Analysis
-
max time kernel
888s -
max time network
894s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 20:44
Static task
static1
Behavioral task
behavioral1
Sample
ESTE VIDEO NO TIENE FIN (quedarás atrapado!) #shorts.mp4
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ESTE VIDEO NO TIENE FIN (quedarás atrapado!) #shorts.mp4
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
ESTE VIDEO NO TIENE FIN (quedarás atrapado!) #shorts.mp4
Resource
win10v2004-20230221-en
General
-
Target
ESTE VIDEO NO TIENE FIN (quedarás atrapado!) #shorts.mp4
-
Size
2.4MB
-
MD5
4e43a22dfdaaca7f89d20aa8295f97c5
-
SHA1
4fc67fc04b0c6557de6f54dcb82696459823beb6
-
SHA256
e923e3b0bba03a5b3312ba55b67189d5f0b3cd0e940e526506724a40dc7fed93
-
SHA512
7a166616b0d99eed9ed30815ca084038e45f63b1da7cc7cbda40da3c0199c8955dc75169acfbb8d17ad0eed08053f64fe5bc2544a5a98056f0cfb3b15a46ce85
-
SSDEEP
49152:kPnnk/Ay4YuMkWLGxU8Ih1kaNF+M+BPPpkXOnGH72Iv8feRY7WMH:8nPYuWLZ8ITF+1PpkXOGHCIvwfW4
Malware Config
Signatures
-
Downloads MZ/PE file
-
Sets file execution options in registry 2 TTPs 14 IoCs
Processes:
MEMZ.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logonui.exe MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "rekt.exe" MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "rekt.exe" MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rekt.exe" MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "rekt.exe" MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "rekt.exe" MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shutdown.exe MEMZ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logonui.exe\Debugger = "rekt.exe" MEMZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shutdown.exe\Debugger = "rekt.exe" MEMZ.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
MEMZ.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Control Panel\International\Geo\Nation MEMZ.exe -
Executes dropped EXE 6 IoCs
Processes:
VineMEMZ-Original.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exepid process 4780 VineMEMZ-Original.exe 1520 MEMZ.exe 4400 MEMZ.exe 1356 MEMZ.exe 4136 MEMZ.exe 1612 MEMZ.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
unregmp2.exedescription ioc process File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\F: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
MEMZ.exedescription ioc process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
MEMZ.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\Data\\Pussy.png" MEMZ.exe -
Drops file in Windows directory 9 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeSecHealthUI.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeSecHealthUI.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\4272278488\3302449443.pri SecHealthUI.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\4272278488\3302449443.pri SecHealthUI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3340 4672 WerFault.exe SecHealthUI.exe 2072 4896 WerFault.exe SecHealthUI.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133244312151062731" chrome.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Rating Prompt Shown = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\wow.com\NumberOfSubdomain = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\LastClosedWidth = "800" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = f44760b6ff60d901 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\wow.com\Total = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$blogger MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000c6b30a41701b19306850786d736d6b9e6ee24ff6841f99fc3594491523b243084fe422f9dba94c063645e94753cc3baf43fac9f723e266a44fe3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Next Rating Prompt = 007fbaa23a77d901 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\yahoo.com\Total = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\Certificates\83DA05A9886F7658 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\SettingsVersion = "2" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 5c07999bff60d901 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\LastClosedHeight = "600" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\FileNames\ MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "25" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\yahoo.com\NumberOfSubdomains = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OpenSearch MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState\EdpCleanupState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\google.com MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exeMEMZ.exeMEMZ.exeMEMZ.exepid process 4360 chrome.exe 4360 chrome.exe 932 chrome.exe 932 chrome.exe 4400 MEMZ.exe 4400 MEMZ.exe 4136 MEMZ.exe 4136 MEMZ.exe 1356 MEMZ.exe 1356 MEMZ.exe 4136 MEMZ.exe 4136 MEMZ.exe 1356 MEMZ.exe 1356 MEMZ.exe 4400 MEMZ.exe 4400 MEMZ.exe 1356 MEMZ.exe 1356 MEMZ.exe 4136 MEMZ.exe 4136 MEMZ.exe 4400 MEMZ.exe 4400 MEMZ.exe 4136 MEMZ.exe 4136 MEMZ.exe 1356 MEMZ.exe 1356 MEMZ.exe 4400 MEMZ.exe 4400 MEMZ.exe 1356 MEMZ.exe 4136 MEMZ.exe 4136 MEMZ.exe 1356 MEMZ.exe 4400 MEMZ.exe 4400 MEMZ.exe 1356 MEMZ.exe 1356 MEMZ.exe 4136 MEMZ.exe 4136 MEMZ.exe 4136 MEMZ.exe 1356 MEMZ.exe 4136 MEMZ.exe 1356 MEMZ.exe 4400 MEMZ.exe 4400 MEMZ.exe 4400 MEMZ.exe 4136 MEMZ.exe 4400 MEMZ.exe 4136 MEMZ.exe 1356 MEMZ.exe 1356 MEMZ.exe 4136 MEMZ.exe 4136 MEMZ.exe 4400 MEMZ.exe 4400 MEMZ.exe 1356 MEMZ.exe 1356 MEMZ.exe 4400 MEMZ.exe 4136 MEMZ.exe 4136 MEMZ.exe 4400 MEMZ.exe 1356 MEMZ.exe 1356 MEMZ.exe 4400 MEMZ.exe 4400 MEMZ.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
MEMZ.exepid process 1612 MEMZ.exe -
Suspicious behavior: MapViewOfSection 12 IoCs
Processes:
MicrosoftEdgeCP.exepid process 4060 MicrosoftEdgeCP.exe 4060 MicrosoftEdgeCP.exe 4060 MicrosoftEdgeCP.exe 4060 MicrosoftEdgeCP.exe 4060 MicrosoftEdgeCP.exe 4060 MicrosoftEdgeCP.exe 4060 MicrosoftEdgeCP.exe 4060 MicrosoftEdgeCP.exe 4060 MicrosoftEdgeCP.exe 4060 MicrosoftEdgeCP.exe 4060 MicrosoftEdgeCP.exe 4060 MicrosoftEdgeCP.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
Processes:
chrome.exepid process 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
unregmp2.exechrome.exedescription pid process Token: SeShutdownPrivilege 4912 unregmp2.exe Token: SeCreatePagefilePrivilege 4912 unregmp2.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
Processes:
chrome.exeMEMZ.exepid process 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 1612 MEMZ.exe -
Suspicious use of SendNotifyMessage 25 IoCs
Processes:
chrome.exeMEMZ.exepid process 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 1612 MEMZ.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
VineMEMZ-Original.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeSecHealthUI.exeSecHealthUI.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 4780 VineMEMZ-Original.exe 1520 MEMZ.exe 4400 MEMZ.exe 1356 MEMZ.exe 4136 MEMZ.exe 1612 MEMZ.exe 4672 SecHealthUI.exe 4896 SecHealthUI.exe 3436 MicrosoftEdge.exe 4060 MicrosoftEdgeCP.exe 4060 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
wmplayer.exeunregmp2.exechrome.exedescription pid process target process PID 4052 wrote to memory of 4488 4052 wmplayer.exe setup_wm.exe PID 4052 wrote to memory of 4488 4052 wmplayer.exe setup_wm.exe PID 4052 wrote to memory of 4488 4052 wmplayer.exe setup_wm.exe PID 4052 wrote to memory of 4556 4052 wmplayer.exe unregmp2.exe PID 4052 wrote to memory of 4556 4052 wmplayer.exe unregmp2.exe PID 4052 wrote to memory of 4556 4052 wmplayer.exe unregmp2.exe PID 4556 wrote to memory of 4912 4556 unregmp2.exe unregmp2.exe PID 4556 wrote to memory of 4912 4556 unregmp2.exe unregmp2.exe PID 4360 wrote to memory of 4464 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4464 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 3844 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4956 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4956 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4508 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4508 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4508 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4508 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4508 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4508 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4508 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4508 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4508 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4508 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4508 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4508 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4508 4360 chrome.exe chrome.exe PID 4360 wrote to memory of 4508 4360 chrome.exe chrome.exe
