Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/07/2023, 19:16

230718-xyrwkadc59 9

18/07/2023, 18:54

230718-xkgtfaea5z 9

Analysis

  • max time kernel
    201s
  • max time network
    267s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/07/2023, 18:54

General

  • Target

    com.steam.687750_installer_44234475.msi

  • Size

    37.2MB

  • MD5

    b672d2824125bc19198f2b72a2681bc1

  • SHA1

    f4cb9c57397fc4c3110a1887f625527b88f41e38

  • SHA256

    a02b53d9de6a12ac62756d89aeba7196d51f42498171499a89ddc5105b0ac769

  • SHA512

    62e91a1266be9016cbb72ee3f8b3821d07fece71fefe6dcfd28b9d55836ff0092af47028874d22720f1468eedeb7afd777d753a5ad5b8a724b9d727b3d5a38bb

  • SSDEEP

    393216:0+WKfCjRguX1IHiZucfo3RwCn1VJopk4ZNtq9jSi79Es+w5dI80eaAJqsc5tlqH8:Tf23X1I0WRwCPOC4nvOck0l5SpXKB

Malware Config

Signatures

  • Renames multiple (54) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Blocklisted process makes network request 29 IoCs
  • Downloads MZ/PE file
  • Modifies Installed Components in the registry 2 TTPs 7 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 64 IoCs
  • Registers COM server for autorun 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\com.steam.687750_installer_44234475.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4928
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 91ECDF8232FB9E239844ACBB4431BECD C
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3240
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss72B1.tmp.ps1"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2520
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss8DCF.tmp.ps1"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        PID:4564
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss9D25.tmp.ps1"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        PID:1772
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Eclipse Media Inc\Installer Assistant\prerequisites\WCSetupv1.11.1052.27169.msi" /q
        3⤵
          PID:2896
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Eclipse Media Inc\Installer Assistant\prerequisites\BAv1411600.msi" /q
          3⤵
            PID:3256
          • C:\Windows\SysWOW64\msiexec.exe
            "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Eclipse Media Inc\Installer Assistant\prerequisites\BESetupv1.10.162.23111.msi" /q
            3⤵
              PID:436
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss2318.tmp.ps1"
              3⤵
              • Blocklisted process makes network request
              PID:4696
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss306A.tmp.ps1"
              3⤵
                PID:4476
                • C:\Users\Admin\AppData\Local\Temp\setup_com.steam.687750_flow6mkt_44234475.exe
                  "C:\Users\Admin\AppData\Local\Temp\setup_com.steam.687750_flow6mkt_44234475.exe"
                  4⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  PID:4484
                  • C:\Users\Admin\AppData\Local\Temp\pcgame_CB5DF222\setup_com.steam.687750_flow6mkt_44234475.exe
                    "C:\Users\Admin\AppData\Local\Temp\pcgame_CB5DF222\setup_com.steam.687750_flow6mkt_44234475.exe" /app "C:\Users\Admin\AppData\Local\MobiGame\\"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SetWindowsHookEx
                    PID:2868
                    • C:\Windows\SYSTEM32\cmd.exe
                      "cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\pcgame_CB5DF222\utils\sysinfo-app.exe"
                      6⤵
                        PID:4892
                        • C:\Users\Admin\AppData\Local\Temp\pcgame_CB5DF222\utils\sysinfo-app.exe
                          C:\Users\Admin\AppData\Local\Temp\pcgame_CB5DF222\utils\sysinfo-app.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:5060
                      • C:\Users\Admin\AppData\Local\Temp\pcgame_CB5DF222\MobiHelper.exe
                        "MobiHelper.exe" --install-path="C:\Program Files\MobiGame" --desktop-path="C:\Users\Admin\Desktop" --local-app-data-path="C:\Users\Admin\AppData\Local\MobiGame" --parent="C:\Users\Admin\AppData\Local\Temp\pcgame_CB5DF222\setup_com.steam.687750_flow6mkt_44234475.exe" --playstore-json-file-path="C:\Users\Admin\AppData\Local\MobiGame\playstore.json" --google-analytics-id="44234475" --create-playstore-shortcut --api-url="https://gamestore30.emu.codes" --source="flow6mkt"
                        6⤵
                        • Executes dropped EXE
                        PID:4668
                        • C:\Windows\system32\ie4uinit.exe
                          "C:\Windows\system32\ie4uinit.exe" -show
                          7⤵
                          • Modifies Installed Components in the registry
                          • Registers COM server for autorun
                          • Modifies Internet Explorer settings
                          • Modifies registry class
                          PID:2512
                      • C:\Windows\system32\ie4uinit.exe
                        "C:\Windows\system32\ie4uinit.exe" -show
                        6⤵
                        • Modifies Installed Components in the registry
                        • Modifies Internet Explorer settings
                        • Modifies registry class
                        PID:544
              • C:\Windows\syswow64\MsiExec.exe
                C:\Windows\syswow64\MsiExec.exe -Embedding 75E8EAC3784F9D2493A86BD724CE665B
                2⤵
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:2228
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss7A3E.tmp.ps1"
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1544
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss8DCA.tmp.ps1"
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3456
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss9CE1.tmp.ps1"
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2616
                  • C:\Users\Admin\AppData\Roaming\BBWC\7za.exe
                    "C:\Users\Admin\AppData\Roaming/BBWC/7za.exe" x WC.7z -y -p1.11.1052.27169
                    4⤵
                    • Executes dropped EXE
                    PID:3400
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssAA34.tmp.ps1"
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1548
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssB728.tmp.ps1"
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2196
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssC64F.tmp.ps1"
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4504
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssE082.tmp.ps1"
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:432
              • C:\Windows\Installer\MSIC633.tmp
                "C:\Windows\Installer\MSIC633.tmp" /DontWait /HideWindow /dir "C:\Users\Admin\AppData\Roaming\BBWC\" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -noninteractive -ExecutionPolicy bypass -c "$w="$env:APPDATA"+'/BBWC/';[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes($w+'Newtonsoft.Json.dll'));[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes($w+'System.Data.SQLite.dll'));[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes($w+'ICSharpCode.SharpZipLib.dll'));[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes($w+'LZ4.dll'));$f=$w+'WC.txt';$h=Get-Content -Path $f -Raw;$h=Get-Content -Path $f -Raw;[byte[]]$bytes=($h -split '(.{2})' -ne '' -replace '^','0X');[Reflection.Assembly]::Load($bytes);[WebCompanion.StartUp]::Start()"
                2⤵
                • Executes dropped EXE
                PID:4952
              • C:\Windows\syswow64\MsiExec.exe
                C:\Windows\syswow64\MsiExec.exe -Embedding 67AC7EA82D8FDBE270CBB5F29B5F3EA2
                2⤵
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3852
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssFC5E.tmp.ps1"
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2592
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss7DC.tmp.ps1"
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:1988
                  • C:\Windows\SysWOW64\taskkill.exe
                    "C:\Windows\system32\taskkill.exe" /F /pid
                    4⤵
                    • Kills process with taskkill
                    PID:3596
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss221F.tmp.ps1"
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2368
                  • C:\Users\Admin\AppData\Roaming\Browser Assistant\7za.exe
                    "C:\Users\Admin\AppData\Roaming/Browser Assistant/7za.exe" x Data2.7z -y -p1.41.1600.26808
                    4⤵
                    • Executes dropped EXE
                    PID:4120
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss5A59.tmp.ps1"
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5076
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss7DC4.tmp.ps1"
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3772
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss89CE.tmp.ps1"
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4648
              • C:\Windows\Installer\MSI89C1.tmp
                "C:\Windows\Installer\MSI89C1.tmp" /DontWait /HideWindow /dir "C:\Users\Admin\AppData\Roaming\Browser Assistant\" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -noninteractive -ExecutionPolicy bypass -c "& ./edge/x86/node.exe ./edge/startup.js"
                2⤵
                • Executes dropped EXE
                PID:3596
              • C:\Windows\syswow64\MsiExec.exe
                C:\Windows\syswow64\MsiExec.exe -Embedding 13E936D4578EAB773CD3BA1BD12A2055
                2⤵
                • Loads dropped DLL
                PID:3676
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss94B6.tmp.ps1"
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4480
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss9EFB.tmp.ps1"
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1740
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssA6C0.tmp.ps1"
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4632
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssB9B0.tmp.ps1"
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4308
                  • C:\Users\Admin\AppData\Roaming\Browser Extension\7za.exe
                    "C:\Users\Admin\AppData\Roaming/Browser Extension/7za.exe" x Data.7z -y -p1.10.162.23111
                    4⤵
                    • Executes dropped EXE
                    PID:3852
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssC6F2.tmp.ps1"
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:892
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssD03D.tmp.ps1"
                  3⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2500
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssDBBB.tmp.ps1"
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4528
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssE69C.tmp.ps1"
                  3⤵
                    PID:2296
                • C:\Windows\Installer\MSIDB88.tmp
                  "C:\Windows\Installer\MSIDB88.tmp" /DontWait /HideWindow /dir "C:\Users\Admin\AppData\Roaming\Browser Extension\" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy bypass -c "$w="$env:APPDATA"+'/Browser Extension/BE.txt';$h=Get-Content -Path $w -Raw;[byte[]]$bytes=($h -split '(.{2})' -ne '' -replace '^','0X');[Reflection.Assembly]::Load($bytes);[WebCompanion.BrowserExtension.S]::Start()"
                  2⤵
                  • Executes dropped EXE
                  PID:116
                • C:\Windows\syswow64\MsiExec.exe
                  C:\Windows\syswow64\MsiExec.exe -Embedding E8ACDC8C183595A8CBD890690B58EE59
                  2⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  PID:1496
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssB7D.tmp.ps1"
                    3⤵
                    • Blocklisted process makes network request
                    PID:3352
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noninteractive -ExecutionPolicy bypass -c "$w="$env:APPDATA"+'/BBWC/';[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes($w+'Newtonsoft.Json.dll'));[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes($w+'System.Data.SQLite.dll'));[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes($w+'ICSharpCode.SharpZipLib.dll'));[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes($w+'LZ4.dll'));$f=$w+'WC.txt';$h=Get-Content -Path $f -Raw;$h=Get-Content -Path $f -Raw;[byte[]]$bytes=($h -split '(.{2})' -ne '' -replace '^','0X');[Reflection.Assembly]::Load($bytes);[WebCompanion.StartUp]::Start()"
                1⤵
                • Blocklisted process makes network request
                • Suspicious behavior: EnumeratesProcesses
                PID:2492
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noninteractive -ExecutionPolicy bypass -c "& ./edge/x86/node.exe ./edge/startup.js"
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:2292
                • C:\Users\Admin\AppData\Roaming\Browser Assistant\edge\x86\node.exe
                  "C:\Users\Admin\AppData\Roaming\Browser Assistant\edge\x86\node.exe" ./edge/startup.js
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3552
                  • C:\Users\Admin\AppData\Roaming\Browser Assistant\7za.exe
                    7za.exe e -so -p1.41.1600.26808 "C:\Users\Admin\AppData\Roaming\Browser Assistant\Driver.7z" BrowserAssistant.Driver.dll
                    3⤵
                    • Executes dropped EXE
                    PID:3368
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -c "$w="$env:APPDATA"+'/Browser Extension/BE.txt';$h=Get-Content -Path $w -Raw;[byte[]]$bytes=($h -split '(.{2})' -ne '' -replace '^','0X');[Reflection.Assembly]::Load($bytes);[WebCompanion.BrowserExtension.S]::Start()"
                1⤵
                • Blocklisted process makes network request
                PID:3736
              • C:\Windows\system32\vssvc.exe
                C:\Windows\system32\vssvc.exe
                1⤵
                  PID:3436
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c
                  1⤵
                    PID:4712
                  • C:\Windows\system32\wbem\WmiApSrv.exe
                    C:\Windows\system32\wbem\WmiApSrv.exe
                    1⤵
                      PID:2484
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell.exe -ExecutionPolicy bypass -c "[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes('Newtonsoft.Json.dll'));[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes('System.Data.SQLite.dll'));[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes('ICSharpCode.SharpZipLib.dll'));[Reflection.Assembly]::Load([System.IO.File]::ReadAllBytes('LZ4.dll'));$h=Get-Content -Path 'WC.txt' -Raw;[byte[]]$bytes=($h -split '(.{2})' -ne '' -replace '^', '0X');[Reflection.Assembly]::Load($bytes);[WebCompanion.StartUp]::Start('',1)"
                      1⤵
                        PID:1972

