553f77f91b11dc4589ec8a0930554e9e0b381bbacd8d23ce794c04f6fe821388a6e87cb14cb59c7522c18c06b1af11fc177c7e40ef71242adcba7
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\ca.pakFilesize
479KB
MD5a0b45b122241cf0c11a081eefb9cb4c6
SHA191fd660a4688aaa70fee42e783b8b1863b4d11d7
SHA2567d911cda51564500dd7a6de43a1e347869427c035b15fa25cad0526be9e055b1
SHA512abcb3bcb96934189cdfd52528cd7c65ea870c9b997bf6349599b7064fe6f4bef0d34809f0f958e4d4e46486e7c0a41f86b5ed0a132bbf20743d41f3af64788b4
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\cs.pakFilesize
494KB
MD51101c784521a550b0561b363722086de
SHA1838f2bfe3432b87b950a2ec5d9862d2f58fde3e5
SHA256cc6ff937d1c9fec4634db4e2f6c0718d2606fe2d5d25addf1314e110c5b78772
SHA512eca3ce2075d3c920116c9e34957631e0617a869467bb76b09873ae96f7803f20032a6dd0a0f785f9e59dcfce3a4ccecdab2d445a860bee20d42e140b45e74089
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\da.pakFilesize
446KB
MD55b033c206820ace5eb4c6f82aed34a5d
SHA128017cfc13259273022059f02564ffc99dcd75a4
SHA2561a51de04cb205c708520f1b013447f1a89f0b1330dbce6d1e71cf355319d1108
SHA512e423069f7a895179ea17be5774284e9e2e27f02c40bac7d7211cab77348800622796f04c3e6618905364e189ca5ec772ed7dbd285872777d163d3ebec08a64d4
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\de.pakFilesize
477KB
MD57ccdc41a3dbdf89058d71629225664ae
SHA1e15c35b18685d9573349ff4247733b5f5ada8717
SHA256163ea4c2cf67edd0526a8e18d3810872e92a1d4e17b5cf4f04107fda5967b0c9
SHA51213b20b0db02a0a7480c56c79304ef594353507e1a30da0130b73aa8e9ec7636f306315a6f40729b10dc725f936642d2e2b282ed3040a079a6f25a7f9f7f1ae28
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\el.pakFilesize
865KB
MD52b391b2b35f7e096f696faf5dc093366
SHA11409134a46fcb84457a0e332edde98f7666246bd
SHA256f1fe39af50f4bfe9edcea3af6c132e87d464d7277fb491ed95d7189b3157d20d
SHA512aa640ca41dc9d4f60392b61bbead215345abd32369b0de90ed1d7ca2ff7a838d04689d538789a1adc0324fe4539c34db26b6c245155e51fb0308af13b60bfdae
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\en-GB.pakFilesize
389KB
MD5745918a5a74c7b6f4818a8bb8813f456
SHA1031f50286d003844425ddac557e13e2ea4554bc2
SHA25691bdbf5f1f6bcbcaf16e47865f72ec97d72c74174fb929f089d14c00989f91f4
SHA5125a1eb0231352705bab527ab27543612d75cb00c522620828ce2a0fdb0b47be9daa2dd7a192f8b4bf299007c5af1d9515f900b9586ba44dd2bd9f4cd4436aa681
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\en-US.pakFilesize
391KB
MD5c9c2abcb04e1ad5f1a20244da8d595a8
SHA189ca81da21900074a5ccdcdc852768277b2b620b
SHA2560364c73f320e441b03cb2afcaaca3ffbfac51a3559dcd0ff99a1accf82c7f762
SHA51296bbf21174f56a111a2fc6ec024ab2f143945306797e77d773367a7fad42b7828ebb7b08d0dab76858d9fa340bf3205be403bc53df9e5e4e390058c94a751ffd
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\es-419.pakFilesize
473KB
MD5c8f488b85c17431360e531aa507be979
SHA1bea5d66bdcc05869a0389e051a9217fd49e48fcd
SHA256536339d99dee6e8c01f018d4700ddd92ce063f765766a48073aeb256669680c1
SHA5121d7f9f84a8d7c055bf705c71efaea817f1b9dedd5ba314fec6ce5324f578d3130b5541bb52fa55db9f6e46efa8e152d50199a61c7e2466844a4414df65d61c22
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\es.pakFilesize
473KB
MD529cbdcc2168f1bb29532122c39e67a1a
SHA1f086c79d60daf2b0a7df91916387efa461795dcb
SHA256232f41ab5996c917687276e82c177de208b36e77aa834bb5d94d6a331f4180fe
SHA512b603edf2a18f5893ab482b0c34e4126f824fbdd1b669927d7bc30d68e2e5bdf78d7d4b2aabdbe257987e8e19f440d9396a3683340b94c3fd844c70e34e93d8a8
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\et.pakFilesize
428KB
MD55b169234895d929930140b4869a0b81a
SHA1f58ba50d1e19ce191a0f8117f3e70f7f3dcb7362
SHA256c465da80b14981bdbc687b7c37bf70d2bd4b8e03293c04ae5410f84c91ef980e
SHA512c4297e272b5c04a0ee0956b873d5246591bee98c3b340e72202f3448381c691096a5bc540fdbcf61fb40d6a69270afa7198c1f0ccf3b2e84cabc906e23eb022c
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\fa.pakFilesize
703KB
MD5f7da0d07b54698bf8a213d0ccf1942c0
SHA1d64fff18274ebe71a4aaa4754f9bb99d616fa000
SHA25633bdd6eb52f648d475306f35b6103500b864672cbf39cc0fbd8c4ac84c997dec
SHA512ce7a7b3df4c814a26e3fd9fddafc01ac1a4b2a87ef2d2893db5d0edf8e5b8bfe34afb6e91ff94306248361d57c6b3bd63d116635fb756aab74c4aed38f31c88f
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\fi.pakFilesize
438KB
MD51cbfa553a5b1de642ea4c248dfe1edba
SHA15de05b3c11fdd59ff5064a153a6dcbda33350971
SHA2568f3e8ec0fbb471b45db65a77dc1013e3363f387d3d0c6a458c90f371907d0085
SHA512ea3b99be7da893be8c3b228d1d3d7b644a1f5425b5380dc3e0ae0ba1bd29cf39dabe73819bcc4fa67f10a488f018e9fa2328995cb78f40ae8fdb66aa514188aa
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\fil.pakFilesize
495KB
MD58ce446cac9221f07f912be59534d86ec
SHA115cd1b902b26abbe665fed518575748483a9c3e4
SHA256b6ce37b1aeb4ca17a7f78ebc8f97c2807f588dfc4ad3e0639005c626b5c9b939
SHA51220be2b5c7e8fca897109b1dc8219931eaaa1c8296b1d26dcc7f9058168fef371d7955fb0f6c5693399b83fa81d27369efac8c3742059eea2333bd66d20b8d0d8
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\fr.pakFilesize
513KB
MD5a1de4ad3d9b7aa8f122ba00cb983e49c
SHA1323d6e1b4ed75f9406bb8488d7ffc7e12fa96886
SHA256a69f52162f6081a06f835ede10818218df6e211f00d0ef24561e6221f4696e61
SHA512542f0818ea4517fdea929f3d4938f7de75e2a5e6d872607e548f87de7e9cd0737fab3f5e82ab7895f44e809279d81c490999ed055acbddafe84f85e60ce2e23b
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\gu.pakFilesize
996KB
MD502bfa1114fd5b75261c24d6c0e6441f7
SHA1d48b80339405cb8c8ec7a19b688e8d544938c4c7
SHA256bbb17268412fb3e13584ca4dc90a94f984177d3c97ee89af2a57324709f8ed1d
SHA512751b91d381c882a5dc0c0ee6313cf3e7ef51b4d369330a169cf9625de99e6019233109e815fc474fae44d79235940ba2ce68af7033f4c4c994e2774bbd8105be
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\he.pakFilesize
616KB
MD59fccb330d8b07ca54661407cf737d847
SHA12c6f52801b66aac7d08acb60d9736f9149e48ae5
SHA256bb06d364a91b8641724254822b2eec5d0675e262a4cbf93b92494f601807dbef
SHA5120cbf36643cc7b1d85dc7cb7825bc816a8538d0cc50b137dd27d5a9703324ae7ff271d38dc0cd6e4a99c6b391070690b90eb8ddb1cc511bc8d84d49a32d36c34c
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\hi.pakFilesize
1.0MB
MD5cd91036827739441e4cc849aa30706d6
SHA1cc8e4c53e18db16876f855c2377f3cf0e2abf95a
SHA2560936587aa072339f8dc347506e5553159319a686010ca1912bed1d830e107c6e
SHA512553773bdc11be94f495b88e0587d572455ef68c182d51c9e1ae0e3aa23744f836996a446ed136afc562eb9a110e435b494d5955d2792a364a619111e7b3550e6
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\hr.pakFilesize
477KB
MD5ef62a50cc098afcf3fab69c7502219e9
SHA1db474cf332c90de660fc575ef897d5389b65784c
SHA25607effa557c8bc822626c05a4d299296f88d3da0654248c326d796f7c2de3ec64
SHA5127ae6f40c7bf404532df0bc2ffa449e0d99debc2b9816450ed0d015b1634dd96cd5650ab6af5a6d44d52d0e3c9c81836ee350210c4f8a13be6cc0cb796a630350
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\hu.pakFilesize
513KB
MD551b14b96d1b9fa99ed849347a8954133
SHA15259b749576a9612e429a665dfc8bf47651c39ea
SHA25670d4a0724a2e0e80ec047e7683eec7715c0fb5f88795cc97a63e4c2ee2237800
SHA512b68d4bc792f29df210602a557d0b3333a95e30cd03a0a4cb5f537c9c51da9937119391f2a359c03fb874c1f540c23f44bef121e45f048f32b1db06d67a0bad1b
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\id.pakFilesize
421KB
MD53b5e08406059d1a76566e9a5d4c9b15a
SHA16bf45f2647e959ec1b545763180e8f29961ab3e1
SHA25660409d8b785dd057e3495190b18e6d6d235d8313555341cba5f64327e3d8c3aa
SHA5126c4150c064edf6ed0b83b216ce62134bbab12137e6b45749dad08d1d1734b3365309414900615137c6acdd12250add5c69a222daa7984a94ee850aaa55af1b8f
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\it.pakFilesize
466KB
MD54e7ab6a5d407bf4d3f96671d65e467f9
SHA167f43053ccd167f2ce6d945202f64df29ee1ac49
SHA25620408c09d9447f44aa920f2529d231072db8bb9c0c8b8fafa2db733561eb6964