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\ESTE VIDEO NO TIENE FIN (quedarás atrapado!) #shorts.mp4"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\ESTE VIDEO NO TIENE FIN (quedarás atrapado!) #shorts.mp4"2⤵
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9e2f19758,0x7ff9e2f19768,0x7ff9e2f197782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1824 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4332 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4692 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4556 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4916 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x24c,0x250,0x254,0x228,0x258,0x7ff678937688,0x7ff678937698,0x7ff6789376a83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5116 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2440 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3576 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3020 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4412 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=3248 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4904 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3692 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2972 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=4472 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=4548 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=5288 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=2968 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=5468 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2308 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=3064 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=5624 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=5084 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=5552 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=5676 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2436 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3568 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3704 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2972 --field-trial-handle=1780,i,5264389837523432118,18123381542577796787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Downloads\VineMEMZ-Original.exe"C:\Users\Admin\Downloads\VineMEMZ-Original.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe/watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe/watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe/watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe/main3⤵
- Sets file execution options in registry
- Checks computer location settings
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Sets desktop wallpaper using registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt4⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3e01⤵
-
C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe"C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe" -ServerName:SecHealthUI.AppXep4x2tbtjws1v9qqs0rmb3hxykvkpqtn.mca1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4672 -s 16682⤵
- Program crash
-
C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe"C:\Windows\SystemApps\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy\SecHealthUI.exe" -ServerName:SecHealthUI.AppXep4x2tbtjws1v9qqs0rmb3hxykvkpqtn.mca1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4896 -s 16802⤵
- Program crash
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000007Filesize
162KB
MD54043af37a3392a9db521ff9ab62d9608
SHA183828688e7a2259ed2f77345851a16122383b422
SHA256ee076822f35390ee382cda71759a2eec8f4db2bc18e4e3acd586173c29dab321
SHA51297a9d37ec02796cbca922559f384e1632c249d9955022578c14e046f2bfd9f84db113cf55899cfcf63fd318fbee050f483d04ae3156220ff2f0d364f989e680a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000bFilesize
20KB
MD5923a543cc619ea568f91b723d9fb1ef0
SHA16f4ade25559645c741d7327c6e16521e43d7e1f9
SHA256bf7344209edb1be5a2886c425cf6334a102d76cbea1471fd50171e2ee92877cd
SHA512a4153751761cd67465374828b0514d7773b8c4ed37779d1ecfd4f19be4faa171585c8ee0b4db59b556399d5d2b9809ba87e04d4715e9d090e1f488d02219d555
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000dFilesize
292KB
MD525ba274f3fff99cd61375d4fd70f904d
SHA1485055b2abd1ccc03aa46452df3c6f3dd21d51fe
SHA256fe9f03b9a07969bcb99b5c361366e8b7816ea9f58b45c0400ff672325437d221
SHA51241285b0d432fcca27a2fa48999c30b05cd8566dc09e1306fcc901a2feaa8d9dff4a07932f7811c589d3c28fff9aece3d3cacefac8b6311c28bb484af5a528956
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000eFilesize
63KB
MD538a059fbc080b07299425dbd6c9a0de7
SHA1d20df74f0fb27f3154324147960a848988bd570d
SHA2566a0192e4a39c3b7445105aacbca7ab692f39ea8f848c183ee9464b8cdc70d1bd
SHA512dd15c47ee780d9bd7e4b6459d411a259f55e65f805a7e40d9b1473a491740d7fa7d99e276266cbd1987c6583c70fb1ba2c673eb81aecaae07d7026ab72ef64f8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000011Filesize
37KB
MD547ae9b25af86702d77c7895ac6f6b57c
SHA1f56f78729b99247a975620a1103cac3ee9f313a5
SHA2569bde79a1b0866f68d6baa43f920e971b5feb35a8e0af7ffadc114366f8538224
SHA51272b5296e3dd1c5b4c42d8c3e4a56693819779167b9f02bc2d5f5a626b519a9cf10bee59846d614c929c42094b65d13039f6024f6cb1c023e740969aaefd060c4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000012Filesize
68KB
MD5514babe5b21a5f39e18375d75baa3f6d
SHA1a7fc20859c7509732eae6314b4b187d864ddb237
SHA256219f1313f7a718a5279e8e4aa1d8a471c030c56c3e98d38a2c6bbc0780be06b3
SHA51234208a09b1729374cb6392d68acdaf6536b667502f597a8c4bcea04238876085ca4227f45927bef55732d7cfcdd1aabfd6a1613fe44ce2df40a6fc9fa749c78d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000015Filesize
208KB
MD5b6fb6e0bf79d6a18d22297c591741b01
SHA185a7e3f2c824ab8856488acd51acfd25c5f674f0
SHA2567cdb592d734a8ca8b1620d3e2a40194f607cbcb294bcfa2405da142217199ac3
SHA51296c5446e04e656ffe17a384315c8fa721d47816383c1ed42a6773afc35ca7a344d46e1eef879d36200760ed7f799b6ea3376c5c47a410ef5ae4cb972dc2bbd9c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000017Filesize
402KB
MD559d5443f2514bc1d0b4c474a443e8e0a
SHA1768e74ca95ae08348b46dcaee4b3de588506e21b
SHA2568b2d7b31a3a4a9f208a3668e96417eac5633f984a875fef9014b820cb7f3baf5
SHA512cbb1ab8836f2f71a2305d7b76179779673f516faa61a8e1069933c1edf70886446c6b33fe929d0c3fc23ec9dbaa91b71dbdf297caee4bf8fdc6d944ca106cf38
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000018Filesize
61KB
MD511d1b2c0f58efde16b1e8b536038d2f1
SHA1316955db875fa89d0896b7794ec63ffb7e928459
SHA2565ceb6dcf079ab772724441e3543f9dd8a4d439bc5be8421fe6c7c03cdb94486a
SHA512220b2f950bcb8b5325cad93edf3923a418b7655699f4cc72d9701b709a8a8e11682510ee2f2bf6f0ac507cbb707a772d687fcd6d2a5df360c1a53717663b7b21
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000019Filesize
50KB
MD57c25eccc08c604818f2ad949bbd64d03
SHA1f798ffc2e47c6c816b6407df3be703e26daeb167
SHA2564065467e0796055cdb19ba98e01666d967e99df14316fe190edc613c9f2bae71
SHA51299d95a658e9cb66eb237fa78b0053e2403b903b5ae785d3b4ee840fe4a3696c22a707a6d7b3ab86fe2bbb7b3e34942f95db773e4cefd32fea224c8c559253274
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001aFilesize
107KB
MD58fddc97d131bf74e054fe861dd45b637
SHA13f7d1c5e6d69c89847cfce5bee89fce548e86290
SHA25616f04e220c0e897266f178aa92486e6b3d53e6b76bcd11f820d71b564340f702
SHA512b0bad48327781a0a6ca4786bb463bccc7c0c9882ec9b2eddbba3730fbf377f760f788db721fb6a7b928cd2ed94eb965522a387d72914c27400bf16e70bd456ab
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001bFilesize
611KB
MD5b184139ce34469a5ec45b250b44646d6
