Analysis
-
max time kernel
600s -
max time network
604s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 19:47
Static task
static1
Behavioral task
behavioral1
Sample
PrismLauncher-Windows-MSVC-Setup-6.3.exe
Resource
win10v2004-20230220-en
General
-
Target
PrismLauncher-Windows-MSVC-Setup-6.3.exe
-
Size
15.5MB
-
MD5
cdafdb2c5d1671ec3953b32172ccdb80
-
SHA1
06ca76295dd916a1f12a9f34a088426450a643ce
-
SHA256
f0dbf35b026acb481bb42d8fc6155d952c521792ebc1bdd52e3152342a317f92
-
SHA512
4a09c540a3c831453af56613c2a8272a4c15d661f0e3c8343488c2606e7c594783e888ae2d5521a12a0736f6bb922a74751f1f36fd25a24281e59528e10c96fa
-
SSDEEP
196608:LCiFgS9OWiVxhbStnh3nDohlG3fxkIIdfwbdo0ctmVwKyZCGdYcpH84aPsX0Twfu:LbgYohEhqk3ARw0moC6bNFX/DX+DtGJS
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
prismlauncher.exeprismlauncher.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation prismlauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation prismlauncher.exe -
Executes dropped EXE 13 IoCs
Processes:
prismlauncher.exeprismlauncher.exeJavaSetup8u361.exeJavaSetup8u361.exeJavaSetup8u361.exeJavaSetup8u361.exeJavaSetup8u361.exeJavaSetup8u361.exeMSIA110.tmpJavaSetup8u361.exeJavaSetup8u361.exeLZMA_EXELZMA_EXEpid process 4292 prismlauncher.exe 4560 prismlauncher.exe 1764 JavaSetup8u361.exe 4328 JavaSetup8u361.exe 1248 JavaSetup8u361.exe 816 JavaSetup8u361.exe 5100 JavaSetup8u361.exe 2252 JavaSetup8u361.exe 2448 MSIA110.tmp 1852 JavaSetup8u361.exe 1920 JavaSetup8u361.exe 2824 LZMA_EXE 1992 LZMA_EXE -
Loads dropped DLL 40 IoCs
Processes:
PrismLauncher-Windows-MSVC-Setup-6.3.exeprismlauncher.exeprismlauncher.exeMsiExec.exeMsiExec.exeMsiExec.exepid process 1536 PrismLauncher-Windows-MSVC-Setup-6.3.exe 1536 PrismLauncher-Windows-MSVC-Setup-6.3.exe 1536 PrismLauncher-Windows-MSVC-Setup-6.3.exe 4292 prismlauncher.exe 4292 prismlauncher.exe 4292 prismlauncher.exe 4292 prismlauncher.exe 4292 prismlauncher.exe 4292 prismlauncher.exe 4292 prismlauncher.exe 4292 prismlauncher.exe 4292 prismlauncher.exe 4292 prismlauncher.exe 4292 prismlauncher.exe 4292 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4560 prismlauncher.exe 4388 MsiExec.exe 3080 MsiExec.exe 3080 MsiExec.exe 2720 MsiExec.exe 2720 MsiExec.exe 2720 MsiExec.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
Processes:
MSIA110.tmpdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0016-0000-0063-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0016-0000-0095-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0034-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0055-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0069-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0038-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0023-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0058-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0051-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0062-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0097-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0015-0000-0005-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0015-0000-0026-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0015-0000-0091-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0047-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0061-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0018-0000-0030-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0013-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0015-0000-0029-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0059-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0091-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0014-0002-0036-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0056-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0077-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0017-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0014-0002-0033-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0034-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0028-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0070-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0013-0001-0037-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0015-0000-0025-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0065-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0077-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0014-0002-0021-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0014-0001-0006-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0013-0001-0058-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0014-0002-0007-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0030-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0065-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0014-0001-0003-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0099-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0037-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0015-0000-0070-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0005-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0028-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0090-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0001-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0059-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0045-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0071-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0014-0002-0041-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0015-0000-0056-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0065-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0013-0001-0038-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0014-0002-0037-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0036-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0002-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0065-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0015-0000-0017-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0014-0000-0003-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0015-0000-0032-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0071-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0017-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
MSIA110.tmpdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{DBC80044-A445-435B-BC74-9C25C1C588A9} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} MSIA110.tmp -
Drops file in Program Files directory 64 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\jfr.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javacpl.cpl msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jfxmedia.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\jfr\profile.jfc msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\management\jmxremote.access msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\management\snmp.acl.template msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\rmiregistry.exe msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\ext\jfxrt.jar msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-crt-math-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\cmm\sRGB.pf msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\wsdetect.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-crt-stdio-l1-1-0.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\release msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\resources.jar msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\deploy\splash.gif msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\Welcome.html msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javafx_font_t2k.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\nio.