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Config.Msi\e5876c4.rbs

                        Filesize

                        12KB

                        MD5

                        1d98a8a38a7ef3360054a45e3ec0d9e2

                        SHA1

                        47f7c11764da5612c2105687cebda98105acab54

                        SHA256

                        85dde7c06d4f91f2704b8323efaa4cb690490fcc09685848a60c076bd8554b2a

                        SHA512

                        bbc87fa4406d7d349b029fa36cee642e46d2b36dc17eb1c7cb500163f609f32aaed167fe85c820f1e53c23d1bb1e6040b8a8057fc0d19921d61e49a8fa8f1579

                      • C:\Config.Msi\e5876c9.rbs

                        Filesize

                        21KB

                        MD5

                        96f92f7f099211e7d58598015db68469

                        SHA1

                        1b896efd07fbbcddf4b7919b182cb9dc57073d27

                        SHA256

                        ecec5a73847c07f2f673aed057357ce5b5b38746e1caee7196200c3382b4a86d

                        SHA512

                        448105b1675ffc2cb1d0b7728141da153e593d9d5e78774ff515e154be24c49aa7bfdf24361d1d1a72e87be007b7097c671076130d5741b01b972edc7536779d

                      • C:\Config.Msi\e5876ce.rbs

                        Filesize

                        12KB

                        MD5

                        0a3821d14cf38e4a231795e4d281c60d

                        SHA1

                        75ce7abcea8e67600cc19a6567f6564890431b5b

                        SHA256

                        d1c5a5e3893ef4f2537bee3ec75f7e244d05052d62724036382c43e45bae69cd

                        SHA512

                        275adef6e8f0182a29d6b3ebc95742f2959f75e1514a788db1597e2523e9c1890a088ff20ed88fe986c444e1d1ebe847ba91ffd19f826bea2510d21789391ea0

                      • C:\Config.Msi\e5876d1.rbs

                        Filesize

                        481KB

                        MD5

                        b8f49d3bffd79776895e07502d697c24

                        SHA1

                        765e971506f52c65351e49b030dd52bb71d1f51d

                        SHA256

                        54c234f2cdf376155c2025a3d47a5c65a0801e663ca1ad80c959e72db3d82934

                        SHA512

                        549e8a55793c3b9019e19e0e49074f22ef2ddf2e6201edafd779b885171985968ab166082de236f87ee52871815845991d650d5666bc925a68e202c931db5a54

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                        Filesize

                        2KB

                        MD5

                        6832ae680e8ddacc9752c84ff4ee94d5

                        SHA1

                        eba38e3a46f6a27ec29c567c6766ba57fe7954ba

                        SHA256

                        19c4f3bc855b449022b1baf50569236e2d844e3f323453291495de125f76e632

                        SHA512

                        9cea7dcd3b0bf6bb6c1fd15aea43312cb52926e2e61455fcb26a6dd82323e352b9960f4afe412891be2aba54230ef354772e5397df8c6100e5aab875247fa1ef

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        20KB

                        MD5

                        4103edd1ad35f4da62c6888a115a84b1

                        SHA1

                        e246696c4fe5a7ad2bb77dbbd3fabdca31bd5150

                        SHA256

                        12e37ff44c9da7370cad28d8a50c33139492a9ddf0eb4583cb732f9077f7198c

                        SHA512

                        92289380691f2b068e618ef811cd52d89d788f7dbfdd8e991231b4e484d6404461158977cc6bd7fc716d7a72cf3b5fefd2615d944ab51f549126d36a4fbb22c5

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        18KB

                        MD5

                        70b123bada4869bc1547c4ff080b7569

                        SHA1

                        349c0eeacf451598fe4278defffb9ddc50fa77bc

                        SHA256

                        60f9aca57e83fdf11d47e30e83669bfc36b9b85c5b6989d6e3ffbb3d92d7aab7

                        SHA512

                        6547bd16863f74393b7ceb56cc3d8cffff3590533df66a6341b5accbe02fdc209df213b255b03c73589f2f0468ffc05902c4fec7507fd89f9137e8ecdf515efd

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        19KB

                        MD5

                        99193a162b04168f4cd28edc4e3bf4e5

                        SHA1

                        124ce311574ca19ea7b7c47558d35a6f35f7fe84

                        SHA256

                        1592293126298de63d302b58489d73ebd6b3cb832019e66b00064235bdd7cb96

                        SHA512

                        3b6f9428db4b94fdd23a4d41c0e2fe9b473fd68f97e5872ce6f5f7556380e3e2d8366706ea335cc04c814e17598536f21c7c20187b733b7f662792155452f791