SHA1de45e59516e6170cd38f4e3b386f30e7ebdc14ef
SHA256ac738b8f617b74220e663f7a6d4715b00ed3fc49ce181c790ddc56a128896622
SHA512622c186ecc4525b89a1aff9dd4f91e2ec9d23911f19183c01f599e39ea62111cdd5c5954d5874e3f61360d29890219db86c85e56c625d6240c603737cfaa717b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001cFilesize
35KB
MD56ddcb89c6fc52a615868ad112aa18372
SHA15873ff26339e766787790e041aa618dce9b7c82d
SHA2562933c0390c29d782cff2f0307e42db3cda6295d338030fbdf4d261fa95d1e0bb
SHA5123c12b78fa1854791d081964b5dc92932bc646aacadb5319adbbbbe7f5ca432c2b65c232c2ce40f9511e32df7eb3d3fc4c1a61cedc424c070781d7c3a8bb8ac7a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001dFilesize
103KB
MD5c8e0835b150f48784cd7115da168a25c
SHA1d93ca69a458cd5d09337842da083ba687a6a6707
SHA25680143f99fc193b524a510451ca25c591b225f782071bbb4de5ac10b3a86a22d2
SHA512e57459fc4339479d16ee602718103c90b842916ec3caed2263bab72cd93364191179cfe46ee9bf00ef6d8acfe342ce9307eb26bed42d649458aecbfaef2ab891
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001eFilesize
74KB
MD5879d19f0a7988d7713e19a45dd6c005b
SHA1636189dde3c690ed2df380f18ac9d9e1845dddec
SHA256593ec3d4e6be754fdf66f20e9641b5585ea1e257d6dd43b5f29f3641566d0dfd
SHA5121c6d467c103eacc576d37b3d6d6071b04d42e4244393395dbba6634450ea10238bfab21c5034179c9c765e63d1ed7bf420350f4102c8b1ac8649b83db5ace248
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00001fFilesize
148KB
MD52e62067afb9be3c763be7a277a2ca84f
SHA1c12b437fc1cd16bd16857cde558a028086f0d5a8
SHA2563a7e4baeface7bbd63a6b459e1d7667bbba414f4122c151e59e91c043d6b5dc5
SHA5127072f10b517783f3f8e186b2c8872dad955753364e585c081c34f35c1b137a4414d7c0863806045a8e00d0246fa060cab3711e169ce5235459c56adea04816aa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000020Filesize
202KB
MD5be3e20ae43510f255fcf41054fa4f58e
SHA1c733620a4cbfcc8b09fc1cb9eb9673d84db9ddba
SHA25600d00f0d18afa11dd271245ba1cb4ab4c666e621462278f6d6e913a0d2d48159
SHA5120634375f56a77bd3dcc7c58a5fc87cad6b211e91345fc2f70bd9a523c9701981df2a13227ea1f4279add3acdb6fbeb61c5e074433cf98bd9be72bcbeacd1ebd3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000022Filesize
24KB
MD50a0199538506b60474361d036bfee31b
SHA1d9d3bf9efb57a2f730a48aea1d9f394ad5f3f582
SHA256f96dc9b988e9a95147a81aee5f368df4e8ab1aed3905981e302dc7278f1b6fca
SHA51237a4e99f84c091901dc99c367053c666f25ad848301c45c91ba972c317f82a9900d577fbd313b0069ea95e5f52ee3f947f3d93215072cff781c4419eef67fc2e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00002bFilesize
44KB
MD54fbbf22f7c282962ddf375053c5cc23e
SHA1940ff57a8da4b32e8383236dd49b0298a3226b37
SHA256f8e68bb37b25f8e41bfa51d72050ae6f4a9ebb9664da7f150fa1ba81c94d8c4b
SHA512f6603de2b7796268ae334d47fcad63cbb10e9528c4e41d9522a8a9129ec72838f58efe21808aa09dead2a949d34edd98423dc86b6e975f1b8d4a59277ac7b7f4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00002cFilesize
36KB
MD54f584941643227707fda008dec37c6c1
SHA110cf8b1d3f7ba0483f80a8acc0d0dcef93123fa2
SHA2564b799fd2818bf5342bfe0866f444973ecfbb9e3fef5c74bb5100d5d05610d0a6
SHA512c8bdddad550f86444e676aeb50b0db80872a0cb36631b90ddb771258b15ac9b4aea0c42026d5d3c90d4394f8c088c9c086b40be80b49ff2228c576ef7bbeda57
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00002dFilesize
31KB
MD5f08cfb897d03774f4e35c6506153ebc4
SHA1e17bc86caaff4936a6d306df45c96e7665bbd053
SHA25602ac723267d4c3832462a97e96984b6ed12bc25fe668ccfe0dc5b4549d6d87f0
SHA512f7df609e7e0175aa0f2e20a8ea5459bea77bf002ccadb35fd3ef22fa6a9e04254f3dbd2e50cdd9572edb89e5c2ea12284d0150253b45266b6bb074113a728a06
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00002fFilesize
16KB
MD523607149ede688319bed9d4b4a519ec2
SHA1d5760abf4b46395b9aabef6b316467770169ef69
SHA256359bc28f70f359efd5f3358800d379ad74ca8d59a334a11fb35408178544d356
SHA51252d096e2e75256de6335e18b448cca7f4dcedb568daea70dec57df9c7ebe7049578c3dde5553265d9f962bd5a79cbb8ba55631f9f8367381bc92aa3af9ae7f7e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000030Filesize
19KB
MD539b3153aec1389748d7aea7b1ecbffd4
SHA1f9840264c67a5d7db64b4beb7f3adab18bf4171f
SHA256dcfe833b312be0b1af66e043b3e165f399a70c435200d0bca4f7cd95d7999531
SHA51272aa2325b03f7f0ceab345cb300b672382cfeb6b10d1cacaf98d8c9704ce4993d14538fef5d0691e10e95562246d6de6d82c73781a120f7d19e9a1ff201c867e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000031Filesize
61KB
MD5f6c9d08dacfdb80be77bb17fdb659628
SHA1478d547206e682179243304a88aded3175c0df07
SHA256bb08c4b7fdc1136d8e3190b434d6a843ce49ef4f28bfa6021b5f11f1117f9bb9
SHA5127b18c0dfd30b3cee6cb078938e2a128eba681bd7c1b99fd1ca0a566e4f29e6a66029df7687f20fba5728a93facbad51e66231ca4c6687f44a1f161760c804ff6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\03e72cd679a9ac88_0Filesize
235KB
MD5e2f854d038413d6db923a580659a6a97
SHA178df2b85d45dbea9b1619a76275c7d62fe217201
SHA256dc29ca5e9603f17a988191a87f1cebe24add9df3e987e62773668cf49b0fdca3
SHA51224dc5d0b301c82a64539c9df6541e25ecbc7b9376759d861d8dced1625d18f557cdc02fe33fb5af01302c86068dfc4caad4c502ec7aacca74bb78d98e9b492ea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\0f32b16c87962c2b_0Filesize
411B
MD55d414bb958494e9c7f88a7033aa8d819
SHA168c9610daaf59584771cf1aa94dd69610bb15181
SHA256a50a87c83353bf48bda548dc925b57548e44ac822a66aaf34f5b4860e57a5ac4
SHA512d1e1ad4a6b2dcbc348afd611be28c8f552ef0710ad8ff1a95a222c889ad5f251eda1c6e99aad1de2e6ee4504c01eeb1bad1e95519fffa126ca154b696293772f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\16acb07680d1b994_0Filesize
291B
MD5aab942ad90fb26d2cfd088c706d1241e
SHA1d4794b5ffc423d3384351b7d2de41c9a319996bd
SHA256dbc0b0229661273b1a0920ac2a33b6367c43c51133d7e7f012147f47d99e810b
SHA5129ade108dd615517971f1cbaa24aa908aa6e585045bf4fc9185ccfbca630535091817d7155b7e672bb45774a26760bf9c06277184b3231f94d46814a0654a6a04
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\16b8f1966d8a54b8_0Filesize
61KB
MD582f20086a0e931b533fbfa03efde5337
SHA1057ca819710625c8800b8885bd05a53215241a9f
SHA25677c472c00dc9a32616ad8206398bcc0f3f15127d4852235af554c536a74c77db
SHA5122eaf69e8b256b5f6293da51d514da004219a417914688dd26ddbd31dcfb93d94da181241266085439c23de7f6ac864491ae46512790f1ccb4f01ffb1fafe207e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\20beba2d469dc52a_0Filesize
32KB
MD53b03cd8b09d7715dbb2299b00a1e0f7c
SHA1d7d7bfa25b1fe2c60d43afd99f4c2bc532a40e7c
SHA256f70e89090f0db166d02f6723d7ca2ca5a4a8a497ae496b8fc1867a2697cd8a57
SHA51203e267c813726aca4074a5fbe546b73b7e3fb3ac46ba90dbc44168ec2267b1384e65d98861efa14726e6bae4fdbbc0fd7a19d5642daa1ec3594dd91f6b2459f7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\2937ef61813f1f84_0Filesize
1.2MB
MD5cb3f35554cda14c29c2b62b4d06de788
SHA16c1207085dc56473291c20976048ecfae66b9af6
SHA25638d636f4b4649f26e97ab8d295889dc609bc54df608baa45cf690c61b04ce611
SHA51299e796a3b9934a8361caff9795ab5ea1ace3af373777da081983d10ff41d98a9b25bbc5ad8851db84add8d30faf7a7fccccd515278a8dde28f48fca96dfed402
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\38128966a99d9306_0Filesize
2.2MB
MD5966e16f01de87e39c10aac6b889e1e07
SHA1ef0e87c8fc9f26da4b9ff4898e917273c7ca51a7
SHA256dedb4f35992705b1f9ffea166ff00ded0c0af729a88d7baddf1e6068b19f0d1b
SHA5128e057c5a3ba6e12988618fefdb5fe4fb42fb0a1fb7d7d041786165c02a182f6ac0e2cd2a7ba8e82be57db24a831d37128edb374ebc060b0d1d124da13702781d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\40e9a976142a0ac0_0Filesize
279B
MD504e12fab8e7e2ca8f7614103fc717173
SHA1ca5b13c4a4c3ca67d0ec42c0542fea6852f47ecb
SHA2569c8e1d00820b00cf732e9a7a9d7cea58d2f1931bdf2b15846bac9baf9cdbe3b1
SHA5129e760b0ace6bd0705d5ad27d2ab5435f4c26e3f2019a571766a3daade30118d499614089cb535dada92c2c33f268d000eea72689994aecea03e31237b04c18e3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\4559d4908d0e575e_0Filesize
284B
MD5921e4254077f9fb3f8694b3f6369e93f
SHA1aae17da3ff111df1a7b9db878e19d0b2503b481d
SHA256f6ee7b745e3336807c009e694e708db279d1f8af3ffa101c057172ea1f63110d
SHA512aa98b697ed7f84a10a83ddde3ec5d3da3df91292fa932f26428057ab90fb68f43e4581871305baaff565ba5e9033be4f2b7a43e740982edf021a45812cecc2a6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\4b56b7ff4b3f3f5c_0Filesize
2KB
MD5072bb2d63cb7934dedfc60cb56c41409
SHA1b5e2172518331d4f288afe22ea394bb85a619d2d