SHA512bf493e1a1c0898f7a54f8a5278dc0ca345e9937efe269b1bd3a3bc90645d767070ec9c117df001f8c3b51b4a383c30f025daf79606ac1840fcc5878ad4c53624
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\ja.pakFilesize
570KB
MD574e2430cf18db7ecae2a9b1feeb049b5
SHA1362a5f3e4d8a79b9d0b041d62a8a5233e20fb208
SHA2561a726c500b5b3efdbc7b9e6626765dcb8957005f9c072c09d1f517587d6b673a
SHA512324d0ba770c09cccac4c59e0e0605846a4e18f32cc79f14fbd4e5b0172f439ef8dee538f686458b3a07e5e8b4528ef67aa5d339ae25f7c601c9a302caa7970f9
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\kn.pakFilesize
1.1MB
MD556c5f63f439cc962b815bbc4f3f12c32
SHA1c96248cafd869fef11bc37aefb1382d0f60a7855
SHA25614b332541c2cce0835202372f8cc822aef30b3575b651c96219a88b8d1381648
SHA5129210759d8e73266381fbf04280aad0bc5006f315ce3fca74fe304b3261af0ba399210f0b84620230d6aa0c667e60c0a6d9e67681fdfac401338e9331475bb7f6
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\ko.pakFilesize
481KB
MD5a9b446bb79b0e5d0b4af4f7243b1f3e2
SHA1fcf962506b32b34a6315ed61acdece33df3dbf23
SHA256507fc8d2a468456f2842b65a111fc0c74fe1f56d5f5ac0d6e743aef186b43b2f
SHA512e7f281206bd481427a75b581f8b2a435eb8a29bd8b5586a8db78605b1c1bbc20dc1f4b2ff92d04c62fb509dc6e1e062d1d584c195e386c5c2ffda0f764276aa6
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\lt.pakFilesize
519KB
MD549201fae17b715a15fa03c4d89dd2176
SHA17c559c174850de48c4a2837fe32c58f74d8150b3
SHA2564a80792cb9a401ebfa7ec3212182b5024d651ca6a5ead8fc9809d0d3ad4803cd
SHA5123016f721d77206e13e275e7eea1adc95d403feaccf595eacf933940485031e9aac0c29b6f47a9ff5f73b08c354b7b82c72193c83e1ff09d84cb5b9b72b708166
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\lv.pakFilesize
516KB
MD5335158efe454819a0dc8de0edb0f0e90
SHA185871f85f626db1fc597ef24c79c84115a66c17e
SHA256113073cf60ae3d2bcf8a61df655762e34ba28e4b35b97de33c18e13f959d76ff
SHA512f81733bca3fa65c789630b55c4f414a8541e71c4e1aba56bdb9d231ce189677b3bff4dc57c92fbe1cbc88f1f2f7fbf1a7e4319a8918c50409fcba958d743ccbc
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\ml.pakFilesize
1.2MB
MD51030c08ffbbe7366ce5b7d55bc8ecc0f
SHA1b45b53c1e47a0051560c607874357130c499563d
SHA256e1f97ce3011d9231f23fe033bdbb0905c173921b18402d362bfc35224ff67db7
SHA5123b9127a0eec02f75f79c66f5f7845b65c4ebe2e6a33989c7686815ffe0651be47d42f55c2f32a67a221495a8bebf043d853df7b244a68f89390044210e52dd3d
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\mr.pakFilesize
976KB
MD5eafb18d633064d0f02a3eff3eff9aadd
SHA1a8846e473014be80125630f1c5b51366220ff018
SHA256fcb7c4aeed28ae4d16fa7b82d9571165aab0fdd46eb65d3ab29007231630ccef
SHA512d332a4b7f4cb1583a5bf5ce08fdb46661a5bccbf0a66f7f5ab6ce04367e9bc589588dcb32f443695a3ab129dc50d2962ed4c138f97858639d4ea37c117e23495
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\ms.pakFilesize
442KB
MD53d0dc94a638f98d9bf3c0f60f89a0c95
SHA1a979b04c65832d908305fb0406cb0653271ad744
SHA256a9f9ae23a3bc2ac919c5b46d16b7e1f3bff73698d2626260196210e101d119c2
SHA5126d687f1eb9a7fda3791295487063393b8f0a7409b55461b185aaf106c596229de6988114230625d6504b869d25d7a624bc3b90d66a0bdf561cb05a57d5b87c15
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\nb.pakFilesize
431KB
MD59c18dfa9e69c1d7810132800d084136c
SHA1bbaa9576e1b012df33d79a5dc7776c00e67295e4
SHA2564f3babcbec0d138654ec59fd8ab5fd58da2273237a587928b9687928c7ca10ff
SHA512a82b1e340a25a3858906ded73624bd0be4b3ccd1f5728560480b4a4e3a78529f5a178d20cf7d95fd55ded7ca4fa95a5fff87d89f0520ea08b54e7b99c9057d6b
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\nl.pakFilesize
444KB
MD55cde06a63c9dc07fdbb0fdc94e403d00
SHA111be56054908f1f9cd56ab77692fe3717ee91ee8
SHA2563b9ed5ed0dd07d8fa67412a046ab085137542c156876dbfe6f83376571af91a3
SHA5122716496dcbf76cc2dece938103813a8dbc17d4c795b4e3459a572de4f62f9ac0e1788de3a21f5fb287ad364decbd541a5e3bddd406e130d2a9c72118ccee5390
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\pl.pakFilesize
497KB
MD5b44fcf9fdc4ec7bb5e72cae30aa15c01
SHA1daaae4aa7987bcce299995feea5c54f2d77b61d4
SHA2567f1a8392fe3aff4e6bb4bacbc1f4b395f08ecafda9f81e36b41b77fb4ab0bc76
SHA51252b46d7affac4949fa19841d26d2f4bf877e36cbda4b75f3ff289a7abe9a80c2a014b1ae23d3079f4d31ed5fa76c320103733284a2c13d99a451810407325674
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\pt-BR.pakFilesize
468KB
MD5de8ff9456ba9ea999d0d1bc9b831e7ce
SHA11d67c6dd97fcf221c71137cc8b1946368807aba8
SHA256b32fe8f602ec9800d59806e097e369fd065d8fbf473da40fd29289493489930c
SHA5125a3a48ddad801382ec9065c6160698dd746aae810374c2b772d521a1764e7e0fd2c28c5dd1cdccb50834d699ee19441713fe10a91dddead46ba0cff3edbd6984
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\pt-PT.pakFilesize
469KB
MD5002d5b37e68a0725dd7d89fe3fc7ec48
SHA1545de8047d3f89150516b95031965adc8f17df68
SHA2561fadff356a7e89a8ff2af3ddf84f70fd0ce69525c7787f8adae10beed9d76d4e
SHA512abad6cbb30a958bb84a521a66636af4221a9f63774122d3ac3b552503930ad83d343ec4c8109c8031cab17c546ef7549aa0f87746e39a80f6758fad28ecee129
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\ro.pakFilesize
486KB
MD57056fc61de4a16c7f4f5bf44d2e87f8a
SHA199d16dcb3b1aefc472601439f630e1244b1aa277
SHA256b7ba9435d82f6bedd7005b6e868ee86f0bb6c4d7b312fe5f5d4afbd440ad5b85
SHA512529152da39f7ade6713206fa9f767b35b9bf03816387579522eea78ac7d0e150bad557fcdbef51e76d52e39f61a0b4e54ff6a3b592eb7e34fafdb98afe460f7c
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\ru.pakFilesize
797KB
MD591379a583d22fa9343ed466c261366ff
SHA161e8c39235945c4f38807b14ac74da7d3257759a
SHA2560d4d0b8052519848abd182c44dfbf444a77a0c6994965c4a3001f0a3a4d1459e
SHA512dde26b59a1e5f94d5b245f47399d7a9d3db8d247037331a471c39b1d7e79e236c5a0732fea4c53b843d8eaff1f54ca155a816a193b7baa870fc458a5aadf76be
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\sk.pakFilesize
502KB
MD578bc785a75ee512391a9cb462a771c09
SHA1229d39e017174dc0a8cefcfcc72b0feca94d6208
SHA256ec15c82956ebddb7b246c78045ad414ed34ca97d890a915070e252c8715096b0
SHA51296556f6072e69351e1bbce06bbf896b1ad53060c7cbaf7928eebbe0f610f5e8778b2b8b97a5a268b7942a1c8d1adc6bea0403383a2a5bb99049437e95d575ea0
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\sl.pakFilesize
483KB
MD5e76e473c419c25768b08a95a2822918f
SHA10fa7e2fcabb03a8788f50f1d4b4eb383c833e9ba
SHA256fcd27a9f5cb4b4be373da7076a8232006ebe020999fdf90d20745f16cd7ef223
SHA512e39ae0acbb7d148d6ade676d92e83fa9fb433230bae4339c31693a538198bf0679adef51883b96f8dfbcc8593a982544c64a2b265897f35a693183b27070ea5b
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\sr.pakFilesize
745KB
MD548abf758a49e2e8aab013f2bf56091c0
SHA1ca909bc28b03bf959ac32e218a318289e0badbf0
SHA256b4cf2d19b5e443b57ca9d1189880458a7cacfe1c8b231265557a3fb58f597617
SHA51222d65df1cd35a8127296420a699f26edf55813fd6a970050dc9b2b051aaf7da2cf2fe6314a94977587021c02aa7d8b42541e1d08d5940fb7e1af127e87268c68
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\sv.pakFilesize
433KB
MD506c878c1538813e5938d087770058b44
SHA1c8ab9b516b8470bdee86483151ae76368646bffc
SHA25690dc45426bc1302aa05261f136881ddf038272e9ac315297aa8e5dae2b31109b
SHA5126ddf615bcf0a8c62221233687bae1eeda5cfd749aa8acc179d6650987289201b405edd453fc181a1d250eba9bbdf61ea28fb7c694539fae3d320bfdea56665cc
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\sw.pakFilesize
456KB
MD555241312a3aaba14a6b19a9012ca25b8
SHA169fadf0817faec3bc6b018f0af5f63378ade0939
SHA256722c86bd857a93ae06ca0b7cfe2cc04237a7ed5a52586cab7246336c802abe37
SHA512612f815c25e9f593d1f1c4de8e9016dce048cfe90f21319c4cdbb5772580cb8c71229e9ddba60852cd0bec80a07a783ace24f873d90dc3323e5fdcc44905f2c7
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\ta.pakFilesize
1.2MB
MD52c0a9cc4a7c775ff13a6888234265cab
SHA1497bde42737667fc833bbb9d8a9edaf014d99957