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\javafx.properties msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\jfxswt.jar msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\msvcr100.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\fontconfig.properties.src msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\cmm\LINEAR_RGB.pf msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\eula.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jfxwebkit.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\images\cursors\win32_MoveNoDrop32x32.gif msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\deploy\messages_zh_HK.properties msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\sunec.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\java.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\lcms.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\policytool.exe msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\keytool.exe msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\jfr.jar msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_zh_TW.properties msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\splash@2x.gif msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-crt-private-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\management\snmp.acl.template msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\ext\sunpkcs11.jar msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-core-file-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\ext\sunmscapi.jar msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\JAWTAccessBridge-64.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\amd64\jvm.cfg msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\accessibility.properties msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\rt.jar msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\jfxswt.jar msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\verify.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\prism_common.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\legal\jdk\relaxngdatatype.md msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\jvm.hprof.txt msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\plugin.jar msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\ext\access-bridge-64.jar msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\ext\nashorn.jar msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\fonts\LucidaBrightDemiItalic.ttf msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\charsets.jar msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\LICENSE msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME.txt msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\calendars.properties msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\bin\api-ms-win-crt-utility-l1-1-0.dll msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\deploy\messages_sv.properties msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\rt.jar msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\fxplugins.dll msiexec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\cmm\sRGB.pf msiexec.exe File created C:\Program Files (x86)\Java\jre1.8.0_361\lib\ext\localedata.jar msiexec.exe -
Drops file in Windows directory 16 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F32180361F0} msiexec.exe File opened for modification C:\Windows\Installer\MSI220.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFFEC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBD93.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC73A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA110.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIFE26.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI30B.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5eef0f.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\e5eef0f.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIB93D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC092.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF02B.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
msiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msiexec.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 1 IoCs
Processes:
TaskKill.exepid process 3544 TaskKill.exe -
Processes:
MSIA110.tmpdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{44D1B085-E495-4B5F-9EE6-34795C46E7E7} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{5852F5ED-8BF4-11D4-A245-0080C6F74284} MSIA110.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284} MSIA110.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\AppName MSIA110.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\AppPath MSIA110.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5852F5ED-8BF4-11D4-A245-0080C6F74284}\Policy = "0" MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{C8FE2181-CAE7-49EE-9B04-DB7EB4DA544A} MSIA110.tmp -
Modifies data under HKEY_USERS 7 IoCs
Processes:
chrome.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133241615108955245" chrome.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1E\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1F msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\20 msiexec.exe -
Modifies registry class 64 IoCs
Processes:
MSIA110.tmpdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0013-0001-0013-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0013-0001-0027-ABCDEFFEDCBB} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0014-0002-0018-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0033-ABCDEFFEDCBA} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0040-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0065-ABCDEFFEDCBB} MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0090-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0015-0000-0032-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0015-0000-0081-ABCDEFFEDCBB} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0051-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0081-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0013-0001-0007-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0038-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0061-ABCDEFFEDCBA} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0014-0002-0033-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0015-0000-0085-ABCDEFFEDCBB} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0004-ABCDEFFEDCBA} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0014-ABCDEFFEDCBB} MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0016-0000-0035-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0013-0001-0012-ABCDEFFEDCBA} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0015-0000-0078-ABCDEFFEDCBA} MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\CLSID\{CAFEEFAC-0015-0000-0042-ABCDEFFEDCBA} MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0015-0000-0029-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0016-0000-0057-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0016-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0025-ABCDEFFEDCBA} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0013-0001-0048-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0013-0001-0089-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0014-0002-0040-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\CLSID\{CAFEEFAC-0015-0000-0008-ABCDEFFEDCBA} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0017-0000-0008-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0018-0000-0001-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0015-0000-0074-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