SHA25615a973aa46c426e7a68f4c68ef50645fb52720b1fb6261b1a85439a9cfc78ea6
SHA5120c6ec8d6f468e3b78ee57080ee306d8017592d92debdb1159fe54d8ab91bdbd5803bd1b1740d8af9d0575b01abf26f2bb9af1e2be8355f3b61ede5d35bf2dbc0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\4d93289a5b858e78_0Filesize
127KB
MD5783a60563a78b4ce058449c1f04b9bec
SHA1161dfaf89e303d41d5319935cf8234ad78b56055
SHA256c2652f7f0a5409f8d24081729112bfaa5d3a524be54f51abee4347c9160c6dbc
SHA512587cbd8bd7d710e527d54af03d537b1b06b409c0f7f443b9a2dfb834d0bbb11ebb6b72f53f0cfd19d45d57487a6bbff7ed9c206c40bab61611bc304e357e53ba
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\6cab41e696ee46aa_0Filesize
74KB
MD5a261093da82d74171c9ce3756d740c82
SHA17db7e5dc123dcaf1f7776cce890299f46f647356
SHA256d4f92f98200344ba6d1508cf9c6336479f7cedd969ec179694cb6495033d8868
SHA51284a62c007245d9c2ef70d1ab37a15cfa6de5ca6374e5c4c8de779cea358a69a7a01ac9a72ebfa6602dde5681739b7ad49e6c3a7ff8e55e9659b18ce889ff528b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\744d7e98d2c5d9e6_0Filesize
281B
MD5745b72621a236ff2f50067b0b238ec45
SHA18662cdcae1bb66a9aa7c37fc0edf90b03ee22973
SHA25665ae07b495a54400acc4aac20eaaa3cf32679919c8ab43e71524dbed39d430cc
SHA512f98baacb364e2e3714dd2ff7c871db940de3867b24eedcd0ff14c9ba00b873a6e12150fe1d13bc597b11fd477bce497dc856a32517764dda72b9d0245397db6e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\79429593b8c5974f_0Filesize
5KB
MD5f327774067ea65b096c17fccf18eab40
SHA12924bc28dd7e6101534ce2ceaa0a1d8050563736
SHA2565559ac0ae7c256d3fa21f59b6a728ba9ae284a231512bfd633604abe510d1340
SHA512b106ce21eaad0f9c87ec0f1a5f7675f7268301989ac72c2bbe9847377a5136f81a6db4d7a46dbccdc1ad28e8da53e6aea60c31ecd42fc18c01d1da68ca24e895
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\7c1a931f45e7800a_0Filesize
491B
MD59e71fb0f89d2f1199af8a5c300934630
SHA1a6429a9bfadaf25d84b069d80b60372463f02e08
SHA25604506a9ab81f50d884de77afdecde937c3be061d30ca533d9473f6ef1e7cd11c
SHA5120cbd4f382843a1de7c692a93d207a33f932bb5988ccdf356a7ae897536337fcb264413065ed9cc9a589c46f5933d2fe187195210db6be0228fd04361867bd238
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\8511d4267b7013dc_0Filesize
204KB
MD517153c522788cfdd482da124ec2010b6
SHA13d66663a260e5684bf1fb647801cd9042802e698
SHA2560222883fa039a1c26ad24a02d8170431415be83c24b4f507e1a47ce5a9aa7a8b
SHA51280573e8118500fa661b0a2b0dde3a18d92fb1d6fac1bb71de4b338f6e95b5ad864df4841870352decc95f7e1b961571f9e7e48157b43a2eccd38680b1dbe3b22
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\8aa05b2bea09f81e_0Filesize
261B
MD572d8e1dbd09ac004936518485b038f1b
SHA13f6c97f07abe6de83fe06f53af079c7cc218bfc1
SHA256423d21fbcc192dacbd5bbd9f8bedeeaaba93b6563f22df5ae79fc57c397867a2
SHA512926d9a81f0c9d7cbb427838a6f09515ffbe29cfb438a31bca652d71844f523ef8a1b5d4e50f005c26506a912e0cc7789d7dd566b7cebab3a4db41ef76bb2bc4f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\970cb0ca8bb4c06d_0Filesize
136KB
MD55014b5794f8923808b8de702d6906d80
SHA10c88bb071ae04d2d8204eb07862166e20334837f
SHA256769f8a2ad88cd4de723514c7516c5fc7a26591b6bd61e31b5db17a18b2866d5a
SHA512dcefbc2b3d2942ddffa5e87f97a6eec4694aade6a35416729d994403d5c6b1faffc31ebb6f470a399f45cf43c26c347eacfa7052320a6aef9a285b94f79c2ca2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\b227a39674051662_0Filesize
8KB
MD58e79fa673046a78d9c9e3d843dd004e0
SHA142ac1b903099d1f11a26dcf4d1a2e0cf0f6353e0
SHA2564c40edade2b60b461ac1095f803a5fc31b774752f0f6111ea49229bc923a47ca
SHA512705276a9b967d44fe9d07c48f348d83b860a6b75e65c5371413c1517618f6b63b45389c178a8d1ac3170b6567aa6dde6ea0dedc2fd57c989af7b4c681516b5e9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\b78338a0ea9ce1e2_0Filesize
2KB
MD515c32fb289c1915ebaa4176a42225427
SHA10b623b7cbed947cb54f64055c969fb98f1ee31ef
SHA256e5e8d3ec888eb1d4b798c76e7d76fa5a23b321c687c40a3c977f3c5c09f04de8
SHA512077af8a8e563d009134f026f5b2fafd284d525a2b1e9277fde9a4cbcff151840dc0c8561d34b3cd0161e697bae9e7661a2eaa9bd82da73d9db867d8034d512a9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\bed326134b7faaec_0Filesize
386B
MD5f5fb624eb9ab944b380046aace6ea30a
SHA1a8fc044fcfcc25bebe1b7fdcb4bbd38fef2876ad
SHA256226314a0746bfe90d024d42b881c4e01e73669c852477ed961352e4ffc065543
SHA51220fa4cec486004ba695244d953a4b2ad3139d7502e4ceb822a53b366a11e1eb85eb4fd49ab3f5d7324d76a5fc9bd1ecd5cec6b25824aa0acd522f0378b199851
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\d05c13ca39356a4a_0Filesize
1.7MB
MD5fcf3e5c4efac58f915292a71e358d63e
SHA19df44ed471187273a826f2c21deac33f9737dddb
SHA2564d9d63fe6e5b0e7b032098f01959f541690c1300e58ae94a722a56f0c78f9141
SHA5120e7a9eed62d4fc64860cb974cae215397d69904da3d84bfd0f237162cb04dbbe1c737134062cea2797c8af98a18fbc0c3d507bca76d4022e21895d5f1a824460
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
96B
MD50092fc6548568526934f53abca7a22c6
SHA1661199fab29ccc6aa5c503691e29f8e3873707ce
SHA256ae17f79a5bf1742656983a922e9c328bf2b124952fbbd724ef3b43b51fde9454
SHA5127291cb325f3380bdffb524bc45dd987dd3bd0eee57c0286d6f032d7042b3e421f40d7bbb9b6e20d324e23b72fe49ca3a3704ed206c3eeba709dfe9ca7957945f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD5675d330084a9ce7e63965f16c7594577
SHA118cdbd94a1b6e99699c6e6a8c3cf487eca45459e
SHA256b04c3ebb41a52478052dec9eee58cf423cad005017ccd3fe21d7226b8ff7919d
SHA512dc8059c3df2100d8f36270203881ef39d9869debafaf304a373c1688a4b07dbfd2fb9dac8559b66cf1f1b43f61df4499899f90a3bed6da412e038ea10b5feb06
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD5a5031ff6499b1689300f619449626a35
SHA134c366f6d1bee9e6b1dd1c381176d01cc25bb8e7
SHA256a69ecab32cc5ad934bee6e265871eb747be2983cffa4ffe4b3d382db82540dc9
SHA51225d3215cb145f8b880a64afe9bc9d14660acabccd3a6bbfe133bc6e9bd8fe7b72f8033713eb4196cb7396aec3993dfb0d929cc5cf0d1d82a18984d479ec828ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1Filesize
264KB
MD5e04bd0a46ec062c0c1ded66574630980
SHA17da12657646fcfc8a819e94d8eabb3c77d4e589e
SHA256e97c5b8d5a8401081794254dd9b2a6de03bc376c067e21caa4c2f9e053d92f27
SHA5128c173f7f2f5321faef031f39e13970f2f1a780cd4d2bb4ee2390e3ce77a95c85b9d7309eb98b0696cddc640d446cd9c83af3bc97ee49ea467be6ade495224ca7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\000003.logFilesize
55KB
MD5eca932100cf20eee326b8045fe8de7f3
SHA16b1b5ee2ee4a6bffafa9282606e4a8ef64f0b248
SHA256f4270a90603153ac722b11c2a238276de3ceae37fefbf09779b657fba289c579
SHA512cd37d467a109b184dea275ec884dfe0ef99714813f05db48cd8c0892bd43811e58a27fd73117317a2850a53e1cba40592c9929e286cb9353498a0f074efd27de
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\LOG.oldFilesize
389B
MD569e620b14e668a88f281e78d0855c868
SHA14ea597aa10d393fe7806315d1dbbae2c54827b94
SHA2560ed48c34e7a2e403a025e81fe531dda478131413c708ee6d420088efe6cfa327
SHA512bf0daae76f088a0f6eae84cd323a744d06f9143e82ee05bb9a3ac41d20d81f15538eeee79c7076439a1b51fe6f81ba732a0d657346b297f16680fc25509aa56c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\LOG.oldFilesize
392B
MD5fdcf9d732f0fc0c432619afc53045a6a
SHA1f4d959023aa738c70852fe0555ccf96abf1d5c72
SHA2563e59b3f13fcb6a3f0389404c4ba83bfeb553627822cc42479c831da22584677a
SHA51298ba1e4760c1c0df3ba16c9297fbfb3d52fc4e7f1de24394538b8b886875906da3073d345dae835a37542aca04ff43bf2cb787017f72e508ad0f6db096532389
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\LOG.oldFilesize
392B
MD5cd09c641efdba695a2c1183472d4f6c0
SHA1ac21aec6d6173fc162223c788bebd312ecf3a6a9
SHA256408622f4829dc50607805a84eabe5af0d28076b237d2ced6afa5cbe3303de6bb
SHA512de393a0582eb099bfc61a1e6dfc30297338aee2693c9be272008d9dfc2b15fe189fae53794f43f4c948c0d113866052b27051c08a5c12cc82ae55b0340d765fb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\LOG.old~RFe5f97d4.TMPFilesize
349B
MD574760b2b3abb1c4fa45b3d8c5b1c630f
SHA16890f4ab9ab6f1554cd1419ca8a0e77c9edce8a3
SHA2569adf4860aae651a2425f690999c7488060eb2da8069891967bede482f228738b
SHA5128e90e446bae2193c32d2aa4785bee56d918e6bade7735f70b19d82726be3bd646adc77f2afcd6061314568c5f63bdf50c0a7c75326671bfbfc07d8cb43992c88
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\MANIFEST-000001Filesize
23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD53e3661f7970f0031e955a1ef1a439b5a
SHA19e6edb7e299e941b4f65446c4bd72de334ce8727