SHA2561dd55659ef21082b9d58bed50f387c0e1fc0f28d0ede52251b9ada25ed2a657f
SHA512b862221cf17d3f2ca0495a8a3e1f630ab915fd9b2a46ac16c71deffee9a6f71264a8550233781474d60cc6001a48c7c658c77d4e0dbd5b543e768928119d2f0f
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\te.pakFilesize
1.1MB
MD55f9b7a945638b88e75a3175a7923119d
SHA16af614f2cbd72da2224f48a203a6430a623fc7ed
SHA2563b476d2ce7c72c3a10170808020dc3f1a87309f9f725b08217c4716b28d10888
SHA5123b66c9152ec032d6f2372ae5075cbfe7d0fb398c4bf173a7f8c76d91d9eaa816e6f839b90884533b46a9224e9fb52c4d439b3d1907885b8e9f80c5c55a852b65
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\th.pakFilesize
918KB
MD584ad3f888c0ec307bb7b8c278cd36757
SHA1948a5f8b43d059280d5374ca6d66e8dfc6a76d49
SHA25656665860fe6577fbe00543a47a15e10eceae83458815f2989d179e42af07f81b
SHA5127001c0607df927145e40a605e2b97914d02712d11e09ca20339cb1aefb042a1f853fd06e78b76f6dc6f19b6df837bca12946a3470c6c064ca767af1db57042e5
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\tr.pakFilesize
465KB
MD50aedf5c2f6f4f49074a2adea454df4c9
SHA1a48d9d8461e61170257897766dbd6906e754a0c3
SHA2563f4658b3811b36f5cad794e48e6507335abfe78b0bfa0c80d1ef9c5d7bb410d0
SHA512e359e446330fc154c16e34a7335174f372bce701faf85de8a5f4b432ce3e10c69f42c93b7182deac89bb4d29750d0dd525b6dcd74a5b7bd724f544d14ba44a79
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\uk.pakFilesize
798KB
MD564aa9344abd9a32f10d6c05a58eda4eb
SHA13286ee43f36e2232677b4573e8b4a3303c7df048
SHA256ca20af5982ae706f5029467901d7d66f90b261f03c7d240d0d1ab2fca2b50a7b
SHA512dd768b314da50b8ba5a006a4e56d70044c1af79960834722894d930f5347194ae7f9f5697bc4cd0790a79341635cb1df8c74ff45f74d1736049161af5b163efb
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\ur.pakFilesize
696KB
MD588eef2798dee8a361c3ea9bafaa02a35
SHA16f8d4ce422336ca5048ef35d6ece360a9b416d8a
SHA25691318006c880e427417a2b2fff81fd451769a5536fa16d1dc185972137bc2d6a
SHA512db36b58186f165ff3f746ac483f75b6fed596fad9b3f335e86b374b359e563407acf58ac7cded9420e4fcb91f31eebc8a91c7777ea59bafced8cff2f1c0e9a53
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\vi.pakFilesize
551KB
MD54c5c09cb7e6eb120c8019fe94e1ac716
SHA1f018e7f095605e21db24944b828cc3580cba863f
SHA256e7319ca18eba379772954132493bbabb448d4e97d755b85360ed337216b48800
SHA512d171ee83cf02a8904290a74df1224556887e41333b8a01fbd95f0cacc88d230195fbfb6f99f9e02573d4864b3c95b570a77c2a0b1e19324d2599925e40684807
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\zh-CN.pakFilesize
398KB
MD507b6c43d87dbf93ac8abe6837f3c2103
SHA179e033179b445609b3f1756c3f4184d5efacf1c2
SHA2567f85b35938fadca91bfd8f92ca53613718e375ef010c340947dd27a4ff66594c
SHA51238ef8f8a8a950b11c18eb7a40da721b888ef792a49e1371dc8c1eb22058a6791f95bf9b25df4ba190a7aa6cb62ce38b0bfaea83c71b62cde6980d12cf9da53f9
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\locales\zh-TW.pakFilesize
394KB
MD5960e99a171c4ed4b6d787027ba88774d
SHA1e3869aff0c52841c9df718133e7c4be2977de7fb
SHA256e42640f5309add2ea7fd5a4db503b93e479ef14807710a06d7e53a0f261da8e6
SHA5124e51d787aff8f425d101882bd70e71b88b253f2ca61ed54dd7ff77c7e3a1d6570b270f4eb91f2d03869ea4537d09e141f3e32ea3a27537295ec698bf26305cbf
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources.pakFilesize
5.2MB
MD54f1e4a359a66a46eb55313e04090e102
SHA1e3f971830be08bf10638ec136e7b9a7990abe4d2
SHA25650dfd64b881b8ff256c7fc4d3743389e6e2f95cf6da453629557812ddc0f7004
SHA5127762848e8404dacce11a83195ab4e8d1cf391d9916f27e165ee257a6ba7d6a73fc12c855be74c734eacc897cf64655b949557ea12275f3d488cc3680d7fb5e7e
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\app-update.ymlFilesize
217B
MD5b6445cfe8a306b2d0b2d62279f89f342
SHA128d5e4412cdbe96fd371f922d5c43a15b844cdd0
SHA256e454f3a59380021c96442aeb784c8f35a1da9362578eb1c6dd9765422917e68e
SHA512b898e4f7c304486610efb042a8ba3bcf6daa05265f9ea711043ffb228db341575bca21f227b12bb489968d231f2812be177e55a441f2519788dd231966bf456e
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\app.asar.unpacked\node_modules\win-verify-signature\build\Release\win-verify-signature.nodeFilesize
682KB
MD569e7b200c7b8ae48089fe5b0e8954727
SHA1dfa5c587feff56e14b0db8c2a6dcb6e4b60a75bb
SHA256f15184be0a818bc392ef392600608b85be358443b148394fd6106e540e744914
SHA512ef08b516f4f2039fb670abb9f842f4550397d18c18d0c42637af135f3a79f0fc6f53dd35fb364f9f5f6ab352a1f443bca8b94df7b45daea60b819ad0820f5360
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icon.icnsFilesize
266KB
MD594dd98d589bd729f78fc958382e37540
SHA141351608a8563c493cd66dcb76b3d0cd4cf5e937
SHA2564be15b55ecd3f5d2dd2cc2d0f20ed4c3c2ec4f841d529ff14a46653b19b86398
SHA5122b8760f32df77090a3853a44db5816970bc1fe7c82cd5011162a4c19d2c021d5d543d0dc72a0cef194aa5430eab6a9c36892a4980c5f799e5d31dd52bec1d639
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icon.icoFilesize
145KB
MD5c4cde1909ccef4e595096ce5bce0b3b7
SHA1260bc7007fd1d1c5d6b706b6710c6018b009f2ae
SHA25630f8143e9f2a92ac8e7a9d3a8b98261102fa17e442a579da95b044ce23d33b57
SHA512abcb8db33878ecb2460052b2b93c0324e7ae362df41542da3b9f7a5cf2bc80591ee4e8383699636db00566b9f69d241ce6828a0ad3cf3bf74bd8ca06b4623a05
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icon.pngFilesize
6KB
MD543eb78d2bd99e9a3b7ce5989ded52227
SHA1ceb1d7b27f26de57cc2d264909b9b086633ba447
SHA25672badd686613f3b51868a28fd33a9215e40ce1a4a74403649ea0df7d8a450a57
SHA5123edf9d4b6e4a16634d07168b7ed12e12ee90e5e271c2955b3a0792e83e9ab3d8b944656f3d02c32796e2188095ae4ead52009f041d5113f5b792d086bd4010cc
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icon.svgFilesize
3KB
MD55b54d286827a2e5f05a5d22be28b05e5
SHA164554efef58e255f28ee41074b2063e6c2715173
SHA25604e78839ae8889a92b2dea5578f9a266ed034e9724e0079e5cb4adc8b962838d
SHA5122368c3842ed21a6b5952327b845d8d63b098d3c2fad3a652a3764bba9db0787a76b8ac4be010c9e02e4daa9b09aa5f45c161f39467f958aa95610833e397e3f9
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icons\1024x1024.pngFilesize
31KB
MD58dcc54ebdf329fbfe17e09ce27db2519
SHA16f5c13b4cfd332f88aae5ff4be1cde9a044aff01
SHA2563b7756a870fccd056d03110bdd841797a4c07ca8c467f3475dab48bc824de2db
SHA512408278c01cccdeb277873e1293f441e1d69c72ec4b0c721450382c5b5125a631023b0b6caed762ae815cff707b6e7124fb7d6d0811270ae6fa9bad0e50841e4e
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icons\128x128.pngFilesize
3KB
MD56a50490e9adeccae9f038b566e2cafbb
SHA1f22f865deee1b9b4268e5347b897b4dd17d6b3de
SHA256538d81c175677cc371d696065d2b7d132a85a028e209df330acf19facebaac17
SHA512343596a5395f2e5df5a975a6daa37f4392822f96f632cc1ddb7128d0652fd14e713bf3a0313693455e5fedaa24833c0e60f22563de5ebb37f582e0f4d29664ca
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icons\16x16.pngFilesize
586B
MD511aad0a70107a4a27c005eb61b43726b
SHA1486a16dfff12d661ae6de44b19f5122196e412dc
SHA256817c7d7b3eaa3a768b9fc0a832d6e9d16f7066e6d161557a195caa7a854461a5
SHA512e4f2aa181b5889a7db3b786d53fe18f35e7d43072bc33697cb14456c16b148249210faa225a428dfc6b91076315da8377af03257d010677ef26cc94c75359029
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icons\24x24.pngFilesize
899B
MD53cd1f8b904170befaa047a8438722644
SHA1c339532001818ead60ed3fa0560e798dd41ee29a
SHA25610e0065c81ea5b82d5e93aa37f6a553487cca6875d08c004fa7907dc926be2b4
SHA51240866aeed355ddcff1dacb05dec41e51f8d80ac1787ef0411e72da992a803e656dab667085f30642e548559c4d1ada01fe52bc6a69ad9b70aabc559116cd7509
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icons\32x32.pngFilesize
1KB
MD53527644b8b43dead9a4bf7f52ee5f74b
SHA1b1cc0ec4970a132c6282c4681cdcb474bd7e0187
SHA256a656420b911d66ac1e2dce0b0596765ef1f8a68ebcfab8dd59670de2de16493f
SHA51257b1bb73a9604778b95ff2bcf1c49e73681c98cce04fe70f09d536c325118cf6d7a8b131309902a635ab5a7d9ffebfbfa4e1cdaed65d7632e54ff0f74777f2a2
