Analysis
-
max time kernel
1065s -
max time network
1121s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-07-2024 01:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://koo
Resource
win11-20240611-en
Errors
General
-
Target
http://koo
Malware Config
Signatures
-
Processes:
wscript.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wscript.exe -
Blocklisted process makes network request 3 IoCs
Processes:
wscript.exeflow pid process 734 5480 wscript.exe 737 5480 wscript.exe 746 5480 wscript.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables cmd.exe use via registry modification 1 IoCs
Processes:
wscript.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" wscript.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
Processes:
wscript.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad++.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adwcleaner_5.005.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCleaner64.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\htaedit.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\installer.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssecse.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad++.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\installer.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmic.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\crashreporter.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssecse.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\htaedit.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\updater.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\plugin-hang-ui.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VirtualBox.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uTorrent.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit32.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\control.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adwcleaner_5.005.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCleaner.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mdsched.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\student.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\updater.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskhost.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCleaner64.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit33.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\control.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbsedit.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uninstall.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit33.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\attrib.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procxp.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msert.exe wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uTorrent.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\update.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\plugin-hang-ui.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmic.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msert.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCleaner.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\student.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "wscript.exe C:\\Users\\Public\\ghostroot\\Message.vbs" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit32.exe wscript.exe -
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 4160 takeown.exe 7888 icacls.exe 5820 takeown.exe 3364 icacls.exe -
Executes dropped EXE 6 IoCs
Processes:
ClassicShell.exeBlueScreen.exeFreeYoutubeDownloader.exeFree YouTube Downloader.exeFreeYoutubeDownloader.exeBox.exepid process 7620 ClassicShell.exe 6972 BlueScreen.exe 6068 FreeYoutubeDownloader.exe 7452 Free YouTube Downloader.exe 6420 FreeYoutubeDownloader.exe 5260 Box.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager reg.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 4160 takeown.exe 7888 icacls.exe 5820 takeown.exe 3364 icacls.exe -
Processes:
resource yara_rule C:\Users\Admin\Downloads\BlueScreen.exe upx behavioral1/memory/6972-3070-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/6972-3071-0x0000000000400000-0x0000000000409000-memory.dmp upx C:\Users\Admin\Downloads\Unconfirmed 276735.crdownload upx -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
wscript.exeFreeYoutubeDownloader.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Windows\CurrentVersion\Run\Bolbi = "C:\\Users\\Public\\Ghostroot\\Bolbi.vbs" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bolbi = "C:\\Users\\Public\\Ghostroot\\Bolbi.vbs" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Windows\CurrentVersion\Run\Free Youtube Downloader = "C:\\Windows\\Free Youtube Downloader\\Free Youtube Downloader\\Free YouTube Downloader.exe" FreeYoutubeDownloader.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
wscript.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wscript.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
ClassicShell.exedescription ioc process File opened for modification \??\PhysicalDrive0 ClassicShell.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
wscript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Public\\ghostroot\\8ydfdsE.jpg" wscript.exe -
Drops file in Program Files directory 64 IoCs
Processes:
wscript.exedescription ioc process File created C:\Program Files\Slap66.vbs wscript.exe File opened for modification C:\Program Files\Common Files\DESIGNER\Open142.vbs wscript.exe File opened for modification C:\Program Files\Internet Explorer\en-US\Open10.vbs wscript.exe File created C:\Program Files\Java\jdk-1.8\Open58.vbs wscript.exe File created C:\Program Files\MSBuild\Microsoft\Open21.vbs wscript.exe File opened for modification C:\Program Files\Google\Chrome\Open87.vbs wscript.exe File opened for modification C:\Program Files\Java\jre-1.8\Open126.vbs wscript.exe File opened for modification C:\Program Files\Windows Media Player\en-US\Open111.vbs wscript.exe File created C:\Program Files\7-Zip\Clap192.vbs wscript.exe File opened for modification C:\Program Files\dotnet\host\Open63.vbs wscript.exe File opened for modification C:\Program Files\dotnet\swidtag\Open238.vbs wscript.exe File created C:\Program Files\Microsoft Office\Clap173.vbs wscript.exe File created C:\Program Files\Windows Mail\Clap222.vbs wscript.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\Open207.vbs wscript.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\Open235.vbs wscript.exe File created C:\Program Files\MSBuild\Clap64.vbs wscript.exe File opened for modification C:\Program Files\Windows Media Player\Clap12.vbs wscript.exe File created C:\Program Files\Windows Media Player\en-US\Open138.vbs wscript.exe File opened for modification C:\Program Files\Slap67.vbs wscript.exe File created C:\Program Files\7-Zip\Lang\Open109.vbs wscript.exe File created C:\Program Files\dotnet\host\Open214.vbs wscript.exe File created C:\Program Files\dotnet\swidtag\Open154.vbs wscript.exe File opened for modification C:\Program Files\Google\Clap182.vbs wscript.exe File created C:\Program Files\Java\jre8\Open233.vbs wscript.exe File created C:\Program Files\Microsoft Office 15\Clap74.vbs wscript.exe File opened for modification C:\Program Files\Reference Assemblies\Clap140.vbs wscript.exe File created C:\Program Files\VideoLAN\Clap60.vbs wscript.exe File created C:\Program Files\dotnet\Clap193.vbs wscript.exe File opened for modification C:\Program Files\dotnet\swidtag\Open248.vbs wscript.exe File created C:\Program Files\Microsoft Office\PackageManifests\Open48.vbs wscript.exe File created C:\Program Files\Mozilla Firefox\uninstall\Open40.vbs wscript.exe File created C:\Program Files\Mozilla Firefox\uninstall\Open239.vbs wscript.exe File opened for modification C:\Program Files\MSBuild\Clap18.vbs wscript.exe File opened for modification C:\Program Files\MSBuild\Clap78.vbs wscript.exe File opened for modification C:\Program Files\Windows Mail\Clap109.vbs wscript.exe File opened for modification C:\Program Files\7-Zip\Lang\Open226.vbs wscript.exe File opened for modification C:\Program Files\dotnet\swidtag\Open229.vbs wscript.exe File opened for modification C:\Program Files\Google\Clap81.vbs wscript.exe File created C:\Program Files\Google\Clap173.vbs wscript.exe File opened for modification C:\Program Files\Google\GoogleUpdater\Open227.vbs wscript.exe File created C:\Program Files\Java\Clap229.vbs wscript.exe File opened for modification C:\Program Files\Java\jre-1.8\Open101.vbs wscript.exe File opened for modification C:\Program Files\Microsoft Office\Clap233.vbs wscript.exe File opened for modification C:\Program Files\Microsoft Office\Office16\Open31.vbs wscript.exe File opened for modification C:\Program Files\MSBuild\Clap35.vbs wscript.exe File created C:\Program Files\MSBuild\Clap202.vbs wscript.exe File created C:\Program Files\VideoLAN\VLC\Open26.vbs wscript.exe File opened for modification C:\Program Files\Common Files\Clap2.vbs wscript.exe File opened for modification C:\Program Files\dotnet\swidtag\Open157.vbs wscript.exe File created C:\Program Files\Google\Chrome\Open129.vbs wscript.exe File opened for modification C:\Program Files\Internet Explorer\Clap241.vbs wscript.exe File created C:\Program Files\Microsoft Office\PackageManifests\Open53.vbs wscript.exe File created C:\Program Files\Mozilla Firefox\fonts\Open.vbs wscript.exe File created C:\Program Files\Common Files\System\Open148.vbs wscript.exe File opened for modification C:\Program Files\Google\GoogleUpdater\Open161.vbs wscript.exe File opened for modification C:\Program Files\Java\jdk-1.8\Open100.vbs wscript.exe File created C:\Program Files\Microsoft Office\Clap154.vbs wscript.exe File opened for modification C:\Program Files\Microsoft Office 15\Clap209.vbs wscript.exe File opened for modification C:\Program Files\VideoLAN\VLC\Open42.vbs wscript.exe File created C:\Program Files\Windows Media Player\Clap49.vbs wscript.exe File opened for modification C:\Program Files\Google\Clap145.vbs wscript.exe File created C:\Program Files\Google\GoogleUpdater\Open120.vbs wscript.exe File opened for modification C:\Program Files\Internet Explorer\images\Open139.vbs wscript.exe File created C:\Program Files\Microsoft Office\root\Open34.vbs wscript.exe -
Drops file in Windows directory 18 IoCs
Processes:
FreeYoutubeDownloader.exeUserOOBEBroker.exeFreeYoutubeDownloader.exeUserOOBEBroker.exewscript.exeUserOOBEBroker.exedescription ioc process File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Uninstall.exe FreeYoutubeDownloader.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe FreeYoutubeDownloader.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\System32 wscript.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe FreeYoutubeDownloader.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe FreeYoutubeDownloader.exe File created C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Uninstall.ini FreeYoutubeDownloader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 58 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
Processes:
chrome.exechrome.exemsedge.exeSearchHost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2076 taskkill.exe -
Modifies Control Panel 4 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Control Panel\International wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Control Panel\International\s1159 = "Bolbi" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Control Panel\International\s2359 = "Bolbi" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Control Panel\Desktop wscript.exe -
Processes:
iexplore.exeexplorer.exeSearchHost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\BrowserEmulation iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateLowDateTime = "4064600288" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "9" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionLow = "395196024" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\GPU\SubSysId = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPMigrationVer = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\GPU\DeviceId = "140" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListDomainAttributeSet = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "268435456" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateHighDateTime = "31116547" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\HomepagesUpgradeVersion = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\UnattendLoaded = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "395196024" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\GPU\SoftwareFallback = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\GPU\VendorId = "4318" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\GPU\Revision = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "8" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionHigh = "268435456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "13" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000\Software\Microsoft\Internet Explorer\Main explorer.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
chrome.exechrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133644452407886289" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 64 IoCs
Processes:
explorer.exeSearchHost.execmd.exemsedge.exemsedge.exeStartMenuExperienceHost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\GroupByKey:PID = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2263" SearchHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.scr cmd.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\MRUListEx = ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "3486" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1797" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1711" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1276817940-128734381-631578427-1000\{C6CECBFE-5C0B-46B2-988D-D3ECDE9CAA4F} msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lnk\ = "exefile" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1097" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "7371" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\Mode = "4" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\LogicalViewMode = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2211" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "6222" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "8513" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "8513" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "13543" SearchHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 14000000070000000100010006000000140000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c00530065007200720020004c0062006800670068006f0072002000510062006a006100790062006e007100720065005c00530065007200720020004c0062006800670068006f0072002000510062006a006100790062006e007100720065005c00530065007200720020004c0062006800470068006f0072002000510062006a006100790062006e007100720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000e8070700530065007200720020004c0062006800470068006f0072002000510062006a006100790062006e00710072006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000002000000000000000000000000000000000000000000000000000000000000005a5c9594edccda01000000000000000000000000530065007200720020004c0062006800470068006f0072002000510062006a006100790062006e007100720065000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000050003a005c00480066007200650066005c004e0071007a00760061005c004e006300630051006e0067006e005c005900620070006e0079005c005a00760070006500620066006200730067005c00420061007200510065007600690072005c00420061007200510065007600690072002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50100000000000000000000e8070600420061007200510065007600690072000a004800630071006e00670076006100740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000079e452e46bcda01000000000000000000000000420061007200510065007600690072000a0041006200670020006600760074006100720071002000760061000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff75ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff81ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff82ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff83ae2078e323294282c1e41cb67d5b9c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\GroupView = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "13543" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\GroupByDirection = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "14109" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "5511" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2211" SearchHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHost = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "14109" SearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "3486" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\FFlags = "18874385" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "7371" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000070000001800000030f125b7ef471a10a5f102608c9eebac0a000000f000000030f125b7ef471a10a5f102608c9eebac04000000a0000000e0cc8de8b3b7d111a9f000aa0060fa310600000080000000e0cc8de8b3b7d111a9f000aa0060fa31020000005000000030f125b7ef471a10a5f102608c9eebac0c00000080000000e0cc8de8b3b7d111a9f000aa0060fa31040000005000000030f125b7ef471a10a5f102608c9eebac0e000000a0000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "7373" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2263" SearchHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.pif\ = "dllfile" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1097" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "13543" SearchHost.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{80213E82-BCFD-4C4F-8817-BB27601267A9}\IconSize = "16" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0 = 6800320072adda04e358e5102000424f4e5a494b7e312e5a495000004c0009000400efbee3581610e358e5102e000000000000000000000000000000000000000000000000001c9bff0042006f006e007a0069004b0069006c006c002e007a006900700000001c000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "6222" SearchHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\NodeSlot = "4" explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1276817940-128734381-631578427-1000\{E39DA00F-CCB6-40DB-B405-EB18B65BE9C2} explorer.exe Key created \REGISTRY\USER\S-1-5-21-1276817940-128734381-631578427-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchHost.exe -
NTFS ADS 18 IoCs
Processes:
msedge.exemsedge.exemsedge.exeexplorer.exemsedge.exemsedge.exemsedge.exemsedge.exechrome.exemsedge.exemsedge.exemsedge.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\Bolbi.vbs:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 56329.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\TaskILL.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\Temp1_BonziKill.zip\BonziKill.exe:Zone.Identifier explorer.exe File opened for modification C:\Users\Admin\Downloads\ClassicShell.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\BlueScreen.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\FreeYoutubeDownloader.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 313384.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\BonziKill (1).zip:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\blue-background-windows-365-windows-11-stock-3840x2160-7920.png:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 297034.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 982848.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 276735.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\BonziKill.zip:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 226681.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 452559.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\BonziKill.txt:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\VeryFun.exe:Zone.Identifier msedge.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
explorer.exepid process 3000 explorer.exe 3000 explorer.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
chrome.exechrome.exechrome.exemsedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exeexplorer.exemsedge.exemsedge.exemsedge.exemsedge.exepid process 2248 chrome.exe 2248 chrome.exe 6232 chrome.exe 6232 chrome.exe 7692 chrome.exe 7692 chrome.exe 6708 msedge.exe 6708 msedge.exe 7664 msedge.exe 7664 msedge.exe 3580 identity_helper.exe 3580 identity_helper.exe 6744 msedge.exe 6744 msedge.exe 5996 msedge.exe 5996 msedge.exe 7516 msedge.exe 7516 msedge.exe 7516 msedge.exe 7516 msedge.exe 7360 msedge.exe 7360 msedge.exe 4496 msedge.exe 4496 msedge.exe 7008 msedge.exe 7008 msedge.exe 3156 msedge.exe 3156 msedge.exe 6072 msedge.exe 6072 msedge.exe 3000 explorer.exe 3000 explorer.exe 2060 msedge.exe 2060 msedge.exe 7736 msedge.exe 7736 msedge.exe 1612 msedge.exe 1612 msedge.exe 6352 msedge.exe 6352 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exemsedge.exepid process 3000 explorer.exe 7664 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
Processes:
chrome.exechrome.exemsedge.exepid process 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7664 msedge.exe 7664 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe Token: SeShutdownPrivilege 2248 chrome.exe Token: SeCreatePagefilePrivilege 2248 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exechrome.exemsedge.exepid process 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7664 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exechrome.exemsedge.exeFree YouTube Downloader.exepid process 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 2248 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7692 chrome.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7452 Free YouTube Downloader.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe 7664 msedge.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
FreeYoutubeDownloader.exeFreeYoutubeDownloader.exeexplorer.exeStartMenuExperienceHost.exeSearchHost.exepid process 6068 FreeYoutubeDownloader.exe 6420 FreeYoutubeDownloader.exe 3000 explorer.exe 7684 StartMenuExperienceHost.exe 5576 SearchHost.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2248 wrote to memory of 2264 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2264 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 1016 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 4924 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 4924 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe PID 2248 wrote to memory of 2632 2248 chrome.exe chrome.exe -
System policy modification 1 TTPs 31 IoCs
Processes:
wscript.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" wscript.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun\ = "wmplayer.exe" wscript.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoTrayItemsDisplay = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFileAssociate = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "67108863" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableLockWorkstation = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\TaskbarNoPinnedList = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuMorePrograms, = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun = "1" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = "Your PC has been wrecked by Bolbi!" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoPinningToTaskbar = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoTrayContextMenu = "1" wscript.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun\ = "wscript.exe" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun\ = "rpdbfk.exe" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun\ = "explorer.exe" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetTaskbar = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSaveSettings = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuMFUprogramsList = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFind = "1" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSecurityTab = "1" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun\ wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = "ATTENTION!" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuPinnedList = "1" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun\ = "cscript.exe" wscript.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://koo1⤵
- Modifies Internet Explorer settings
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xe8,0x10c,0x7ffa4babab58,0x7ffa4babab68,0x7ffa4babab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4236 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4232 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4548 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4456 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4452 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x250,0x254,0x258,0x22c,0x25c,0x7ff7884eae48,0x7ff7884eae58,0x7ff7884eae683⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4744 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3964 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4904 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4704 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3252 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3344 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5240 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5232 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=5580 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5768 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5940 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=6108 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=6148 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=6308 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=6488 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=6520 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=6888 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=7040 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=7280 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=7036 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=7296 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --mojo-platform-channel-handle=7416 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --mojo-platform-channel-handle=7676 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --mojo-platform-channel-handle=7888 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --mojo-platform-channel-handle=7680 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --mojo-platform-channel-handle=8312 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --mojo-platform-channel-handle=8376 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --mojo-platform-channel-handle=7996 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=8736 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --mojo-platform-channel-handle=8920 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --mojo-platform-channel-handle=8876 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --mojo-platform-channel-handle=8952 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --mojo-platform-channel-handle=8724 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --mojo-platform-channel-handle=9452 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --mojo-platform-channel-handle=8280 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --mojo-platform-channel-handle=9340 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --mojo-platform-channel-handle=9872 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --mojo-platform-channel-handle=8208 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --mojo-platform-channel-handle=9500 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --mojo-platform-channel-handle=7588 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --mojo-platform-channel-handle=8144 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --mojo-platform-channel-handle=2784 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --mojo-platform-channel-handle=6584 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8472 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --mojo-platform-channel-handle=2768 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --mojo-platform-channel-handle=10096 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4896 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=60 --mojo-platform-channel-handle=3324 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --mojo-platform-channel-handle=6992 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --mojo-platform-channel-handle=4444 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=63 --mojo-platform-channel-handle=7616 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4224 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=65 --mojo-platform-channel-handle=3384 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=66 --mojo-platform-channel-handle=8308 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=67 --mojo-platform-channel-handle=3784 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=68 --mojo-platform-channel-handle=8324 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3980 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4076 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:82⤵
- NTFS ADS
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=72 --mojo-platform-channel-handle=10160 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7640 --field-trial-handle=1816,i,3787261864725760080,10003123543389863728,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004CC1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa4babab58,0x7ffa4babab68,0x7ffa4babab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1808,i,12705827497168354849,11356751129242529704,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1808,i,12705827497168354849,11356751129242529704,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2168 --field-trial-handle=1808,i,12705827497168354849,11356751129242529704,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1808,i,12705827497168354849,11356751129242529704,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1808,i,12705827497168354849,11356751129242529704,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4232 --field-trial-handle=1808,i,12705827497168354849,11356751129242529704,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4424 --field-trial-handle=1808,i,12705827497168354849,11356751129242529704,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4432 --field-trial-handle=1808,i,12705827497168354849,11356751129242529704,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 --field-trial-handle=1808,i,12705827497168354849,11356751129242529704,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1808,i,12705827497168354849,11356751129242529704,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4816 --field-trial-handle=1808,i,12705827497168354849,11356751129242529704,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1800 --field-trial-handle=1808,i,12705827497168354849,11356751129242529704,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5004 --field-trial-handle=1808,i,12705827497168354849,11356751129242529704,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3356 --field-trial-handle=1808,i,12705827497168354849,11356751129242529704,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa5d7e3cb8,0x7ffa5d7e3cc8,0x7ffa5d7e3cd82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5676 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5672 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5876 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=7036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6944 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6044 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7064 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7052 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7008 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8176 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6796 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8020 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5200 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7884 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\ClassicShell.exe"C:\Users\Admin\Downloads\ClassicShell.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8040 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\BlueScreen.exe"C:\Users\Admin\Downloads\BlueScreen.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7000 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7980 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1696 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\FreeYoutubeDownloader.exe"C:\Users\Admin\Downloads\FreeYoutubeDownloader.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"3⤵