SHA25638d29c298c8e62ba386bfdd68e62e0173f4b740cba0c75a28090c93585ac0f9e
SHA5122aa69d0ec5e4473b0247258068170ce07f6a1801a668f03f5675782f46fd53d6047bc0e3cc981ecf56a8fdd4f41b1b2680a8ada17a07c89a431f4a1fc8d548b3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
4KB
MD598340c93373761a5320bb5276f6edb4c
SHA1ef21bab097df66e302760c6b916e9a6bc293dd6c
SHA256fae6da452f8e9560d94cca172600839789b96c904434a2514ef20703d725c7f6
SHA5125946c714c0923b5c71c3ae65e292946857125b65dbb4bc81848520c5cebcdad0c52e31932d9d1860aaa5b220622c93c286285decc6f9be6d25de61c7241adb5a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
5KB
MD55fa8f862f6cc1806f82842421e3a088f
SHA1f1a23cb4456cfa5b42df7366c813907e8c47d53f
SHA256805b1d293ca41c11cf9f8944b2f52c3de0740933421b7d77f63635326f2d04b1
SHA51213fa4c589e4d2831f93b179c139b08ca9649ac89b3e131e8f39155f8e4318424e3f3d0c3f85d83e34db21646da2ecf99b9a8271abaea32e89d6929ebe2095fd7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
371B
MD51ef8e6e5af75f81a6e23799de3b7ecf8
SHA1c31f77deed652bd6045d6c62e7d22fb44014c855
SHA2564eeacb6645d647092412b8afeb8c161f5a8e9bc4298e44a67ef935a12bf3429f
SHA512853ec7256acefd4c08f7b49d7760c0ba03feadcd89642131816443cc290819df1482d709bc735bea84f75d7a5d23dcf95619f8a2ab91315226bcf11e9ac7db63
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD576bfa7702ec10d4019451bf7799354c1
SHA1577f82c0aa192a65692e0432e2e7e8e2ddfd3727
SHA2568fd21e8e4e8e9279a6bcf9db1d5116a84d915c1ab2dfe2bd5b69a0ab460ca0c8
SHA512b5484d784c90eeb2dfdde0af7cba04f4ed3e9f1468a7735ab6d0ec729d4af29817bae74a1a890a0b92a23760689b0b190ba172cfb93c0a67560baf7d18f3a171
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD53360f63d4f56e62f4618eca2a2475c83
SHA1ea47f49747b1c2bd44fb17cf4acee0ee819bf795
SHA256481ffed33cf670892ad573bbac3ca6f2eb32d0c84625c72e1a4b0b9d3ced0e99
SHA51281e2a6f69720c12731e1a5e72afbd1d3e5fcdffb86f76a9148da2e1835a772510308178b6b1555f2ad4cff61f8389dd6fa139002bef12b9b799ec70fc4751513
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5307797f637d2ca3471f2a66e48b235b6
SHA1075326ea4c9b378024de3043755e5a99fa8c3a3c
SHA256051f8cb14d247efb260faac8cd3370c6c516f0260654c8e8c041226a9be103af
SHA51254d5adc1b7b419004d93f26602274bdf9fb0f3ea2f1146d6f59f1f74e664dd4db9f558c75d62373ddfad02ed609fb38bafcbf5a08f6aa7ca14779b98a994d4eb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5e1896a20a31ef2a4cf3125a851de2a67
SHA11e7cede56337fd2d24b8553169b099399fde5906
SHA256beb58ad5b86275f659728ea37b1adb906f69161a5677e8afcd18423cc5c01ce8
SHA51212bb4c8d7bb00b57092b7a1004ba0210fde07019b765f7258cdadc88baa9f1820c513ed585a1ea88670e66ad54bd5520feb23d6c35ec21854271979e9ec551c2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
371B
MD5be8e6c7dbf3823f13d780a49478b27e6
SHA11cfcfa8b4bc8ac91de71655a290ea0b78eb71bd0
SHA2566df4f0320075e14e9029de5c3cc9969757a3c6e34564e6ee88e958ab697772d3
SHA51231a3f60e0589916ee6dfdcaf1b38f8c9ba648043c6a8c14da0c306dfb50707911f82900075aa1fab1cd14f46274a915ecedf6666f49ac7818385231f6e5887fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD55e035ecc2a636b801fc07965b88a2fcf
SHA1ad8a021ea71f9ccfe38d36aab8a8d39a999785d3
SHA256d3ceb8a449fcfee9ca9fafefc29feeeb4600780d9024174e00d0a53e0bbdf78b
SHA5123852c29a99dcba6883acab225104800f29d3ca883275a74c6886ed050da843333447d7ae9402214fb28d51e6b1e38acf8c3e0163e14b5b428baffadbffbf0688
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
539B
MD5ab204d67034c0f156fa7e6c6aaa28730
SHA10f2f977d98749258f360a831e09107ee52cda948
SHA256613b8e61cbf20879946cfa416ff04dcdfca11a3afd0b8c52bf53b83ce1263493
SHA5127882b018954c8ba516cf4702dc1dcf5e5559f5ed1f2cccd0e9d4f123fe4a9baee9de89e8956e2edf01c2a588857f69669d476b575799fc7a0b5c54c34eba8654
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
875B
MD51888f068e6a38c9a6c843377dcdfa2e4
SHA125886da263e0cdf43f09c58b13242c90b02e0e3b
SHA25674c9b9c3f0c36d46563c5593b44cdc6f2d91ba514998db53441cf860618dfb61
SHA512faf7bcf1485c6dd28a3cb5f7d66c6322c60ac72ebc25d8d2654e2b00716fb7c720c1a2adaf5f7e0fb6cf3dbeeda76adddafabc13cf31a74251cd8592a0a6b6d9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD53c5129c7d10a9edcd47cb982c6524264
SHA15bd01be614a6ade727038f67429b4bc53973139b
SHA256807580b579cc81236208071d827da98341507ccd30d32994c136a33aa3444bc0
SHA512acdc8a9da8e1e5981700ffbe3c0fdd980db84fb6865783bd4d564cd16f252c22532cffce31777666c10374c1297ddd5477b053aa7ded91fcec14484b16d63684
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD56533cb4277600a06ee2990bf38500ca4
SHA163b0f99fd87ccb24d5c20bd3d6e6691e626e2d4e
SHA256c404f5889b5307e473d8f4ccf301ff079e65a6a403412a8e116a7535c9b6f578
SHA512c5f1c8897117bf657fab9de196341655ad8fcde94d13db1a0af9024c7d0730d65fe73c992c2274998fd4cf2bd84d27a434c3858bc3d0b907b3932c1054823ef7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD516ad306b2dd1dfe7215c3156238c6fdd
SHA181fc053a8836f70dcada8c7a9e7b1aa320858406
SHA2564f62d184057aa9dafb5dd71e9075151ffa0ac584dbeb780143da5f4fc34f0e84
SHA512258efffb4f647ea82d82b87dc4600dc2c09985c2d340852f398364b077da6a5ad2a69df861f9d50b455040b95145e488829ce76d403281c95b9dea0438de2a61
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5a7dea6e00bdc931f1ca82a7bfb2f9bfd
SHA1d15d431e871d9cafc45d4bf8bc0f57205c378261
SHA256f5ec5e38964f4dea7303e4e07652526c0b78d44801a976a9d386d4bf6e69bd97
SHA51297e4c74b87744832d2c0880cff0ed6e0dc06f427361177b0f4fb20439ba97725c51717b69681bcb4ed6892c09f929440be041def9cd29ceebe8ae88d211da03e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5a30d558846ce96cd76704877af7441e2
SHA1b816528ab9b52309dec1eb5d04e953d5145952cf
SHA2562be373da5c9a2ba0d12104070430967623f272d2c2d5fb0fb1023e341acf9fc5
SHA512d3590061db9779d48e165a997e8ff9b36c86df64488852693c0585b504191d11095b6e2266113578effb36706dea15b017f0a77f0373af45ad1d96af14ee838b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5b7728acc84ebbdb87713ad5b0aec8ed7
SHA1d0948eed984fb9a5004cb9d335bac7dd5f2ad396
SHA25618cba6be9d572cab25098c16b35da8a6670098a0c3b35ce709a7999549af70c5
SHA5120e7ee73885ad13af145c7985e57fff119b1b28bdb25871dc1a4c979ea05adc89abbda5aa388ad87083a73c183b94bd1fb6555eaad5158dba188e2b2bea2e265a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5cb4d09686acb26074dad8a6b8189a0ea
SHA13203bba43f4079c8778dfca5f9b3aa889d2ea452
SHA2566fb46d4a3676e0dc56bfb4578f87b28b65f48588720a5da29e3111fb70bd9dcd
SHA512176f3596697284d7cda29d233fca69d0e91c881ec56074bded0e78cabb7bdb8a4d47643d188edb79b16e753a9c201d088e2fae82edd16171cd8aa4ec8d6800b5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD59371dc9f63a0f1f276f1e888fd057854
SHA1871ab30fe318bc39ecc3ed2e847ed2683a62ba5f
SHA25644af8ae45daf072bc2b794a7ff9e9857e741a339dc31c1b04238c4210249d22d
SHA512060eded406f425566185aa2fbf7b9af4f332d1cdeb705ae6804a794d073a8f8f1098a55f8026ff3b0deacf764fe832fdf690c0e5c3fc1d1d6c909c735b3cb252
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5702615d3eb745bcf8243c819554cd164
SHA1d00a88a55e893ec239f9616cbcd106aeecfb866c
SHA2561cda9d76b47d78b16e12460f288aa4ae5d9db99b61d1cad94435150181a9afcc
SHA5128b1fa557a689ee699146c7220b02a28df1d13986c98ab51cc2dfda7075a6f9df1c42b13ca8d460d8e39eba2a27f8b4bd457337aee0b24611bde59b35f04cf032
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5905689694ac4b2ef741075bf05d97eae
SHA110309e85cfc1a3a66bd15c8a214411d383b4873c
SHA25663f52a608210c4acacf27fec698386f47188e22df00752e2f31b2814e885ab54
SHA51213aa0f97c653244c268c45033aeb79f2e36ee082fa606e1c6cc7644393c4375a19467fc90a0d84ea6db182dc9c9e2346e81d7fe1f2efe4f6ab43d0f26bec8133
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5fec21aeb53b4651626fa0ad9eda234c7
SHA1eb316948b20156d9d5744b1f46331898c5818743
SHA2561e303cea3f89e43e645dafe09f32ef3f7f97900265e342685ed4ecf06ff30a27
SHA512a2c36bb7318cd83735b6aedafe0334760acff09dc9a1affd7a4bcc094610a64abcd87f885af3cf718f5bb256a3ca317cdfafb6571228a225b8d5b909e1ff0f4f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5862da4004771e181b3667956d0f7a628
SHA11d6042d43798d95908d478bb1d336187b3fc8f54
SHA2568f60b5edbcbc67b11948610a71d244d91148199e8e960ddbdaa1040a703e3dd7
SHA51242a595506fdfd95236c01bbc9a9a567b09528c706e42d44530261cbcdd5883c132d6e8fc17158690f43b9a26f86f35a7502a60df727926eb50a6aed70df88513
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5dbe77dcf4dc904cffdfd1e3711c4c426