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icons\48x48.pngFilesize
1KB
MD5eee5695f4f0bdf96db881a298729d8cf
SHA1a51d55c6ea91420f0b1d952cabfe4fb48a3e3e89
SHA2565a8ba7bd7a6c57813f65a3e2006aa726dc65e9add14107f22c686f0e63bfc45c
SHA5129581bfdea9783227f746ab098f0d8150e65b7edf220c35fbb663324425683694b51a7e4f0a9173ddf445e1f9d090ba2c7140711d4717a12c155331c94337f463
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icons\512x512.pngFilesize
14KB
MD51f2cddbe3887a4efd5930b4637eac5cb
SHA12d9d67c262500f73b4079841e74caebef88e1bed
SHA2564849b3198cf57953e2d30353f1b36bb3f77e9b3b7309857e8a19c296c7ee39a2
SHA5120634259aff058f09e5c77f9e08f5b579039d4cd7d2f5d1092a7a70ea9e614ed95650a754cb47dc95956bec6c2df839e1c313295240ce4b13969f756c4c4a5e0b
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icons\64x64.pngFilesize
2KB
MD5594464b4bd3ec960c0e0a52a351aca69
SHA180151377e4fce1818e851f6841bfb0bb5b202dc5
SHA256a9440ab1480d87a7c5267321320fb77f5c25e8758a68c2ba843594e6a10d37fb
SHA512c5d23cd396b345fdaff5489c75886e39fc4ace26b0cd7b2cc739dbd0de1e8024b9f965cf670861e3d782dbd307f58518dcdee6451597345fbd3eb1f3e3e372f6
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icons\96x96.pngFilesize
2KB
MD599413da84bdb8e347a9d1087cf9c329a
SHA16bff7868b1b302d27126fd4c5824e07eeac205a4
SHA256e465031f153a3fa21a1f388ea107c5ec909dc9e8a996b0246a0c43645a86f4e7
SHA5122f9f1058df353b2d8eb403be92036c5a645d79310b34257ad3cef22d31eade183f346a4a705b56909a0166d85b9a16400b34720fd050727b7335996e15934670
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icons\DegradedBackground.pngFilesize
7KB
MD55393141f4c9746f469b56c01bbaf9078
SHA1d5afaba2a042b715280f064f4e16bfb2046cd977
SHA2567252ccd01d6d667f11b166cac6db22f06b60e239de3562245024c67dacaf1fad
SHA512af43ffada1ae705c36a5daae6529ad9fd293f5252d3e1ef365344019eeb844726955614b79859cbd97d0a1c7653fea0a85c17125a8337702623b3adc7fb1a179
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icons\PausedBackground.pngFilesize
7KB
MD5ca919ff0b269fdc5cd4c09a5b6d2f73c
SHA17fc34fff8835a0fe39fd5966562c047fef5a8b00
SHA25641dd6b240739e0879875923ce64e8c86d7af2e6d827cf9c82cddec338fca48fa
SHA512ce8f6a21277b39f71997cfbb393d65ce214df2249588b8ef6d2f613e60646d1d5fc3ad062a10d9d021865fadf5cd3353e4f8b28b35de39339fb307c1e0d40395
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icons\RunningBackground.pngFilesize
7KB
MD5023559a8a6617224002c4d4f31606ca0
SHA19686066e138804700ad722f65fe8fab8819101dd
SHA256f559f33201d6732a653ce385424529c565f2e9d05ec21a03a3c2ef9f9475b3c6
SHA512a54bcf3117b0223ee60ab9c2298834c8c0a8e1498a77422bf8061383821709636ccd2848af280b60f15a38e24ad51d36e2a4b93b6eb0c32139bb5fe220d03b26
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\icons\SaladIconBackground.pngFilesize
6KB
MD5d752c3146f5cf869ba105e2f30c87363
SHA11c04b22fcda8d1ba783e92da75ba1510a7e4e57c
SHA256aad7f5b08eec2e8176c2ff04d669a48f01be872d46adaf540c7e01c0e3cd8744
SHA51285ce76060240fb235eb08a6ee2d756e8b0c48a1a667b9598fa8a4522343c301a044cbb4fbc539b254fa51b3342b800aff5aeab49d39d28dd1514e70756b2f2f5
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\installerHeader.bmpFilesize
25KB
MD51952d035248b8a8c926793a3b484a47e
SHA1614842f81e2163a7bdc7f29ed99969d7dc7d1e01
SHA25646d46c9b2357a7f40a9271f2f497ce2ffa7d6ffd45376b7d6d9d057d917a7d68
SHA512e101731d1f29a64bec15e228a09874857e379e821ebd1de9a1fa79dc35d8fab9b2f707c31ca13974a1b92968105524bafc1efd1b11fa6121b3b1248ac925065b
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\assets\trayIconTip.gifFilesize
880KB
MD516864dfc9f3f500c42b02735d2ab0484
SHA115d7c55cc31136c207dbb24766a41f941e1284c6
SHA2561d3af4f40e36c4da2aedc1e85bca123f4605566ba6780014b039c0e56e09b5fb
SHA512f2e84a45226b99d7b64125d5bd25caa87b9084a00d1699b8399f2dde70f4d694c496f2c5c56c93079f7bf60acfb34a48ed0aa48164c8d62be49a29741109b228
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\resources\elevate.exeFilesize
127KB
MD557063021770abe36adbcc721ed666081
SHA1de90ceada615ed59becbee279e2527d053d82971
SHA256e2b125c8bbe8f465db1a450ddb7ce755257c5c7b36f4ba888ab355b677521278
SHA5129a7914e61ba8fb70a4c232d07aa7f762f5377a937d0b4f30932532df13a349a6224955093b1514643d10ea579fce8992070e779ed16732bb90fa55d72d81bf3f
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\snapshot_blob.binFilesize
262KB
MD540a3c2200e4126e8c47a7802532c9236
SHA1212a4686dea5a467b7b6fa54397e42122b235f1e
SHA25694aa518fc892ee9a0f1eb5fe35b60123ee61a5f848864b00519b96d8d5d9786d
SHA512fa1a943822abe3737587d520654078117cae86c58fefe6dd6a09f4a08c09293e9547a0ad79c52f8638dfbb1c496df3d0e828ce414176c8fbb77113be41212866
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\v8_context_snapshot.binFilesize
581KB
MD5264e3b574e4f86b1fc47b2427402e779
SHA14a4f9e7c3da262713e4cf7af6ac51822c56b5ef3
SHA256ed559c6e81b6003b2057e5c1b0bdb5b28ca094b895ca86c69fe11c5c9e014f06
SHA512144365d0fb83576aaa02ea6ecea51d7ba2cacb044eea568a08f65b98a83d3e7d7e693738e065e22f94bfd1165d0ea93a749dd1325d829257a9bb6607a9a927db
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\vk_swiftshader_icd.jsonFilesize
106B
MD58642dd3a87e2de6e991fae08458e302b
SHA19c06735c31cec00600fd763a92f8112d085bd12a
SHA25632d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9
SHA512f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\7z-out\vulkan-1.dllFilesize
917KB
MD55148e286ea76b5c3a01656a84548d035
SHA19f90b7523c64c62d7b0adf4511b49a3f2bb022eb
SHA2567fb87a7f0d50007dca64bf845d444fc66116a57edecdd8487c91d6879b578a0f
SHA51223527f9eedc4873320c65b91afd90873febce3f666470dbaaa42e1165c4b864f1df19038bb272954eb2281bb103c15199c6ff25ca44c0ecbfebfa1f5b34c01d6
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\SimpleSC.dllFilesize
1.1MB
MD57b89329c6d8693fb2f6a4330100490a0
SHA1851b605cdc1c390c4244db56659b6b9aa8abd22c
SHA2561620cdf739f459d1d83411f93648f29dcf947a910cc761e85ac79a69639d127d
SHA512ac07972987ee610a677ea049a8ec521a720f7352d8b93411a95fd4b35ec29bfd1d6ccf55b48f32cc84c3dceef05855f723a88708eb4cf23caec77e7f6596786a
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\StdUtils.dllFilesize
100KB
MD5c6a6e03f77c313b267498515488c5740
SHA13d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA5129870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\System.dllFilesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\UAC.dllFilesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\WinShell.dllFilesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\nsDialogs.dllFilesize
9KB
MD5466179e1c8ee8a1ff5e4427dbb6c4a01
SHA1eb607467009074278e4bd50c7eab400e95ae48f7
SHA2561e40211af65923c2f4fd02ce021458a7745d28e2f383835e3015e96575632172
SHA5127508a29c722d45297bfb090c8eb49bd1560ef7d4b35413f16a8aed62d3b1030a93d001a09de98c2b9fea9acf062dc99a7278786f4ece222e7436b261d14ca817
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\nsProcess.dllFilesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
C:\Users\Admin\AppData\Local\Temp\nsk20B9.tmp\nsis7z.dllFilesize
424KB
MD580e44ce4895304c6a3a831310fbf8cd0
SHA136bd49ae21c460be5753a904b4501f1abca53508
SHA256b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df
-
C:\Users\Admin\AppData\Local\Temp\nsm414D.tmp\ApplicationID.dllFilesize
196KB
MD5a858c1a57e32485505b1977cf0a125be
SHA125d86c4b51f7cc10fc70e3a0493a39c4460cc350
SHA2561462a072345e86318b981089b08b613a34027ddf527bfb66606c683f218fc3b4
SHA51232b597fc2412a9407fd12ac77c556ff9740f1dd0d2055426d11a7baf21b09c536a84cfb97865b4e94168656514e7ce71eb2bc4122aa340100f4ce483bad1722d
-
C:\Users\Admin\AppData\Local\Temp\nsm414D.tmp\nsDialogs.dllFilesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
C:\Users\Admin\AppData\Local\Temp\shi1328.tmpFilesize
3.4MB
MD5b5b6aec8ad531f3d05a3db60f6a6ef6d
SHA1894b0afe1435a314332e139ac34e0484e83b15ff