0015-0000-0054-ABCDEFFEDCBC} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0013-0001-0026-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0013-0001-0019-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0015-0000-0008-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0059-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0074-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0016-0000-0082-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0039-ABCDEFFEDCBA} MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\CLSID\{CAFEEFAC-0015-0000-0094-ABCDEFFEDCBB} MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0055-ABCDEFFEDCBB} MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0049-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0056-ABCDEFFEDCBB} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0014-0002-0039-ABCDEFFEDCBA} MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0015-0000-0019-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\CLSID\{CAFEEFAC-0014-0002-0026-ABCDEFFEDCBB} MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\CLSID\{CAFEEFAC-0018-0000-0039-ABCDEFFEDCBA} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0015-0000-0004-ABCDEFFEDCBC} MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0014-0002-0001-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\CLSID\{CAFEEFAC-0016-0000-0027-ABCDEFFEDCBC} MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0016-0000-0070-ABCDEFFEDCBB}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0002-ABCDEFFEDCBB} MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0017-0000-0039-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\CLSID\{CAFEEFAC-0017-0000-0048-ABCDEFFEDCBC} MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_CLASSES\CLSID\{CAFEEFAC-0018-0000-0062-ABCDEFFEDCBC}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{CAFEEFAC-0013-0001-0024-ABCDEFFEDCBA}\INPROCSERVER32 MSIA110.tmp Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\CLSID\{CAFEEFAC-0013-0001-0007-ABCDEFFEDCBB} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0040-ABCDEFFEDCBC} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0018-0000-0056-ABCDEFFEDCBC} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0017-0000-0021-ABCDEFFEDCBB} MSIA110.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0013-0001-0011-ABCDEFFEDCBB} MSIA110.tmp -
Processes:
JavaSetup8u361.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 JavaSetup8u361.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 JavaSetup8u361.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 0f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d432000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 JavaSetup8u361.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 JavaSetup8u361.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 JavaSetup8u361.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
prismlauncher.exeprismlauncher.exepid process 4292 prismlauncher.exe 4560 prismlauncher.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
chrome.exeMSIA110.tmpjp2launcher.exemsiexec.exepid process 1176 chrome.exe 1176 chrome.exe 2448 MSIA110.tmp 2448 MSIA110.tmp 1640 jp2launcher.exe 1640 jp2launcher.exe 1972 msiexec.exe 1972 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
prismlauncher.exeprismlauncher.exepid process 4292 prismlauncher.exe 4560 prismlauncher.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exepid process 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
TaskKill.exechrome.exedescription pid process Token: SeDebugPrivilege 3544 TaskKill.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
chrome.exepid process 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
JavaSetup8u361.exeJavaSetup8u361.exejp2launcher.exeJavaSetup8u361.exeLZMA_EXELZMA_EXEpid process 4328 JavaSetup8u361.exe 4328 JavaSetup8u361.exe 2252 JavaSetup8u361.exe 2252 JavaSetup8u361.exe 2252 JavaSetup8u361.exe 1640 jp2launcher.exe 1920 JavaSetup8u361.exe 1920 JavaSetup8u361.exe 1920 JavaSetup8u361.exe 2824 LZMA_EXE 1992 LZMA_EXE 1920 JavaSetup8u361.exe 1920 JavaSetup8u361.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
PrismLauncher-Windows-MSVC-Setup-6.3.exeprismlauncher.exeprismlauncher.exechrome.exedescription pid process target process PID 1536 wrote to memory of 3544 1536 PrismLauncher-Windows-MSVC-Setup-6.3.exe TaskKill.exe PID 1536 wrote to memory of 3544 1536 PrismLauncher-Windows-MSVC-Setup-6.3.exe TaskKill.exe PID 1536 wrote to memory of 3544 1536 PrismLauncher-Windows-MSVC-Setup-6.3.exe TaskKill.exe PID 1536 wrote to memory of 4292 1536 PrismLauncher-Windows-MSVC-Setup-6.3.exe prismlauncher.exe PID 1536 wrote to memory of 4292 1536 PrismLauncher-Windows-MSVC-Setup-6.3.exe prismlauncher.exe PID 4292 wrote to memory of 4376 4292 prismlauncher.exe javaw.exe PID 4292 wrote to memory of 4376 4292 prismlauncher.exe javaw.exe PID 4292 wrote to memory of 2680 4292 prismlauncher.exe javaw.exe PID 4292 wrote to memory of 2680 4292 prismlauncher.exe javaw.exe PID 4292 wrote to memory of 2072 4292 prismlauncher.exe javaw.exe PID 4292 wrote to memory of 2072 4292 prismlauncher.exe javaw.exe PID 4292 wrote to memory of 3368 4292 prismlauncher.exe javaw.exe PID 4292 wrote to memory of 3368 4292 prismlauncher.exe javaw.exe PID 4560 wrote to memory of 2044 4560 prismlauncher.exe javaw.exe PID 4560 wrote to memory of 2044 4560 prismlauncher.exe javaw.exe PID 4560 wrote to memory of 320 4560 prismlauncher.exe javaw.exe PID 4560 wrote to memory of 320 4560 prismlauncher.exe javaw.exe PID 4560 wrote to memory of 2712 4560 prismlauncher.exe javaw.exe PID 4560 wrote to memory of 2712 4560 prismlauncher.exe javaw.exe PID 4560 wrote to memory of 2720 4560 prismlauncher.exe javaw.exe PID 4560 wrote to memory of 2720 4560 prismlauncher.exe javaw.exe PID 1176 wrote to memory of 1712 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 1712 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3200 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 4868 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 4868 1176 chrome.exe chrome.exe PID 1176 wrote to memory of 3964 1176 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PrismLauncher-Windows-MSVC-Setup-6.3.exe"C:\Users\Admin\AppData\Local\Temp\PrismLauncher-Windows-MSVC-Setup-6.3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\TaskKill.exeTaskKill /IM prismlauncher.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\prismlauncher.exe"C:\Users\Admin\AppData\Local\Programs\PrismLauncher\prismlauncher.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Programs/PrismLauncher/jars/JavaCheck.jar3⤵
-
C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Programs/PrismLauncher/jars/JavaCheck.jar3⤵
-
C:\ProgramData\Oracle\Java\javapath\javaw.exejavaw -jar C:/Users/Admin/AppData/Local/Programs/PrismLauncher/jars/JavaCheck.jar3⤵
-
C:\ProgramData\Oracle\Java\javapath\javaw.exeC:\ProgramData\Oracle\Java\javapath\javaw.exe -jar C:/Users/Admin/AppData/Local/Programs/PrismLauncher/jars/JavaCheck.jar3⤵
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\prismlauncher.exe"C:\Users\Admin\AppData\Local\Programs\PrismLauncher\prismlauncher.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Programs/PrismLauncher/jars/JavaCheck.jar2⤵
-
C:\ProgramData\Oracle\Java\javapath\javaw.exeC:\ProgramData\Oracle\Java\javapath\javaw.exe -jar C:/Users/Admin/AppData/Local/Programs/PrismLauncher/jars/JavaCheck.jar2⤵
-
C:\ProgramData\Oracle\Java\javapath\javaw.exejavaw -jar C:/Users/Admin/AppData/Local/Programs/PrismLauncher/jars/JavaCheck.jar2⤵
-