SHA1b211d5c472df1384d1f3d24c198806365a9d3fe8
SHA2566272022e31c1f02fc0b0d387d44c0321300453b2c72e35d765dcbe087f3c90a3
SHA5121c2b4e2b3845e973eddef316d34264418efbf2ab9c28e926f6a8d3fa51da5d2e1744f3b16c0371666c4630bd6d2458328840b033e559cc5a0e650aae4b2faf3f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD56ba8a53195a762842ec647efb97ba5a0
SHA122956f4742aa358fbd1a4c5df88b775dd56a4d5f
SHA256f9232b68340a6a9f73dc39f6004f37d7936ecaeccdab06741be715358fdbafbe
SHA51260d49170cd55454a215e7a83caf37cc06c91a96a0486278408398b05e0c702825175c7601874d2f91b5d7e33cfa933cb5fb13edfce03f44f0cf671f5a6f61f06
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
9KB
MD5d01ca0ba35cd4248faa0fa534284f4b7
SHA16479c5a18962c0e5499a09eefb01790614ffe51c
SHA25636a2a6fc99ead1d6aee43fd88906fc7353bd1f7b0b03b06c02cb85526fbc2038
SHA512787a7ece292ab828face559d2971b73265674b40d2ece28e53c05316f3a245fd06de90d9bc867475081c095621205a5165e630bfe568ea38e9203fc1853db7c9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
12KB
MD576932a801f737d8074c19999a69356ef
SHA1f57a9ff80b57b6d1fecc604fdb355d305139c9cf
SHA2566980993ac6fab94d5cf692cf349f4019b42c4853e590080857851ae214800f2a
SHA512eb97fc019726e8bc0e5d0c4bc5c8fd6848c1cb4fe9a22a52f4cc3d9f1959d5472fad1792d9ecef240ca769bfdf6b5c2231a3817519d81c5762d1bbb40e09fd1d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\8ab54704-dbe2-42af-9080-990af185f10b\indexFilesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
120B
MD5244805b105623cfe72645ba702283afd
SHA174c0185eec8119ac304b421cda72be1a42913369
SHA25604c9904cac5c14d3119114f463e45b71e7e5dd91b3e5d04ab155b18d80bc0e16
SHA512f756caa1e9038ba5db4e28f27d53ccae0b1f1b659e9e1599b920b07ba8445e3a786711a54c55550979bd2104d9e3cd5c8e8a6551d58129107bc780e3c09048de
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
120B
MD57047cd2529f4f949aa846e9762556c2d
SHA1ae74af6dbc454ffda1d8c1f4cda4f8b1b7689645
SHA256185201dcf7780e01ffc666c1236fb5863ad513ab659bd6a3665a6d62384d29a2
SHA5122ea298870cd2523d6676b4c1e6f9dcb2d522f6a72560de80c03934eb5bd09605e4e09aacb30e3a2eda8b544fbe9e17bd6d4ca4dfda5c6ed3e4c87c90dc9da42d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
120B
MD562955443988515db5f2a536a6ba12750
SHA1b80661cb1ffcaa843d3bc507a633dcd42f685f85
SHA25682bd25a11117630e8fdc163962202dd8c708c85d47be10694942a94370c5e643
SHA51279f12ef89b861c6a779467eb9c260c34629db2699f11e05331258e844fd6ed14f9402fb1697aa71cfd93b9c5ee5b08a971fc990f8caac75af18d63d12be6536b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
120B
MD578542a41bdbf045b86186cf045436eea
SHA18991e8f6c82fc1dcc26cfe3f6150e0fdc4aac53a
SHA256d9adcea32a776c041187a0e27d86e6cf3cb9dc7deaa4c4357bd423ec24ce984e
SHA512715feb6425c07da07bfcd4f489bb6bb51ac1745e1530c983444feb6183b21ee95d7b84eda81828ccd03b2f1051e794ed046554105eda157c845b2f1852d7fe9d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
120B
MD51193c23f7bf425b448bdb37a93b06ce4
SHA1e863d1d4480ddf3089f09519d818a3221a3042fc
SHA256d812b02aa5baf8ab8f1224674cce8a76f6490bb60fdc4cd2473c9e51e0c31443
SHA512bcda4a56d85b39e8b5ee61eefe747e99f9c394c15b0893da2ba3e48799c3c904656df65a0735658580b531149e34feda93c0806d47bf36d55e89146f1d2b16f9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt.tmpFilesize
120B
MD52597a90a1a6bbca24ed8d55f7a754796
SHA137918dcc03c0c4af78e86e715b1ea20158ade723
SHA25688858782d5f833938f08191118bcd9b2b8cd8ac3ed6e71b4c2f25742790424da
SHA5120b218a6e6b87930a62b11097c7a840ec62fe1cc016b375f53057ac7ce677e21f6b26f9bec632307987e8aac94feaac6e8094765da2153fcec4cbf1706648c707
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5f3959.TMPFilesize
120B
MD5a477eb72253e1303030ca93b9380a617
SHA18275a974f22c0fed92553260c8d63a655785db08
SHA256bb151e678d0864e7cb081bc31352db6b491260170a388af770ba52ee8bc8c93b
SHA5125de70093c61dd4d575a276536c72c97ab0777c52ce047ab018c9da7d8793c92c345949d4ba08ed7fb7acd2103fe4c76b4541cec7dabd024557b480634ba20ce8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e4abb0d4-2476-4974-9fd5-e29f1f2f2062.tmpFilesize
9KB
MD5b6cdebfd7516bb48abb57a6ae6dc4d87
SHA13389759091fb8039c667b95af404c72a9a4fc1b6
SHA2562bda1e47500384037e5de47c046c34b02158d134686d5242cb7dbb00c761302b
SHA5121a22589ebce822a124f76bb8c9d798432f9782e2ed8f804c3e7439e4262876c514c6a6e571564ed4b78d2e212d134dea0a53afbc1934df0380c8f349056b0c57
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD5f91447cec6c76c0868de1dcbff1cfaea
SHA10f3000f72ebf3ae18ec13615bbabb0b1d6c442ac
SHA2561c8c39d96aebe1ed0d7048638e5208da371eb1381c562db5759842dac7bf1a34
SHA51233a2e333057a883d17f8fd42348c07dc1520959a62aa51615daeb79bdb62c598a8b65e746c696d601d77c34fe2396a85ee8ee6ccf81f85351ddec9b97f46c285
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD599e50fff44bd752af7f7f5ed18737a15
SHA1b0e5f6dc69fa518f469338577ef04b16e255bcd5
SHA25693cea8b5c8d6e11fcc497e2156f0e0d00c238b0e59034e8f5574d025239e6858
SHA5127e47065acfd8ed234cbea1ad9da90eae491ec77af461b91beb1af57249ddb2fd2ab527f259045172e187ad81eb56329a48e7c59f5917dd8099de444794d34982
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD510e93eda2e0fcf72caaecc6d52fc5c63
SHA1f3bf388f5a16372bc63e793e42829e704277e41e
SHA2561f4bc2009c1931daa517faf8f3e1cfa72a0b48a6962dcd856e115299acd4fade
SHA512a8ab24b33ab04bbfb2c214cac2f330a412c769751036a39f4a400470cb1e2410d672c54b6e8afca262fe5741ea4d6279ee061b11612339348cd4add77655fc7c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
93KB
MD547c686dc2e4c7c9444ef752346320ec4
SHA1436f3dc2cb28e61eebb3844823dc6bffcff25a71
SHA25636ffb80db4dc846c8c91c0572146e6067f98423a64d632fda592942ea5d4411a
SHA5121b5a1598cffd87ba6e88967b8d7c50e9d5eb6acb18a7465afe6ae3194bb1a0736a6d84145a49b5e284c71db3665779106a1e8b26ed2e6f86929b32e1f34c0b60
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
96KB
MD5a956852e364ec6f7f824ff41b408a02c
SHA165a125ff594fc808f7a8c48142cb4bdebcd32bad
SHA256615f9022a7945823b315993f26db684414e04c3e5070d5de9456038678dbbefa
SHA51292b5ec1a6154e364827d1d069427fb3bb2d7adcaadcc074c2d4faf8928cfff6e7ea4a3c5d28e520e787443e3ea837cbf62efa62ac2680b012a91161ebe71dfb3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5edacd.TMPFilesize
93KB
MD56533984fb76fb52731c06775b0a018ba
SHA1dec03a33d33aaa5c91bb93adace342dbefbbf076
SHA2566a1f199a3d427b1b7a19aff62a41badbcba3d8d2da8f39f82b47e2264e78c2ce
SHA5125ebe69982793a69d32f4316619578f5340601a47e9cb10f10ab1e27c708798d3a1bcc49275a63b8578b28979e5b69156ae386a943ea01b9ba37b235a9c7bfc24
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdbFilesize
64KB
MD598df921f667bf303621c789390ed9f2e
SHA1d9c82e51534cf1c2eb5a255286de6a09ca364d1a
SHA2568b8497d37fa9ddd44e275aa7631d7c7173c384a501d11e73e3d4401513c4bbe3
SHA51258e896295763c2729c5a19986356e7cc7706265bbda5cd9cec98201ec9ce86c4b68a3e388c86aba198870ca4b8ab1a7876f2d8e1fff7437216dd2789b3ed3796
-
C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bakFilesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6FGHNCOX\edgecompatviewlist[1].xmlFilesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1LWGV33H\recaptcha__en[1].jsFilesize
405KB
MD5733e4a30889fa7c9947958423e21e810
SHA116a2cced6035295476141f8ac1cd928114cafebf
SHA2567d2c1727a32a92776f9a3078abb845bbeb77e6603c40a318f12ea1e1b5a040d7
SHA512b4a458c1c881be83715467db5c53826dd1a657bbfd8fc4b2b24b9350e5b80e489d6a438c88b05ba6cd139cd2bd62031ef07a40551437a1575b4b25b612baf3fe
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\4NNFWL0I\api[1].jsFilesize
850B
MD565f4b0da387ca3fa48d1efb14c9cd385
SHA18a48751f76ea657b8b1c192f07ec5d9624352673
SHA256a22e425317dd9d6bb2bcc724ec7179d54c747165c9143505d7a129ad7a549da7
SHA512f5345424e930aab6ae6ee8431df8dde2d949fe73fc76a23ab0345fc86dd3d30b6fcf3fcb1a02bd9e439a15d6fad66bc75aca4e5e373198d57748cd3aa77a5b51
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\4NNFWL0I\consent[1].jsFilesize
55KB
MD530041de85641388adc318444ffcc6d92
SHA1b1c71d53f9efe0316d1e1e83cddc6b22fdfce8ef
SHA256ddbd75824673dd5dcc53f469430b2321489c2625cdead7a73b951f4a4ecf1396
SHA5126e434ddeb5b7a40f22ec54c3eb2713bfc0fd23227ec5e03eb58d0618c489a15bce623333b6861ca972db556919bb6e2076d540c91c506e89da106d0b1e0b0d41
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\4NNFWL0I\styles__ltr[1].cssFilesize
55KB
MD583f90c5a4c20afb44429fa346fbadc10
SHA17c278ec721d3880fbafaadeba9ee80bdf294b014