SHA2563ad943fdc99b66365bd323fd59a3db6477a0b2692347e0ce26b4f0578ae99502
SHA51207d2a90b21214e5d6d3dcb269beab5f9cabf181a54c76b0d9bcff4e7608d92a17b9e297da968848a506ff896a337b934c2e308b0a41675726780513838b44715
-
C:\Users\Admin\AppData\Local\Temp\tmp59E3.tmpFilesize
35.9MB
MD55b16ef80abd2b4ace517c4e98f4ff551
SHA1438806a0256e075239aa8bbec9ba3d3fb634af55
SHA256bbc70091b3834af5413b9658b07269badd4cae8d96724bf1f7919f6aab595009
SHA51269a22b063ab92ca7e941b826400c62be41ae0317143387c8aa8c727b5c9ee3528ddd4014de22a2a2e2cbae801cb041fe477d68d2684353cdf6c83d7ee97c43d4
-
C:\Users\Admin\AppData\Local\Temp\wckjxu.exeFilesize
2.4MB
MD5dbfbf254cfb84d991ac3860105d66fc6
SHA1893110d8c8451565caa591ddfccf92869f96c242
SHA25668b0e1932f3b4439865be848c2d592d5174dbdbaab8f66104a0e5b28c928ee0c
SHA5125e9ccdf52ebdb548c3fa22f22dd584e9a603ca1163a622db5707dbcc5d01e4835879dcfd28cb1589cbb25aed00f352f7a0a0962b1f38b68fc7d6693375e7666d
-
C:\Users\Admin\AppData\Local\Temp\{19835dde-db14-d24b-8ae5-19ee549e9d51}\parsecvusba.catFilesize
11KB
MD5cfe9c8fd6faf915a653d39895d3d0862
SHA19daa9cae1db02c898eb193a47c838b834b295d01
SHA256f37febb98b96e9e39135acce723186952363c4c5bf2341c4abe486d8580415ef
SHA512f7894c8fc7726dc0f9a9392a4607324ec52d6b7c0bda775901741fc0ca5c13522160b67d82d690a850ec9ecc911d3c8be31e0080a7cefe48b5694f7efef75421
-
C:\Users\Admin\AppData\Local\Temp\{19835dde-db14-d24b-8ae5-19ee549e9d51}\parsecvusba.infFilesize
2KB
MD504f8c6a4c9d90818704596fff273ad0e
SHA1f82f3b99ed2725eb2b64608d666eaf983ede9288
SHA25654ed129dc73fb7d9a37d899e21724c22f69fe8f8bc99caad30197b3b107ef90b
SHA512b26d5110c459b9b51db371387fb11ac4109019abf085a762cb953edccbd34e95e6b48d9813a92218fa9afd87afa14057172fb1d0236e58c1acfb13fdc3ef7501
-
C:\Users\Admin\AppData\Local\Temp\{19835dde-db14-d24b-8ae5-19ee549e9d51}\parsecvusba.sysFilesize
257KB
MD5591ab089c7184e33d0f4db12b4ca5498
SHA18f45cfc643564bb1d69b6a5059c2403542afa0f3
SHA2568fdc89a3ba70b279827b4a29b4ed22a59373fc9304de4ccd06fd3428bff4b0f1
SHA512d8a662eee3d466c0a44718c4e14b1d4f65310bf84d484c7362423970c57c0dc604ecc3d5a5bcc09ad9e328e3bf1402a50d8a7414ca4ef634d8fb618ce18fc286
-
C:\Users\Admin\AppData\Local\Temp\{2c067fa6-bd61-be46-951f-26ad8e549183}\parsecvirtualds.catFilesize
11KB
MD5560efa3fa6e5ab486d958b12207ac6ed
SHA169b8ebe8ae3d9af94886dc1c9c52fc858b5affab
SHA25616db056748caeb3b2d6abbf9f6c77f34dd0f81d3bbf4e65da2ee4f2fd0b55681
SHA512a4761740090cdba84cda9e9a805c695567b6ed5c79ab339da315679124b7c9f05cc0b2de53dfb58d133ce67f30f5dde5a20c2f2a1330c9c8f4a85abdd674456f
-
C:\Users\Admin\AppData\Local\Temp\{2c067fa6-bd61-be46-951f-26ad8e549183}\parsecvirtualds.infFilesize
1KB
MD5ac423f3b285c615e7bec73dc2fa71d20
SHA1a508a10ad7de55f0ec2ce9c4135ce623b773bf1d
SHA256e31aeff7229ad9b63394fb3646f7dfdde2ea8bbe8b247259a5a9548fe3cd89e3
SHA512ff2ecba42697815f906d4e5501f9c4b33cd5652432dfb26302644ad385b40e361c32e0120603002d93dc12b0c38e081d5ff0cce6145a0420ba0ee70a22fe3b07
-
C:\Users\Admin\AppData\Local\Temp\{2c067fa6-bd61-be46-951f-26ad8e549183}\parsecvirtualds.sysFilesize
26KB
MD50790b2e5b9d6b38b566c6bc796f0364a
SHA11c87512273f9e98e43ea1b048a67995a93e02b4e
SHA2564b98d337ed94646d10bdb0395a29d10dcac50c660c5176c1937a823301bd6ca1
SHA51203a8e2be9c98385ec13cde7ee321ab73235289de22deb1029b795392b90a447dfa46182d40cbbc091b39ab0df8f5a8e9fc7a80f1d839f36ec8c678bdf746844e
-
C:\Users\Admin\AppData\Local\Temp\{ff4ffc0c-edaa-0b40-9a7a-b4742b56a5be}\mm.catFilesize
11KB
MD51fe1fc7cc73fb17e995d65835d51ca94
SHA1249acf0a3a362b2163127bd76f6d4d6aa463297d
SHA256136e64ac07dce5a3b4935d5a9c5cfe03983c0b3065f46a30a45536d5b1681d5c
SHA51231fe1bdcb5f243a6eecc40006fc70793bc5aea9d95ffe449117cb67366f0f120c393716ffe93b65a73c8b2dfe02917f1d0dcf4ca62aa302fe685513b8cc80bdc
-
C:\Users\Admin\AppData\Local\Temp\{ff4ffc0c-edaa-0b40-9a7a-b4742b56a5be}\mm.dllFilesize
169KB
MD5f09967cc8cc9bf03612ddecb6bf86daa
SHA1166f8e3000b6a1e2b13b46e85b7559b9837b9aa7
SHA25696db6ae2f950b56e52be3e68f92893afa94645eae09fea2abd5dd1985758150a
SHA512190d2edea81c42a2d7a5bc69cb98f03368e702a5fcb3fc1dcd4e9c387687bab542e4b0e5de67292e8b8a7efed7fd9e30d1efdd35bcdfea28417de71db0e13864
-
C:\Users\Admin\AppData\Local\Temp\{ff4ffc0c-edaa-0b40-9a7a-b4742b56a5be}\mm.infFilesize
4KB
MD5d8030afe09a2f984be00389b31f7039b
SHA1ab7a55fa6641cc31b0b7e70c8680bbbd553fc8a1
SHA25634da9ff45c13577631f67e33d11b8a26e3d22ca685d00c388b6122a795800588
SHA5120787e9e95369686b20bcbddb9ff984111c4ed53a064fc8f198691db5c124dfbe1b1f4d434dbfd81482545b723c01325ed9bcc626f461191b3ae4095222df10a6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
22B
MD514f705f549f3028d93387168a973b57d
SHA1904d2cdfa31872976e6144d3049fd93241077cb6
SHA2560994bef5e49e421d0af1c4833f5410e131f3f2a49ccc5d217a553f41ca59cb86
SHA5122f7dc1827e66c6dbd89c189fa87250971ad033490489f657a6939b5bf30e6e7eadc36deb1d215afb622418b9cea01c7fce321acb2335d3f2b73795d8fccf2052
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\940ad788ca8ecd2.customDestinations-msFilesize
1KB
MD56868330afcec64b3d5fff14423917466
SHA1ff220a11e2dbfe3699fffced5e8d7729770911f7
SHA256d0158442800ed7ad2604a040c86bd06b22c03b132cfddf8f721936c819b644b8
SHA5128ebf402cf1b2486532e03a102ffeb3201e2095c27d6d29e62e6e7cc39a01ea36ffe1fd2ec50ec4984f03c8debebf03186dcb64548fd312261fd7d60cd3795b61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\940ad788ca8ecd2.customDestinations-msFilesize
1KB
MD5fd5c38952ca1a67053841e7a3f7417c1
SHA127eed1e2e1e9538d73a4cd95e7b47b95959276cf
SHA2566ba8253fcb27d673205aaefe228c8c4a89b61944bd9787aecda593731c40f6cf
SHA5120eaa3439861a51fdc6495e5e9f7e7035f97ffc4a9328de40584ed3d836fd56ab9393f3cb8f19581d15175eea0db88dadd036ea9dc4ee02b42b047929a927f2b2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\940ad788ca8ecd2.customDestinations-msFilesize
1KB
MD54c7b67a5e9fb7d5d0fb2466fecc0dd02
SHA1c441c2680482e285d242b4a2026ef438d7e69f83
SHA256aa0b7ffc9a363bbed798470135f5290875110d3a2ca3dd1413e2dd604234d8f4
SHA512ee5773112dd4c9002798789e90d0e6772da80a314bc67012d3cda93c282546ed1294b2c4dd8d3898dd46acdb4bc09e113471bbb16350008446f91ca1dceb657a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\940ad788ca8ecd2.customDestinations-msFilesize
1KB
MD58f7461d43c71b6774b1a51b73ba24a71
SHA11eef6142d40854fa7e737ed0945aa3c153d01a0f
SHA2565fc39dd7a95353d8bb24138b8e140ca769c23eed7bdfd9a8e03fe55b3552ddbf
SHA512fdb429736956dd496600449ef95508c0f31f1c9f357a09c29e9db2d6e94d26dcf12c8fa99f0ae5932b61ff3f5eb8535f99b91045e9bd451e86ba7c4545f426d6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\940ad788ca8ecd2.customDestinations-msFilesize
1KB
MD54e8aa30247e8d28deae7e9a6a3b4e78e
SHA1b436c59e78523279b2100289504fecda86e75aec
SHA256fcb0b35e6d11dfc329c8fbfc843bb3fde00a60158c65ecf6197df98fc538ebc9
SHA51293d15cda294ed2dadb7cc513d9f43d5a20617fb191a8388ddebc50162c84e45239f888d224667042d2c55080b5a27ad912edcd316bfa7127ba72eddb1d450fd3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LCYEA91UUJJOY0J88DAL.tempFilesize
10KB
MD53a4a054dea0be4dcee1217b48fa1cb8f
SHA18da400bdd171270fcf98d58593cc6c807362263d
SHA256f4af9453c3836485bd972bd7dd0255a3540ed9a3fe1592ff7832aba003ecd531
SHA51282eb5e132bf1044574d75ebea89d604346fb15aa241d2e8a29519769ab9b80200daab63a59f4d0df724b789edd171798d7df52870897b6b39c90e2f45a2a7375
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
10KB
MD5957e11dc8e0c3d11cb2ed5bc2b6b91be
SHA1abbb4368dbfc3b2eed13dd7a2dd3c535cd7ed91c
SHA256a37b994fe785e2fdaaeab8dd688aa1b4e356529adcbd50fb79c9855fc065811a
SHA512ce355b9874ea382a8f391d40d521acd2904a9b8be494ba4c3a206e96fd38e51f4539b53dc47dc39a82fc8a1dd88fbd109595c26842257842b2287b6ebb555680
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
10KB
MD5e10b67c71ada89ecd69597bc9dba8976
SHA1fdc25ca95b542bb860044ec78e9f3499c4e943c6