C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Programs/PrismLauncher/jars/JavaCheck.jar2⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd60e29758,0x7ffd60e29768,0x7ffd60e297782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2284 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3216 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3352 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4536 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4688 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4548 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4992 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5148 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4672 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3244 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4664 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5560 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5868 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5816 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3532 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6048 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5488 --field-trial-handle=1844,i,16491268559024728436,3121624343046970215,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\JavaSetup8u361.exe"C:\Users\Admin\Downloads\JavaSetup8u361.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jds241030031.tmp\JavaSetup8u361.exe"C:\Users\Admin\AppData\Local\Temp\jds241030031.tmp\JavaSetup8u361.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\JavaSetup8u361.exe"C:\Users\Admin\Downloads\JavaSetup8u361.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jds241037671.tmp\JavaSetup8u361.exe"C:\Users\Admin\AppData\Local\Temp\jds241037671.tmp\JavaSetup8u361.exe"3⤵
- Executes dropped EXE
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Downloads\JavaSetup8u361.exe"C:\Users\Admin\Downloads\JavaSetup8u361.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jds241061140.tmp\JavaSetup8u361.exe"C:\Users\Admin\AppData\Local\Temp\jds241061140.tmp\JavaSetup8u361.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\Installer\MSIA110.tmp"C:\Windows\Installer\MSIA110.tmp" ProductCode={26A24AE4-039D-4CA4-87B4-2F86418066F0} /s2⤵
- Executes dropped EXE
- Registers COM server for autorun
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe" -wait -fix -shortcut -silent3⤵
-
C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe"C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre1.8.0_66" -vma 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 -ma LXdhaXQALWZpeAAtc2hvcnRjdXQALXNpbGVudAAtbm90V2ViSmF2YQ==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe"C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe" -u auto-update3⤵
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe" /x {4A03706F-666A-4037-7777-5F2748764D10} /qn4⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6415A9174C94943DF5E413C6F74DF9612⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 111617DC85F34F0879CCA4BC52E0A13D E Global\MSI00002⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3A2979EC8F3EE17A9070ECE2B7336DA52⤵
- Loads dropped DLL
-
C:\Users\Admin\Downloads\JavaSetup8u361.exe"C:\Users\Admin\Downloads\JavaSetup8u361.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jds241124953.tmp\JavaSetup8u361.exe"C:\Users\Admin\AppData\Local\Temp\jds241124953.tmp\JavaSetup8u361.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\LZMA_EXE"C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\LZMA_EXE" d "C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\au.msi" "C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\msi.tmp"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\LZMA_EXE"C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\LZMA_EXE" d "C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\jre1.8.0_361.msi" "C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\msi.tmp"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Config.Msi\e5eee47.rbsFilesize
48KB
MD500c3037221c3f19d2f1105c74e91026f
SHA1e3edf81be476e845d2ca2d5046ce8f69a14c3954
SHA2569412b078a732b5cab5235a0ee82afdfbcd48c43e01d961bfc4028a770adf3994
SHA512a841ceb05192677a3278c06effb1fd0076a6b82d6c59761b4ac3e71eed00dec7ab38debbc4dc02858f5b1ba66573e563b25eea6a963ee37b0a95e66155938ebf
-
C:\Config.Msi\e5eef0b.rbsFilesize
7KB
MD5457b730bad469014ff4ece5164171128
SHA128c3c54be2c4dfe46fea0e38e896746178809864
SHA2560e12b5131c0193b743f98e2d103d8ccc429443a42a5e4e34c8f78b3d7a12345f
SHA5128dd4524634fa9a9a88197953f8c56f3cc89b7863172b213299e400e06dd46b80b9a33fa23a3c9ed7bbc27a41b039904f349460b149e823c2d35a3b6c4f9295e0
-
C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestampFilesize
50B
MD566b389424929f6c78db775f1385139d7
SHA11e41ff876d9cc7196f63d65282bf14b5c365876a
SHA256690c0417e4b413b0baf50b9049aa38902a8a1870ad12c2fbaf8a22918b44566e
SHA512e549abff2b6409a1472fb7465a2b9deb7904db8fff6e4d148e21d0193168f3d970264d23b92c777e42b5c6886f0ce4d963cde26d819c8662503119654b74a584
-
C:\Users\Admin\.oracle_jre_usage\90737d32e3aba4b.timestampFilesize
50B
MD5d8576988ef1741b7baeb8dce883c4337
SHA1c5cb3353a053c6298974ddd67bf97d9d5d678daa
SHA25607a3f1eb24add0c27db8569d8a70219acf31a4fce1ee13b0a35f6222061d93b4
SHA5124e82eede4f42c916ca15cb2d23fb8387fdf5d9e61e0db78fc2228b31cf544325985f38d40a10ca45501995cd626f4c5b81ef7599aeeed2a47cffc83cc6c8d175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD5fa6eefd63db549fbb96f3177d9fb0ae4
SHA18b453ce70b61c81a879ec99c12a5b8007e71b884
SHA256e8d97fde0ad756ad0d35a23b982714dbdf81182496cab38aed776c4bdba6642d
SHA5126507b8bdc65f997232c086e208fa667ef9c84bf25a1f8f35190badf1fa6e4d8ac09cc95553f18612f96df3f04f1e32dc396a32f87b906af94a20984863336091
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\Java3BillDevices.pngFilesize
27KB
MD58e52efc6798ed074072f527309a1ba25
SHA1347d4c6b4f92e7315d9b199a97dd5cf7d86b2431
SHA25612491ebc4eb99bf014d3bc44f770114bde013e84cbec2633303559a8c6e5f991
SHA5120653c6e7f94ac36fe555db3eda8465f99d17cdbab91ea6413c6bd68dbbbb4db5df06e5d62768f6f4dfcef8d207d771e0b6924adfe403b92729bc4c5689e4fca7
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\jds241063562.tmpFilesize
52.6MB
MD51aa57a5a04ec43b25937efa2a3f0f0ad
SHA16121bef34c9c603e8b03140c05e0418096ac7bb6
SHA25666a697fe354addb90ae4e3c6b617f9ca0e5a65a439435f674e3f6d8c7db85b6b
SHA5121461ff7fc5d3a1e3fff20bd42324f0dc6f82bbdb9d35cc425535449a0f8e346599c4012802f0a801cce243eea4d878e6430a02db5b24fe6cc99b24cdad31c4e8
-
C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_361\jds241068656.tmpFilesize
843KB
MD5c95a831719a0a8659911c2d961a9e425
SHA184e5db605edecd9976f2a7d45b00c2c5deabe11d
SHA256bb5d1befb8970ee28066d13727056d54e0ee624564556757c26c75d6faafcc9d
SHA512073f2e9ce88f18ddf6d5e9d1d47a142b68a4935d73854580ca6d5b619473632965051e398bf5485ff0664d2caf2ed13d4260ab64428c7ea2cce78983feed3069
-
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\deployment.propertiesFilesize
698B
MD5cf1c4e5c2e543b1f5557e744291b8084
SHA13076c81423846077e8b3ed6540936557deb05a54
SHA256d877897c80cec68e88494d236adba892e3dd4352327d7e689de5a8d6c3a23c24
SHA512b0b4814e5412a181480f8006ea5b0d2b8dcb68697e6ca6cf337255c8c924419cf9ab5401d63da1c6860e0541e79401e071a98a467569b89c6f1491f9f47efd21
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
864B
MD5af30aaa74eec665c399d27555b89b5f6
SHA1619ed534bc2724f7956e9d671c26a3d1db93ef91
SHA256012ae391c34f61ef9ba9901963b04db796cff239dd82aafbb73202cc68ca43d8
SHA512632914c51494e11fa33ab460b3dbfc1b982c89458b01cba9ca23df59e317a7183d1b2f627f6dad637e4e357718ece30f67daa80355ced83d4e1b8a0845460dc8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5327a5d4b766b416267fd33aa496fa83e
SHA1066b23847e65880482ea4f98e508701806e2de80
SHA256d837f7130a38e5fdaa0c0885ec9caf71d41e835e60abf655794a15668288da8a