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        20KB

                        MD5

                        48fb167221bddd7ce5a328363fc5df06

                        SHA1

                        3fe0fcd21a503dfde7b8ca7afeca83c8bf8df1f7

                        SHA256

                        379678e501b7e308a98eb0d4ab65b12abfe3396641a9a2ed6173031345ef1953

                        SHA512

                        4e4b5ff77841ec410792faeab9204c4c46e45af02efe7ba4b2472d42253f5e47bb9fc0a4e5dcb1526b0ccc8cfe5d269eeac98b1f2666cae1fd05351b25faf2b7

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        17KB

                        MD5

                        e8e4e0751f6482475e101a93c5362bc7

                        SHA1

                        7ee7110ff8d7e59e4a57d24ed29c4f7c51d1f187

                        SHA256

                        5d4310911d05f1c64a52d8bcf0a45fbac97252fec21ed47118724974b4dfa364

                        SHA512

                        b22b8213aa2ff38c223a0e770b4620daa357b17d71bb46921ca5f78166b003713581ea42f9f06f520ac9f01c2d606d616eff3baf1199f00490e1de300787d7aa

                      • C:\Users\Admin\AppData\Local\MobiGame\logs\downloader.log

                        Filesize

                        3KB

                        MD5

                        337ddae5e41274e1fc9796ce66b7a9a7

                        SHA1

                        fe5a63e2b8c505b14843eb041871fecdc33575de

                        SHA256

                        98c2ad025e42c33ba9a293c4328a8db43bfb3c6dc5ab6b5469862a0041e242e7

                        SHA512

                        d0b487326f1f10cbdb11febf0dc72b56d5e82aad48d84dcefd0952b25d2939b3c37307a3ab6868b4eb7c54c3ec5ed9bac8b23212b8f98fa1db8e3ecee89d2a3c

                      • C:\Users\Admin\AppData\Local\MobiGame\logs\downloader.log

                        Filesize

                        4KB

                        MD5

                        356aa8354b6f2e5a5b6600e8bb0e0273

                        SHA1

                        1603d6a5c54cf988a0738afd0a691848e78d85ab

                        SHA256

                        d4d7bf81797032f2f6a2f9525bae6b70d21fcf7b498997ef763b40e6145c81a8

                        SHA512

                        267671c711885a18ebc034169a7cae8841d417aa77494b666761a1da7c379b1344c46d48ea812b495de1b1db520364bf0b8636632f03174c485a85e95447872c

                      • C:\Users\Admin\AppData\Local\Temp\MSI6D84.tmp

                        Filesize

                        568KB

                        MD5

                        a3aa72600009a787d43e416607b93788

                        SHA1

                        edca472f111824f894692e827960d93a96695319

                        SHA256

                        4682dde803565d892faeb5e4cde49364829d950e6f71592eeaf9ad2d2c227c7c

                        SHA512

                        c733862e75cb6bed056b0f8399e28865ca2b4ae346c83ae5fc6c0996c9ab2c56f688edf46b3ccf01cf3bbeba80b284e7e749897b3094337fac55c72cc9f3d86f

                      • C:\Users\Admin\AppData\Local\Temp\MSI6D84.tmp

                        Filesize

                        568KB

                        MD5

                        a3aa72600009a787d43e416607b93788

                        SHA1

                        edca472f111824f894692e827960d93a96695319

                        SHA256

                        4682dde803565d892faeb5e4cde49364829d950e6f71592eeaf9ad2d2c227c7c

                        SHA512

                        c733862e75cb6bed056b0f8399e28865ca2b4ae346c83ae5fc6c0996c9ab2c56f688edf46b3ccf01cf3bbeba80b284e7e749897b3094337fac55c72cc9f3d86f

                      • C:\Users\Admin\AppData\Local\Temp\MSI6E12.tmp

                        Filesize

                        568KB

                        MD5

                        a3aa72600009a787d43e416607b93788

                        SHA1

                        edca472f111824f894692e827960d93a96695319

                        SHA256

                        4682dde803565d892faeb5e4cde49364829d950e6f71592eeaf9ad2d2c227c7c

                        SHA512

                        c733862e75cb6bed056b0f8399e28865ca2b4ae346c83ae5fc6c0996c9ab2c56f688edf46b3ccf01cf3bbeba80b284e7e749897b3094337fac55c72cc9f3d86f

                      • C:\Users\Admin\AppData\Local\Temp\MSI6E12.tmp

                        Filesize

                        568KB

                        MD5

                        a3aa72600009a787d43e416607b93788

                        SHA1

                        edca472f111824f894692e827960d93a96695319

                        SHA256

                        4682dde803565d892faeb5e4cde49364829d950e6f71592eeaf9ad2d2c227c7c

                        SHA512

                        c733862e75cb6bed056b0f8399e28865ca2b4ae346c83ae5fc6c0996c9ab2c56f688edf46b3ccf01cf3bbeba80b284e7e749897b3094337fac55c72cc9f3d86f

                      • C:\Users\Admin\AppData\Local\Temp\MSI6E12.tmp

                        Filesize

                        568KB

                        MD5

                        a3aa72600009a787d43e416607b93788

                        SHA1

                        edca472f111824f894692e827960d93a96695319

                        SHA256

                        4682dde803565d892faeb5e4cde49364829d950e6f71592eeaf9ad2d2c227c7c

                        SHA512

                        c733862e75cb6bed056b0f8399e28865ca2b4ae346c83ae5fc6c0996c9ab2c56f688edf46b3ccf01cf3bbeba80b284e7e749897b3094337fac55c72cc9f3d86f

                      • C:\Users\Admin\AppData\Local\Temp\MSI6F92.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Users\Admin\AppData\Local\Temp\MSI6F92.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Users\Admin\AppData\Local\Temp\MSI70D2.tmp

                        Filesize

                        568KB

                        MD5

                        a3aa72600009a787d43e416607b93788

                        SHA1

                        edca472f111824f894692e827960d93a96695319

                        SHA256

                        4682dde803565d892faeb5e4cde49364829d950e6f71592eeaf9ad2d2c227c7c

                        SHA512

                        c733862e75cb6bed056b0f8399e28865ca2b4ae346c83ae5fc6c0996c9ab2c56f688edf46b3ccf01cf3bbeba80b284e7e749897b3094337fac55c72cc9f3d86f

                      • C:\Users\Admin\AppData\Local\Temp\MSI70D2.tmp

                        Filesize

                        568KB

                        MD5

                        a3aa72600009a787d43e416607b93788

                        SHA1

                        edca472f111824f894692e827960d93a96695319

                        SHA256

                        4682dde803565d892faeb5e4cde49364829d950e6f71592eeaf9ad2d2c227c7c

                        SHA512

                        c733862e75cb6bed056b0f8399e28865ca2b4ae346c83ae5fc6c0996c9ab2c56f688edf46b3ccf01cf3bbeba80b284e7e749897b3094337fac55c72cc9f3d86f

                      • C:\Users\Admin\AppData\Local\Temp\MSI7233.tmp

                        Filesize

                        632KB

                        MD5

                        07ebb743bbd7230e04c23bcbaa03fc44

                        SHA1

                        8e6deee1ffb202f60c10aa7d7756395534e40dcf

                        SHA256

                        194b29c26d925fdc1f1aa1802714118d0ca30e413c7fea5c19a928eba7cc43b0

                        SHA512

                        f02b6f0caa860ba97d5a887bbdb28a6d417b2aa4dde91beeff57a99e05508a10b063ef1d025223fa2f566cc208f86401a38abc445d20bf208c5a4f92bb53ac24

                      • C:\Users\Admin\AppData\Local\Temp\MSI7233.tmp

                        Filesize

                        632KB

                        MD5

                        07ebb743bbd7230e04c23bcbaa03fc44

                        SHA1

                        8e6deee1ffb202f60c10aa7d7756395534e40dcf

                        SHA256

                        194b29c26d925fdc1f1aa1802714118d0ca30e413c7fea5c19a928eba7cc43b0

                        SHA512

                        f02b6f0caa860ba97d5a887bbdb28a6d417b2aa4dde91beeff57a99e05508a10b063ef1d025223fa2f566cc208f86401a38abc445d20bf208c5a4f92bb53ac24

                      • C:\Users\Admin\AppData\Local\Temp\MSI8A50.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Users\Admin\AppData\Local\Temp\MSI8A50.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Users\Admin\AppData\Local\Temp\MSI8BA9.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Users\Admin\AppData\Local\Temp\MSI8BA9.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Users\Admin\AppData\Local\Temp\MSI8BA9.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Users\Admin\AppData\Local\Temp\MSI8C08.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Users\Admin\AppData\Local\Temp\MSI8C08.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Users\Admin\AppData\Local\Temp\MSI8DAE.tmp