- Executes dropped EXE
- Suspicious use of SendNotifyMessage
-
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7736 /prefetch:12⤵
-
C:\Users\Admin\Downloads\FreeYoutubeDownloader.exe"C:\Users\Admin\Downloads\FreeYoutubeDownloader.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7844 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2616 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\Bolbi.vbs"2⤵
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\Downloads\Bolbi.vbs" /elevated3⤵
- UAC bypass
- Blocklisted process makes network request
- Disables cmd.exe use via registry modification
- Event Triggered Execution: Image File Execution Options Injection
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Control Panel
- System policy modification
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Public\Ghostroot\KillDora.bat4⤵
- Modifies registry class
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\RUNDLL32.EXE user32.dll, UpdatePerUserSystemParameters5⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlSet\Control\SafeBoot\Minimal" /f5⤵
- Impair Defenses: Safe Mode Boot
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlSet\Control\SafeBoot\Network" /f5⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
-
C:\Windows\explorer.exeexplorer.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32 /Grant Users:F5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls C:\Windows\ /Grant Users:F5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7888 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3104 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2088 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5996 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1056 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2632 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=67 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2480 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4880 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1888,6230573424249475116,10373744736415415190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4600 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3953055 /state1:0x41c64e6d1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Active Setup
1Event Triggered Execution
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Active Setup
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Modify Registry
6File and Directory Permissions Modification
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD5b0f123a1a23589d7039d6e4f7ee5b768
SHA1d83ba85f2b1dc79cfba7a4a1eabe636511ee3829
SHA25606f9a4471f17f36e5dd7d06d38ef8270b1a36f930ab77cfefebd18ac00319037
SHA512b13b1a337d89cdeb6c797645b05189d62ebe5ad669e9cef569f1aca8ef8a83982b502447d9b28339c0a2e3e12df90b7aa3e42e93f633864d824a2b5dee92be14
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000008Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000051Filesize
28KB
MD513d4f13cd34f37afc507ac239d82ddbd
SHA16d500935a441d438ed052e90de0443bccc8c6d17
SHA25676464e77d22532976bbe5d1829e97854d5c37ed5a46ff300ad9680876ec81d01
SHA512152e6449d09a7b544cf6f986c9695ae07c330f4b13068cca028ab56ffdad6ff2467f371ea4385ad71da023f3beb83fe0ba1d6d413f1ddde14372efe82ae36b6d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000052Filesize
54KB
MD501ad880ee50b786f74a5e4fae9ba3d71
SHA1111387dbe885b7f3af44cdbbeea17eeb04bbf803
SHA2569368f2d586a1d2727921605892048bf5201ef8caa044f2e939ef431aa881d83e
SHA512d8dc47e5d55e6598988281539205936c56b716eb02b4e643fc917a68ba4407ece36a9d4115d5d0e32ac630d44eadb94ad2607330de082629fea82a9bd35fb83c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000058Filesize
62KB
MD51721006aa7e52dafddd68998f1ca9ac0
SHA1884e3081a1227cd1ed4ec63fb0a98bec572165ba
SHA256c16e012546b3d1ef206a1ecbbb7bf8b5dfd0c13cfeb3bdc8af8c11eaa9da8b84
SHA512ff7bfd489dc8c5001eea8f823e5ec7abf134e8ad52ee9544a8f4c20800cb67a724ec157ca8f4c434a94262a8e07c3452b6ad994510b2b9118c78e2f53d75a493
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00005bFilesize
19KB
MD59db75af2ae54430b2c88c452b4d66505
SHA1805a267ffe69bc89075066761742682e32461a47
SHA256921262b9d71dc673eed53926026576bdfd85b2f3192e12ec3931de84d48a8b33
SHA512bacaa8f5afdca197f3642bb4f673321a6448c5e6c10cd10624cd214b3c0a0e8976d542efa2c9724360cfa7116f129b4f6a456dc3ed718cb8d75632ab55c89a44
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\5153534bf59c8be5_0Filesize
16KB
MD56114136bdc6a5e2d16baf391e1865453
SHA1fdfd6903c0290b5b675e50b779caf59618813bf2
SHA25685b3dff50454499d613a450e01c937c62d31e1326669150f3087759fb802409a
SHA512560ece8b58d66f87458ac5077bc2f9c1585299827af198d40af2bd4af620d24ab7387d34fe30025e62c5607d690438af0a7ca0e2c9022624a0b6d0d45ba55eea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\59b33e110d5b2587_0Filesize
277KB
MD526e112bec5f7e68ccb3b61c7ecf85252
SHA16559c8f3155f7c3ccf268dab7319f1b8bfb659e2
SHA2561b20d4c5033362ea7338e02929d4a413e27f688cc732987910ab24741f9c4e8c
SHA51249c8219a314a78ac7941b8c00e4f17a41c4975fc61dc8a0aa9897e829b43e59e589e2d56ecbd38e05df2b97e02c73a55d0af7cb57c72cf658c0f709ce724bdb3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\db3b21541f66e933_0Filesize
266B
MD546835ca66ea6d2fa0cff5f4a8b6af6d5
SHA13168dcda2d37330c8085926128059f73c0aea0f8
SHA25657aebdb6697e88909ed927ab8bcaf443365f0c2cde7f18fc970b4f75a53313e2
SHA51252cf1bd44b837af19b5da97ea0bd97437245bed68468c4eb030a2a320c71e8fc85f9fdb0482dc589ee5207fdbdab31bfbb7312e0a6bd56fbfeaddd1121636d48
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\e77897df5165f68c_0Filesize
274B
MD5f424888231df6ccc85521abd96b35606
SHA136331658e5fe4cf5e1c0f0c31847bc1d269e783a
SHA25606aaea27ac25a7f449de9ceabdaa896bb38739f15d5d67deb34936a4c9c1d1ea
SHA512afcfee90688e1c838dff4f31accdebea53c4ee367cd64f6c72fbc7fc0442f986147ebbdbec4703d049fa8b31d12d391805f87bdfcc5f27f750714497fbb826cd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
3KB
MD529899ea6d584b70a0d301d1243715ce6
SHA1f39e9227202813cc452395e35d6365abf92cd71c
SHA256be749c7b1f7bfbb9d21a37995cf4e1a6a89834d8c6578f876f9bbd77a70e52ee
SHA5124f468fa74cf69624765ca30b3a6d4f901f9cf559e497ce746ec1f641cffc5a176ea2df6f3af926f2a41717b78e25c22c6c946b20074f03b27f4477ad93d89ea9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD5d15155b1020a246dbfba92f233a6b4ff
SHA18901bf59757e23fc78bb085ed0e8eac4d7779eed
SHA2568d03a7192c626b92fc3208ecf6d1c4d42956386d881e6eae335bc1d29e8125b8
SHA512ad50822fc73ed14b8df8875dc1f59d5ceeeecb84aa22200df601a26a09bd29b5e368c9a849a14942dd503ca2ce2301ae7dff122825d397e99b910f46ab547c20
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD54535a157154962d18b9caedde7ca7a3f
SHA167e6c3de7f972cb2a27fb5d174e1c21a2a50aca7
SHA2563cdfd5dfdf6a0407458f228e5e688bfbbc6ab29c3fb5a87b64d486bfb9e66e16
SHA512d413ce957600a61a1647f19af2c4e8dfba58cf5d9951bcfe8d18bd4920a66f035a2107170f82581fb9ea13b2bac24b08f75d655f8fc892fd96675c04f7b9e620
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD56ff45971ec5938a225ab4ffd134e0f8f
SHA128bfde74dbaa184239a2198adce98397dc9b6f9f
SHA256546c91ea0e9a02f00e098936929458c1b1143ce884f2856945e41e5275e00dd9
SHA512e2a1ce91abb174f4c10a687a5444e6ec20f8750654f92b871934bfd0bd4b5898cce239604883a7dc414f1e95c8d393acff8e5c4d4c567bb3351ecae7030e3bbe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
20KB
MD5e7276842a3fa4c7734570ac80bd17779
SHA1a0b256c849f69524bb3669808721b928574458c6
SHA256ef3b2b1e326453395c89dd8a54a90b78b7763dc0b67385ba7819eccecd6b69c3
SHA512f3ae0a15e6c71a82ed6df4ce7db9694ac9d0e7bb72465ab220ee7e915baa91588584d6dac499528d31e354005c5752f8bbcae9d197189c366a804f4b9a6f6bb3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
17KB
MD5d9a6381eb900c4b83e4a0d338b44d496
SHA169c955e9d84c9d45f9925d689f22bf7a9a1e5b2f
SHA256e8dac584fc7ab4cffd0a4c370625b769db90da785b2835e988a72d8ad5c95cb7
SHA512ca6de7cc062a037361347d89115f5c7c8badded1abe512d110b3a9805c5cc7c3604dab5bb17c27ce43608d4f718a94734362a00e4d7d63e011ca3d8523a6f272
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
18KB
MD5a0e769172eaae56e89240b7b2b27c073
SHA18aa288221af0a47ce11ae0577bf780e86a337c81
SHA2564966ad31ed1c7c5c8fba814178dc33a7dd137531cd6f3710fa42cb39df7436f5
SHA5125106bfd83c77fbd161d5d7641af25b7b3a26dda0ae982f470aa10069bdcf7527c535aa5cfacca2b1c0e31c1ed483d09d43e1a4385c71e0f5fe3988bef981e4e5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
356B
MD578dd773d785b8cb91f5689b3ccf480b0
SHA17d342e762882695c3d320fccb050a0fd2aafef5b
SHA2568fdfb2ae61d8d0e438790d2c5e16fbdbe8b70aa0c8b2cc6c3b5116bb0994c813
SHA51277ffc37f73e368e628d5e41a7843cc8e936826c22d56cde963bd56eb51b6a30a15b616e442c7c915bedf2b55790c6b510259a9d66eeb4ad5bc71c68eb6880a5e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
4KB
MD5d21d50edfa81eadf570d163bd1bf296e
SHA1b4d3a44d61160d1707a018ee3ec03ffaaa644b75
SHA256d9c190ce0f1c9703051e215a812a0cf1ba2ba3c861c619203649836ecaa87420
SHA51237cb8b74dea9622600f00dbf19e00f8a6b509801e282945475ad92fbfd11a6fa8be2527177639c3a62f39795a9800c441028b68c638b37a93ab8c0cddd92a409
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
6KB
MD5a4a343ec74f5668a4f63f16a18ec2706
SHA175c527b49e30126aa026817b43fe5b658fadfa21
SHA256c1a7b4c57476833b0af216e4433cc56cbba3e2e537dedd209773e3bdd6332185
SHA512c83e543467e3661fdffb752439fa198fdf9f5da139364ad6da7519b45f06d4d1f171724d760f52eaa3cc9c03ce02fd31eff398279994e8dc65a18d5edec3db2b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
7KB
MD55c28e35f39abccb2e8518969fe25b408