SHA512ea6a28fe5a62cffe5ada9ca320c0bad3d798c521dadad2ea3dfe08e347af8e977258215e203ee93285d095eff17fcc4dcb1ab19bbc24d74fa9969e7fc3c1855a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
369B
MD5fb1d0a6ebc0a2dd1a026c488c10df3a6
SHA19efd41445131b79ffd51f19719e8457048bbdb5c
SHA256a9fabc8441c7a8813267fb4acd97b142e0bbc08a28c4dde695549b2140946310
SHA5129701900771993b19bb3b1d5320776dbf2586e6c4a6e74b441c4c0ac53344c9809699426a88a07faeb6d4fd0419086315d2c6238a3fdca682ba07c457adba74c8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5a2d4abd0e98dfedfd5d72f8ec68facb3
SHA186fdea98c5a0b1af370506671e93927dbd31c865
SHA256ead9fb681460fc4bcbb801564b532ec5a77f4dbd869d7fd9314556e2ae93af8a
SHA512e19c6f1ac183b79882a208c50591ec030ede16cdd941bae505312704ba3886a92448515ed7f75f1048c41efa14df3f5b0e7f155b1f804b755c7af4ef43b0f1d4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5bd7cd7bbafcdfa8023934971aee9367c
SHA135b167439f9b5e7540e6977399051220109e86c9
SHA256b6d668308210d6eb5fe7854cee93d6099be06205135539c3b6afcd42db5a428a
SHA512ec9e5d51d15f1a9e930ccbf721c90ffc3146239ba266c227c57a33c5da5c35caef1566633b3517cac86dcc6fb52537adc481344397e780c1da6447de34245edb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5eba61858160171e488ab252d450607da
SHA1d534f72361192d0cb0b6995d883a9f61f4348699
SHA2561560cc28ddf6822d56aff10a0c683abdbf235bc99a1ddbb62e2a64914f802170
SHA512b23e6cb538ef6b3e1165db99a07568b3ec80da4ab5652220c73cfaab6398938a16681b4eed765ec359d6987fdf7c14dc09fee1d8ddc786b23b606ebf35888ddd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD598866c2266e560c0a44c6e936eeebd47
SHA1fc94b3e0ed8db122c1bd5ec645a747de80aba8c8
SHA256ede460dbd61945cda56db24deaa434f4718137012076f75cc422575ad21ee2b0
SHA51222c591f059d7729b3b0fd1b500482a84a7d2e4808fd26a4e0f244ca94e4758b7be4242d77888a8da3ef792ac8ee710dff193d8d57336b2d173c59c2e8a64435f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5405d547a5274ffd4c3de77cc3faa1169
SHA14fdc8f702d211bc0793b03863bbdbd4693bfc264
SHA25627b859ff17fbf90ff45cf2fcf93741deb7dfb5881223346cd4081614cc5ef378
SHA512925f4ff1acc70cb52ca747c9b10f734faf954f90946b49a3093f9c1b0a8172cbabaa072941cac9413a6e1d663041e457742f3b3620979c6151961fa6e66e8b56
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1Filesize
264KB
MD5376769ef63f399802a1f21e1cb7cd880
SHA1fa37cd3759b5adc618031c80c485c4db1e43a7e2
SHA256350a285f805fbb6897d5d213d36836c3cb9845575bafee0a4d37152f1e462514
SHA51280ca11cc45827bc1511b7647c10e4fc76131c8d6297850947e56fdbb3b2a60b097ae7eae9316e689bc64b6b0def3e47dec1ea984b5683b3209b21b86eb74686f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD51b059e4f96b927bf5b03ae2f925247a0
SHA1aba85e6efa1916156fcbea4f41be1ebd2edf965e
SHA25685d6930651f78a75ad5604b84bfef05fbf98ed44de497bc4b2c652d31727711b
SHA512b8c91d5eae82469d17ecbb96e53f02064d3d31101469051902fd8feebfbf4e618837f4a29f5344463dbbc06d1f2c6d33771a7f75bd0240625d3eca7fa402367a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD5372453eae56f1d9105516f70da1361b9
SHA188d34dcfb9554c7a457a492ed39dda561b87f7a1
SHA256f70b73e7392e378fc93e3e3c8ba5ac96768536bc5adf4323859fc8bc6f642ca9
SHA512990c177e754bde0799bc7e658fc82af61ba57fbc6cedc77098c90fdd979eaa1532bcd05e0e08dfabba56ffd291a9d80d1db2b20e851098bf5d687ff656720cf7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
113KB
MD5e2c7927854c92dbb7149f6af38a4e5a0
SHA10194b19574be732d121466a38d7eb3990566e35c
SHA25660dafb0d61ed77d907070303d046fb2936af3def42b90b7a7499dcca9e0c9642
SHA5126706f9dbf2b92545961b3d6759feab3f90567130e7d577f11b00d4e6c8757e069a7f87efa45487878a26fb9bad831c16d805d6efadb86ede598c3e142e2dab3c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5dface.TMPFilesize
97KB
MD599283d4b4db266596a601f043b37dcb2
SHA1a3ea0a357c391fc1908e583a52c15470b8c42113
SHA25677aa7ed58c4c766d0528422de6aae079eceb7ac58fee6951e6d8e5651d498b54
SHA5122e311d852f9a3a01949f002085dc4bf7cae901db634e5e6dabfd4d987503de9994a11bd6defa25c198dc98c7db8095ea5335a710962949b2552f30e519538231
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\host[1]Filesize
1KB
MD5a752a4469ac0d91dd2cb1b766ba157de
SHA1724ae6b6d6063306cc53b6ad07be6f88eaffbab3
SHA2561e67043252582aea0e042f5a7be4a849b7cd01b133a489c3b2e67c10ade086f3
SHA512abc2899705a23f15862acf3d407b700bb91c545722c02c7429745ab7f722507285c62614dcb87ea846f88fc0779345cb2e22dc3ad5f8113f6907821505be2c02
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\rtutils[1]Filesize
244B
MD5c0a4cebb2c15be8262bf11de37606e07
SHA1cafc2ccb797df31eecd3ae7abd396567de8e736d
SHA2567da9aa32aa10b69f34b9d3602a3b8a15eb7c03957512714392f12458726ac5f1
SHA512cc68f4bc22601430a77258c1d7e18d6366b6bf8f707d31933698b2008092ba5348c33fa8b03e18c4c707abf20ce3cbcb755226dc6489d2b19833809c98a11c74
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4VT6R2QM\layout[1]Filesize
2KB
MD5cc86b13a186fa96dfc6480a8024d2275
SHA1d892a7f06dc12a0f2996cc094e0730fe14caf51a
SHA256fab91ced243da62ec1d938503fa989462374df470be38707fbf59f73715af058
SHA5120e3e4c9755aa8377e00fc9998faab0cd839dfa9f88ce4f4a46d8b5aaf7a33e59e26dbf55e9e7d1f8ef325d43302c68c44216adb565913d30818c159a182120fc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4VT6R2QM\masthead_fill[1]Filesize
1KB
MD591a7b390315635f033459904671c196d
SHA1b996e96492a01e1b26eb62c17212e19f22b865f3
SHA256155d2a08198237a22ed23dbb6babbd87a0d4f96ffdc73e0119ab14e5dd3b7e00
SHA512b3c8b6f86ecf45408ac6b6387ee2c1545115ba79771714c4dd4bbe98f41f7034eae0257ec43c880c2ee88c44e8fc48c775c5bb4fd48666a9a27a8f8ac6bcfdcb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EY3KXMB3\masthead_left[1]Filesize
4KB
MD5b663555027df2f807752987f002e52e7
SHA1aef83d89f9c712a1cbf6f1cd98869822b73d08a6
SHA2560ce32c034dfb7a635a7f6e8152666def16d860b6c631369013a0f34af9d17879
SHA512b104ed3327fed172501c5aa990357b44e3b31bb75373fb8a4ea6470ee6a72e345c9dc4bcf46a1983c81adb567979e6e8e6517d943eb204c3f7fac559cd17c451
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EY3KXMB3\runtime[1]Filesize
41KB
MD56ec53f9a37577beb8cc538f35da0cc41
SHA1fbd4d0d3480999741ae882ff3e4c965e2d9aafd4
SHA2562d5dc895f7197ec80f500968d62fc936c490d83948e07e1aeaf1a7ebc7d30a6a
SHA5125b70533d479a0e43300058cdbf887e4161b9e6bd4d72cea216bb5f03cbeb7ca2ea04e4f9f435b957db4bfeb7725e8c677c4087390e4fc52dec502c3a300acb4e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\common[1]Filesize
1KB
MD5f5bb484d82e7842a602337e34d11a8f6
SHA109ea1dee4b7c969771e97991c8f5826de637716f
SHA256219108bfef63f97562c4532681b03675c9e698c5ae495205853dbcbfd93faf1a
SHA512a23cc05b94842e1f3a53c2ea8a0b78061649e0a97fcd51c8673b2bcb6de80162c841e9fdde212d3dfd453933df2362dcb237fe629f802bafaa144e33ca78b978
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\l10n[1]Filesize
4KB
MD51fd5111b757493a27e697d57b351bb56
SHA19ca81a74fa5c960f4e8b3ad8a0e1ec9f55237711
SHA25685bbec802e8624e7081abeae4f30bd98d9a9df6574bd01fe5251047e8fdaf59f
SHA51280f532e4671d685fa8360ef47a09efcb3342bcfcf929170275465f9800bfbfffc35728a1ba496d4c04a1fdefb2776af02262c3774f83fea289585a5296d560b0
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Core.dllFilesize
5.4MB
MD5f153f00ed37064b392bb36dff59e67d8
SHA1a6ca85c8fdfad202d2148cd046d56020b780820f
SHA256eaf9f64363f25524deda5e12bb0b5efcdc2477611c8b936507486bfb4627f373
SHA512a7d09e1790e9d9a0971d6056be7efa8c574107fd5bde7e08732138605c0c8aa15c8cf68b67a3320a9fbfe5e5965d22b2858e36d8aeef0a9a2efb4dfe1f5981fa
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Core.dllFilesize
5.4MB
MD5f153f00ed37064b392bb36dff59e67d8
SHA1a6ca85c8fdfad202d2148cd046d56020b780820f
SHA256eaf9f64363f25524deda5e12bb0b5efcdc2477611c8b936507486bfb4627f373
SHA512a7d09e1790e9d9a0971d6056be7efa8c574107fd5bde7e08732138605c0c8aa15c8cf68b67a3320a9fbfe5e5965d22b2858e36d8aeef0a9a2efb4dfe1f5981fa
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Core.dllFilesize
5.4MB
MD5f153f00ed37064b392bb36dff59e67d8
SHA1a6ca85c8fdfad202d2148cd046d56020b780820f
SHA256eaf9f64363f25524deda5e12bb0b5efcdc2477611c8b936507486bfb4627f373