                        Filesize

                        632KB

                        MD5

                        07ebb743bbd7230e04c23bcbaa03fc44

                        SHA1

                        8e6deee1ffb202f60c10aa7d7756395534e40dcf

                        SHA256

                        194b29c26d925fdc1f1aa1802714118d0ca30e413c7fea5c19a928eba7cc43b0

                        SHA512

                        f02b6f0caa860ba97d5a887bbdb28a6d417b2aa4dde91beeff57a99e05508a10b063ef1d025223fa2f566cc208f86401a38abc445d20bf208c5a4f92bb53ac24

                      • C:\Users\Admin\AppData\Local\Temp\MSI8DAE.tmp

                        Filesize

                        632KB

                        MD5

                        07ebb743bbd7230e04c23bcbaa03fc44

                        SHA1

                        8e6deee1ffb202f60c10aa7d7756395534e40dcf

                        SHA256

                        194b29c26d925fdc1f1aa1802714118d0ca30e413c7fea5c19a928eba7cc43b0

                        SHA512

                        f02b6f0caa860ba97d5a887bbdb28a6d417b2aa4dde91beeff57a99e05508a10b063ef1d025223fa2f566cc208f86401a38abc445d20bf208c5a4f92bb53ac24

                      • C:\Users\Admin\AppData\Local\Temp\MSI9CD2.tmp

                        Filesize

                        632KB

                        MD5

                        07ebb743bbd7230e04c23bcbaa03fc44

                        SHA1

                        8e6deee1ffb202f60c10aa7d7756395534e40dcf

                        SHA256

                        194b29c26d925fdc1f1aa1802714118d0ca30e413c7fea5c19a928eba7cc43b0

                        SHA512

                        f02b6f0caa860ba97d5a887bbdb28a6d417b2aa4dde91beeff57a99e05508a10b063ef1d025223fa2f566cc208f86401a38abc445d20bf208c5a4f92bb53ac24

                      • C:\Users\Admin\AppData\Local\Temp\MSI9CD2.tmp

                        Filesize

                        632KB

                        MD5

                        07ebb743bbd7230e04c23bcbaa03fc44

                        SHA1

                        8e6deee1ffb202f60c10aa7d7756395534e40dcf

                        SHA256

                        194b29c26d925fdc1f1aa1802714118d0ca30e413c7fea5c19a928eba7cc43b0

                        SHA512

                        f02b6f0caa860ba97d5a887bbdb28a6d417b2aa4dde91beeff57a99e05508a10b063ef1d025223fa2f566cc208f86401a38abc445d20bf208c5a4f92bb53ac24

                      • C:\Users\Admin\AppData\Local\Temp\MSI9CD2.tmp

                        Filesize

                        632KB

                        MD5

                        07ebb743bbd7230e04c23bcbaa03fc44

                        SHA1

                        8e6deee1ffb202f60c10aa7d7756395534e40dcf

                        SHA256

                        194b29c26d925fdc1f1aa1802714118d0ca30e413c7fea5c19a928eba7cc43b0

                        SHA512

                        f02b6f0caa860ba97d5a887bbdb28a6d417b2aa4dde91beeff57a99e05508a10b063ef1d025223fa2f566cc208f86401a38abc445d20bf208c5a4f92bb53ac24

                      • C:\Users\Admin\AppData\Local\Temp\MSI9D12.tmp

                        Filesize

                        568KB

                        MD5

                        a3aa72600009a787d43e416607b93788

                        SHA1

                        edca472f111824f894692e827960d93a96695319

                        SHA256

                        4682dde803565d892faeb5e4cde49364829d950e6f71592eeaf9ad2d2c227c7c

                        SHA512

                        c733862e75cb6bed056b0f8399e28865ca2b4ae346c83ae5fc6c0996c9ab2c56f688edf46b3ccf01cf3bbeba80b284e7e749897b3094337fac55c72cc9f3d86f

                      • C:\Users\Admin\AppData\Local\Temp\MSI9D12.tmp

                        Filesize

                        568KB

                        MD5

                        a3aa72600009a787d43e416607b93788

                        SHA1

                        edca472f111824f894692e827960d93a96695319

                        SHA256

                        4682dde803565d892faeb5e4cde49364829d950e6f71592eeaf9ad2d2c227c7c

                        SHA512

                        c733862e75cb6bed056b0f8399e28865ca2b4ae346c83ae5fc6c0996c9ab2c56f688edf46b3ccf01cf3bbeba80b284e7e749897b3094337fac55c72cc9f3d86f

                      • C:\Users\Admin\AppData\Local\Temp\MSI9D61.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Users\Admin\AppData\Local\Temp\MSI9D61.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Users\Admin\AppData\Local\Temp\MSI9DB0.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Users\Admin\AppData\Local\Temp\MSI9DB0.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Users\Admin\AppData\Local\Temp\MobiGame_resume\setup_com.steam.687750_flow6mkt_44234475.exe.config

                        Filesize

                        3KB

                        MD5

                        94edc01dd811ef15634a30e3ea4e1520

                        SHA1

                        6c9c92a3002fa79d50c991725cc8c86dbd39f2e9

                        SHA256

                        cfd03708204405726a4921654fbe41336bfdfac7e446352691499a1ae859783d

                        SHA512

                        5f004eccb14199409ebd7987dfb3f8481b234b14525c4aff71de0437c203958699e91c54e3e76224188dfe502ef963f0904428e445ac894a0d6c344d94228c44

                      • C:\Users\Admin\AppData\Local\Temp\Pro2319.tmp

                        Filesize

                        42B

                        MD5

                        5b5fe5124b458ce0d7acd870cc8bf607

                        SHA1

                        7b94b425e655a65a0507f82ec0e88220ba8b1ed4

                        SHA256

                        5b3d92b4eb656e55ca988da57c874527d3cafebf87f06b3389f96abb5900cb77

                        SHA512

                        f371cdd01d9febf56017b2f5c9e39498e782f92a1868f9740ba1593cd15f72a408bcff6cb7e57a7841bdc007f91eaa313ce7c1e7b0ac6351c559609823ab9759

                      • C:\Users\Admin\AppData\Local\Temp\Pro5A6A.tmp

                        Filesize

                        21B

                        MD5

                        27931970a207104aef1bf5e876df72d1

                        SHA1

                        c887556f7b68a01cad1a80891dbe710ac94c369e

                        SHA256

                        d7caf088ea4653dee1bde8664827d051e02b377d354f39b559056c7f9ebca5b8

                        SHA512

                        52e050972eb4102fcaa49b875da572270bceba60fc1a724ac775721b67d70fffe79ab65238f96c52879b8a85bc0375e4d86a90cb28c025a2c598f2adb2701e94

                      • C:\Users\Admin\AppData\Local\Temp\ProE69D.tmp

                        Filesize

                        164B

                        MD5

                        0c6982404ea88056e090dc67ff7dc467

                        SHA1

                        ea0c65e486eef042a62df1e3a0519c3b4ff55e36

                        SHA256

                        70e82ce55c841c21f0790217c4beffc37df50b052c2e65e8e12d8eeb0e7bd7db

                        SHA512

                        47b172f6c7fa868610c79f5363b658eff96dd5bf590c3a9b580dce333e316eaffc499aedc918e0b28c51a71afc068bca057fc0efaf242a772d8d3318835d592d

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_l2p0xljm.ewd.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\msi7242.tmp.txt

                        Filesize

                        60B

                        MD5

                        836d1bbd9e1a7eab40af114d9e471095

                        SHA1

                        ac6474809291b7d95e325016b476efa146afb3a0

                        SHA256

                        e27af88a94981c5dda0f8855e671c398efae186d87fc7f1755085561852d330b

                        SHA512

                        de47fd16b343bb627b360a9d2667cb87aa52336062866d3f2486a24effefb35abe182f69c51bb6bc59975dab89e14707a072b8a5f3322c500954c16bfd4060ee

                      • C:\Users\Admin\AppData\Local\Temp\msi8DCD.tmp.txt

                        Filesize

                        98B

                        MD5

                        f95c022d8e6024a471feb39412a9916c

                        SHA1

                        0f306b5a876090494007ad0a3c867aebe654637b

                        SHA256

                        5d4b10a2e53f6ad12525959da5e1a514f0fe28c63138bd150ed260f7060f1e1b

                        SHA512

                        ede368f10d6e80cc713d3ed79e9ff125e2b875311249383f8dfe724fded45adc9fc1049443f3406480c1c8ad4ee38707cba9ed3b8f28080e3e4a55e0aec29d0b