SHA13585ef590f77b9e39a75888e5adaedb74d7841bb
SHA2567a27aa5ce6ebf4fcdab50e564ffe83e1b505ee1ca2ccdaaa2387949128d6abf5
SHA51267e32078372c79571fa65fe47db47c8e5336515941e551511d4105b726dd7abf3bbe86dd33cb5fd8770d4b045cdc118828f12998f6b19f3322e712914d2fcf01
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
8KB
MD5453748837494e6d411096261fbe2ebfc
SHA10bcb4b14bf06b7fcd1b251eeabac406bd5ccecda
SHA2568eb2ab1ab6935f5f3a58d82aa7ef12917b4b94f93653e62e253743431de68ea3
SHA5129dbc257992fc932df083ab0a175666ef6c3d1fb6d407e54030a13d6f9b810f74ace9f317e1730972f91ca343d92ed60fd38fd261aff24c77e01991c0e29c98e6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
8KB
MD514919ba6fb7339b768cd3cc2460e6927
SHA1ae683020ccf19d6bf94286ab6bdb13c3d59c89a2
SHA2568be971ff6b1a98bdcef6a9855ffaf03126a78514c2b2f14d9311339d9046c6b6
SHA512caf5e2d0232cd63d39347b891fefbb01843cbf0539ae68c0db136563fae7c9f08c84a6d397b5d7ec17b60cee46357878bc2d34070550db20486ba05d4d5d5390
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD56eee21e35badec29a4b7d53b27c184c9
SHA1b21a1f3b04d1f58840d8d2952138c6aa20a33945
SHA256885b5950fcf6470790e1d53bb1ec22c4d57258984241ca00229dff0cd7d4b372
SHA51235138180ccb607516598e08a6b2ebcec47f929f1fe7f1b83b02f469d5d7e215c192ee7ef22123dff964ea6cb92c96680aaf2476e596fa4aa02746a1d0d2b2274
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
8KB
MD5ac3f5cafa8b3ca1b3c5bbfcb03b56c91
SHA13ab989ce34308bec89926d5ec4f1561805fa4d2c
SHA256394a527d29fcd8f52a75637aeb709a3aa24f95d9b97daef8cc55dc33632e4504
SHA512adc163dd2a490ecd990a7d41569dbf38f236d8d69612eec009665b6031fd2ea850a129dd2e1541b293e2e0b1e65a7e4ff19d5c95e141b13fe6e9bee36ab2a52c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5743abc9dfd4608f0bd7ce39057f1b609
SHA1e03bca7394e5b6275fb237d0fb407fbbe3dea6e5
SHA256e3ee5271edca32a305faa343263ffa14568cc78dd1d41c53d43a1ffc2af56596
SHA5128a93bb1856e1c88424954bcd3978f91ce566625508f46d1d0e05126c1ee1657d8d97b8a16c754bf9405ba90f5112e538c6216b21651bd445b02df2d4b41d9ce2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5fcc61d624dce3c95f7c06e3d2835f4b0
SHA13fdf4e3dd3fe1eee69cb499738afae30ed4b9a7e
SHA25692b8a0c84e9d39b3c475356c406f33e9918200ba200e522ba07c24ba9eae6302
SHA512ef8ab31423f3e5513d0edefc9ccf694624da2c2971fc0867bf60f40c350a1cccc80aab2f183f145d42e6b1e34fb4c421d661ef8b2d3ef88c37bf49c864a8db16
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
8KB
MD5630ac4e2e45e082ef9effd2482e9cfcd
SHA15e169a01672c017e1f887821d0f421374f720ac9
SHA256fabef6f6dd32bcfd72d98996062539f994c5f82a25195fcfcb4489e13240edeb
SHA5122e900bcf3af576beffe9968ed5e6339f1371b936bd9bb42d87bdaee6a97d7525dc2a70cc4839c42c73c1c99ed5d8dda2dff6d2c482810d251da956f635be5b69
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5bf34accadcd2c688175401026c04bdbb
SHA1aee152aff4b46f3d3042dc3c03f51e8cf111206e
SHA25632b2d70278a044b01f7a94c18a843c01b97ab55f669c03ec0c5dcdadb295d84c
SHA512c7e9cc28d1bf172de62abce8993ec6d562e67de2810a64c07e24e48866a4d2ab0ddbcea31884005b9300a089bdd483af506c3ea73f1d24c8fc8a3237da40c3a4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5ce01e07fe68f7f86ebf53d0a9bb64f87
SHA1a784c78ed8f34f6ab9707e36c415371def4d9345
SHA25613e993732af530efa87353ea3f637e7be160313cc78d0013c115f482a50cd62b
SHA5121a8c4d64fb3d6e031fa5a6df2a4ee64cef337eaf07b2c0370b2fdf5d01a13c89662dc0965ce7ef1275980a2be22b7c280251a91f9fa5a60a152d09fe19ca5589
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD51834128728eeb6b145ce3ba73290a98a
SHA156cafbb7957e57fc733ee905fb227a64c46d8af7
SHA256ab8f43d5197313d35608fc73587a90e175c8f008ef1c7e9ad29c04c326eefe71
SHA512d2392e7d1afb207a9e4a100a623a293b14fd54dc7e2b17d67462a2f34f7f7fa4353b702a7d9e4ee86e6d089ac2541ccabe2440dc0d40f35a9dd82237c7b6c744
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
10KB
MD5254c531305d1397794b794e6e17604e6
SHA18c5405804eb2f2649b7605a5be852541ed89cf49
SHA256991568ca2d645c017b73a149fb4782e77c85f67f78225e620c7f4bd722cfc00c
SHA512b0175ea4f90d5382352f5a85c9b84ac1eaaf1085aa7bfb1c30803b6e90b84c38656e0a119a4beb055368088e5860bd1e30d83606b6b082d1e31b2a9f1c80513f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD54eedf0e602462f5627995cdcd841f0f9
SHA150a4d0115501c13c359855ce35fc65c495fe971e
SHA2564b70967f203372d6926a09d5857e7f3ca9280394daca9e39fe917af8fdd55b34
SHA51282222e48e4f14ea790fc0b8724ae4d0d3f3f9b9bf2b63e3f543dd141c4029b37238b78e9820e8c17935133b160c2babbaec9c8aa4b6f189effa7c5e1a8f80a81
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
96B
MD5cb2d409045a7af9d5de2269b44540a76
SHA12ecf55f85c0aafd6ee1054a3d678a004aa9af09c
SHA256ffe97ea34b9bb55626cb141279ae412e06a93402c0864333340b0e22414cfd92
SHA51251b8c36d89c829efeb62c3e06ed6975a8c5b16fe5b99391ba575dbdeb0bc76851a7ebe2817ff6ba26ecf7a78b326cfe5a59c16188b724eeb50f4b369abb4f398
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
278KB
MD5d22ca111b08551891cfa7a70ae06d35a
SHA181858e041de344504503efc53e1e7bf33f6ea3ff
SHA2560f8815ed95bede0f7ee6acba1f83f0f9b82680366f030e6170d9c60849f2468d
SHA512aeaeb7b2c56aa35ed163201e2817c5180cf4a4b10e23e40ebe91c11e3c70f761a7459feade4a17a283c61da2ba3203b8dc90185adb163dcec6a31f7438a407d6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
278KB
MD5b1a4eceb71bc2b92c1ef438fea524236
SHA1ab59e37133ef5c14df142cb735d7101c72f9be28
SHA25651c28446c6e93c5cedb35066f63f39d993df6ce4640a29c2bf68f3911181e3d6
SHA5120d7fefa78794182bdaa213d0c264e2a57681436f4a79f23bf6b70b7e4cc44ffd97ebc710244baec93ac74612f2e67ec25c3e2a5f7a67699ba6160d4d1fa1eab7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
143KB
MD52438e9af037ce76dbf915281b5491339
SHA13235190097db43465cf88ff7a999ed6602c258a6
SHA25649e146293d24b3f00c5e14191636cd446f47ed47f857bc84d624b19748429af9
SHA512af63ecab04a4bb01513f25123f1d5ecee6fa64ada8291acd69bd1a946b9cc41f892e23183e849ef2ba10118c3dad2634d079391d8cfa34f9a909744e5f808fe4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
278KB
MD5ffc3884de2342f486010bbe7a600f10a
SHA1af08d73cad1c70f0f6306589ddf976b57550b63d
SHA2564ad0777d067b90d427e7ed9ab4caa973a6d011896b291b164ca84040b02082ff
SHA5125b2425aa95d05aadc34d111a64eb1eb663b0b9aaa42a340b0555d7c6e955ef0384e3d69ec0609dd9d7c480ff1cbcfd6cdd40437a923154f5951c789e600fb833
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
143KB
MD5cac3118944b35655c840a4fe49d021e3
SHA1057761348fbf20da58b356f2dfdb46eaa5700de4
SHA256858ead1b88638fc870a15ce70807616e40733096842e8daa05351925978af2cc
SHA5129fcff8414ac6c19f5fd8518610287212614daf54982f002887b4e6bae86125dda131fa4e4d3eae0f3045413fa2c094caebbb088007443b0f7d903d6cfd536b70
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
278KB
MD5c0b1ba1ccf1e84301ee02897f6424ab7
SHA193ed0955464e02f9264a87999d9510f3f993beb5
SHA256e3e523d75b2f6ba454a8592823544b7c215081b8c02f6c096f686cfefbae7040
SHA5128603adbb60741069574a9288e1b519b739a0548b3c746afd5167f7742ecaa4fa9c8c5ca306e8c0cae4aae4c78e1a66946a1aaf310c484668cb990e997a53f3fe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
278KB
MD5d573e01711c5e935270752e54e26953a
SHA1e790cffa3e5110a86956bd6e6f965f690586d5e0
SHA2560833f691d1ebaa307d9abecdcbad01b5c54138b42eedf655718ff117bfe09a56
SHA51200d56471af97499ea01145c1c885468de5a23bac0a81c7f2ff83435eea9a8696da339ca59e322a5007b21a749a1bdbed25c48cfa856639ded97a2fe1325e7dd5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
86KB
MD538b4b9cd41056189266161541c968015
SHA1d57f6bafd10f8ad341bd082592c4111d3f9147f0
SHA2567b3b4d42a7aabbc9c6f1a20b5638ab5752640cd6edaee8b95a72217064225a4d
SHA512add58a1e00d745a1ec32bfa01e281a479bac2ee5fd1db6d20d151b4ab205bf9b0285050806ad37301ca7b285bc22bb5a4a3fc8939e47da3438d8fc840a19e6bc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
94KB
MD5be95fbb6d1d203487d8ddd10a993c1b9
SHA1e52c1a157550e8bf20733c916a6db5ffd339385f
SHA256fcb2527b5ef73963f3f87ff915a8b3e8103219c3d0332b9b16c5798dfbaa05a3
SHA51245a168eed1303c3d038cca917a1c89c593c9bfbcbf331f75f5561e8e27ddd71bcbc6a329554c11e8ed382ff756e93717a3ebb25ec427324de7f709db91c9e535
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
85KB
MD5fd4c11bf3a7952e6d6c915e1795f68fa
SHA1f3f73e76b8e6a725ca0759ba647ac5521240fbfe
SHA256f603235de2c3efd23813292182052db3ccdf52c319b161dc4e576258b3106619
SHA5126832d9ef3dde68c2ababf80fce9d4e780eca2df97be0e364c4839c66d4bfdf5dfe2ec6e37902815e1e005304c49e8f4df0ed70e131d9fd09fbdad71bdf6f1b86
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
92KB
MD5c35478da13b3e62107063a2076074e8b
SHA1073e4d0b6e27a27abfa46dcd8727acde87ba0941
SHA2562ad988107b4adbbb96fe852430f7a577fcfa8863f9535a924842dd6189f7cf94
SHA5123ffa9905a146fa2a727a0133626bbdb9c16fa4705baf191588a436326ce046009f8e5dcf9b8be2e95b84652432faa001610cd43f478ce820bba7e92fa5fdcc5a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5a1927.TMPFilesize
83KB
MD541ffc51ae33fb52b717c5680755ae812
SHA1050dbc3603a41e33dd83e2463bec5aecd2de4919
SHA256b9bcbcc6d6046ac25a232726688bb5e1e222620ba4a9d60219bca041b8a70dea
SHA5124848ef7eccf37269d2b005f8c395119056c707e3830992fc99692b223ac8bac7a09bb15d397b591458d2c4a1084d2c3fe35c37576103e100140f6c903c20e80c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5a74887034b3a720c50e557d5b1c790bf
SHA1fb245478258648a65aa189b967590eef6fb167be
SHA256f25b27187fad2b82ac76fae98dfdddc1c04f4e8370d112d45c1dd17a8908c250
SHA512888c3fceb1a28a41c5449f5237ca27c7cbd057ce407f1542973478a31aa84ce9b77943130ca37551c31fa7cd737b9195b7374f886a969b39148a531530a91af3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD564f055a833e60505264595e7edbf62f6
SHA1dad32ce325006c1d094b7c07550aca28a8dac890
SHA2567172dc46924936b8dcee2d0c39535d098c2dbf510402c5bbb269399aed4d4c99
SHA51286644776207d0904bc3293b4fec2fa724b8b3c9c3086cd0ef2696027ab3d840a8049b6bde3464c209e57ffa83cbc3df6115500fbe36a9acb222830c1aac4dc7a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1f39a094-dc84-41cb-bcee-2546346971e6.tmpFilesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000002Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003Filesize
67KB
MD59e3f75f0eac6a6d237054f7b98301754
SHA180a6cb454163c3c11449e3988ad04d6ad6d2b432
SHA25633a84dec02c65acb6918a1ae82afa05664ee27ad2f07760e8b008636510fd5bf
SHA5125cea53f27a4fdbd32355235c90ce3d9b39f550a1b070574cbc4ea892e9901ab0acace0f8eeb5814515ca6ff2970bc3cc0559a0c87075ac4bb3251bc8eaee6236
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005Filesize
41KB
MD5ddb8bf0444969fde4ffd0dd3036d9dda
SHA1b77ba856c51a72a40f69637a9c7980cbbe859897
SHA2563e634c7e24539826f9f228decb932e1b9c3139c6505bbf6a9d15cc206f1cc6c3
SHA512bca01e2dbf2b8aed3a08ddd51d68029296175b7a2f2a601a3c3e522ccfbce6c397b3c9a109db07abb053cd812865d930b097888ea58a772a99d4a67821d02f5d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007Filesize
84KB
MD574e33b4b54f4d1f3da06ab47c5936a13
SHA16e5976d593b6ee3dca3c4dbbb90071b76e1cd85c