SHA256952833e41ba7a4b64c31a2d7b07dde81bf5bbacf5cbb967821cfe459d0c4a0d8
SHA5124f0d19678a6758e67cb82652d49ee92a3646c3b4b68b93253c3e468e88506bb8ad78942d7be244b390bdd29a0d00026ad561c040c1b557067edc7887fe7119ee
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FDLC1TNK\combo[5].jsFilesize
26KB
MD5a5db9ca37f52a432a3e22b8c0baec53c
SHA1fb58cd3d025c0d80d2c2f3d247f59f3234105d19
SHA256e029905bcf8a7eaa14181888fa4cccad6d51c42c8218c3ab33988f52f086cd5a
SHA5120f83a6eb6449f8a7af33cb910c29ef91357d939f1e81bcda4e42eb68854c6f1869c5ecf8f876269f6a3e84a54c0a1ba48fa3cc9e0496a087149659a33cf60620
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SQVILF42\webworker[1].jsFilesize
102B
MD5fc823b252bdde4324aee7e965950ea8b
SHA1dd99b19c3ec6c0ae2aec797b3caa0fe160df2724
SHA256dd0d37adeb04b70c9c1a685f30233486fdad2136cf54cca03862eef582d8367b
SHA51209b2ef38305096a181affd75c3d4a1ad952591d1b7b71deeb70112fc9ec7addbf365a43598d54e44f5b951d90bc6ec3a3073c489068fdd5dc61c8e35623e1968
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\CRYOWX1I\www.google[1].xmlFilesize
136B
MD500273837a26df74f867482ade07dac37
SHA1f12d49b44d7145ae9d59da9f7296d1c116794905
SHA256ba309b75bb16d73d37f2c1502e1a34c446819eff650d71b670508e81bebe14b3
SHA5129d1130beff1fe1b91b199c737b9e5d3d9de8283b87548e68ac040cbb9528210f42e05bada06cfec1d8692bcd0627e877d914b0aaee730e87f277db5eed64dddb
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\436XYR05\favicon-trans-bg-blue-mg[1].icoFilesize
4KB
MD530967b1b52cb6df18a8af8fcc04f83c9
SHA1aaf67cd84fcd64fb2d8974d7135d6f1e4fc03588
SHA256439b6089e45ef1e0c37ef88764d5c99a3b2752609c4e2af3376480d7ffcfaf2e
SHA5127cb3c09a81fbd301741e7cf5296c406baf1c76685d354c54457c87f6471867390a1aeed9f95701eb9361d7dfacce31afd1d240841037fc1de4a120c66c1b088c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\436XYR05\favicon[1].icoFilesize
5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\573H4T04\favicon[1].icoFilesize
894B
MD54a2ca1411c2316e68d6ef13e14502bf0
SHA1969d29c62cbffccea6bcc01f016b3d832c3804dc
SHA2562c67d7e8a5a88712a83ace18fdaee95663ddbbee6c53ba3b7a30083547451aa1
SHA51258088cb5e88de863919006f545dc346bd1bdeaf57e4f32fde831d43e09645b0d14282e1a259b4b01381220390ebe1965b778b326a777d3e0bf471c540a1c1cb6
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\K1B3Z7JM\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\SFH5866T\favicon[1].icoFilesize
2KB
MD53a07174943f82046370997254100d870
SHA1ecb1e2e89af0ec6f45f875c22df0fbd45821ba80
SHA256c6f7ee2cadae2e121342a8c4245141175bfe887776206deb17149d46cf3aa827
SHA5120a589e20251f62f02c4b96b916fbd9359677a26379d46eeef4e455464643de0c9aeef921ad563d970e7436805dd18ae974de6942dfdf0c65089512d8a3b2fd35
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.logFilesize
512KB
MD5e83bae96ca5989d4529e95a4eb8017d6
SHA102a095623bab452f815622d77c0a2509c337d27c
SHA256f9a5dbd9ad9876ce99a12f47125368f643e4d1a7451bf1cd4c871f0b416cefce
SHA512af5cb6e38dc779f296763f3caa2000bbf4556556a66accc86a81af81492f5b0976c116f7a9fff95ab4684d6c43686285a5e10e51d4e9a782543e380263561dac
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\nk6giea\imagestore.datFilesize
13KB
MD546887bdae4f7a985213f16047d4de27b
SHA1a9a369bb2b5bdc26468bdce972cdd45d06ba96a3
SHA256cb69e4ca7450cdab02a013b1656d4efd889d032e6f8e1bbb3e507b2b94edab5d
SHA5122b08e369b56fb5fc4b45767da3df112e177efa33fe38f7f0629a3c90453aa74ba49b0ffb36efadd3d831346918f81da4a04f43fbd9bbf4ec9ce52d64eaad8197
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\Windows\3720402701\2219095117.priFilesize
207KB
MD5e2b88765ee31470114e866d939a8f2c6
SHA1e0a53b8511186ff308a0507b6304fb16cabd4e1f
SHA256523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e
SHA512462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1LWGV33H\B7InTrcwAAxYOgZYz9MRWRGfNWo.gz[1].jsFilesize
821B
MD5dadded83a18ffea03ed011c369ec5168
SHA1adfc22bc3051c17e7ad566ae83c87b9c02355333
SHA256526101adc839075396f6ddec830ebe53a065cddbb143135a9bca0c586249ff72
SHA512bd1e5bad9f6fb9363add3f48fe2b3e6e88c2f070cfe9f8219dc3ae8e6712b7fe04a81c894e5ca10fb2fc9c6622754110b688bc00d82a9bb7dc60f42bd9f5f0b6
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1LWGV33H\H0tBeYy8ok5qbeZq9Oge36K-zeo.gz[1].jsFilesize
824B
MD53ff8eecb7a6996c1056bbe9d4dde50b4
SHA1fdc4d52301d187042d0a2f136ceef2c005dcbb8b
SHA25601b479f35b53d8078baca650bdd8b926638d8daaa6eb4a9059e232dbd984f163
SHA51249e68aa570729cc96ed0fd2f5f406d84869772df67958272625cba9d521ca508955567e12573d7c73d7e7727260d746b535c2ce6a3ace4952edf8fd85f3db0dd
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1LWGV33H\ozS3T0fsBUPZy4zlY0UX_e0TUwY.gz[1].jsFilesize
226B
MD5a5363c37b617d36dfd6d25bfb89ca56b
SHA131682afce628850b8cb31faa8e9c4c5ec9ebb957
SHA2568b4d85985e62c264c03c88b31e68dbabdcc9bd42f40032a43800902261ff373f
SHA512e70f996b09e9fa94ba32f83b7aa348dc3a912146f21f9f7a7b5deea0f68cf81723ab4fedf1ba12b46aa4591758339f752a4eba11539beb16e0e34ad7ec946763
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1LWGV33H\tfpoqzYv42r7UjQvzw0PVIoT2nY[1].pngFilesize
8KB
MD583c9af188daea75971437f3f67daa05f
SHA1b5fa68ab362fe36afb52342fcf0d0f548a13da76
SHA25696054ad091360d568c6d01633833ac8988981696e14b1ec230e96a2457884990
SHA5129335c143311fadaa50a5c6766e2d29bcd68524d90e93fa1e2ffad1b70616f5b0e7db0c8261347b1210f7b16c7c1adabbe0a2153a5761b005732b715d3e3ba48e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\4NNFWL0I\Xp-HPHGHOZznHBwdn7OWdva404Y.gz[1].jsFilesize
576B
MD5f5712e664873fde8ee9044f693cd2db7
SHA12a30817f3b99e3be735f4f85bb66dd5edf6a89f4
SHA2561562669ad323019cda49a6cf3bddece1672282e7275f9d963031b30ea845ffb2
SHA512ca0eb961e52d37caa75f0f22012c045876a8b1a69db583fe3232ea6a7787a85beabc282f104c9fd236da9a500ba15fdf7bd83c1639bfd73ef8eb6a910b75290d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\4NNFWL0I\z3VtkVlRZpQdIV7qjpw29Wkf5fM.gz[1].jsFilesize
21KB
MD51e2c0702c1245fb906c74e95d4841ef2
SHA1ba156cd69a958100f7c81974837aa2d5feff4afd
SHA256b7607c3c95c96bc713d487e91a9fd2fcf4b1981593ac9fce5725b8129091c579
SHA512d968c21772290ac617c44ae760e3e3a3294078840df1835a6d28650f25cf3e19bb36b783f2b4cb6530597fab01794d269d7fb72b553fdde80cf3001d41f0aa89
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FDLC1TNK\0GCffyAv6tOkSw_dl6ZsJPZ2S5c.gz[1].jsFilesize
1KB
MD503a03eb513bd86fd7e5d173d05aab087
SHA1e9f0297833725db970e9a76739dda499a569ffb5
SHA256b9d08e484aa6c73eedb7e15963e95fef4270a94d475f039dada3492754ddfa6b
SHA51241e0fb1917243886f5fbaf928aabe61eee015d02386fddfbdf3b7ee2ab9b7056452e40d0782637e5870de92b0bd85db407c36915ec2966b73cb28133214676bb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FDLC1TNK\nxfMzw1nNLuLBqH--76jwmuIDS0.gz[1].jsFilesize
16KB
MD5adbbaf936d885d1fbca6f7381de706bb
SHA1e6b61ece067968dfa7a2cdc30e3847bbdfdd16a3
SHA2568ad53003e96750d6c582576aa2691f48a6e939a38457d8f10842167d9376f1f7
SHA5128671a34eb0a868157afd877ebd579c9af793b30b56921f3ebff52272445106f88a4d930e03d43e6700047772bfa4303eb3f8d6ba9db380779c3025281077d15d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SQVILF42\Eo8Y8CBjaLp1XcGrxKUtnD4sNG0.gz[1].jsFilesize
4KB
MD556b91eab01144db91d100617ba0ef2a6
SHA15994c12e9338175d82e2ee3053265f738d858e20
SHA256ee7f4b86a5c2b3d2781d6a0ba8f3deff6ef943d21a5a92f435453c87b99f9509
SHA51284715f3b86201e40ddf0b6e052c2fdfb8cb9c6fb79fe42df01ed4ac26197993439cdd917480ca21e5c04f6c39725695cbcf1e7ec7f4726573390f62088bbf85a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SQVILF42\Oe08_JybWoSjYfa3Ll9ycg1m96I.gz[1].jsFilesize
1KB
MD5a969230a51dba5ab5adf5877bcc28cfa
SHA17c4cdc6b86ca3b8a51ba585594ea1ab7b78b8265
SHA2568e572950cbda0558f7b9563ce4f5017e06bc9c262cf487e33927a948f8d78f7f
SHA512f45b08818a54c5fd54712c28eb2ac3417eea971c653049108e8809d078f6dd0560c873ceb09c8816ecd08112a007c13d850e2791f62c01d68518b3c3d0accceb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SQVILF42\T_fuRJ5ONhzzZUcXzufvynXGXyQ.gz[1].jsFilesize
1KB
MD5cb027ba6eb6dd3f033c02183b9423995
SHA1368e7121931587d29d988e1b8cb0fda785e5d18b
SHA25604a007926a68bb33e36202eb27f53882af7fd009c1ec3ad7177fba380a5fb96f
SHA5126a575205c83b1fc3bfac164828fbdb3a25ead355a6071b7d443c0f8ab5796fe2601c48946c2e4c9915e08ad14106b4a01d2fcd534d50ea51c4bc88879d8bec8d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\Windows\3720402701\2219095117.priFilesize
207KB