                      • C:\Users\Admin\AppData\Local\Temp\pcgame_CB5DF222\setup_com.steam.687750_flow6mkt_44234475.exe

                        Filesize

                        825KB

                        MD5

                        2284a6f1e1d63f4e03a1755b89a17a68

                        SHA1

                        65aebffe5d83ef4146dc1111a6d0f354b50dfea6

                        SHA256

                        aef89216fe69c56ab9bf0bad6acc0279a069c27deb2f9f3ac79bafe070446a6e

                        SHA512

                        e3490cb97ffdf0835d1e4eb95555ea7b2eefa1f9c2360fc16787cc1efa2bc58561ad8ee491efe69e54de97eeeeee56c60cbbfec06f6c2fbe51cfdac6a7071c11

                      • C:\Users\Admin\AppData\Local\Temp\pss7243.tmp.ps1

                        Filesize

                        1KB

                        MD5

                        b73a574214c3df0808adb8ed865c922b

                        SHA1

                        bf0ac25a4f40c7f4f5023face07d22b100cfa10f

                        SHA256

                        40d28970bbb468a94819e72eb69a908a788ee999fece87f421c680a5eee91c34

                        SHA512

                        929553551e42e9180b77d063ce7a10c30f3b6ccba5560a1bf179b1d8436b39671be5e1bbc715470f3b9b9f4c2ad73bbc3dbb6beb6c2cef5ff5b9fe0c49d8bffe

                      • C:\Users\Admin\AppData\Local\Temp\pss72B1.tmp.ps1

                        Filesize

                        5KB

                        MD5

                        3d4d6ea069ecdda3366511ec587a86c7

                        SHA1

                        1072951f209ca387024f27411980d568242c8f3d

                        SHA256

                        68100ca41d59f0ada8921d8737f6292b85d78d8a66433b63c3096a11b9e14ee3

                        SHA512

                        2df4122a1c09f08c8ca7e901be7492389b3c4c20936222683cbfc5892ff049f8f4f3f2ae39a352bde4772f1f8d8b4093058b3953cbd00a6bb57191c2ce3942f7

                      • C:\Users\Admin\AppData\Local\Temp\pss7A3D.tmp.ps1

                        Filesize

                        2KB

                        MD5

                        2ef0d6f2e32f62a0986a36454a2200eb

                        SHA1

                        4d3632d145f8f1a426ae6c22f0aebae101b0af52

                        SHA256

                        2a100b9b2b30dac52716c659ba8ac6dbdc78cf462074808bab237385038c9bc6

                        SHA512

                        fdfae63b712db89bc637e9ccf3f31dfeb3f4f0373ecdd771a44d879cc04ed2fd1d2227941d5bad25719bcb2462277e9597f4b233997b83f28d930495678e0726

                      • C:\Users\Admin\AppData\Local\Temp\pss7A3E.tmp.ps1

                        Filesize

                        5KB

                        MD5

                        08f6c73912a3560f0765c0e9af2c28a8

                        SHA1

                        f303b25331fa3001c523ac8c776f0b48737b746d

                        SHA256

                        3f5ce877050d412bd4328de2f96e3341263e00b8b4c35d09bfe68345ba97db1a

                        SHA512

                        81d6d50e4f6943e87dec3724eb3324a15803b4fe4cec37cf69dddb24a2888fbc09469336b3c07d2f528e4f50e1c26d193b1c7aae3381a21b870d4139fafce81a

                      • C:\Users\Admin\AppData\Local\Temp\pss8DC9.tmp.ps1

                        Filesize

                        1KB

                        MD5

                        92e8f020390914efb6138613cc07f449

                        SHA1

                        8b4fa4c6d0b8832eb4380b3f9a861c0788ec18e5

                        SHA256

                        26cf0f5c2dfa1e3589e689f4a16041be87fcaf2b31b7be0ded273c483d9577c2

                        SHA512

                        980d19faf254a634b0b362c0d19ecb041caf32ccdfdb3ab45acc5f7a6e307a209def8ce5aea5523ec3517fc1c2eb49e10dc41759cb83becff61f13347309f677

                      • C:\Users\Admin\AppData\Local\Temp\pss8DCA.tmp.ps1

                        Filesize

                        5KB

                        MD5

                        299a7c5ee2ac79e806fdd64d3cc948d0

                        SHA1

                        c54458fe2d607e08f4934fb849d90da7548a5666

                        SHA256

                        6084e68b926fb2ad93a054b088a5d6091d0e969e095198cb097e2e56cbeeb777

                        SHA512

                        6445b8080b992493e590bf5de402d306e83ed66e4dee60bbdb9a03060454a612ba49d3fbd87071dee6f45859cc8e26be18d68ea00ba17b542a0d3aedbea338d4

                      • C:\Users\Admin\AppData\Local\Temp\pss8DCE.tmp.ps1

                        Filesize

                        3KB

                        MD5

                        a3d9f30e2bf11e6ea82836f1fb5f3dbc

                        SHA1

                        a1cf12f3a9e1ebbc3472f0331fc079db7a471a43

                        SHA256

                        1e9d3c6bd4ca35ee44b1dd4253a0b0cfcfe7842a4ec880fbd943de773cbe4f5c

                        SHA512

                        0fc12e709c281593bad26c32f732d5a359aeb7f36d2c42c8456b0980b276a372c445624a4e7eda9abb42bb2c2309e315949c63543b3f74d1b1cf829d64275ad3

                      • C:\Users\Admin\AppData\Local\Temp\pss8DCF.tmp.ps1

                        Filesize

                        5KB

                        MD5

                        5e296df2841df0e57aade69c89af6c35

                        SHA1

                        880ba031e9f4f379208c2a81604e771f501e8648

                        SHA256

                        d022082dfc7aafdc9b7c0cc0eebbe9247852bc8a4c7f8a94b95c85b1c373ecda

                        SHA512

                        315a1036c870d621ec43d0ed444c07e745bca7fd2b793d7c4cfbebf6e55a1d56b02f4740f5f72872472138913ab925061db979e458645e606656694c8a15264d

                      • C:\Users\Admin\AppData\Local\Temp\pss9CE0.tmp.ps1

                        Filesize

                        4KB

                        MD5

                        12586bab5f45607aa46ecfac4a124135

                        SHA1

                        32a929cb68b6607ba7e560ab446bc1c59c86d8b2

                        SHA256

                        aa0da174a1672eb45a653c74cf969e63dbfb4ae66322a6f7cf46d2648c5f92a5

                        SHA512

                        5259f5301f39e738c23a5fecde5210d5ab06006f23c23af361567676691f687b520384eaca6a92e1ec3e723e27b2cfc147e2c01d2933cd05e16f5b44cac8a1ca

                      • C:\Users\Admin\AppData\Local\Temp\pss9CE1.tmp.ps1

                        Filesize

                        5KB

                        MD5

                        37a55774bfea3101f093898b63fc838f

                        SHA1

                        30535052cbcf9e05a5ed49b10c2e63afbecaa7fd

                        SHA256

                        485a224ac2bf751ba8e49eaeaa7bb01f67ca84e3bb137c34c630e94aa48446f6

                        SHA512

                        ea24338dba2383c8e2f5eb218896978fa41c9bab5d4d62443f2f1017bee19cf94042504292b2e29bbf314498e8fec8d1607c19288b6ca7bbf1f9d25d5238597c

                      • C:\Users\Admin\AppData\Local\Temp\pss9D24.tmp.ps1

                        Filesize

                        3KB

                        MD5

                        09d0ac6b17e1172fe126026478497a68

                        SHA1

                        d27d925c0adae4e72d7bb518e030dac562d38d58

                        SHA256

                        58be81c7590ba36b50b6ebdf96f8e27aea37aed28e88e6eb04224ec6456e5cd9

                        SHA512

                        f49276d74fad5e8e4de31cdbc5dfd4df889c972ebc71730b73477596a677f47ca52732fc9ac746b316f53aa988b7c6849a20f06c49c2a594bed83f52576cbfae

                      • C:\Users\Admin\AppData\Local\Temp\pss9D25.tmp.ps1

                        Filesize

                        5KB

                        MD5

                        7459ab0c263da22ce52691f15421c099

                        SHA1

                        472ac4f29902bcc2c41f463ae75a39e8a7e3d84a

                        SHA256

                        39990379d3879f028c3e1577f9b2c6cebc8244d97ff6cd62117c9ffe0d9b5dc8

                        SHA512

                        edee906d5a24df7ab84d0c1f8622b2aa020498cabbcfc11d1b6d473573b471c8198c5db0b05220ffed8221afb5d6bf99051ba7e2c9b31b02135e3b8e2c4641d0