SHA2563aa74d1392f812a64347105140babc8d49bcc6f52130b06ba8dff0490fbf3c0b
SHA51297a708d53ceec4039a38b565226f66d4c41eaf9275b2028106a855488c7f03aae7a3bacfc4516a92ae8757c10f5c6d9c12aa6ae3539ae290295d4949ca9c8d48
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
10KB
MD5c03a59e74f186489c56aa870c7f5d69d
SHA1c74b1d62a9b4e55fb58cf7cabefc8b702ea6a491
SHA2563b1f697f1f401c211ca517f5841660c337caa8419cd24ac7889b0db9b11c4834
SHA512e472aa331e6031ae79495b526a7eb345b4ecbd0699b2f32695dfcbe3fd69e1cfa14e4a6061b7167a1d3db26bc288aab85b5e149cd3b089155df5cb6cd29ed8cf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
10KB
MD5b83d89dd96f78ccf32fc6b38b1098bd6
SHA1fa5cfaaaf735e7cd3f1aba14a4f6b44d98c175ae
SHA2567500da023ee9f8938e2145663e2133d131388fde6c573f52c2e7b2ad1c8d1bee
SHA51215d7e880ab507324c7b8795167e34d745be739d45bc5fe7b3557e200d0c10f59c08f39369f9100bcd1e8b2f14a56661da3a0e955a22c86286113c4eced33eb63
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
10KB
MD523d57df5bf2c825063d289e9d44bd2b0
SHA1bb5fd2aadc7ffdcb1c70682f4ef534237b5cc1be
SHA256fbb61fc51bf971fba30b88206af48a8efc6227634b16ebf1cdc3b52b226c62f1
SHA5128b4e8ee35892368070cf66790672497d51ed8dc3867a1b518803989298cefce7145fd39fbf931f752ee5442d17e2b648eb9000a37a53937acef246680976fe74
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
10KB
MD5c49179c9faa2208254c9b525bae8acd9
SHA1e75408cee71c8ee592720f214602a60e63397e3c
SHA256385438d2dd006b20cf93806ab571ba01576e80fec34fef3951f4492381dc820b
SHA512d025d57eae95331effc4b2d925922737a22a331c048a61098d0fc41ef0d72b352c739b21cf4a58a65f94b1af1d14543dfd62bd51b16bd9791f4f76982ee31119
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
10KB
MD520df669418eebfc09d3b443ba916fbbb
SHA1f552879d2ae5739e4a00728f5b489b7ef98d1b1b
SHA25602c6ace4bb3d8626f99a423c21c2ca52a76ecb9ed24a6d7ce44ec8d0212a1ffc
SHA51263f5c9781f05db68c13fed4fe883191e1f9f0b3a3a0f77bbe61f94247fc54af39e1bc0bd082512e9350e33dd0519b2a487439c66400d56b145a9ede11191c16f
-
C:\Users\Admin\AppData\Roaming\Parsec\appdata.jsonFilesize
155B
MD52c669af7ee4adeddf72fa0102aa0378d
SHA15fcdf2480946eef8f55daa2df5522508e45deccd
SHA256cd5d52066766b7f0fd7222e551a96c539f17c72debd32f8da9f76df4627a6dd5
SHA512553caece520111cab22bb8e92099a2976acd7f2dc8c8766227f8d64259cc9e3104adf1b10019b25edb3a05b92a64afe5466c661f88bf33f2ecacda4fe6edc32f
-
C:\Users\Admin\AppData\Roaming\Parsec\config.jsonFilesize
173B
MD5e1402ec314d9af8f7f23263ad530a541
SHA1b4eb942b83abbb964207ba47c36b4ab44ce99ecf
SHA25675074aec169a744883623e994aa722ffff937508b7fc8d181d0cfccf39ac586a
SHA512712ff85f67f1cca1118339bdd4b6f9748565f45b1ee224e7e47063d18602b6a96d6830a610b54835b1baf5ffb54684f7ae6441119c53606fbaf771af674e7505
-
C:\Users\Admin\AppData\Roaming\Parsec\config.jsonFilesize
264B
MD5cfa73a96d56d5e200e29be94330b35c1
SHA1f7da43fc511a7fe6c45db1aabad9e433606d3b69
SHA2561d70f800b3d6cba05026fe82c7945eb03260a844e04cd23a07dc77d900542a16
SHA5127ed0c2f5e18924debece33bc10f44485fc27f88dfc222ca388e66b8390b7f705194679c52c8de6b518e9418d5116837337ba71abbe99d4c9cc1ecb60386bc6f4
-
C:\Users\Admin\AppData\Roaming\Parsec\parsecd-150-93b.dllFilesize
3.3MB
MD51ff3e1349edd37a206a97943731045c4
SHA16d1cfc0c0b26191385cb27149433e743b74d479a
SHA256b43debe8105cfd4e2c8f81599497ad4ad38640f19a64f9e530e7d2f64662bf6d
SHA51280f91692c22587e76e26c7ca38b267493d4598bce75e284b3fef4ef03c64ef8ba91d67bb7be2bddd9624e4aa52a67bdeb4b5eac3a86a31529bb18c44f5824fe6
-
C:\Users\Admin\AppData\Roaming\Salad\76d1c706-6f8c-4887-a08b-371cc8b85772.tmpFilesize
57B
MD558127c59cb9e1da127904c341d15372b
SHA162445484661d8036ce9788baeaba31d204e9a5fc
SHA256be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de
SHA5128d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a
-
C:\Users\Admin\AppData\Roaming\Salad\DawnCache\data_0Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Roaming\Salad\DawnCache\data_2Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Roaming\Salad\GPUCache\data_1Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
C:\Users\Admin\AppData\Roaming\Salad\GPUCache\data_3Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Roaming\Salad\Network\Network Persistent StateFilesize
300B
MD5aa6d4c5b28f93f882d18bac652d0d4d6
SHA1095967061005c96c634496b1e0990983df6806b1
SHA256e9aecdc506ca3c2e6b30610a85a21f6a30c795497501eef59c78c563871474b0
SHA512e5231c3d91d12fe9b7bd220fbc98b94425f4263547a517429d8540bc0f5386e5aee1eef6c93df40e01ee9dda70332ff849e2a52d3cd8ecbfe4b930d36be69395
-
C:\Users\Admin\AppData\Roaming\Salad\Network\Network Persistent State~RFe7cb9d6.TMPFilesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
C:\Users\Admin\AppData\Roaming\Salad\Preferences~RFe7bba96.TMPFilesize
86B
MD5d11dedf80b85d8d9be3fec6bb292f64b
SHA1aab8783454819cd66ddf7871e887abdba138aef3
SHA2568029940de92ae596278912bbbd6387d65f4e849d3c136287a1233f525d189c67
SHA5126b7ec1ca5189124e0d136f561ca7f12a4653633e2d9452d290e658dfe545acf6600cc9496794757a43f95c91705e9549ef681d4cc9e035738b03a18bdc2e25f0
-
C:\Users\Admin\AppData\Roaming\Salad\config.jsonFilesize
32B
MD50d17acddc799d376fadb1b4b725d60c4
SHA1fa370fc3f29d8a99799b853422b7af87e77627d7
SHA256f6cc0f24c10b04175704f5156f82d75b5f7c402dd2aa0180575d9040e68c52f7
SHA51294da27bac353f74c864b4b0eb5db1bd77949e78183b0107f051c37ffc535e3f92a7617dab4ee40c3cc9a13b1b020734d7f59c34aaad9a15946457bc3759160fd
-
C:\Users\Admin\AppData\Roaming\Salad\config.jsonFilesize
68B
MD56603a4b701091234f31f5fe804cd9af6
SHA137bd1bdd0af267e5f1fc22e1310255ffa40b55f2
SHA2569371eb2819c8776e895a53a0d62ca2350020278c3c97abe80d187d2e5fa04e27
SHA512280b29a7db84471c992bdd5fbeca4203e7aeb949c32736ca387a851eca7111f49f494b353101fffe3118cd5050088c3d7a73414ca5d54e1114d1da41e13eab2a
-
C:\Users\Admin\AppData\Roaming\Salad\config.jsonFilesize
1KB
MD5133bdeab85912d27db67a0741492ab04
SHA14427e84edde74abd80af8c04c4c1129e73d70f85
SHA2566cf60a1db0c57157b238b22494f251cc3d4f9554d35ebc8e157b60d138a89a18
SHA5128acfa031fb5ca1b63cea58215eecaba065526a3775b77677a5bb2305504bbf0e7d7c4b21b4cf20d35edf7e92f30836d85b3d0ab821bf325d0bf1cae3455ecd70
-
C:\Users\Admin\AppData\Roaming\Salad\config.jsonFilesize
116B
MD52dbdea4b3f818e6291c3247615bb9950
SHA10d219167d3aa54b40d1a8962b2e6627d14baeb02
SHA25695f9f1017ae1dd408eba2047f4a257ed2b694f2e35a6530b8361ea329a3d3cb8
SHA512660de312fd4fd7c16f68684e30f9fdb578482a06f4d75455d136bbaad183ba10075a0d17ce4c2f70cc86a30e8551aa86af32816c6fa7c3d6c1c5715135d4a4ec
-
C:\Users\Admin\AppData\Roaming\Salad\config.jsonFilesize
165B
MD535cecdb4ed5ff7dd60d14819dbf162c4
SHA10d3e0f334b82f0594ce06c2d6327506630ab6f0b
SHA256a550bc7cf0dd69e22cd5b2d265d031869654454ea9adb9efbe40f9a2f67f14db
SHA512c58f909e4886edfaf7a603275bc9ba28221d684fb6745f514ac070fbb975c605909aaee20ba0d3657ac8b29556b6c4e4ab14120b64f919937be71e9774790626
-
C:\Users\Admin\AppData\Roaming\Salad\config.jsonFilesize
211B
MD5c2d932fe2fbd79412e8e7260021245b8
SHA1cd3134b7a7eb0479c6e6607748e8737525ad5196
SHA256ac75fbeabd9254cf913e55b2c400bc4e5224e618788169ad3c3f9db6dd94c8d6
SHA512a35411e7e360eeac4c3f754aee2d16008c98ca01cafc1a687667447cda47e447e638e919138cb6f05980e597819f82747e75317d3d0029a65c495d560ee6dc5e
-
C:\Users\Admin\AppData\Roaming\Salad\config.jsonFilesize
247B
MD52ff0bf357e4d63e780f1cffbf65643e3
SHA1a89f84738629e6c9e79f11df24c91fd42122ff32
SHA256c8c02c8f5f177e4edf62459f778442ef577f0d57163f288dba1b2f65423d7c6b
SHA512575003f416c1188ecf23182a3f9b90ec594a83367c96e3ab0e107cc18ef4d01844356ae9c9952ba50e87fa9ac0277eb3096fb89b43984f2e48573b567ce677eb
-
C:\Users\Admin\AppData\Roaming\Salad\config.jsonFilesize
304B
MD5dffc26d9d8d6f841873bd71ed0560583
SHA18a6acc2ff959062c197e80deb82c54640d221df4
SHA256f80eb0520f9c81d11226b8d81a718f577ac807e37b9dc7c4e20b2be99048a15e