SHA512a7d09e1790e9d9a0971d6056be7efa8c574107fd5bde7e08732138605c0c8aa15c8cf68b67a3320a9fbfe5e5965d22b2858e36d8aeef0a9a2efb4dfe1f5981fa
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Core.dllFilesize
5.4MB
MD5f153f00ed37064b392bb36dff59e67d8
SHA1a6ca85c8fdfad202d2148cd046d56020b780820f
SHA256eaf9f64363f25524deda5e12bb0b5efcdc2477611c8b936507486bfb4627f373
SHA512a7d09e1790e9d9a0971d6056be7efa8c574107fd5bde7e08732138605c0c8aa15c8cf68b67a3320a9fbfe5e5965d22b2858e36d8aeef0a9a2efb4dfe1f5981fa
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Core5Compat.dllFilesize
816KB
MD5845d73d30e593fa45ff7756eed99ada7
SHA1d5b42c11f2140c86c5b6ea31cfa2f07b1ccedaec
SHA2567863b24f046efa36fea0923eb32070c80c93dc89802b7ed8b472f1b8f8fd9fca
SHA5122a0a5e0c7aec919bf026008b959b2c1d1924b3da385d12fd8bbc4e7923697284124544aab3c188e4296d9e8bf0946fc8fcfc91aaa3cb4c1c42231842864315ae
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Core5Compat.dllFilesize
816KB
MD5845d73d30e593fa45ff7756eed99ada7
SHA1d5b42c11f2140c86c5b6ea31cfa2f07b1ccedaec
SHA2567863b24f046efa36fea0923eb32070c80c93dc89802b7ed8b472f1b8f8fd9fca
SHA5122a0a5e0c7aec919bf026008b959b2c1d1924b3da385d12fd8bbc4e7923697284124544aab3c188e4296d9e8bf0946fc8fcfc91aaa3cb4c1c42231842864315ae
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Core5Compat.dllFilesize
816KB
MD5845d73d30e593fa45ff7756eed99ada7
SHA1d5b42c11f2140c86c5b6ea31cfa2f07b1ccedaec
SHA2567863b24f046efa36fea0923eb32070c80c93dc89802b7ed8b472f1b8f8fd9fca
SHA5122a0a5e0c7aec919bf026008b959b2c1d1924b3da385d12fd8bbc4e7923697284124544aab3c188e4296d9e8bf0946fc8fcfc91aaa3cb4c1c42231842864315ae
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Gui.dllFilesize
7.3MB
MD5d9d28c74bf6331296ba2dfcf2b9c95f6
SHA19f966b77751e2681916f165f348e1b598c71bd8e
SHA25697e9cbc396e54fcba316c3b8f0383ec526159ae70bb63f7ebdd9ffc0f511c143
SHA512554dba9b59d5ea6043a4cce9fe74b87f7cbd0dc341b6df78f2f5e3778e6a35f05cb03a9ff84d91753e4685936b74bcac550c4fc87f9fc671b73507d47b924592
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Gui.dllFilesize
7.3MB
MD5d9d28c74bf6331296ba2dfcf2b9c95f6
SHA19f966b77751e2681916f165f348e1b598c71bd8e
SHA25697e9cbc396e54fcba316c3b8f0383ec526159ae70bb63f7ebdd9ffc0f511c143
SHA512554dba9b59d5ea6043a4cce9fe74b87f7cbd0dc341b6df78f2f5e3778e6a35f05cb03a9ff84d91753e4685936b74bcac550c4fc87f9fc671b73507d47b924592
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Gui.dllFilesize
7.3MB
MD5d9d28c74bf6331296ba2dfcf2b9c95f6
SHA19f966b77751e2681916f165f348e1b598c71bd8e
SHA25697e9cbc396e54fcba316c3b8f0383ec526159ae70bb63f7ebdd9ffc0f511c143
SHA512554dba9b59d5ea6043a4cce9fe74b87f7cbd0dc341b6df78f2f5e3778e6a35f05cb03a9ff84d91753e4685936b74bcac550c4fc87f9fc671b73507d47b924592
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Gui.dllFilesize
7.3MB
MD5d9d28c74bf6331296ba2dfcf2b9c95f6
SHA19f966b77751e2681916f165f348e1b598c71bd8e
SHA25697e9cbc396e54fcba316c3b8f0383ec526159ae70bb63f7ebdd9ffc0f511c143
SHA512554dba9b59d5ea6043a4cce9fe74b87f7cbd0dc341b6df78f2f5e3778e6a35f05cb03a9ff84d91753e4685936b74bcac550c4fc87f9fc671b73507d47b924592
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Network.dllFilesize
1.3MB
MD586103cc463c0f96c296cd81fb35574a7
SHA14af5098476fda9f866309d1a75256d3a0d589a51
SHA256c203bc6a09ba5e9b6c272109f61a1a04d8531796a33e59015cc08bf2c07880fe
SHA512e3d3db3b896c100844ea1de50313b1244f1cf16e00196cf571a22245c6eeed3adcdf226dee0a4eeb122c0a7ce4d9c1259bab742fcede328933513563c8631adb
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Network.dllFilesize
1.3MB
MD586103cc463c0f96c296cd81fb35574a7
SHA14af5098476fda9f866309d1a75256d3a0d589a51
SHA256c203bc6a09ba5e9b6c272109f61a1a04d8531796a33e59015cc08bf2c07880fe
SHA512e3d3db3b896c100844ea1de50313b1244f1cf16e00196cf571a22245c6eeed3adcdf226dee0a4eeb122c0a7ce4d9c1259bab742fcede328933513563c8631adb
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Network.dllFilesize
1.3MB
MD586103cc463c0f96c296cd81fb35574a7
SHA14af5098476fda9f866309d1a75256d3a0d589a51
SHA256c203bc6a09ba5e9b6c272109f61a1a04d8531796a33e59015cc08bf2c07880fe
SHA512e3d3db3b896c100844ea1de50313b1244f1cf16e00196cf571a22245c6eeed3adcdf226dee0a4eeb122c0a7ce4d9c1259bab742fcede328933513563c8631adb
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Svg.dllFilesize
350KB
MD5e98e4d70d5bd9f743d71018177c8f347
SHA179969a1673a3baf7d218b56b095d64cea9ebc80b
SHA2561decbd3d2cb252e4fb23ec966b7bd5fdc63cc0b1c51f4537afc480fe4e0bb2c2
SHA5125c476f4c436e91b62e519d31d4f1a42c337da43233a610e6a86b5c8ff8814f949f8b5e5eafdc569f82eb4f96dd9f89adb15a4288d92127a059ba6008b544db80
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Svg.dllFilesize
350KB
MD5e98e4d70d5bd9f743d71018177c8f347
SHA179969a1673a3baf7d218b56b095d64cea9ebc80b
SHA2561decbd3d2cb252e4fb23ec966b7bd5fdc63cc0b1c51f4537afc480fe4e0bb2c2
SHA5125c476f4c436e91b62e519d31d4f1a42c337da43233a610e6a86b5c8ff8814f949f8b5e5eafdc569f82eb4f96dd9f89adb15a4288d92127a059ba6008b544db80
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Svg.dllFilesize
350KB
MD5e98e4d70d5bd9f743d71018177c8f347
SHA179969a1673a3baf7d218b56b095d64cea9ebc80b
SHA2561decbd3d2cb252e4fb23ec966b7bd5fdc63cc0b1c51f4537afc480fe4e0bb2c2
SHA5125c476f4c436e91b62e519d31d4f1a42c337da43233a610e6a86b5c8ff8814f949f8b5e5eafdc569f82eb4f96dd9f89adb15a4288d92127a059ba6008b544db80
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Widgets.dllFilesize
5.8MB
MD5fdc4fc0eaa7a6cfc8712a1c65f7592ad
SHA1f43f709d373a70f3b3a895d08114f0dcdab79db0
SHA25631336c26f42b274187dc473da01e4e1c1f0f2a6250313eb4822656d94b420264
SHA51225cc93a6eac7a73fdeaa61ee874fd5f1998a8574255ecb57bbef8d72743eee47862468d714117f62493431e49720951c2fc00988f6a9888687f8425d73599094
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Widgets.dllFilesize
5.8MB
MD5fdc4fc0eaa7a6cfc8712a1c65f7592ad
SHA1f43f709d373a70f3b3a895d08114f0dcdab79db0
SHA25631336c26f42b274187dc473da01e4e1c1f0f2a6250313eb4822656d94b420264
SHA51225cc93a6eac7a73fdeaa61ee874fd5f1998a8574255ecb57bbef8d72743eee47862468d714117f62493431e49720951c2fc00988f6a9888687f8425d73599094
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Widgets.dllFilesize
5.8MB
MD5fdc4fc0eaa7a6cfc8712a1c65f7592ad
SHA1f43f709d373a70f3b3a895d08114f0dcdab79db0
SHA25631336c26f42b274187dc473da01e4e1c1f0f2a6250313eb4822656d94b420264
SHA51225cc93a6eac7a73fdeaa61ee874fd5f1998a8574255ecb57bbef8d72743eee47862468d714117f62493431e49720951c2fc00988f6a9888687f8425d73599094
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Xml.dllFilesize
133KB
MD55fceb2eaac6f25a75108a7a9ce8b57b6
SHA1a31fec965e023b73764e2fce92ad9093ed6f7d65
SHA2562d623a1fb8901ecc24107be17636c76f41607192b411b4e57bcdbae6ca515a1a
SHA51249bc1c81a8e634c51d4303c6d28bab774391e74ce96af51e7a14b06767ff0d40594cdd7f72e01c1025b80dba1b28597fef53c6d80fea2c434ef636db2a57d161
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Xml.dllFilesize
133KB
MD55fceb2eaac6f25a75108a7a9ce8b57b6
SHA1a31fec965e023b73764e2fce92ad9093ed6f7d65
SHA2562d623a1fb8901ecc24107be17636c76f41607192b411b4e57bcdbae6ca515a1a
SHA51249bc1c81a8e634c51d4303c6d28bab774391e74ce96af51e7a14b06767ff0d40594cdd7f72e01c1025b80dba1b28597fef53c6d80fea2c434ef636db2a57d161
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\Qt6Xml.dllFilesize
133KB
MD55fceb2eaac6f25a75108a7a9ce8b57b6
SHA1a31fec965e023b73764e2fce92ad9093ed6f7d65
SHA2562d623a1fb8901ecc24107be17636c76f41607192b411b4e57bcdbae6ca515a1a
SHA51249bc1c81a8e634c51d4303c6d28bab774391e74ce96af51e7a14b06767ff0d40594cdd7f72e01c1025b80dba1b28597fef53c6d80fea2c434ef636db2a57d161
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\iconengines\qsvgicon.dllFilesize
63KB
MD5dcb4d3f7d20a7ac5d1abe2bbf642409f
SHA14affe079dba43d280a04c9c522a5cfab75e52a15
SHA256c80ad0e9a105fd610aedcd2d6f8edeb249e2874c683cf0c97a47e3cc24762b91