                      • C:\Users\Admin\AppData\Roaming\BBWC\7za.exe

                        Filesize

                        731KB

                        MD5

                        8643c94c9f899404d4cc24e22c54cecc

                        SHA1

                        421635d30ae1efb25249672c850955d3d45ad11d

                        SHA256

                        c167daa5614d28354fc0f66276b53855c8332077afb8f6d0b8497106af44ce76

                        SHA512

                        62702c82866ab76ab4a5f768fc472e439d9107f6b90745fdd873177971d16e9a8eea81d295ff54168fe1d830c8b9935725fbdd085e35c5996ef8144310f391a4

                      • C:\Users\Admin\AppData\Roaming\BBWC\intermediate.dat

                        Filesize

                        8B

                        MD5

                        10e0f54c962752e7ceaae79f0c19c0f4

                        SHA1

                        32a5981ddd1577e754ba26ff8af049834d847992

                        SHA256

                        92a159982fb65d8811f390d1b95a4ca27fc4ff36c1818f2be2a2bb1f88cb5dce

                        SHA512

                        b205990652d65a4803918447ba5107867b69973f4dd2548c269f5f5433ae1b2cd7520e5573df4f2daf4a2ef63739e568c53a843adc612adbcb792ab8b696058f

                      • C:\Users\Admin\AppData\Roaming\BBWC\updater.ini

                        Filesize

                        155B

                        MD5

                        d0c9a5a319662af9b3960f14f3d521bb

                        SHA1

                        0aa117b992bce39b18ea528756b6d2faa92356b6

                        SHA256

                        acf30fb145d5e963ba08a0754ca4f01e262d6d23abf105d33d770c2e1162b951

                        SHA512

                        340e3953aa59e61c0c660812343e4c6194643dc5fbbe85eefbbd3d5f5f8d08d9e468cafa8fecbe1608ee523f55547a275d4bc9b949611750fc2aad1e520ae16a

                      • C:\Users\Admin\AppData\Roaming\BBWC\updater.ini

                        Filesize

                        281B

                        MD5

                        e873d32938e85a4a39667045474eca68

                        SHA1

                        49f482acec504ec8d73d8277ebb8fe430c155cc9

                        SHA256

                        4cfd8ae7b85f382014d36e14c64869166c002c8f18a00149aa0343804c5ad608

                        SHA512

                        ffadfcea54a7ab2e59ff2b7dda555d3a49d783ec7ba595b0066da65354b7221b46836ff21717bbf72ddbe109375b65d3ce6a32daacd8cfc50dfda8d6985c90d5

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\JSONSelect\src\test\tests\level_1\collision_string.output

                        Filesize

                        14B

                        MD5

                        82be7c4bb7af26940fdb563b992fd52e

                        SHA1

                        7e2ab467386762e0a329969c689063410349cc16

                        SHA256

                        b1f6776c304316161e551ae43b1b2407087f4a1a0f08fc53dcb692fedb0fe14c

                        SHA512

                        c10db13e86d4546aff2f5c288b8bbf8fab65b77599a5f0b336ffd4c90c786902f99c6bf7da7e60ea87be2e178a43c7400de63e8d3084621ae236c0e7a90cecec

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\JSONSelect\src\test\tests\level_3\basic.json

                        Filesize

                        571B

                        MD5

                        8a9b6b7c8cd36d20fbc2a738339a2290

                        SHA1

                        d24fc49b3c560e2b1d5e564bede0d9dc1c595480

                        SHA256

                        d386e0812dcfbedcb6c083cf33bf30160f800125b471321a2e543be109dc3138

                        SHA512

                        deee10e9c30593322f6c2c3ef537fea98b923f1536ce20c0b39850f440daa5c574914f02dc1412276bb227f4086e87e9b89078cece69977ff47edc5edf602fe2

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\JSONSelect\src\test\tests\level_3\expr_mult.output

                        Filesize

                        3B

                        MD5

                        50a2fabfdd276f573ff97ace8b11c5f4

                        SHA1

                        34973274ccef6ab4dfaaf86599792fa9c3fe4689

                        SHA256

                        084c799cd551dd1d8d5c5f9a5d593b2e931f5e36122ee5c793c1d08a19839cc0

                        SHA512

                        65f61ced21494aeaa7f9f2bb439d37df97f6ba2394da57f215e7ffd457f647e478532174a9406e8519b2444ad85aba2f8a47edcb8bff8419ff0083bd9a9a1274

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\core-js\library\core\_.js

                        Filesize

                        90B

                        MD5

                        d861fb3b00fb776dcb6fc4887c4ac80c

                        SHA1

                        8fcd44d9d8fe3703a8bf46e80bb8579bffae30dc

                        SHA256

                        ba4cb2dcf8dc6eceeab3abc32113c8638ae91846103d2d4c474b00db4e43c288

                        SHA512

                        ed28ca9a537c67b13f3ba920a54dd95d4d8c5b0b8640cbc363871c0c04fb588d9e93ae23d2540ff0ac4c28a4109ba94bd54fe2db64b1c37a99d93ef757eff75c

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\core-js\library\core\delay.js

                        Filesize

                        86B

                        MD5

                        63aac485c8a03510b81a0a4c2bd18336

                        SHA1

                        228e248f7f9bce1c79f1b01fbc1045cb6b399cc1

                        SHA256

                        4ef6161fba95bdc34b0fb5945e5b3f1355970f8313ac674844399f655e6c0749

                        SHA512

                        abc27628797b3cd178f5cf8b0154fb9462300cb9f8f8f2bb423f4591d13d650a9f03c1df3365736897ee1bdc5f18330cd14b38a3eb54f396ff027af624cb8961

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\core-js\library\core\dict.js

                        Filesize

                        84B

                        MD5

                        feba9cdeebb0c7261fab886a8170c624

                        SHA1

                        84914f9f137bc04a4752ee4cd07eeafb96caabc2

                        SHA256

                        304a950897124b7b29258e753a93b4b210ac81bbadb56430456ba13fa92bc63a

                        SHA512

                        6ee04f9a3a737ef0164fa64cb9da3ac7bedb21c62f48279234ee0e9239e018b29d92d2e9841e4d914d23aa7f6f9b93b886cc6023369e6066910e95d4707af210

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\core-js\library\es6\parse-float.js

                        Filesize

                        96B

                        MD5

                        f97592318c11d79ac384a28eb3373eda

                        SHA1

                        01735a2d9abd3d186c33628d650032c8bd975118

                        SHA256

                        23ffcf84d3fbb79d648aa6aa81630770167473eb37b6793d954e72a1ffd3f5dc

                        SHA512

                        7d475bccd7457cda247ee8ab41ea5b91c97537ef9122c872b9309adddfe634b2f32f5913668bde13cf24286691317d8bd3163333970e85c6a739d9864e45118e

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\core-js\library\es6\parse-int.js

                        Filesize

                        92B

                        MD5

                        e9475584baa3e867e8bd82b5149bc3aa

                        SHA1

                        76db73513547102678147feb20c7ba6cb08aa080

                        SHA256

                        1abbde1b0225f65ccee86057a43413a39a8d0afc19c53a68df09ab4d21f0495b

                        SHA512

                        161c9df7aa88aaca2f3309fbf73de74abaed4784ecc9e7e30ecb2c19e599e89ba0bf271a5e9f93081d9121ee616760f50b84102dc317fb599dd76a7faa982932

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\core-js\library\es7\asap.js

                        Filesize

                        83B

                        MD5

                        23332027d2dd56a4d6c979819e53dbf9

                        SHA1

                        886a1a46374a861e623fcccfcb0d366195961a1b

                        SHA256

                        8b55f5c7192f9e924ccb0b2242e0eed768edb5fb82a84afa99dd17c2329ae785

                        SHA512

                        0cb0292f95a6405cb7dcc353827a20d0dd487ff621109bc2d3f47ce63962c82c5d0e448f8f29ce6e447e29f49d8120ad7c7858fdeed4f72cec110fb82170df38

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\core-js\library\es7\global.js

                        Filesize

                        87B

                        MD5

                        8b496bc0ff982b0ccf81f5842ad9c525

                        SHA1

                        44f4d9111918bb8870e9bb1ea3d3646036704bee

                        SHA256

                        ca93cf817b932fe1b63ac6893032c909a18044af122f7e33edd23baf0f990b2b

                        SHA512

                        efbaeb94d885aff7c0dd42ea0e5fa42ef1bae612a68165315a5292b722fc62bd22df5460e62e67e281465faa87f481ec6c2b34b82f042ed4271a8d8a7fed42b3

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\core-js\library\es7\observable.js