SHA512f1cb96527456484e988d0a2e37402252ddc1e2e67b3e0bf8a81bb1ec8bf89937e82393031ae7790e8dd2ff7e5822375abb94051f85e2b629c59035d3dceef9c3
-
C:\Users\Admin\AppData\Roaming\Salad\config.jsonFilesize
1KB
MD5bb40a0d5813523da897586917eb0193b
SHA15e496c16dc779456dcb046c942a30d7133f8ceb9
SHA256d97ee01a0888ab1bb2d77e17f6bf16493d5d22366cda0b1dc152fbe6ad44d733
SHA512eff0f0ee0529b83d57b396a9f929d5bbae5a445e1c0bc08563a75869c1f82f12ac4eb08da908c7c2627eb5dc56a3a76fd3f3bc94c930407cc59651b8294841e5
-
C:\Users\Admin\AppData\Roaming\Salad\config.json.tmp-982812863803a99dFilesize
5KB
MD5dd936cb66fd5a6325a6a714c7c6eddfe
SHA12501b6ff6e3555704c6ac85a98523043b1f5890d
SHA2561204292f283bc3f2cd7c45ccab55918daf17f5444c1aa41aeaa0e2551b2e8e80
SHA5122c64d95b01a674617e2b9a641ea5a07d3a1b699106d6677278eff84d6abf961cf47c1ef3c93c63d7d75d5229bf6490120e16b385b85e1d2d39a62d40b728ba2d
-
C:\Users\Admin\AppData\Roaming\Salad\logs\main.logFilesize
1KB
MD5ea9dc73ff44afe6d1ef230ddb158541f
SHA111a7ba8524d5659aff21692916488f0858348c1d
SHA256e48827ec2006d126c378f5ab417601d728c5a718ed0494ef230a25397ae34818
SHA512a73aa5406f7d41ec2d1d0a4b81fbda05c69699a28178272a89371fe49bc3b06291d7bb99ca15594d78db447af599943406c38c021f94a98721dbaf2a373fbd6d
-
C:\Users\Admin\AppData\Roaming\Salad\logs\main.logFilesize
8KB
MD50f00f61b9992648b441ea27d55bab531
SHA163c58979b1829b71f1f149b448482943eac71a64
SHA2569c8604e83417b954aa32e2d9026faacce6e68fe78486526d7a1b9fb797d4473d
SHA512b3d4a7d6c4be2d3ef8d949e4f2a6c35cff2d15d5f70a90e47f9601ace3481d6f1a071135d2090823d0207586ad3ee777afd5bc738322574dc4b705c28a1db9ce
-
C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msiFilesize
1010KB
MD527bc9540828c59e1ca1997cf04f6c467
SHA1bfa6d1ce9d4df8beba2bedf59f86a698de0215f3
SHA25605c18698c3dc3b2709afd3355ad5b91a60b2121a52e5fcc474e4e47fb8e95e2a
SHA512a3ae822116cddb52d859de7ffc958541bb47c355a835c5129aade9cc0e5fba3ff25387061deb5b55b5694a535f09fe8669485282eb6e7c818cc7092eb3392848
-
C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\decoder.dllFilesize
126KB
MD53531cf7755b16d38d5e9e3c43280e7d2
SHA119981b17ae35b6e9a0007551e69d3e50aa1afffe
SHA25676133e832c15aa5cbc49fb3ba09e0b8dd467c307688be2c9e85e79d3bf62c089
SHA5127b053ba2cf92ef2431b98b2a06bd56340dad94de36d11e326a80cd61b9acb378ac644ac407cf970f4ef8333b8d3fb4ff40b18bb41ec5aee49d79a6a2adcf28fd
-
C:\Users\Admin\AppData\Roaming\discord\Local Storage\leveldb\MANIFEST-000001Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\Desktop\Telegram\log.txtFilesize
9KB
MD5d08115e5d726c4a7c9c2abdbbee95e32
SHA1069de021110011a4d98e645712338ae8e5c8cf01
SHA2563f53aafe9399365486e4c9a3c11709bd43c2af92483627fa142ebe2858fb2e95
SHA512fa07c16f2bcab3d4e52bda082fccf107c5f75d7b2562929ac513a9959c363655c17b0ac27ce293c6990100165da1cce4bd36fccd8b115d7b842b31c6f49d240f
-
C:\Users\Admin\Desktop\Telegram\log.txtFilesize
23KB
MD5df1aa940cf59bb17af7f8a7b81d44075
SHA1a4db71271f92daec317383cd902c2f7c353d3ca0
SHA25698f8b7a0d982112b1302cf1d0a7ca260b5e50df94db5cdd5cc9b98dccbc557ef
SHA512a45af540108026124cfdb2c233b5bde726132ec2ac32083c668cdfc9ebe8bfc064af7f540ace95a1505b437abc4e6b1e39f2ee08bc586876ccabdf44f07f6787
-
C:\Users\Admin\Desktop\Telegram\tdata\881D402645AD696D0Filesize
140B
MD57bf590c5ed336ff482185733fd7d9695
SHA17703ed913423f8e7ce53556577f6b8c0973022cd
SHA256df66112abd8963f539fa5ece576e15f6ef26b2ab0b8e64376d411f89fdbae844
SHA512bb08b17b19ee10f81a133178f24f0b8068ba2d11e31dc772229f0e0673afef397af7842e7ed055400ff6705f770415a8a29675edad2706877c190f3246e634a0
-
C:\Users\Admin\Desktop\Telegram\tdata\8A911B704AEB3035sFilesize
11KB
MD57b7bb6b7a80614315fc57ba9dbfc497a
SHA1c0bab2226757f7cb7b7de1619d779e9419fbc245
SHA2562a0e86df3f5c5f849a4e6f2f8b7115dadaecf977eb5a7a0881a34f69f7caff5b
SHA512053924be21bdd1f8b4c51361b6745032828bde63716b51eea1f8bd73c0d1fa3a5757e8516bb0e1f05d764c7cf66bab4453d69a9185f9a58e32d121ee4d8e1cd6
-
C:\Users\Admin\Desktop\Telegram\tdata\DEE91B9B0A858D2EsFilesize
409KB
MD557c2b84b3a71fc3fe93e72828680b967
SHA195316ed02ab5f2eff2072eab97d499808e6aa398
SHA2561a17e0d05c32cb6aff4845ba4f296dfadc8df9fe6dc9004cff962e0adc327435
SHA51231b966f2993c137fd1b643bbe7731188dba9c307925c889e2ce2962bb8469f1387e1ed92b1a92bce2f6fd366d9221ecfad392c8f4c458faa9ffde63e3e58705c
-
C:\Users\Admin\Desktop\Telegram\tdata\emoji\cache_18_0Filesize
648KB
MD552fabb97c5b590433621941497a5ff90
SHA182148e256017d231de8de399c6ff99fca288c340
SHA256da05fe8f69700a3c9f60669d81126aa8612877339eb32c31e2ced1361dab5c06
SHA512fc96b60b9dfa4455033377123d1cdee9fdc4a71c67da347a03672684e5ccce3e486bfb54c32c63de5e9047c4015296bf960d624ad11df670496e43f8aeb37fbf
-
C:\Users\Admin\Desktop\Telegram\tdata\emoji\cache_18_1Filesize
648KB
MD5cc3e1de71fc3e46f0774c3f8f8ea9b1b
SHA170ffcb8672d696fc2bb83f2e6e112597fc8b5176
SHA256930fe88d51a087136652557a8d61fb90e69be49b66d106c1454bf2b5250eddc9
SHA5125d424cca4674eb52f76b64d85528ce6e1473d641ed715e8fdd03718cca8496a7b04fe35626cd9aaaac85bf1f19acedb325df4edd244ea19ef550fff0135f3b8a
-
C:\Users\Admin\Desktop\Telegram\tdata\emoji\cache_18_2Filesize
648KB
MD53c09f59fabc14d9bf2c04214f37551d4
SHA17c6ab40bd202c57a48fb6f9c6083539ae51cc477
SHA256cff511baeb67be6ddd3295f6a2509ccb65a1d26c720ddc9927fa1285ec4d91eb
SHA512aa3eaa31bc152571fd1668fc20ad6cf3d4969346ad282ae46db8f1590cef6cc84ef6109a1627292fec7f5899a1cb9792f71121bc4bac3a6f297b211f9c6c904b
-
C:\Users\Admin\Desktop\Telegram\tdata\key_datasFilesize
388B
MD5ff6d712201a0824524f6d37b1df1feeb
SHA19c5a0cba110ac1707aa16cf8badd32f179cdb8c9
SHA2564eaf83de92f1c5cd2c86a01fa7cef37fc550c2474fd26c735ff844770727f965
SHA512e195fefd650a4838459205f76dec61a949470a2c6344746c1550b90c70554cca6ab91d1f3c154e73875763999572673f573a44e53610a26199b43ec866c1203b
-
C:\Users\Admin\Desktop\Telegram\tdata\opengl_crash_checkFilesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\Desktop\Telegram\tdata\settingssFilesize
1KB
MD5e805cebabe4bc072b8abb57108df890e
SHA15d990f26e74fab6d1799d63958648193678fc3aa
SHA2566e25f25e3b0c358fb4aeedc561f1c983e260b6ee0f99998070ff92e86033f991
SHA5124e18998646f8af8ca9585a427ae88e39be9c7ded8212b1fa0a8103b12e490e060ba2490445d92b949a6aa9e36dd4e6e4dbbb4dc5aeb72bc0d0f9df4715213d81
-
C:\Users\Admin\Desktop\Telegram\tdata\settingssFilesize
3KB
MD5a91b573698b5f034315793607f9367a1
SHA10b7f3410e8111fd435a0a4cbaa79f63a659ecae8
SHA2562029445026645ef12f228bf5f8dcbde49bd01de800e3217b349775714af53e9e
SHA51270e45c5c07939cc92419b7a40e15ec68b3098423c6d2e13053556f9e0c0480ed4e0965b0d404034aea2160dc6bdfbc91820b961ebec5736ff6bb85e40dc01df6
-
C:\Users\Admin\Desktop\Telegram\tdata\shortcuts-custom.jsonFilesize
404B
MD5874b930b4c2fddc8043f59113c044a14
SHA175b14a96fe1194f27913a096e484283b172b1749
SHA256f4f666f4b831e84710983b0e9e905e87342b669f61109fd693688d89c12309d8
SHA512f4b0337fba5c5f4d7e7a02aa5d4538334edd38f5df179e4f1701fa2f1c4d3d856a074fa55ea724c4e2a6c5a1ac1dbfc7e9966c814475c7cd2c65cd44fca14621
-
C:\Users\Admin\Desktop\Telegram\tdata\shortcuts-default.jsonFilesize
3KB
MD5748cf4066be09fce7cc0deef21fda22f
SHA1a2e4dc764e1df3a103f513e6dcba111d140f39c1
SHA256f9a8f9e002d9070276744fd996603934e0c03e419a5e537d0e8c4c391410b2eb
SHA5125e3ba925593bfc2fb29b717ff2a1a6d78b8cf588521b53a6e816ad7382d164e59ecd8d97e61a372f28b68acd10a2af109b3d1cc91afd7f0d537d1679929e4386
-
C:\Users\Admin\Desktop\Telegram\tdata\usertagFilesize
8B
MD5381ef6bcc58d1238c0dc4a55d83b2408
SHA1f1679943afd69d29eca3eaf559566c67f9929918
SHA25652006ca9ef5dc630956aa6002928e88ed481e31f8e3d401c92444be59f904597
SHA5121586a6fee20f4af8cae8ce8343b50e120f19372e6e27b44ad6163c25309e136f094708260081e45159d948bc53058f573d9e3654718c51b960eb5b2281b26d41
-
C:\Users\Admin\Desktop\Telegram_tdata_05-28-2024 22;30;01;101.zipFilesize
4.4MB
MD538f689186c6993d773b32907f984734c
SHA12884f1feabe326cfaf0c26d1e944b72c9b4d0e7e