SHA256535fc48679c38decd459ad656bdd6914e539754265244d0cc7b1da6bddf3e287
SHA51279218e8ee50484af968480ff9b211815c97c3f3035414e685aa5d15d9b4152682d87b66202339f212bf3b463a074bf7a4431107b50303f28e2eb4b17843991c2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008Filesize
1.2MB
MD5e9260f3d081cf9a5d5c7551fbdc3d234
SHA10cc5b721c02dab3301207880871fc97e004c3b88
SHA25681b05795af8af16e41a86d022730747b7b59a8e96951ec3053f34f91d66cae4e
SHA512d4445200865a3636e814fcddd9ea21dfdbed943deb68a12279d715879693921e94ca8dd8570853bbed657f47cc8d034f931f500b3591a2001185d9be45bd109a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000aFilesize
32KB
MD52448f641fbbbdd88f0606efa966b052e
SHA125825aef444654fdc036bb425f79fd1c6fc6916e
SHA25603f060bf37ba360360d6a7413d98e485e7d8e6f69e6a1de300c788d439b78d02
SHA512d56e3b19d3f4c6d6663117000b99071cc453b6fd93f708bb8cb92d5adfa0eaab749d8d6cef4f19fbba548d31edaecfd0a74ca55dbca7d5f5f1fe66879b27b9d0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000bFilesize
74KB
MD5b07f576446fc2d6b9923828d656cadff
SHA135b2a39b66c3de60e7ec273bdf5e71a7c1f4b103
SHA256d261915939a3b9c6e9b877d3a71a3783ed5504d3492ef3f64e0cb508fee59496
SHA5127358cbb9ddd472a97240bd43e9cc4f659ff0f24bf7c2b39c608f8d4832da001a95e21764160c8c66efd107c55ff1666a48ecc1ad4a0d72f995c0301325e1b1df
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000fFilesize
37KB
MD5669b1563b95fce26d9ddc3c7e9bdc538
SHA1275e4ae2606a0da908003b77ea06b24ea8b66214
SHA256d46765072d87d9892a0f6f8f9849eafe0abecee9d662e99f8b45d8c5b22ac667
SHA51209e066f5a1974927b2cb607a8b953f2732928c7347f65cdfcdb573170840562de6eae091a61108827b3ae0799c16bfbd41d858ee1a8bc57d9bb1fac814438302
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000010Filesize
20KB
MD5628ba8d31375849e0943894669cd033c
SHA14fa6d50a37fa2dadec892474d3e713ef9de2d8a1
SHA25680e3440c312f921afe33a7d4a3d11d1d2dc7162f8f50b748b796f424441d10d6
SHA512d4406493dc8767c479460f3039b038866549feebf392280384da08adbcad2e871720d046220cb67ebe3ab75c14e06a31df2fa7c0f2c17f91eda26ba0a709d27f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000011Filesize
37KB
MD5f31a1ab9f483d9db21349522e39dd16e
SHA101a275d7fc1c4f578fa506c8e0bf9b7787dd4806
SHA256463800c9ec072ae72a4f6fdc1f2f779c792cb7ceb6f57c7d1231eabefad2bd9d
SHA512cab9bf13c36b854bef939e1d09c8d896caf1d7c20f6948f70f27eaf2869e49c8b9be728b4c95926ba869a987516a79d3193d416b0582b7570a58269c8caa7603
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000012Filesize
22KB
MD518afd1da750d6447a8954b3e2e0c446e
SHA1f8c8a7cbf81af5c9de298e031dfd69c1ec836f81
SHA256446938498d26217dd63160bcd02aa1ee15e7fa76b8f0902b459ec6db609d1cc7
SHA512a033fcfacf5f9f74ce8a02ffb6adc4766fbfe1d25f86ee4afc54c5f3ca1ea9655d65f6c29c67e7a86ef28edca1e8b2fcaa362730e8a6bedbdd8a16b52142dfb8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000013Filesize
20KB
MD50f3de113dc536643a187f641efae47f4
SHA1729e48891d13fb7581697f5fee8175f60519615e
SHA2569bef33945e76bc0012cdbd9941eab34f9472aca8e0ddbbaea52658423dc579f8
SHA5128332bf7bd97ec1ebfc8e7fcf75132ca3f6dfd820863f2559ab22ac867aa882921f2b208ab76a6deb2e6fa2907bb0244851023af6c9960a77d3ad4101b314797f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000014Filesize
56KB
MD5f817e737bd803df8a4f12c1937ab0d51
SHA124e172cdf9d4b77b0cb4c271aed4a7c9eba98fc9
SHA25617b0202476b336c41e4108aa245ac863c3e19ef8c5e430fe112a0900f0a18802
SHA512d417d62e0fdcdfa883d4ffb317546e7ac5258aac538cbfad4eb111b134839750a65c55b5230507ff6912ffd272c0eb6317bcdd95c38cfb81c63b8e85b1359346
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000015Filesize
19KB
MD54ca3c9806914acc847891bf2a3ae9b2a
SHA15e6d9ccf79c7a593be586dbb784f1cb8bbd24d3a
SHA256d8474025add64e3a8b4acade8dd2b0c19b8366aaa38bbfdfaa4b6a6bf45443d0
SHA512efbfb42aa348edab459aeb746277a8bb3fe789f28d1c1bbd23b5835bf5f88deb7d245d4824f834d47a7c310a2d68fe4e52b72ba9abf71f67353d3c45c4254350
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000016Filesize
59KB
MD54bc7fdb1eed64d29f27a427feea007b5
SHA162b5f0e1731484517796e3d512c5529d0af2666b
SHA25605282cd78e71a5d9d14cc9676e20900a1d802016b721a48febec7b64e63775f6
SHA5129900aecac98f2ca3d642a153dd5a53131b23ceec71dd9d3c59e83db24796a0db854f49629449a5c9fe4b7ca3afcdd294086f6b1ba724955551b622bc50e3ba1e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000017Filesize
132KB
MD55bc90eaf1c40d6b4fb53511e2dcb0112
SHA1df4d1b98afd9bbce5fdc44ef8b9cfaf365f76643
SHA25661302d8f11f11e88123be6cdb188e1d148c3e363ef3cdcab22b421dd613c6d73
SHA51224826214035b0ff7426bfbb09fb4a6001385e8b7506c03d89b072e3f6fa945a596863bdc2033793538ac44ffaee8e99e2ea1c490b222534cd84745fe2696fdd6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000018Filesize
21KB
MD50e52c094a93d5bcd8875cce575d7da9a
SHA1de9ecbf399f77a497c96c1a4b3509153ad9751a2
SHA256abafb66ae53e45e075a02ab40e19bc2dbb0126d83f4da5f1fbd3bed1a4b4fdce
SHA512b2cbb5075eb1cf84b9b24c2a2f3165675496d506d5e98a8868c18514c5740c366b5a29a925dcf6f6cacdb8ce6e39eb8673b15ebb55c5e9078e0d7eff631905cb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000027Filesize
18KB
MD54f95ad8321413ba268c45c13864c55f8
SHA185ccc22e813d3877d0b44b893bbad4e1339b1eff
SHA2564d36690ce5df902bb973beeefa2f12a3913d821198d9aa656b87c33c96137875
SHA5122532166827ea0e3219dad5147685f9263937a5937ff8825bdffa9e667b71b716b657e4324f876b5847bc0d89010609815a945e0e7af57568cd47c665095546df
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00002eFilesize
5.5MB
MD57d3c97fbe0e5e5f0f488526010ffc810
SHA1a820f7f0c6028e94a08b16d03edc4e840392cc1c
SHA256623420e6ce7c0e5d06de3c056d01f1c6cc22585563707180d3ba224ad576b9c4
SHA512a70ca08b4290399a5f9710bae27e34313b2f1ed5d8ab348e40aaa6cd2c8048666af55a055ba429e93527e1906641d21a20d75c5785d8b550ae4bec34b8b4ab89
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
4KB
MD56e30989101a66c6d53acf70637d1405f
SHA18efe4e6cfc276e6a95c697a702056ce65542122b
SHA256b95b6e3a81a8d752383da95a834181dd58f8518f542bc2f037a9285c886c6095
SHA5129a2c991f2c91d0fba7e13155e4d546ff869adfa23123faeab4ee26ad4bc92de02e10d096aeebc600090a86d8c34896172c1ab35e5d43f81b578bc6b1050f6045
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
4KB
MD592615043c0e3a8d88e0b6ff9032f4356
SHA1aba73bfbcb1b4196c817ad041d0d8981231262f6
SHA256a120d5bd088ce119ec3ba30780372e22b2028ce0a8ea29379e416ccc82f36f13
SHA512fd4e21821868812a451ce5abe5ab8bf343dd4cfb27cfaafe55523e7cde760f4277b9c7f64f61d1566a6c2ca25f16cb5654e861551de8c92307d70244ebd5d3cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
3KB
MD551f849f76d3ca06d492629ea4dc5454e
SHA1244488aaf8db3c6c093eb5f0b24ba9e1a42fbc85
SHA2565ebe3bc94f9e7f2c32ae0e79b1f628fbd369a173fc69e733d46c8a6ff43788ec
SHA512b02fafc0624c63f6e850415fddf5f3d97b66fa8e6e1f71295718727c6ff02f90a53c0a7a525683e63d38370c0a3df438c7df8ecc8490a8957b1e7f41a507a7e0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
713B
MD511d98040b8ac9347997646f5ce78c8ef
SHA1d6b95a5dd643db4ef313461345bf8b2a87d15162
SHA256827587ef01e6b71d780fdba9255815a3b203053a605c6f6d0c202dd3126e6f39
SHA5120054f5e160d6f8a3040f878e7f8d333e7c241785a37e1f994ce93df8e0c192ba7cdf221bf1a7fd9b53676efcc6dbbef7a7cdb8193a6aa9476851c14457ebce0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1020B
MD56645a1331ab29a3e0d3b0dfb9ae1d4f2
SHA1942165382d408ac3b56c706c1eb93ae5e2af9f2c
SHA2565ac996bb29d64d3f8c1d4964eef4f8fbe6161b72a4a5fc3e59761458f09c6f47
SHA512df0c1ba08066e62e84b29734032c161651e5e420821868c2f762fb1dbaa946241fa97e6dac98086956572be87a3f47708175e82673d9e522871ffaf37e781ed1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD516da5ec1bc1a8565bf5bace22455b190
SHA12a2f51073f5eeaebd4e285c900ce4997ac760cb2
SHA256dc2ad7114cdd299e2e4f633fcc1e6406165d01bae58414c3a69f6414d4255f53
SHA5121721474406d0c9fadb6d02a283ebc5eeee3d0fe6269c33b35c8df41e7a439d84cf501266044802a171a4e7c970058771043337108a1b141b0859d32af6e10bd3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD5bf350431d29ec991db3f148b8f432a81
SHA1d449d8b075740f9b3433d47b536d74766e492219
SHA256c7ec415f4073bd2c5fbf4e8c6a3f23e7c659f549a8a2b4b32436295780926a35
SHA512baadbd36aabc0fffd39e7c4d7633cde141c50909a6dbf83502aea87c892d586b8a80a43770c1cfee16fa564be61bdef3962ec32546b30b74f174f51092d87813
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD5238fd6fa49b5ac4e342ed02f12578039
SHA1a39ab68d604ed38e970e71c582c99c4d02af74c2
SHA2562edcb6b65cc72ae006febddbe73138ce224f2051e5ed33d9d70c1014b6545a83
SHA512c626965cf4daa4792a6056350598f5ec0d74f5d27a2dbfb726b88dcea4379e055299784a9a37a27db4df62c2ad00f90932e642fe0d57a8695efd44173cf23a60
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD510d04f417c27b2596d4b9567d301a736
SHA17625b04cb273c311a88a68e4dfdad6e5b1cbaf95
SHA25670af8e85ccecf023c98e66b1850e8654a11b7fdd09b52ac6fbdfae9d6ad227b1
SHA512b56f281d4ce098a58b4722fdd304da113e4ba3ef0ea2e1daec8b52859047f65810616d2e770ff33f0dec3db92012a25f7539cb8f9877c614c79406a83094570b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD56fee6fe4ed4131e628735f0019645a94
SHA145470b2e85b017e6f4ca2cf71cd37d3ac085bc6b
SHA2566c8374399a5b288366a2e488f7a3a2298d02a9c07c930ea2c159d85048c8dac3
SHA512b4039de2650babbe013a126059239807d47eee3f02074fecbcccc79c14004305a77d7a9f5b1b1559441a710bce41fbb58cae62eacd5a0612a9d355a7b2eba257
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5f57048e30a84fc4c1c6438f58443dd4e
SHA16d7ba9d338ea5798a9a659c670de06634dcf4a90
SHA256053393e14c3537ff9034a0470f510aa127b33d9a087be1f1d07e3d34022b0aad
SHA512cefcf7b6c49e382a3a2a88f0b5788047e8197118077897e07ab1cf240654de50317d6f9b06048661d138da17bf214d51e0923389e2e276c759c4dfb4ab5645c2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD55eb758ce7c26ad1afcc3a03a0da2e800
SHA12c6d3e5b8794b3e1550773e8adce8750afdf378e
SHA256a2e02da3416ce92fe992a5fead6a560ec8f2984c08c9fe05d03874cd568245d8
SHA51264d12b4e931e72c85e2fe5adeb4791c2dc20f8d26241527fd4dff29718cc4012c34af9e7ad69b57779bdfc4a5c8fa1f2ec971b647c8c93d21c43185323bda919
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD57ecc422e9078ffa9b6e478600f59b16f
SHA1260c086e378bae55f084f284e2e9b4538dbf3240
SHA256f57944ecbc906ba97eda558b27c49e35c72cec2dafbe861bebca6bfe6414516e
SHA512f04b7d0cc687ed071f52ac15de2d9ee97738f4edd46d022a23d95e68ed16b1d4dc30d26d966c80ff1de9863c9d3de51c2a8450bf0bc5c6e78cb3f79c8834d95c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5cf9d26cb37cf31c8d0e52fe212b90448
SHA1334cc3191373c241a65ed52c68a5a526219a088f
SHA256c529d3d526010e244bcc0f0cece0e712f688e07e10756ef8078df56171399661
SHA512d2f7a7e807ea0115ef6bae6ebd4c6ea6985eacbd3222928b51811a346be26567fd370745753fa9e7a0663cac4ff45a0a5e936c4a9522989426b9f84ca3aefa37
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD58576f64caf4d1cf16128ae96dc7cef27
SHA16d6da331b7c05d32bcca564929a715df03d892b7
SHA256dd06177fac567489180ac5616d4786b17b34a9328a3bc61d31390e4095a7414d