                        Filesize

                        302B

                        MD5

                        2f3b12af0c02ed1a6e3ffc65938a2ff4

                        SHA1

                        52bf2478fdaebcef1c6175b92bc86dcd8bb7ca91

                        SHA256

                        f9e31ae42e64925f52e8c1fca5d076f0e5be5b569f58175547f2d3f10e4798b0

                        SHA512

                        cef46ccb458a7260fa617834dd3a9a0959e32dcc9b8404877d7bb414798d83cf010ae776136e54cca967ec2580f9b2bd15e01f258b8e4b41afd0fca5d324acf3

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\core-js\library\fn\array\iterator.js

                        Filesize

                        107B

                        MD5

                        8af75261a9d4acd038eebe3e14f3e4c0

                        SHA1

                        ed8f2bf8f0494b0d4e0c48253794f2c5a1b589ce

                        SHA256

                        69882a5b076557ee650eda42dd08bf78af5d2c8e01c1b088f80a73a01e2662b0

                        SHA512

                        369fea607683418b3ed0be3eb275aaac870d81a7b3ca1420e0f2342cc10acc2ea2ea85835a9bd3397a9098b04692b51eeca6b207e04dc924d18d8762a0a95912

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\core-js\library\fn\array\virtual\iterator.js

                        Filesize

                        111B

                        MD5

                        1dcae10ca0ff8eb66e087f2e4d7f965b

                        SHA1

                        39f0c9dc16b79ab1ef17a4294809f2b9e6c48979

                        SHA256

                        20135e71d292926d9eba2d671cc2640e5d8c30f0d959192205baca226aed6d6b

                        SHA512

                        b79bd8602aac31b6148b3c0417952fe3810c172ce9826852720314b662804258f76dfca45fdbf815d13e49e27deddea4d538543d9ccbdbead93993f72efe6be9

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\core-js\library\fn\string\trim-end.js

                        Filesize

                        114B

                        MD5

                        8d512324b9d6076af859b59db71d9cf0

                        SHA1

                        de59c3f523cceabea6f82661084cff2ee4f26de5

                        SHA256

                        90f0b9b385056e6ef1f835e61ae9b570eee316996c25e9475de05868c7a5643a

                        SHA512

                        7279f6bd08d3ffa9fd15b5394ee6c7e365fe5e03c5c6760d0c3e9992e4f62d162ac9411299a26232bfcadb7af0759b5de343d77e9ad12b480ee30126a064c2b8

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\core-js\library\fn\string\trim-left.js

                        Filesize

                        112B

                        MD5

                        c20d7e5fe76586da1ca03eb874dadcfd

                        SHA1

                        005ad020f1f4eed2f58d3d45c6dfecee9102a26f

                        SHA256

                        01ecb3f44047f84ae19e19cb04fbb1981858a76f10e31c8348aea5d50733e9e1

                        SHA512

                        d7ac9e9016d6fd72574b1b926e58931978c776fb7d9a8f9bdef8c010d66efe20d4455b49447534c0d62746544f55d18f9c81dcf49cbcb91f4419ac490704c7ef

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\core-js\library\fn\string\virtual\trim-end.js

                        Filesize

                        132B

                        MD5

                        12c991cc36c539d9bff707683095cc51

                        SHA1

                        78e99892601b60b7ba2d6eb4f7215321a1bd2a5c

                        SHA256

                        8d2bf543e52a43287fe02f0629594217a0074f4f33316acf9357e2ae6da4c028

                        SHA512

                        7e813177c98b003bea79c788d57beb1fa2506076a5a9361d9b72adb096ae9396e7275f91d084802916454ac94bddd842649d6e7d56416635a2ead3d6de03240b

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\core-js\library\fn\string\virtual\trim-left.js

                        Filesize

                        130B

                        MD5

                        1ddc49fc1cb2ecdc2bdabdd87203a8a8

                        SHA1

                        392ae1870d0e5f5e63b8ce5dcec3f9ece242065d

                        SHA256

                        d77989a2bb34e82a0385b08e4228b303cadcfd1add1a0fd3694d8771f8b56420

                        SHA512

                        efe1a445197e53a7b73c2df27303693246755f21724cd3a4c9c2a581873faf0e468fa0209ec6d86d9bbce38532cd22d054de1c74569728da9d6682247b9df6b1

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\node_modules\tmp\node_modules\rimraf\LICENSE

                        Filesize

                        765B

                        MD5

                        82703a69f6d7411dde679954c2fd9dca

                        SHA1

                        bb408e929caeb1731945b2ba54bc337edb87cc66

                        SHA256

                        4ec3d4c66cd87f5c8d8ad911b10f99bf27cb00cdfcff82621956e379186b016b

                        SHA512

                        3fa748e59fb3af0c5293530844faa9606d9271836489d2c8013417779d10cc180187f5e670477f9ec77d341e0ef64eab7dcfb876c6390f027bc6f869a12d0f46

                      • C:\Users\Admin\AppData\Roaming\Browser Assistant\updater.ini

                        Filesize

                        94B

                        MD5

                        2c4a91519213f434aab10fce8af0b0aa

                        SHA1

                        8a3ad8a541616c7203aa5cd0c7d332a132962c5a

                        SHA256

                        f0678a71281ac6548d6a298f68ab5a933166d0e8f0ffec780762ca333e5942f7

                        SHA512

                        233d6e6547190e1ebb441a6b4c1fb25a1b9d7d3f25dea86a024ee94e792023b33cc6162351646ce52f68f1c7bbe6ccfe007b48a617df1f33150a698b6c9a80e2

                      • C:\Users\Admin\AppData\Roaming\Browser Extension\SafeBrowsingExtension\.data\be.json

                        Filesize

                        164B

                        MD5

                        9e42213a483e94da4fceab2b261ab9e9

                        SHA1

                        785c4734fbdcd313acc1c3c53bf246ac0f3f65ea

                        SHA256

                        1d3c12c71584503520a307291cc7f0344755c324ef958a56c22ab298271b39ac

                        SHA512

                        ec5fb86c7372885c29f3fe1fda077715bcd868f054807f643e9f0cd7a78d2c9102c36455942b63987d389341865d9f1987c7764d294f00558a921c79d4db9386

                      • C:\Users\Admin\AppData\Roaming\Browser Extension\updater.ini

                        Filesize

                        207B

                        MD5

                        c95ab0d2a593b7e2b9b8f08514bf1935

                        SHA1

                        3ca1f42e3ece810214f73c0c05189e70c60d13a2

                        SHA256

                        63c7baa0d22d9bfc83e6554ef615a1740ee05f3dd6300bdc6aad49a5a0b336a3

                        SHA512

                        d29b4161acee50ed9a2157352e5f50fb7e50b3713733a37b665355d1a537c5fdae237bcc805e59847af446065e9bb5666ceb581b77676fc13c855e58dd691267

                      • C:\Users\Admin\AppData\Roaming\Eclipse Media Inc\Installer Assistant\prerequisites\WCSetupv1.11.1052.27169.msi

                        Filesize

                        3.0MB

                        MD5

                        1f3a25c2f2d1acf8adda0985e01bf1c9

                        SHA1

                        1a9a4a0e36d1714b5ab96cd1721174b452b19822

                        SHA256

                        f048cb9e01f36ce1c6b8503dbf3b3f5148908215b1893ea95eaeb9b622602a3b

                        SHA512

                        01bfb6e5efbef23ee8cf40db4ee3bb248bc0d22b83c7ca1018a556e274c685399cdda574222996d6540f4201c6cf1df3d5d7a5fbdb9a437404eaf65466f3e0a5

                      • C:\Windows\Installer\MSI78E4.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Windows\Installer\MSI78E4.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Windows\Installer\MSI7A0E.tmp

                        Filesize

                        632KB

                        MD5

                        07ebb743bbd7230e04c23bcbaa03fc44

                        SHA1

                        8e6deee1ffb202f60c10aa7d7756395534e40dcf

                        SHA256

                        194b29c26d925fdc1f1aa1802714118d0ca30e413c7fea5c19a928eba7cc43b0

                        SHA512

                        f02b6f0caa860ba97d5a887bbdb28a6d417b2aa4dde91beeff57a99e05508a10b063ef1d025223fa2f566cc208f86401a38abc445d20bf208c5a4f92bb53ac24

                      • C:\Windows\Installer\MSI7A0E.tmp

                        Filesize

                        632KB

                        MD5

                        07ebb743bbd7230e04c23bcbaa03fc44

                        SHA1

                        8e6deee1ffb202f60c10aa7d7756395534e40dcf

                        SHA256

                        194b29c26d925fdc1f1aa1802714118d0ca30e413c7fea5c19a928eba7cc43b0

                        SHA512

                        f02b6f0caa860ba97d5a887bbdb28a6d417b2aa4dde91beeff57a99e05508a10b063ef1d025223fa2f566cc208f86401a38abc445d20bf208c5a4f92bb53ac24