MD5e2b88765ee31470114e866d939a8f2c6
SHA1e0a53b8511186ff308a0507b6304fb16cabd4e1f
SHA256523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e
SHA512462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.sechealthui_cw5n1h2txyewy\AC\Microsoft\Windows\4272278488\3302449443.priFilesize
65KB
MD5153393e3433cc37fb82899a854dc262c
SHA1db4fe1a5d4700dbd9c3c63febd50ce1b7cbcd881
SHA256c566ced32f0759eb7ced2ecea21eecfec01cf8cd981c54a4fecf0d685067b0de
SHA512a30e6843a26038339aecbc1de847d426ed3886c10a468fd4d02eea19000f868f6aaccdfbbb2e45251570c53c738cb2fea5af53ce3cba8b188d9eebd633ea242a
-
C:\Users\Admin\AppData\Local\Temp\wmsetup.logFilesize
1KB
MD5bd9bb13b2aec573bcf79ad87b0613f31
SHA1b11504db7338659d7b3c1feaaa534eb1ff540e76
SHA2562530e6c52f4ca3877a5d76128e290f72b6427b30e38835a69450e90e6ec2525b
SHA5121fcb9324e8219f923f3bc5b382e482b0329d72adcac4b26429b1f886e2ccc076ab631bfaa067579e23ef1f1feb1a50c69b8a52d06fa6de0ea723f06c5b7b3789
-
C:\Users\Admin\AppData\Roaming\Data\2.binFilesize
353KB
MD58766dce04feb646bf62206d64d6eb0ba
SHA191c5d588028c6c949e9cbcec950bcfaa35a791e4
SHA256f87e1ab69bef059744ee9244f37b0f21ef7d7b06fc5245094cfa22637ef6ae9d
SHA5120bc8fc880bb94ad55a732f2be207d88a6bb0ae8d97f91819e889d04420a71ae5d91af21861bad351c5fd7f4e944c1899b17df326bf19d310cc31a95fd38ee6a3
-
C:\Users\Admin\AppData\Roaming\Data\8.binFilesize
408KB
MD55ada580c290b53327fc8db29d5cd66c5
SHA1a504aff6a9fa93bf4ccb69df17b5238804c659f9
SHA2565dcf1f4b285a6dd70ec7acd77eeb5752a3d381a8a697eafd394fcde615f3ba63
SHA51236da1958e7b4fad5367b257d9343c4eab59d50b01c610514d48eae2d0eeabf7efd06dd8fc63551a0a7e11df91aa3ceb063003cdd9c30c6755431ba218524fd49
-
C:\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
21KB
MD55761ae6b5665092c45fc8e9292627f88
SHA1a7f18d7cf5438ee7dcb4e644163f495d3fa9c0ef
SHA2567acabca3631db2a73a5e20abd050097e44390ead1d74717aed936601904b73c2
SHA5121d743b407663e00a296c2ae45cb5a05a0866657afafbc9e8220e4c1839cbab2c09bf2a3510ec8016f902ccb7254edddf2a3412e7f5a4cafcabbeb5724a67b46e
-
C:\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
21KB
MD55761ae6b5665092c45fc8e9292627f88
SHA1a7f18d7cf5438ee7dcb4e644163f495d3fa9c0ef
SHA2567acabca3631db2a73a5e20abd050097e44390ead1d74717aed936601904b73c2
SHA5121d743b407663e00a296c2ae45cb5a05a0866657afafbc9e8220e4c1839cbab2c09bf2a3510ec8016f902ccb7254edddf2a3412e7f5a4cafcabbeb5724a67b46e
-
C:\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
21KB
MD55761ae6b5665092c45fc8e9292627f88
SHA1a7f18d7cf5438ee7dcb4e644163f495d3fa9c0ef
SHA2567acabca3631db2a73a5e20abd050097e44390ead1d74717aed936601904b73c2
SHA5121d743b407663e00a296c2ae45cb5a05a0866657afafbc9e8220e4c1839cbab2c09bf2a3510ec8016f902ccb7254edddf2a3412e7f5a4cafcabbeb5724a67b46e
-
C:\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
21KB
MD55761ae6b5665092c45fc8e9292627f88
SHA1a7f18d7cf5438ee7dcb4e644163f495d3fa9c0ef
SHA2567acabca3631db2a73a5e20abd050097e44390ead1d74717aed936601904b73c2
SHA5121d743b407663e00a296c2ae45cb5a05a0866657afafbc9e8220e4c1839cbab2c09bf2a3510ec8016f902ccb7254edddf2a3412e7f5a4cafcabbeb5724a67b46e
-
C:\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
21KB
MD55761ae6b5665092c45fc8e9292627f88
SHA1a7f18d7cf5438ee7dcb4e644163f495d3fa9c0ef
SHA2567acabca3631db2a73a5e20abd050097e44390ead1d74717aed936601904b73c2
SHA5121d743b407663e00a296c2ae45cb5a05a0866657afafbc9e8220e4c1839cbab2c09bf2a3510ec8016f902ccb7254edddf2a3412e7f5a4cafcabbeb5724a67b46e
-
C:\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
21KB
MD55761ae6b5665092c45fc8e9292627f88
SHA1a7f18d7cf5438ee7dcb4e644163f495d3fa9c0ef
SHA2567acabca3631db2a73a5e20abd050097e44390ead1d74717aed936601904b73c2
SHA5121d743b407663e00a296c2ae45cb5a05a0866657afafbc9e8220e4c1839cbab2c09bf2a3510ec8016f902ccb7254edddf2a3412e7f5a4cafcabbeb5724a67b46e
-
C:\Users\Admin\AppData\Roaming\data\12.binFilesize
5.4MB
MD59e0ab3181d32ac9950dbe1026b197207
SHA1d8b53f3a93d5e2df9507b6256f2e414712347256
SHA256a3091d14161d268924a4d6195f820c64b1811d6afbd6948dde29e267ecb56cae
SHA512424f8f0a6e945fcd831ca0d0f73f898dad0214f38cc477cb3be8b161836e349cd5d629444033e134e2fd6b8c85cae088f177aea4e26d7192a4f60a5739584c2e
-
C:\Users\Admin\Downloads\VineMEMZ-Original.exeFilesize
39.6MB
MD5b949ba30eb82cc79eeb7c2d64f483bcb
SHA18361089264726bb6cff752b3c137fde6d01f4d80
SHA2565f6a8f0e85704eb30340a872eec136623e57ab014b4dd165c68dd8cd76143923
SHA512e2acd4fe7627e55be3e019540269033f65d4954831a732d7a4bd50607260cd2a238832f604fa344f04be9f70e8757a9f2d797de37b440159a16bf3a6359a759b
-
C:\Users\Admin\Downloads\VineMEMZ-Original.exeFilesize
39.6MB
MD5b949ba30eb82cc79eeb7c2d64f483bcb
SHA18361089264726bb6cff752b3c137fde6d01f4d80
SHA2565f6a8f0e85704eb30340a872eec136623e57ab014b4dd165c68dd8cd76143923
SHA512e2acd4fe7627e55be3e019540269033f65d4954831a732d7a4bd50607260cd2a238832f604fa344f04be9f70e8757a9f2d797de37b440159a16bf3a6359a759b
-
C:\Users\Admin\Downloads\VineMEMZ-Original.exeFilesize
39.6MB
MD5b949ba30eb82cc79eeb7c2d64f483bcb
SHA18361089264726bb6cff752b3c137fde6d01f4d80
SHA2565f6a8f0e85704eb30340a872eec136623e57ab014b4dd165c68dd8cd76143923
SHA512e2acd4fe7627e55be3e019540269033f65d4954831a732d7a4bd50607260cd2a238832f604fa344f04be9f70e8757a9f2d797de37b440159a16bf3a6359a759b
-
C:\note.txtFilesize
133B
MD5910efec550edf98bf4f4e7ab50ca8f98
SHA14571d44dc60e892fb22ccd0bc2c79c3553560742
SHA2567349f657a8d247fc778b7dd68e88bc8aba73bf2c399dc17deb2c9114c038430b
SHA512320de5e34c129dd4a742ff352cfe0be2fac5874b593631529e53d5fe513709ac01f5d1d3dfae659f36a2a33aae51534ec838f5d3748cd6d1230a0f3d29341442
-
\??\pipe\crashpad_4360_RZGITUBQKMLLLNRBMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1612-1916-0x0000000003B60000-0x0000000003B70000-memory.dmpFilesize
64KB
-
memory/1612-1920-0x0000000003B70000-0x0000000003BB0000-memory.dmpFilesize
256KB
-
memory/1612-1913-0x0000000003B60000-0x0000000003B70000-memory.dmpFilesize
64KB
-
memory/1612-1914-0x0000000003B60000-0x0000000003B70000-memory.dmpFilesize
64KB
-
memory/1612-1915-0x0000000003B60000-0x0000000003B70000-memory.dmpFilesize
64KB
-
memory/1612-1917-0x0000000003B60000-0x0000000003B70000-memory.dmpFilesize
64KB
-
memory/1612-1918-0x0000000003B70000-0x0000000003BB0000-memory.dmpFilesize
256KB
-
memory/2552-1990-0x000002BB30A10000-0x000002BB30A12000-memory.dmpFilesize
8KB
-
memory/2552-2022-0x000002BB31C70000-0x000002BB31C72000-memory.dmpFilesize
8KB
-
memory/2552-2030-0x000002BB31D70000-0x000002BB31D72000-memory.dmpFilesize
8KB
-
memory/2552-2073-0x000002BB31DC0000-0x000002BB31DE0000-memory.dmpFilesize
128KB
-
memory/2552-2004-0x000002BB2FD20000-0x000002BB2FD40000-memory.dmpFilesize
128KB
-
memory/2552-1996-0x000002BB30C10000-0x000002BB30C12000-memory.dmpFilesize
8KB
-
memory/2552-1994-0x000002BB30BF0000-0x000002BB30BF2000-memory.dmpFilesize
8KB
-
memory/2552-1992-0x000002BB30B30000-0x000002BB30B32000-memory.dmpFilesize
8KB
-
memory/2552-2028-0x000002BB31D60000-0x000002BB31D62000-memory.dmpFilesize
8KB
-
memory/2552-1987-0x000002BB307F0000-0x000002BB307F2000-memory.dmpFilesize
8KB
-
memory/2552-1985-0x000002BB307D0000-0x000002BB307D2000-memory.dmpFilesize
8KB
-
memory/2552-1983-0x000002BB307B0000-0x000002BB307B2000-memory.dmpFilesize
8KB
-
memory/2552-1981-0x000002BB30790000-0x000002BB30792000-memory.dmpFilesize
8KB
-
memory/2552-2201-0x000002BB1F500000-0x000002BB1F600000-memory.dmpFilesize
1024KB
-
memory/2552-2026-0x000002BB31D30000-0x000002BB31D32000-memory.dmpFilesize
8KB
-
memory/2552-2024-0x000002BB31D10000-0x000002BB31D12000-memory.dmpFilesize
8KB
-
memory/2552-2020-0x000002BB31C60000-0x000002BB31C62000-memory.dmpFilesize
8KB
-
memory/3436-1939-0x000001AC11800000-0x000001AC11810000-memory.dmpFilesize
64KB
-
memory/3436-1921-0x000001AC11120000-0x000001AC11130000-memory.dmpFilesize
64KB
-
memory/3436-1958-0x000001AC104E0000-0x000001AC104E1000-memory.dmpFilesize
4KB
-
memory/3436-1960-0x000001AC15A20000-0x000001AC15A22000-memory.dmpFilesize
8KB
-
memory/3436-1962-0x000001AC15B70000-0x000001AC15B72000-memory.dmpFilesize
8KB
-
memory/3436-1963-0x000001AC15BA0000-0x000001AC15BA2000-memory.dmpFilesize
8KB
-
memory/3436-2010-0x000001AC17510000-0x000001AC17511000-memory.dmpFilesize
4KB
-
memory/3436-2011-0x000001AC17520000-0x000001AC17521000-memory.dmpFilesize
4KB