SHA512424f8cdcfaae06f30ccd637aec6bca3f2036ff2b0d4dc26069d53b1e0fef4c8b10e9e1c88a3f868293abe83acf3152740246ca34e61ae29d941660d08be98696
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD57b1b5a06c5a31f4af0e987435530a106
SHA17b0e7f89e9adfeec5b4b1d90b1aed5bba37d27f4
SHA256017bc145f54bb595c742a1da51786396da9cff99b536d3c464fcc53e3550bcd1
SHA5127252a7eaa56f84f091e79182efe4ac7c4d73cb6e38438a979c01691a0315538223e8e837e72f4f05c45813b190793b5de70b56d84f0a8ee6e71cfa4c62e1f01b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5fe5d9c7c1c04740b3bb306dbc82bc7f6
SHA1e9f0e6436cf663ccf8f06b75672860afab991692
SHA2567433e07fc6a93b6bf70db9946557d101ab1c36546fbbe6c083463f0289f96f9a
SHA5121d486139dd1e043f271277dd21b7afc0fe98ee0d224954eeb611c8ea9069ebea4646558de43d025a7f1443d0f37d998de31ad92fbf45939dcab1f7524e998121
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5a834f57dd929392fdf462709a2c0d5a4
SHA182adbd61d0453299729bda21120c105d784bf2cf
SHA25645e84fb240e24b93d0eeb97fea9598ae531c08f229d7d752d3d4b3dd06ea5a99
SHA512239583ec9aa920d3a1245b04aaa2e3c886ed14effbba64a72f6c4b10cf8d0fb6dd5fd7398b7abb4390df5eef3b12e91a3c5ae78e6fdaa701e4896e4f48bfa99f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD57db413123c01e45cd47b99c03a70d6d1
SHA14bb87ce10920c36fb3da145b76afa8dcebb2353e
SHA256ea8a8c399bdc0aa5dfe5b5d60162826d6d6cd059c2b878dec763fbce8e44a29c
SHA5123eaea75c9d305c74269a8b72da66e76e1a8395769c210783c9ae5c5444ea21c5f8809a697ea70b97765ac7b64e45b2177c374322ff3e29f389b3fed7e3505b87
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD50b299e5bac37f68ada9339533d7ddc52
SHA1a2ac43c8e56dd61b0231a2d5630eceec0bfe1a80
SHA256a1e4b4e717e51a835b13b037d7d55517fe8cf01ef637237bf830c69af0e8caaa
SHA5121db295136278c57f39e57cf53c924d20a76b9a7ebd257f38436169ccec821ac83128955c8198b84dda86a5511fe6c347dd33ce9a672695ac6ddce964105b0a3f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD56bcfd928b5be56e90bcfa80b22109eff
SHA16c2add291a0fa49157bb418802e8f1ba2d9c9631
SHA256fed30f294ba63f3f3d04c08ce45170f49c058fc0e1840094f75460d9fc2ff088
SHA512d897bf2dc9acac01d565c783ac11276e6059ffefa52aca55c41de014efb5b2991e2f3196d028312d21f97aba68836668220138c8c996ffd96b0bcda798e832da
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD511f7624e16b3b9957bcd7042abacefcb
SHA1da0d0dc9d37509818e9c5c696b6348a8f3eb5278
SHA2564b877cc44f7129643a3cc472d0234f069482bb3870cb98c3bedeb31787f75ecd
SHA512d95431862ab8c613c15df14a230138ab768251d47b7095890a567b78c22d627dc7d04fac5695a351b6ce87f0f425111e7cf8d8c4cf43cd6967697d147520b87e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD551e0963ef4a119e0d96819a7c31d194e
SHA18e9c7516c8bed9083b80bd195d91ff5699813fcf
SHA25611a4e61061d6849384e24990eec8fca0f187d834d0e7126b7f945437d7010112
SHA5120c5202a50e5a087404998140c395c05a199440a1d2ea9d2960b17ca8a2c14a77faa4464fa88c2071d1f9f1d4f75356599d218927e1ae692636d11323da682404
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD54e2b909009ea1ccef85f3165444b498b
SHA11d60eb69a06e82ed191d8da69a43a44c1f0ad265
SHA256c63848c8fef58adc5535b0a2fd04c7bf7d140f6fcc0505391af6e253f76d7a32
SHA512ac8f24a143471b2b42251f779e8fb19136458675cbbebd61e6dde6453f7ff48413c10cecad1ccef8b36da73ad537330b7ba02e8f9a0cc3473c941018f03e61a5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5de94ddf3a05f02ebd6772dc28dbef8f6
SHA1268992ce5731928b04272480b1aa604f3d7ec403
SHA2565a894225062407254b8fa394a6ac78c0d80859ab30f0781647a6c0ccf020cda1
SHA51206b8e788dbd55fed2184541336b4fcb79d383045d68cf6497839830c9c157cd4ad8b12022d0da77eb3dcaefeaf656fa435fa762e253e01c4c6b4c58bb53cd9e8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD507485c03c0408418cc9336c9ae402bbf
SHA1df803c5ce64d00c240ec96f433b7312d6b41434e
SHA2569ad365d449f32378b3f94e2c4fb8888ae343ffd61b5efd3a4745f042235bbaa3
SHA512358ae5e27b93fb327bc40cc553e1357c1b4a66dfc60ad846850c5632824c91786a4e1bbb3d3acbddf30c6f03c1a6497d1b6ac8371647c70c7b293bc14bbb4f82
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD512613d6f97c31eec1b17001adb6abd7f
SHA1c5b52b57ba8b241fa3e1b3bc9be3d4733dbe3b51
SHA256409d1242f2b23c5c31653d289b5f77acde5b7f17a58e7398fbd288f471553689
SHA512ab65d99cda766cbb0f27b7d32eadd0796cee0815b5ae8033a09145ca85c557bef60db33232e922ab6263c3dc99be700faab2a2a805eab68531bb1b7359f0f7ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD52b4ae6a8c9bfbbaca855d8bede6d1287
SHA10b928aa6b3a565a9ba67896082a0ca8f83355988
SHA2566543228b5893b95090c98f9d4ab9966ea73429fbaf99110c17b070aec104e686
SHA5125aa22a027812e5e5885cdb1f38c6545c43570fc1f801ce71588abc547de509e7575e69f0d7991e9c3099c35d6cafa883337cb08f9e682df700aae0242e8f30b9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5d4d3c38662e9aa094b3f08489f2955a6
SHA15fb4259c9940babc3bfc8e6c2c6edb41cb89a273
SHA2569ada1c2942c0865e0c643351d645954c6350ad525e835775857bfd908662889f
SHA5123a0cbfc325ca348ff11384ac7b1952cb29be772c803c4ae12aaadffcedd1ca296c951a9f0614f2b64c1003c64ec23e5a4acde6a3e2267e47aec43e5f6e65f832
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD530c6c54d56bf26c278e19e3a1d98979b
SHA1154278373ed7dd30be71db1a2c4e20cd19a482ee
SHA256699b4a42e4bcb1f0e13036f1d714b09240bbe02cadfd13c5ffde7c556ef4b395
SHA5125c82630c908e102676d2661bed61be881f649235e22aa9310e7b466b1d447f7d9350be3a50965392a11976b2c32847cb09ce6be295f110fc5d119be9c999da29
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD51a5ca0c352c8d9d6293e95cea1ef2e2d
SHA10d7de0c3215df3278111f20ab5ffd5aefbccda07
SHA2560cda89c7c44099c4e53ef82116183cbcd115c11496892c7ae19ab75d7baa6cad
SHA5123320bbcfb53cf658fed1179ff2f567b4ff0bb7509702cc28ac9ee3f6518e5387a1675fb82c9faf5b553f6fcb6e7f253a343777cc5e09c0232963cef544f7ea26
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD53b7a4d532c8ef7da755775c9b6a8ff5c
SHA1526317bf127d28f20df8401921d137f48c94c30f
SHA256c15d0fa3a45e68095d0d2750fae023b9c3e5c9d270084c58d7b2ba5c558d9ee7
SHA512e601f0263a833575861edb71f4a65b623b8e6a7f09bb2abc84bd3a578c9d418dad17d1e5da7c8d27d7630edb49b33908d448b3191acc0eb152c4c851e5aa1ac9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD51349b4643f74528fb6c0f4eb4eafb987
SHA139b7f5e30022824ad23bbd32a43c5b4690f2bf1e
SHA2564e01daa197860bd79616a36b33b193b50040d6499ceb5dc13658a0b5ce7b7925
SHA5128ff8b871254abfba32bc73d7dd8079c3ed4d9956762ffc0d6de3bce64599619f1f3c224ea65c8c2c5e3751bfc7f1117fc6aaba2beaf3449f6d3f28c30c15b802
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5b6e4cc5fc894b5e44f43defd2207bbb9
SHA1ff62e1a712c0b648976645a7abd92d7c1c043eb5
SHA256ba580913f77f13eace935cf69c2a42f5843b777a8513e4b666139f1e9b1cbc00
SHA5129d811d04eb597b84af0bb471f8f1ef68e6124ed1c9cc784b2d90f7437eeb1e6387fb4e36b3a1ac364486973beb3ae390d42e078b2002c03ec92e7bedf0b8eebb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5c51ee6397f4cf1a7d3d006b4596444ee
SHA151fbfb73024c1a920c8299939170b22d6e2d76cc
SHA25698c7d85a73e2369b70089b10b0ac03371e6cd3f98c0ac4ae0e04f7b767a7d0d9
SHA51219fb9af7382353fe2d296a1f54cd57ae48c420fc0d13011820b0e688af2009cc063eb503b431ef8a48bfdfec29fc598383c668f39b962596a8723c626663bb39
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD505ccbb11198e4395d8f1dd10a57f0628
SHA1d17a78e8a735ce828fc5ef6847e9e07fd3282c52
SHA256e7e0e0818fd71d61df98c568cb0a9b2ff6424bc226c24d1a6fc58cf23577d98b
SHA51297c86f1999bba43a336a2dd376b39976419146fa6ae795ce2b969ba55e79cdeacd0b5a585a9469edfeabaf42b12e58a983ad5bc3ccf0a6d09487d74fbe3cd906
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5ed6efb9820a8094a2647cb2385f9cac6
SHA12f97ec136ed3621102b0d9e85bb084bb170ce1e1
SHA256902ac4ce4aa4dd1f7b9faee7fa178a6866d57721b0944a84966c3fc13236804f
SHA51264181c23f100de11f6da0db6ba0d86d658efbda8eb10d38489af86a67cffed798a72b5906134ea82288fae413c495948e3a4ee40667412ef056d362c2b28f205
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5ed1242736629831ee59a7ef5a1425a13
SHA18f881f4c15f312454ffb8fbc65328833add4f92a
SHA2565f0456fa4db621dbb1d7ec66fcda5f47bf32a47b14c84534232a0b85aeee71d9
SHA512a259ef0e7d31660fa3632575611333f2c6256534f3f2e6a930b43efaa85ea854294c87d6655ccfbe6f69cf8bbf9c41c1dc70f4d6a9d03cc7f3cff6158f2dd6b2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD51db6421d188affc44a42fc259b1b5cea
SHA1d08c8d2cb7da8f7b47a16696fef01b04b73d9e15
SHA25633d081fae3c1b5b3cae1089879e2e5ab8c4b7d21c3df8c5d656a2c6d7ca0a1b5
SHA51219de9d9367187265ccc2e8b42c7e20a334c74388d82262679ec517c03ab2e47ea3839f6b9d31694ca0432b2a4fc876f8f298307a4e6da785a2588a2c54ee9d1c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5d493c8fc4b0a3b8ed6a9ce087a910994
SHA1c70c05d04e46b9a29c4042c2599a8c0593ba1064
SHA256bee375de3decfdc3711d9484f306a97cf089d908351bdf50c70e7eed33ac3979
SHA5122899dfe7a98a6039ccf436a4702623badb74553a0504cbc9fec7bf7850dc035bb79d47f28e14cdd403b6b583130d84bc640b7ed4bdcd41b7e1ced975f3002716
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5dcefb.TMPFilesize
1KB
MD5dff116d692eb1c6f4ebd7659cd2c88ca
SHA13451390ff3fa17a83adea58679b33b848ae1aaea
SHA256c469faed319fe9541c347e730412637e2dc75479a27ca1af607b56a95bded72b
SHA5125d1510bd53fed40a4f64ab3594a2c380a90a6acd7cf8e5eb65913a1d1f1dcab79967f2bd55138c05be4496f3eb761888b04881c3ae59dd9915f0e3ba20b431ec
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD542db6f7affa4d97d494d6cf208ea889f
SHA1e30a68b85ddf2847174845472afb7bb90c7c5dcf
SHA2569a2c36e7dff684e30a10a6b48e09a2051a82375ebaed92964c687ca7c7fe2caa
SHA5121b0c598575ea5bb9a891fa6fc6df1e20ceef149a660491d2e223af4793adec7f610a10373479182f317d5baef81be102444a70444171a6aaaa2cecc5ba45e217
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5551ae0f95789b8d2fc691f798b247ed2
SHA10696c4bf77aa8451dd42afcb5285ea336f829a4b
SHA256a75b4fb48176acc4d3364fa7fb8d206e20a8162858a33b71d8a697f8d6580c1d
SHA51272d51da8ea40b027b033c2095bdf255148d1e73d69a64ba69f4defb5afd63ca78447c3beb31ee08b9535d7c565db7b158867b37cee5ffc398ce627e17aefcc4b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD58f9a64b5c73ac9cfd9c55ac084970634
SHA19a6f64b11b16bb2dbecc18a63a55a72b84e0a6c0
SHA256990cfa196d7b4d3fe93b1dcc1f11effcbbc4391469966cd51d1794bd169fa8a4
SHA5128b3523cab2bd652f715af3e39c4cf5e57b8f31db63d50c87c204d78711da8e6b6f75d54e57776760643bc756d21852b705b5d991250f47626ab96bffa372136e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD53050ab5fd60137bfb5e3151164518efe
SHA1c86350e0c78bd9d0baf15ca44fd912ae20c4e5d1
SHA2562635ecd0d7a2336fe541e80b4e22063551e234d93c80b0572de1d27c45e4ab92
SHA512dba94c6458a27029f7eafae62f13ab6ca976a581a1691b3c6d86167052b97e7826d2266d24fb7ee09dc9542c27170ba37609a844c951fe7d90cb09b64318640c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD52fecf4152be4bed0b51f2b05d59674f6
SHA13f809767c3f36d317947d644b944e610ca479a36
SHA2561989b6a887b73850585feec582a5396e9592dcce7fcbef0771142b1c816c66e0
SHA5121bb7214ac5ef4aaa56a7be12a6f84f7cf6ebb3ace45847f3588a2663200f2143fa20d3622740685aa5d08e8d7a42a413971770f498cf39bdafcba08a9dc99a73