SHA512ac3853a81bac87cea8fbdaf78667f8a5597727f7d6b1c9735eaa0cb414acfdb5f8c8bb7f31095838463a32ad06b2dfe965f3679ae0dd879f96429fbaebf333ee
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\iconengines\qsvgicon.dllFilesize
63KB
MD5dcb4d3f7d20a7ac5d1abe2bbf642409f
SHA14affe079dba43d280a04c9c522a5cfab75e52a15
SHA256c80ad0e9a105fd610aedcd2d6f8edeb249e2874c683cf0c97a47e3cc24762b91
SHA512ac3853a81bac87cea8fbdaf78667f8a5597727f7d6b1c9735eaa0cb414acfdb5f8c8bb7f31095838463a32ad06b2dfe965f3679ae0dd879f96429fbaebf333ee
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\iconengines\qsvgicon.dllFilesize
63KB
MD5dcb4d3f7d20a7ac5d1abe2bbf642409f
SHA14affe079dba43d280a04c9c522a5cfab75e52a15
SHA256c80ad0e9a105fd610aedcd2d6f8edeb249e2874c683cf0c97a47e3cc24762b91
SHA512ac3853a81bac87cea8fbdaf78667f8a5597727f7d6b1c9735eaa0cb414acfdb5f8c8bb7f31095838463a32ad06b2dfe965f3679ae0dd879f96429fbaebf333ee
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\jars\JavaCheck.jarFilesize
1KB
MD5ebca95af1795431d077af0eefe59a7fe
SHA1d108b038abd93342c4a4ff656e7cb9b66ac26b53
SHA2563030eb718cb2d7edc68d426d46f21e1af2a2cdd5443de5dfc5020650b52e7601
SHA51282db76377acecec4b1b012f1ba83fe234bbc33f2d6b8c9ad97c9631a3df989d64fa0cb111e8db59af5114d620921e4ece38303091c72cc6bdf0226f935822319
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\platforms\qdirect2d.dllFilesize
883KB
MD52dc372bec7d15f0e0e6e45930865a7c0
SHA1cf70323914d0f246c3953855dbe2e8a5ff51e4fc
SHA2561fbfa3632fd292ccb3ab72566d934dfafc3d99308115c60ff7441aa5e905cd84
SHA512d313178dc461f401ad849f2ee5c2b103e81d62742105df89170bf3ec8da100da704515bd668c93617083880a0915e1b2a0e76ed8aff6a6516be705e18932406e
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\platforms\qwindows.dllFilesize
811KB
MD5c375f728acfcce8456b3bda4c5837976
SHA17de1c3476c043a58c41428b7f838cc6ab2017857
SHA256a3bd204581461478282555b3c46b13c8d6779469a1b209b45765dbc7947a564a
SHA512b739588b0adbf1e3f107709953bf68660fe7f33c9fc8d7fbf5d738483e5eca3076de92574789e21e858bd70a3f1bd1c108ca754fed08046185949a85ef38cb2a
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\platforms\qwindows.dllFilesize
811KB
MD5c375f728acfcce8456b3bda4c5837976
SHA17de1c3476c043a58c41428b7f838cc6ab2017857
SHA256a3bd204581461478282555b3c46b13c8d6779469a1b209b45765dbc7947a564a
SHA512b739588b0adbf1e3f107709953bf68660fe7f33c9fc8d7fbf5d738483e5eca3076de92574789e21e858bd70a3f1bd1c108ca754fed08046185949a85ef38cb2a
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\platforms\qwindows.dllFilesize
811KB
MD5c375f728acfcce8456b3bda4c5837976
SHA17de1c3476c043a58c41428b7f838cc6ab2017857
SHA256a3bd204581461478282555b3c46b13c8d6779469a1b209b45765dbc7947a564a
SHA512b739588b0adbf1e3f107709953bf68660fe7f33c9fc8d7fbf5d738483e5eca3076de92574789e21e858bd70a3f1bd1c108ca754fed08046185949a85ef38cb2a
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\prismlauncher.exeFilesize
7.7MB
MD56eee4fe0679ff858adfd4de9b3bb1892
SHA1c536cfb7d4025cc4971389e9bddc3bfb06920ab4
SHA256071d3b45a03c20867cc2bf1f8d4576cd8bfb76655531a09a296229d8b32a285b
SHA5122a24a94a5ca4b93d964de894847a270af094fe7ff6d28d3ee7b3d947fd956706a8a69057f5d0af743024d8eb14f0e04ef8e3116128ccace5a09bcb99867fe32e
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\prismlauncher.exeFilesize
7.7MB
MD56eee4fe0679ff858adfd4de9b3bb1892
SHA1c536cfb7d4025cc4971389e9bddc3bfb06920ab4
SHA256071d3b45a03c20867cc2bf1f8d4576cd8bfb76655531a09a296229d8b32a285b
SHA5122a24a94a5ca4b93d964de894847a270af094fe7ff6d28d3ee7b3d947fd956706a8a69057f5d0af743024d8eb14f0e04ef8e3116128ccace5a09bcb99867fe32e
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\prismlauncher.exeFilesize
7.7MB
MD56eee4fe0679ff858adfd4de9b3bb1892
SHA1c536cfb7d4025cc4971389e9bddc3bfb06920ab4
SHA256071d3b45a03c20867cc2bf1f8d4576cd8bfb76655531a09a296229d8b32a285b
SHA5122a24a94a5ca4b93d964de894847a270af094fe7ff6d28d3ee7b3d947fd956706a8a69057f5d0af743024d8eb14f0e04ef8e3116128ccace5a09bcb99867fe32e
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\prismlauncher.exeFilesize
7.7MB
MD56eee4fe0679ff858adfd4de9b3bb1892
SHA1c536cfb7d4025cc4971389e9bddc3bfb06920ab4
SHA256071d3b45a03c20867cc2bf1f8d4576cd8bfb76655531a09a296229d8b32a285b
SHA5122a24a94a5ca4b93d964de894847a270af094fe7ff6d28d3ee7b3d947fd956706a8a69057f5d0af743024d8eb14f0e04ef8e3116128ccace5a09bcb99867fe32e
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\qt.confFilesize
1B
MD57215ee9c7d9dc229d2921a40e899ec5f
SHA1b858cb282617fb0956d960215c8e84d1ccf909c6
SHA25636a9e7f1c95b82ffb99743e0c5c4ce95d83c9a430aac59f84ef3cbfab6145068
SHA512f90ddd77e400dfe6a3fcf479b00b1ee29e7015c5bb8cd70f5f15b4886cc339275ff553fc8a053f8ddc7324f45168cffaf81f8c3ac93996f6536eef38e5e40768
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\styles\qwindowsvistastyle.dllFilesize
150KB
MD5b1e8f9b4f67602d2af400f97123cd67e
SHA1fb84d95ac7629dee1ab6a6235aa10f0033d606fc
SHA2561e826a5e7dc86022a17f72980f9c9eadb0b6fb439cda43e4af5a1d3b208e91eb
SHA51260cc251e076498396d84ffc9a3e0c742bf241d8be877a090e336f2ee7d8d96aaeda8b7527139ec7e0f523e25ab675269925484a145e8caeb9c6d92ea6f75b4fb
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\styles\qwindowsvistastyle.dllFilesize
150KB
MD5b1e8f9b4f67602d2af400f97123cd67e
SHA1fb84d95ac7629dee1ab6a6235aa10f0033d606fc
SHA2561e826a5e7dc86022a17f72980f9c9eadb0b6fb439cda43e4af5a1d3b208e91eb
SHA51260cc251e076498396d84ffc9a3e0c742bf241d8be877a090e336f2ee7d8d96aaeda8b7527139ec7e0f523e25ab675269925484a145e8caeb9c6d92ea6f75b4fb
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\styles\qwindowsvistastyle.dllFilesize
150KB
MD5b1e8f9b4f67602d2af400f97123cd67e
SHA1fb84d95ac7629dee1ab6a6235aa10f0033d606fc
SHA2561e826a5e7dc86022a17f72980f9c9eadb0b6fb439cda43e4af5a1d3b208e91eb
SHA51260cc251e076498396d84ffc9a3e0c742bf241d8be877a090e336f2ee7d8d96aaeda8b7527139ec7e0f523e25ab675269925484a145e8caeb9c6d92ea6f75b4fb
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\tls\qschannelbackend.dllFilesize
213KB
MD54c28ee5e48080b3c3a5ba7f23cd00f60
SHA11416663464ddc4e85f993759683fcc6e6c3652f3
SHA256cd3c48a739d9ffa9e5a4568e023c64c51aecc55777ab41b5a9ef4d6e19b644f9
SHA5129c2c786f6db9b40d958086f25a579dbe5a0292a19ada6847db6138e43a0f493cb228fc2ee61527deed87197fa3e647e22d65818adda7f8566d64eb27c76d2b2f
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\tls\qschannelbackend.dllFilesize
213KB
MD54c28ee5e48080b3c3a5ba7f23cd00f60
SHA11416663464ddc4e85f993759683fcc6e6c3652f3
SHA256cd3c48a739d9ffa9e5a4568e023c64c51aecc55777ab41b5a9ef4d6e19b644f9
SHA5129c2c786f6db9b40d958086f25a579dbe5a0292a19ada6847db6138e43a0f493cb228fc2ee61527deed87197fa3e647e22d65818adda7f8566d64eb27c76d2b2f
-
C:\Users\Admin\AppData\Local\Programs\PrismLauncher\tls\qschannelbackend.dllFilesize
213KB
MD54c28ee5e48080b3c3a5ba7f23cd00f60
SHA11416663464ddc4e85f993759683fcc6e6c3652f3
SHA256cd3c48a739d9ffa9e5a4568e023c64c51aecc55777ab41b5a9ef4d6e19b644f9
SHA5129c2c786f6db9b40d958086f25a579dbe5a0292a19ada6847db6138e43a0f493cb228fc2ee61527deed87197fa3e647e22d65818adda7f8566d64eb27c76d2b2f
-
C:\Users\Admin\AppData\Local\Temp\jds241037671.tmp\JavaSetup8u361.exeFilesize
1.9MB
MD5442dcacd62016db76c61af770301626f
SHA11ef7a54bb0fb6395b271d88e4d87e7ac3b76e58a
SHA2568aa49738b3efd4a2e2b3d71991c209db46e082e1739de43147041f9af2a7fff7
SHA5123c21efe1f3422107bddc48d0edd842924dfdf6682b1e81ace83aa992ba49e224d45fd0fc6a73be9de6806effe71d8a1908f550c8b1cf520df4972c252b721bf9
-
C:\Users\Admin\AppData\Local\Temp\jusched.logFilesize
267KB
MD5aac52152cd3cf8e4acbc9f09e73b2676
SHA1dfb3a67792606a82fa6827eeb0d5e0e14f578438
SHA2568ba2aa8160c2124a342ffcfd9f04c7351c262b373cf36a571dc0c4cb91a8464b
SHA5120432330154e420268e32177d0cc2cedfade34083145860535b7d9b86c5c33e048f0b0f302f1cbadf25789959d96b270677363917eb650c0cb190c7b96b4ef7f3
-