SHA2563fb0f093d37226cdbb9f1dd4898a1d6a4e83e9a2ca99dd96508f0ba1c2f580a2
SHA512be9a922ed2104df626404bbaaee123f76cd690f94584c4a5da8cecb3cd502ae80f533d805fa4fa9c86f46420966514719c0aef7bbc7151dffe071f101631ba2c
-
C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_094846.jpg:Zone.IdentifierFilesize
27B
MD5c785c55d5fa3443a11b8417209c4b524
SHA1924de7b5f4fe5c2ce16a8263600dad559a3cfedb
SHA256d07777e0dc36ebecce3fa9644f0f44dc4a0b7ede0cbc1f5d33e8d6cb07af5b5c
SHA512cae7738d2bd2b157fb4eaf99954aabcf90008fc0602a1a482de9b0df4c82903991e3a9cd7d85dcd6916307f972965d58192b4557c210ef579fbb23a5860f570c
-
C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_134818.jpgFilesize
2.8MB
MD5524bb0058b870d03a5048c26a841f011
SHA168ad22891896d986f20da0eea0a3d4393945dcfd
SHA256cdead656ea023d83eeeac627e5532abc9236a23c357cfc4f2ccef8e51afd743f
SHA5123308abc5d2f5dd797a7b901ab70cf87d046eb776c3cf8081d338e5482df834ada1ce4252d86242fdee730df2ca23411c17cf0646901e2293b88b25518eb07fec
-
C:\Users\Admin\Downloads\Telegram Desktop\IMG_20240525_135059.jpgFilesize
4.3MB
MD5cbb278f0cdbfb28a73835a40baba6bb4
SHA163af60e9738e257e25337d642f5f53b3e4c22d93
SHA2569d1f6de1af3e24b706ac37ac11e528e31c5bf877b44baed26538f70d395f80d6
SHA51237c3f186e401202f43a2806cd49d45c551d53d8a29c059ffe1b7f3e0d20ea64d014da6462b9c0f6023b91a21e0147c7901e714cb8a715cc931ede7bb6854fc9d
-
C:\Users\Admin\Downloads\Unconfirmed 495541.crdownloadFilesize
3.9MB
MD501ef58e7c144c701b2ea01cfc049dbe4
SHA12f572accb519096c9ea805812ba53703c16cceea
SHA256ae5b66322e5a7c26ad21ccc556bdc1618796166565d2939142c5aa3d76c38ace
SHA512434fd6d4eb49669617da3a15c2239a2cf524624cc4fcf9f09d8bb78a40ddf2dc5e70105e6708ce7643448f3176301edd64a9b71244c179a836119532d7dd69a6
-
C:\Users\Admin\Downloads\tportable-x64.5.2.0.zip:Zone.IdentifierFilesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
C:\Windows\Installer\MSI15BE.tmpFilesize
96KB
MD53cab78d0dc84883be2335788d387601e
SHA114745df9595f190008c7e5c190660361f998d824
SHA256604e79fe970c5ed044517a9a35e4690ea6f7d959d21173ebef45cdd3d3a22bdd
SHA512df6b49f2b5cddebd7e23e81b0f89e4883fc12d95735a9b3f84d2f402f4996c54b5fdea8adb9eaa98e8c973b089656d18d6b322bd71cb42d7807f7fa8a7348820
-
C:\Windows\Installer\MSI15FF.tmpFilesize
312KB
MD5aa82345a8f360804ea1d8d935f0377aa
SHA1c09cf3b1666d9192fa524c801bb2e3542c0840e2
SHA2569c155d4214cebda186647c035ada552963dcac8f88a6b38a23ea34f9ecd1d437
SHA512c051a381d87ba933ea7929c899fb01af2207cb2462dcb2b55c28cff65596b27bdb05a48207624eeea40fddb85003133ad7af09ca93cfb2426c155daea5a9a6db
-
C:\Windows\Installer\MSID855.tmpFilesize
180KB
MD5d552dd4108b5665d306b4a8bd6083dde
SHA1dae55ccba7adb6690b27fa9623eeeed7a57f8da1
SHA256a0367875b68b1699d2647a748278ebce64d5be633598580977aa126a81cf57c5
SHA512e5545a97014b5952e15bb321135f65c0e24414f8dd606fe454fd2d048d3f769b9318df7cfb2a6bf932eb2bf6d79811b93cb2008115deb0f0fa9db07f32a70969
-
C:\Windows\Installer\MSID875.tmpFilesize
88KB
MD54083cb0f45a747d8e8ab0d3e060616f2
SHA1dcec8efa7a15fa432af2ea0445c4b346fef2a4d6
SHA256252b7423b01ff81aea6fe7b40de91abf49f515e9c0c7b95aa982756889f8ac1a
SHA51226f8949cad02334f9942fda8509579303b81b11bc052a962c5c31a7c6c54a1c96957f30ee241c2206d496d2c519d750d7f6a12b52afdb282fa706f9fee385133
-
\??\pipe\LOCAL\crashpad_2412_EULTRTCEGYJOOEOQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1156-12-0x00007FF8E3380000-0x00007FF8E3E42000-memory.dmpFilesize
10.8MB
-
memory/1156-14-0x00007FF8E3380000-0x00007FF8E3E42000-memory.dmpFilesize
10.8MB
-
memory/1156-10-0x000002A16D630000-0x000002A16D652000-memory.dmpFilesize
136KB
-
memory/1156-11-0x00007FF8E3380000-0x00007FF8E3E42000-memory.dmpFilesize
10.8MB
-
memory/1156-17-0x00007FF8E3380000-0x00007FF8E3E42000-memory.dmpFilesize
10.8MB
-
memory/1156-18-0x00007FF8E3380000-0x00007FF8E3E42000-memory.dmpFilesize
10.8MB
-
memory/1156-13-0x00007FF8E3380000-0x00007FF8E3E42000-memory.dmpFilesize
10.8MB
-
memory/1220-1-0x00000000008F0000-0x0000000000906000-memory.dmpFilesize
88KB
-
memory/1220-5398-0x0000000002D10000-0x0000000002D1C000-memory.dmpFilesize
48KB
-
memory/1220-374-0x000000001D280000-0x000000001D7A8000-memory.dmpFilesize
5.2MB
-
memory/1220-0-0x00007FF8E3383000-0x00007FF8E3385000-memory.dmpFilesize
8KB
-
memory/1220-5410-0x0000000001160000-0x000000000116A000-memory.dmpFilesize
40KB
-
memory/1220-373-0x000000001BB50000-0x000000001BC00000-memory.dmpFilesize
704KB
-
memory/1220-7896-0x000000001CC50000-0x000000001CFA0000-memory.dmpFilesize
3.3MB
-
memory/1220-54-0x00007FF8E3380000-0x00007FF8E3E42000-memory.dmpFilesize
10.8MB
-
memory/1220-1543-0x000000001B850000-0x000000001B8DE000-memory.dmpFilesize
568KB
-
memory/1220-55-0x00007FF8E3383000-0x00007FF8E3385000-memory.dmpFilesize
8KB
-
memory/1220-56-0x00007FF8E3380000-0x00007FF8E3E42000-memory.dmpFilesize
10.8MB
-
memory/1920-2800-0x00000000076C0000-0x00000000076C8000-memory.dmpFilesize
32KB
-
memory/1920-2802-0x0000000007720000-0x000000000772E000-memory.dmpFilesize
56KB
-
memory/1920-2610-0x00000000004B0000-0x0000000000626000-memory.dmpFilesize
1.5MB
-
memory/1920-2801-0x0000000007740000-0x0000000007778000-memory.dmpFilesize
224KB
-
memory/5032-3844-0x000001771BCB0000-0x000001771BCB1000-memory.dmpFilesize
4KB
-
memory/5032-3840-0x000001771BCB0000-0x000001771BCB1000-memory.dmpFilesize
4KB
-
memory/5032-3822-0x00000177136A0000-0x00000177136B0000-memory.dmpFilesize
64KB
-
memory/5032-3850-0x000001771B8D0000-0x000001771B8D1000-memory.dmpFilesize
4KB
-
memory/5032-3848-0x000001771BCB0000-0x000001771BCB1000-memory.dmpFilesize
4KB
-
memory/5032-3847-0x000001771BCB0000-0x000001771BCB1000-memory.dmpFilesize
4KB
-
memory/5032-3843-0x000001771BCB0000-0x000001771BCB1000-memory.dmpFilesize
4KB
-
memory/5032-3845-0x000001771BCB0000-0x000001771BCB1000-memory.dmpFilesize
4KB
-
memory/5032-3868-0x000001771BA20000-0x000001771BA21000-memory.dmpFilesize
4KB
-
memory/5032-3866-0x000001771BA10000-0x000001771BA11000-memory.dmpFilesize
4KB
-
memory/5032-3852-0x000001771B8E0000-0x000001771B8E1000-memory.dmpFilesize
4KB
-
memory/5032-3806-0x00000177135A0000-0x00000177135B0000-memory.dmpFilesize
64KB
-
memory/5032-3858-0x000001771B810000-0x000001771B811000-memory.dmpFilesize
4KB
-
memory/5032-3855-0x000001771B8D0000-0x000001771B8D1000-memory.dmpFilesize
4KB
-
memory/5032-3869-0x000001771BA20000-0x000001771BA21000-memory.dmpFilesize
4KB
-
memory/5032-3870-0x000001771BB30000-0x000001771BB31000-memory.dmpFilesize
4KB
-
memory/5032-3846-0x000001771BCB0000-0x000001771BCB1000-memory.dmpFilesize
4KB
-
memory/5032-3838-0x000001771BC90000-0x000001771BC91000-memory.dmpFilesize
4KB
-
memory/5032-3842-0x000001771BCB0000-0x000001771BCB1000-memory.dmpFilesize
4KB
-
memory/5032-3839-0x000001771BCB0000-0x000001771BCB1000-memory.dmpFilesize
4KB
-
memory/5032-3849-0x000001771B8E0000-0x000001771B8E1000-memory.dmpFilesize
4KB
-
memory/5032-3841-0x000001771BCB0000-0x000001771BCB1000-memory.dmpFilesize
4KB
-
memory/5052-2844-0x0000000005390000-0x00000000053B0000-memory.dmpFilesize
128KB
-
memory/5244-4795-0x00007FF8BEE80000-0x00007FF8BEE90000-memory.dmpFilesize
64KB
-
memory/5976-7863-0x00007FF8D16C0000-0x00007FF8D2770000-memory.dmpFilesize
16.7MB
-
memory/5976-7862-0x00007FF8DD710000-0x00007FF8DD9C6000-memory.dmpFilesize
2.7MB
-
memory/5976-7860-0x00007FF741F10000-0x00007FF742008000-memory.dmpFilesize
992KB
-
memory/5976-7861-0x00007FF8F5A60000-0x00007FF8F5A94000-memory.dmpFilesize
208KB
-
memory/6040-7931-0x0000000004A30000-0x0000000004B4C000-memory.dmpFilesize
1.1MB
-
memory/6040-8650-0x0000000002BA0000-0x0000000002CBC000-memory.dmpFilesize
1.1MB
-
memory/6736-9672-0x00000175EC570000-0x00000175EC594000-memory.dmpFilesize
144KB
-
memory/6736-9671-0x00000175EC570000-0x00000175EC59A000-memory.dmpFilesize
168KB