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD534fe2b5dee648e316306753d73931e24
SHA1cdc14c6bfe1859296dc6485e09ee9cd310fb5cd9
SHA2560f3c02d47e3cf429b34fe1d5a66ea7c385aabc40c7906aa6ac2d7161a79351f1
SHA5121a158be649053c80d3173f4e2ba4ec521995da165b2b8aa10334f0f25c815e41b1834aba1f56059ded4378c3522c9560a0b2b7a188681a883805a969abb64c9d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD508fdfeba72a0d196d6d35f80636e5b4a
SHA10d822f4182b9b4a0cedf4c56b711d2202d88bd09
SHA256ced04190b8533b1b0b77231f4e3ea1347ccc8de40b5dfa4a0f311745afa8bdb8
SHA51214cdf81855d55883addd5e4c5b4cac3bb4f9b6e1b1735a261040f52d32b377ba88328244f04e407637da95db03b8b8e9efb1c7b71afe1a6567e13d6ac20249a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5a58320d9614ac198ddee8ace9f2ad484
SHA1fefb2e77b6c9f6f5d8f269a78b9edb9915538e0b
SHA256bfe8d1b5b2378e46b1acb27068d7a038eac4b736f9411111ff544bc0b08b1dd1
SHA5124a4b1036281f93d6dfdbc07e855360f4807746415540f5315b9f066df2c84572c559e875e257c60dd358527533e45954099b75d004b5ecb1c514e55c8870bd8c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5b0f6c8dd7ee7dfe752d1b7d20d4be657
SHA110af99b115947e809dd2bb63c57a933c9c6f427d
SHA25640277e5ee7b32a3548b8f65f2acfda65589b1a6fd41efd942db7945737781f4b
SHA51293f9739290d54d6158309f9bbf2225fb23fbe6555c14c2137303d49a0f570a490403434b6598a7f874211d5daf00433404283c808e4a90abc07ce6fcbe85cc75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5f457d903bb1566d2ee585eb9842f4f4b
SHA1ab5651c4bfc8bbaf866ebc57453512e94e65c790
SHA25654a5bc14688fe4c7daece5617c2ba40aedfd685882a50226750f9c07964891b4
SHA5128c251d00f743f1cda29b076cafb12e3d581c396fac8777efa6ab670a47fb870480377484c9174829e891529c4e3365759909a3042c68aeff48c03fce5a6a7326
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5aeb5ce33ed8c140fd7636ecc2db16e97
SHA1ae718b31ac22b8ae6effeaa5e35c27ec961b87d2
SHA256058e544063bb57cff8854d418592d7c2ded950b3b8f0dde516c7b50677b26244
SHA512a438a394431a7343a98b39cb732c25929a164289c9be1454525cc6dc52105eada132dc3d729ca24f8c138cf68b22a39c95ecc5e382fc147714d28331f3cef776
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD573a4f4c85ff6260f475e0a0218bde013
SHA18999a7b70860163df07df2ef1a3cdcdd67396398
SHA256de94614b0978169b01a464282dcb9db9f74d5edf3b02333d5bf532463efabc44
SHA512252570de4e045cb16ec1513b0c434f7e24f9e5a04a10d30d7a12c65176a25913d953de2c754d339e12cce3e52c10e884a5b390bb7a7187ea30fa60946c2ab66e
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\logs\Common\FileCoAuth-2024-7-3.152.3780.1.odlFilesize
706B
MD56e7a85ed1e10a732ba39dd903977f648
SHA13d27025fd866fba453a8647c62c3770d9e8dedb2
SHA256f393ec39e90c1c39c299e3749715283839f068bf9b1b95624806f97a575214da
SHA512769620107590f9a93d6591be46bf4394b324c436bf39da16b5170a15781f5dd24a502b122cf2f7ba36f53cf7956b046ae12c713541af6a3bcae3b3fcd78dda70
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\F9VYNF5V\www.bing[1].xmlFilesize
2KB
MD56a465b58209abf62b7ae35dabafa588f
SHA19b883b32c7174d00c4b1598656b0b3727278a9c3
SHA2564ed391503b349165dac7155dbca35bca3c0cb7b989d0eb2e3a39e7666504b2ed
SHA5129e21053e5db0fdcd4f685c9e5f749e46ffcfdb5517210538290f79d8fb170ed7626a6e4f3e74a9895610c35ecac300c9aef663637afae54d087e94d964e78d28
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\F9VYNF5V\www.bing[1].xmlFilesize
2KB
MD55b8308f9f8c5f2be830ec1a807378ea7
SHA1df0e2c46a355cf0f0146eb629e632ff011235da3
SHA2567313bbb005004635886a8f901c31e0ab1bba1c0b1752408de3dd9bbbca408597
SHA512a00da966cdc75189a7c697d6acad22e63ebf4c9490b0eebadf1ca3f72fb0f393710cdb57234e4def71076f75d42e81d44012b0bf6271bbcbbbf90131af631fb7
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\F9VYNF5V\www.bing[1].xmlFilesize
8KB
MD5a7770979c4e452e14ab7b572e72aea74
SHA14f4374379af1f92f8cfa230b8ed67912475c49d4
SHA256a9b15f845f49c8379c346f97785e247fdb5511b1c6aa23aaa49ec03a9670a110
SHA512a8da627203d5d8ceb201f8be10edcd014286be55a02b19bde8d1008370225b1e84ff7c239c54cb894580cae14c1363c7c1639e0d39e8441fd0ccb6bc7d10da7d
-
C:\Users\Admin\AppData\Local\Temp\$inst\2.tmpFilesize
36B
MD58708699d2c73bed30a0a08d80f96d6d7
SHA1684cb9d317146553e8c5269c8afb1539565f4f78
SHA256a32e0a83001d2c5d41649063217923dac167809cab50ec5784078e41c9ec0f0f
SHA51238ece3e441cc5d8e97781801d5b19bdede6065a0a50f7f87337039edeeb4a22ad0348e9f5b5542b26236037dd35d0563f62d7f4c4f991c51020552cfae03b264
-
C:\Users\Admin\AppData\Local\Temp\Temp1_BonziKill.zip\BonziKill.exe:Zone.IdentifierFilesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
C:\Users\Admin\AppData\Local\Temp\Temp1_BonziKill.zip\BonziKill.exe:Zone.IdentifierFilesize
78B
MD56c4ddb33edad83edfe35c1f06186079e
SHA1aa070fefac1f08299a0d181d1387448e0833142b
SHA2569d4dbac2d9603394b36ea1d40483bf83379896ba40fb1e5b0b7d1033d8cd9662
SHA512e8965b59183fb15b678defc6a5f57df8802f8dabe3203b5ec7e67b57b7495846a4c564b72d04f397f234a5b6ea576adb1018ac6f3a65057bf6fece5122eca920
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.jpgFilesize
14KB
MD52257fa8cef64a74c33655bd5f74ef5e5
SHA1b9f8baf96166f99cb1983563e632e6e69984ad5c
SHA256ead48b70e048de6ccca219a229ca90b49a9d1b9c14bf3a7c5eaad544294fcfd3
SHA5127792be9b935a46a923e97bb76b76957070e116dcc4cb6fcd8b883c2d6f142285ebc9fd26cdf29bd19c8bdff412487f586abaa1724332b613e71afa45d7f3e4f9
-
C:\Users\Admin\Downloads\BlueScreen.exeFilesize
9KB
MD5b01ee228c4a61a5c06b01160790f9f7c
SHA1e7cc238b6767401f6e3018d3f0acfe6d207450f8
SHA25614e6ac84d824c0cf6ea8ebb5b3be10f8893449474096e59ff0fd878d49d0c160
SHA512c849231c19590e61fbf15847af5062f817247f2bcd476700f1e1fa52dcafa5f0417cc01906b44c890be8cef9347e3c8f6b1594d750b1cebdd6a71256fed79140
-
C:\Users\Admin\Downloads\FreeYoutubeDownloader.exe:Zone.IdentifierFilesize
55B
MD50f98a5550abe0fb880568b1480c96a1c
SHA1d2ce9f7057b201d31f79f3aee2225d89f36be07d
SHA2562dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1
SHA512dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6
-
C:\Users\Admin\Downloads\Unconfirmed 276735.crdownloadFilesize
3.0MB
MD5ef7b3c31bc127e64627edd8b89b2ae54
SHA1310d606ec2f130013cc9d2f38a9cc13a2a34794a
SHA2568b04fda4bee1806587657da6c6147d3e949aa7d11be1eefb8cd6ef0dba76d387
SHA512a11eadf40024faeb2cc111b8feee1b855701b3b3f3c828d2da0ae93880897c70c15a0ee3aeb91874e5829b1100e0abafec020e0bf1e82f2b8235e9cc3d289be5
-
C:\Users\Admin\Downloads\Unconfirmed 313384.crdownloadFilesize
46KB
MD599ec3237394257cb0b5c24affe458f48
SHA15300e68423da9712280e601b51622c4b567a23a4
SHA256ec17f950f6ee9c0c237d93bc0b766aa6e2ab458c70320b534212043128177b51
SHA512af2394d18f672def6d5d7081def759093759205aac0390ca03591c58c15a02e463a68b583b6fc28ef1368922b4bd5f9072d570ee97a955250a478cdb093500cb
-
C:\Users\Admin\Downloads\Unconfirmed 452559.crdownloadFilesize
396KB
MD513f4b868603cf0dd6c32702d1bd858c9
SHA1a595ab75e134f5616679be5f11deefdfaae1de15
SHA256cae57a60c4d269cd1ca43ef143aedb8bfc4c09a7e4a689544883d05ce89406e7
SHA512e0d7a81c9cdd15a4ef7c8a9492fffb2c520b28cebc54a139e1bffa5c523cf17dfb9ffe57188cf8843d74479df402306f4f0ce9fc09d87c7cca92aea287e5ff24
-
C:\Users\Admin\Downloads\Unconfirmed 56329.crdownloadFilesize
31KB
MD5c261c6e3332d0d515c910bbf3b93aab3
SHA1ff730b6b2726240df4b2f0db96c424c464c65c17
SHA2564663715548c70eec7e9cbf272171493d47a75d2652e38cca870412ea9e749fe9
SHA512a93bd7b1d809493917e0999d4030cb53ab7789c65f6b87e1bbac27bd8b3ad2aeb92dec0a69369c04541f5572a78f04d8dfba900624cf5bd82d7558f24d0a8e26
-
C:\Users\Admin\Downloads\Unconfirmed 56329.crdownload:SmartScreenFilesize
7B
MD54047530ecbc0170039e76fe1657bdb01
SHA132db7d5e662ebccdd1d71de285f907e3a1c68ac5
SHA25682254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750
SHA5128f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e
-
C:\Users\Admin\Downloads\Unconfirmed 982848.crdownloadFilesize
6.8MB
MD5c67dff7c65792e6ea24aa748f34b9232
SHA1438b6fa7d5a2c7ca49837f403bcbb73c14d46a3e
SHA256a848bf24651421fbcd15c7e44f80bb87cbacd2599eb86508829537693359e032
SHA5125e1b0b024f36288c1d2dd4bc5cf4e6b7d469e1e7e29dcef748d17a92b9396c94440eb27348cd2561d17593d8c705d4d9b51ae7b49b50c6dee85f73dec7100879
-
C:\Users\Admin\Downloads\blue-background-windows-365-windows-11-stock-3840x2160-7920.png.crdownloadFilesize
3.3MB
MD58937cfc67478cd996831230b28dbdc46
SHA18696df0e49cf6c77afaeff531506053e90120697
SHA2565f80e66f3449ee8194dc7a39345e864093b076c6e49d252d214afcc5aaa3af35
SHA51260c288eee0e662c655169ea201e3e41d2e7ccead4bfe70dc696daa08be05a94e2faaa4d9ac369c849ec488e8a637d268aab896b875749493403c3e7ab6637318
-
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exeFilesize
153KB
MD5f33a4e991a11baf336a2324f700d874d
SHA19da1891a164f2fc0a88d0de1ba397585b455b0f4
SHA256a87524035509ff7aa277788e1a9485618665b7da35044d70c41ec0f118f3dfd7
SHA512edf066968f31451e21c7c21d3f54b03fd5827a8526940c1e449aad7f99624577cbc6432deba49bb86e96ac275f5900dcef8d7623855eb3c808e084601ee1df20
-
\??\pipe\crashpad_2248_GFEGRJQVLDTMRVNGMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/5260-3357-0x00000000008C0000-0x0000000000934000-memory.dmpFilesize
464KB
-
memory/5260-3369-0x0000000005360000-0x000000000536A000-memory.dmpFilesize
40KB
-
memory/5260-3358-0x0000000005910000-0x0000000005EB6000-memory.dmpFilesize
5.6MB
-
memory/5260-3359-0x00000000052B0000-0x0000000005342000-memory.dmpFilesize
584KB
-
memory/5576-3446-0x000001F3E0290000-0x000001F3E02B0000-memory.dmpFilesize
128KB
-
memory/5576-35092-0x000001F3E0190000-0x000001F3E01B0000-memory.dmpFilesize
128KB
-
memory/5576-3398-0x000001F3DEBA0000-0x000001F3DECA0000-memory.dmpFilesize
1024KB
-
memory/5576-3397-0x000001F3DF100000-0x000001F3DF200000-memory.dmpFilesize
1024KB
-
memory/5576-21896-0x000001F3E6600000-0x000001F3E6700000-memory.dmpFilesize
1024KB
-
memory/5576-34869-0x000001F3E0E30000-0x000001F3E0F30000-memory.dmpFilesize
1024KB
-
memory/5576-3402-0x000001F3CE1B0000-0x000001F3CE1D0000-memory.dmpFilesize
128KB
-
memory/5576-34999-0x000001F3E0700000-0x000001F3E0720000-memory.dmpFilesize
128KB
-
memory/5576-35084-0x000001F3E0500000-0x000001F3E0600000-memory.dmpFilesize
1024KB
-
memory/5576-67055-0x000001F3EA990000-0x000001F3EA9B0000-memory.dmpFilesize
128KB
-
memory/5576-35165-0x000001F3E0190000-0x000001F3E01B0000-memory.dmpFilesize
128KB
-
memory/5576-3445-0x000001F3CE170000-0x000001F3CE190000-memory.dmpFilesize
128KB
-
memory/5576-3406-0x000001F3E0310000-0x000001F3E0410000-memory.dmpFilesize
1024KB
-
memory/6068-3156-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/6420-3244-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/6420-3242-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/6972-3071-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/6972-3070-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/7452-3157-0x000002150C120000-0x000002150C14E000-memory.dmpFilesize
184KB
-
memory/7620-3046-0x0000000000400000-0x0000000000AD8000-memory.dmpFilesize
6.8MB