C:\Users\Admin\AppData\Local\Temp\nshB3A6.tmp\System.dllFilesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
C:\Users\Admin\AppData\Local\Temp\nshB3A6.tmp\System.dllFilesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
C:\Users\Admin\AppData\Local\Temp\nshB3A6.tmp\modern-wizard.bmpFilesize
25KB
MD5cbe40fd2b1ec96daedc65da172d90022
SHA1366c216220aa4329dff6c485fd0e9b0f4f0a7944
SHA2563ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2
SHA51262990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63
-
C:\Users\Admin\AppData\Local\Temp\nshB3A6.tmp\nsDialogs.dllFilesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
C:\Users\Admin\AppData\Local\Temp\nshB3A6.tmp\nsDialogs.dllFilesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
C:\Users\Admin\AppData\Local\Temp\nshB3A6.tmp\nsExec.dllFilesize
7KB
MD5675c4948e1efc929edcabfe67148eddd
SHA1f5bdd2c4329ed2732ecfe3423c3cc482606eb28e
SHA2561076ca39c449ed1a968021b76ef31f22a5692dfafeea29460e8d970a63c59906
SHA51261737021f86f54279d0a4e35db0d0808e9a55d89784a31d597f2e4b65b7bbeec99aa6c79d65258259130eeda2e5b2820f4f1247777a3010f2dc53e30c612a683
-
C:\Users\Admin\AppData\Local\Temp\nshB3A6.tmp\nsExec.dllFilesize
7KB
MD5675c4948e1efc929edcabfe67148eddd
SHA1f5bdd2c4329ed2732ecfe3423c3cc482606eb28e
SHA2561076ca39c449ed1a968021b76ef31f22a5692dfafeea29460e8d970a63c59906
SHA51261737021f86f54279d0a4e35db0d0808e9a55d89784a31d597f2e4b65b7bbeec99aa6c79d65258259130eeda2e5b2820f4f1247777a3010f2dc53e30c612a683
-
C:\Users\Admin\AppData\Roaming\PrismLauncher\PrismLauncher-0.logFilesize
61KB
MD56da7ad33c286110bceb8de47b1607de3
SHA1e74d9449e8fcde1012fc8414c4965ea1d9c9a180
SHA256692252ea2173938a792461e76c66b8e289fd278429b23b3dd29c65e862c18f75
SHA512780a6ddd488a4588936126e9f5ce0d9a98fbabeb12c674bcaef42b22705dc20bd31607fd0b43673e0b28473bac550947a16af1d6f03de35a409d072b07490dcf
-
C:\Users\Admin\AppData\Roaming\PrismLauncher\metacacheFilesize
426B
MD50754d1a929d1e5783ddc0425356ca1ae
SHA1f63a2428dff01ed4ddb75db890de1c28c0bd16bc
SHA2569c8835141f3e942252a2f2f1b15af6abd0b23f6d4e098dc4d27b3b36bcf7ed36
SHA51255a59e971a4f2abbd290c4aa9c860b58902931793f81a2c5d4885f8c91818eb85c5757f8ad1877b1b7108734e54b6e9908b0b06f2ae3eb1b62917555b5c8adc6
-
C:\Users\Admin\AppData\Roaming\PrismLauncher\prismlauncher.cfgFilesize
22B
MD51b2b01b0214b9ab0033df479f20abc8f
SHA1e1b576a802a75ced79fb0d8e6ddd82214e4b5778
SHA256e62cd3bc1a8af2490909eed24f5c484b624711b070b0622afffdf8196dfe5764
SHA512fa5c05cf9d03594b3a51e5d8fbc90728de704d4bf8b8d9d93c7542c444c0c08ddf24badad8b3df559170733326716d59f71d7384397b5d7a705e3f32cfc73850
-
C:\Users\Admin\AppData\Roaming\PrismLauncher\translations\index_v2.jsonFilesize
18KB
MD56b17959bd4cf2d7e2014f8402697e492
SHA1b6bbb6fe3f9578939359b5064496af8dc216985c
SHA256223d891646bfdfbc1fa32bbb9b979d1fc017999e1e524adc42beed563c9d812b
SHA512d1a4fa04c2cc97df39a9b727540618600145d35c377f1e1b9b2e8960ff72c524a669df5422a9f983c0c1ff6ae7ebbd69e34fac01c53593ae109c0be2d066ac57
-
C:\Users\Admin\AppData\Roaming\PrismLauncher\translations\index_v2.jsonFilesize
18KB
MD56b17959bd4cf2d7e2014f8402697e492
SHA1b6bbb6fe3f9578939359b5064496af8dc216985c
SHA256223d891646bfdfbc1fa32bbb9b979d1fc017999e1e524adc42beed563c9d812b
SHA512d1a4fa04c2cc97df39a9b727540618600145d35c377f1e1b9b2e8960ff72c524a669df5422a9f983c0c1ff6ae7ebbd69e34fac01c53593ae109c0be2d066ac57
-
C:\Users\Admin\AppData\Roaming\PrismLauncher\translations\mmc_es.qmFilesize
225KB
MD590d7a2d7f59881a775b51982249c7a27
SHA1b07e27075d202a2f6a98ae5fd4fbc72bdd21b252
SHA256d6339ad98398d1217fae5209640c0c1a4d25edbe56f26450c4f952fc7539f379
SHA5124ae109f5feac869cf3c536504bc67aff9837efe7ab4f53cd83db4d62913e1e521e2a285d5e2ee584838ee9834a02d5b61f2c6f0c63d190f385f7542f97d8159f
-
C:\Users\Admin\AppData\Roaming\PrismLauncher\translations\mmc_es.qm.XNVyinFilesize
225KB
MD590d7a2d7f59881a775b51982249c7a27
SHA1b07e27075d202a2f6a98ae5fd4fbc72bdd21b252
SHA256d6339ad98398d1217fae5209640c0c1a4d25edbe56f26450c4f952fc7539f379
SHA5124ae109f5feac869cf3c536504bc67aff9837efe7ab4f53cd83db4d62913e1e521e2a285d5e2ee584838ee9834a02d5b61f2c6f0c63d190f385f7542f97d8159f
-
C:\Users\Admin\Downloads\Unconfirmed 862787.crdownloadFilesize
2.2MB
MD5d3809baddaf7b1e7d94484160043328b
SHA1e1979f5248d3b20858b11386ce22b1ccb0a9bfb5
SHA256e28f198ca200445ab45dd4e94d49993ad1a9a21548908ca9c09ade6419c2e079
SHA51296350ef6c81a1bc7d3c6b29c2a66ffaa1cf4f86172d3f52d39bcbf3886da41208b75cfe16bbf4ea23e04b2e0616637083eeacdefb8c0edc3ce6d0f2f89f881c6
-
C:\Windows\Installer\MSI30B.tmpFilesize
198KB
MD5c7018628101e1bb69437b4ab2f6b7465
SHA1e185b2a7685490f74e11e794bf8e54bd9b21e295
SHA2568c33499755edda822c1ed58354f0353134707f143ea0290758510781e515c8d8
SHA512374f90ca6ae78e784967f314715cd282ea49332de1c1a59b3ed27389799f84eaae8ed9950a0b67ccc383c1ff872984114c2d43538cc39b50e9646e958dbf95f4
-
C:\Windows\Installer\MSIC73A.tmpFilesize
602KB
MD5dbaf31f37c583df88814c6edbfe7f884
SHA1dc3b941933ebe79301b8a2949316c8bb47e27ccd
SHA25632ce5f4ea52b3c172a91df18d15bc75b57fc229ede28f408d13d74f50786eeca
SHA5126303a7bcb88819898cb170a872e10986889382053a91f369c2a77efd0c5970310ef0512ac3ed46d38004e4381c7e191943ff266d7d9a45694923462e869773cb
-
\??\pipe\crashpad_1176_NBHSMSVVKNQRGRVQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1640-1379-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB
-
memory/1640-1385-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB
-
memory/1640-1348-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB
-
memory/2072-313-0x0000000002750000-0x0000000002751000-memory.dmpFilesize
4KB
-
memory/2680-316-0x0000000001090000-0x0000000001091000-memory.dmpFilesize
4KB
-
memory/3368-310-0x0000000002F70000-0x0000000002F71000-memory.dmpFilesize
4KB
-
memory/3368-302-0x0000000002F70000-0x0000000002F71000-memory.dmpFilesize
4KB
-
memory/3368-291-0x0000000002F70000-0x0000000002F71000-memory.dmpFilesize
4KB
-
memory/4292-219-0x00007FF600E90000-0x00007FF601653000-memory.dmpFilesize
7.8MB
-
memory/4292-235-0x000001415C920000-0x000001415C930000-memory.dmpFilesize
64KB
-
memory/4292-218-0x00007FFD60DD0000-0x00007FFD61395000-memory.dmpFilesize
5.8MB
-
memory/4292-251-0x000001415C920000-0x000001415C930000-memory.dmpFilesize
64KB
-
memory/4292-312-0x000001415C920000-0x000001415C930000-memory.dmpFilesize
64KB
-
memory/4376-309-0x0000000000FB0000-0x0000000000FB1000-memory.dmpFilesize
4KB
-
memory/4376-301-0x0000000000FB0000-0x0000000000FB1000-memory.dmpFilesize
4KB
-
memory/4560-398-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-345-0x000001C053FC0000-0x000001C053FD0000-memory.dmpFilesize
64KB
-
memory/4560-1391-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-325-0x00007FF600E90000-0x00007FF601653000-memory.dmpFilesize
7.8MB
-
memory/4560-326-0x00007FFD603F0000-0x00007FFD609B5000-memory.dmpFilesize
5.8MB
-
memory/4560-337-0x000001C053FC0000-0x000001C053FD0000-memory.dmpFilesize
64KB
-
memory/4560-1340-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-409-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-396-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-1126-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-344-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-981-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-399-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-395-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-387-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-1538-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-1539-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-1679-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-1684-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-374-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-1740-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB
-
memory/4560-397-0x000001C0546D0000-0x000001C054E2D000-memory.dmpFilesize
7.4MB