                      • C:\Windows\Installer\MSI8C20.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Windows\Installer\MSI8C20.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Windows\Installer\MSI8D5A.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Windows\Installer\MSI8D5A.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Windows\Installer\MSI8DB8.tmp

                        Filesize

                        632KB

                        MD5

                        07ebb743bbd7230e04c23bcbaa03fc44

                        SHA1

                        8e6deee1ffb202f60c10aa7d7756395534e40dcf

                        SHA256

                        194b29c26d925fdc1f1aa1802714118d0ca30e413c7fea5c19a928eba7cc43b0

                        SHA512

                        f02b6f0caa860ba97d5a887bbdb28a6d417b2aa4dde91beeff57a99e05508a10b063ef1d025223fa2f566cc208f86401a38abc445d20bf208c5a4f92bb53ac24

                      • C:\Windows\Installer\MSI8DB8.tmp

                        Filesize

                        632KB

                        MD5

                        07ebb743bbd7230e04c23bcbaa03fc44

                        SHA1

                        8e6deee1ffb202f60c10aa7d7756395534e40dcf

                        SHA256

                        194b29c26d925fdc1f1aa1802714118d0ca30e413c7fea5c19a928eba7cc43b0

                        SHA512

                        f02b6f0caa860ba97d5a887bbdb28a6d417b2aa4dde91beeff57a99e05508a10b063ef1d025223fa2f566cc208f86401a38abc445d20bf208c5a4f92bb53ac24

                      • C:\Windows\Installer\MSI96F1.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Windows\Installer\MSI96F1.tmp

                        Filesize

                        356KB

                        MD5

                        3144225f1a2dccfda435970964158357

                        SHA1

                        b535c5fcf4b4fdb2b9863cfe89c4362699bdf419

                        SHA256

                        a99d2c6fd1667942a085f01784bd599762182fce8a8f866fa12ac93f52ae2ed1

                        SHA512

                        66017ab6a11017b749cd3045597a70b29be375656fcc03df6382ddf976b7f14b4df2bbb378e1eed8df75651ca9df1c04e084f50dd8eb9eb7e056e54d47679621

                      • C:\Windows\Installer\MSI9CBF.tmp

                        Filesize

                        632KB

                        MD5

                        07ebb743bbd7230e04c23bcbaa03fc44

                        SHA1

                        8e6deee1ffb202f60c10aa7d7756395534e40dcf

                        SHA256

                        194b29c26d925fdc1f1aa1802714118d0ca30e413c7fea5c19a928eba7cc43b0

                        SHA512

                        f02b6f0caa860ba97d5a887bbdb28a6d417b2aa4dde91beeff57a99e05508a10b063ef1d025223fa2f566cc208f86401a38abc445d20bf208c5a4f92bb53ac24

                      • C:\Windows\Installer\MSI9CBF.tmp

                        Filesize

                        632KB

                        MD5

                        07ebb743bbd7230e04c23bcbaa03fc44

                        SHA1

                        8e6deee1ffb202f60c10aa7d7756395534e40dcf

                        SHA256

                        194b29c26d925fdc1f1aa1802714118d0ca30e413c7fea5c19a928eba7cc43b0

                        SHA512

                        f02b6f0caa860ba97d5a887bbdb28a6d417b2aa4dde91beeff57a99e05508a10b063ef1d025223fa2f566cc208f86401a38abc445d20bf208c5a4f92bb53ac24

                      • C:\Windows\Installer\MSIDB88.tmp

                        Filesize

                        392KB

                        MD5

                        de6d3427599b4f5b7af2a726830b03fb

                        SHA1

                        8577c5d56bd691ab52689b7bbc31e1960be41f26

                        SHA256

                        e29eced37dc2720be796627562414b4fb0695789bb195ae431803c32e1c924e5

                        SHA512

                        a9d09c3717928c51ac2aaddaec4ad4c6bfc305ebb9316a2761c52364f753681ee3caf6d83833aed9bd8f48606039bc5d9a97c254faed8c982768b3eba178bb1a

                      • C:\Windows\Installer\e5876c5.msi

                        Filesize

                        3.0MB

                        MD5

                        1f3a25c2f2d1acf8adda0985e01bf1c9

                        SHA1

                        1a9a4a0e36d1714b5ab96cd1721174b452b19822

                        SHA256

                        f048cb9e01f36ce1c6b8503dbf3b3f5148908215b1893ea95eaeb9b622602a3b

                        SHA512

                        01bfb6e5efbef23ee8cf40db4ee3bb248bc0d22b83c7ca1018a556e274c685399cdda574222996d6540f4201c6cf1df3d5d7a5fbdb9a437404eaf65466f3e0a5

                      • C:\Windows\Installer\e5876ca.msi

                        Filesize

                        24.3MB

                        MD5

                        600802fb6bbdc79d53622fa409ba0f03

                        SHA1

                        5aad077cf6f57581e598aaf56cf989ee2a70ecd2

                        SHA256

                        9fb0ee3612aed65dcf2b6c2d9c2e3e13a19c2c18c557cc25fd3e01c27a15f7cd

                        SHA512

                        c0875b2d6c694604fd125eeeb1371c4138fe160209bf975fe15748d667f928bf002aea64ba0dd0d75457bcb18daace72f8029ccbfb1b0cf64670b4e3a3f6ca7c

                      • C:\Windows\Installer\e5876cf.msi

                        Filesize

                        2.8MB

                        MD5

                        502415b13193cd1b1e5ac431c481047b

                        SHA1

                        64cbd83cbffa228eaad9725ffd0c379c8834aabf

                        SHA256

                        225cc0dae046bc70f8e19d174678413c85d30edc794812afffbb4391dc087bc4

                        SHA512

                        3198035b00a06e1621b1f335a48595aef4a8d356a759c34293163cd021df775146dfb3f09fe8c5fd9df8a92e33f609ea99dc4844fff256c4ffd12da843a393fa

                      • memory/432-540-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/1544-302-0x0000000003210000-0x0000000003220000-memory.dmp

                        Filesize

                        64KB

                      • memory/1544-316-0x0000000003210000-0x0000000003220000-memory.dmp

                        Filesize

                        64KB

                      • memory/1544-318-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/1544-303-0x0000000003210000-0x0000000003220000-memory.dmp

                        Filesize

                        64KB

                      • memory/1544-301-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/1548-461-0x00000000027D0000-0x00000000027E0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1548-463-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/1548-451-0x00000000027D0000-0x00000000027E0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1548-450-0x00000000027D0000-0x00000000027E0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1548-449-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/1772-250-0x0000000002E20000-0x0000000002E30000-memory.dmp

                        Filesize

                        64KB

                      • memory/1772-249-0x0000000002E20000-0x0000000002E30000-memory.dmp

                        Filesize

                        64KB

                      • memory/1772-248-0x0000000073A40000-0x00000000741F0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/1772-263-0x0000000002E20000-0x0000000002E30000-memory.dmp

                        Filesize

                        64KB

                      • memory/1772-265-0x0000000007840000-0x00000000078D2000-memory.dmp

                        Filesize

                        584KB

                      • memory/1772-267-0x0000000073A40000-0x00000000741F0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2196-471-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2196-472-0x00000000050B0000-0x00000000050C0000-memory.dmp

                        Filesize

                        64KB

                      • memory/2196-482-0x00000000050B0000-0x00000000050C0000-memory.dmp

                        Filesize

                        64KB

                      • memory/2196-484-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2492-506-0x0000000000D10000-0x0000000000D20000-memory.dmp

                        Filesize

                        64KB

                      • memory/2492-505-0x0000000000D10000-0x0000000000D20000-memory.dmp

                        Filesize

                        64KB

                      • memory/2492-516-0x0000000000D10000-0x0000000000D20000-memory.dmp

                        Filesize

                        64KB

                      • memory/2492-501-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2520-156-0x0000000005760000-0x0000000005D88000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/2520-153-0x0000000073AF0000-0x00000000742A0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2520-159-0x0000000005DC0000-0x0000000005DE2000-memory.dmp

                        Filesize

                        136KB

                      • memory/2520-163-0x0000000005E60000-0x0000000005EC6000-memory.dmp

                        Filesize

                        408KB

                      • memory/2520-154-0x0000000003020000-0x0000000003030000-memory.dmp

                        Filesize

                        64KB

                      • memory/2520-155-0x0000000002F30000-0x0000000002F66000-memory.dmp

                        Filesize

                        216KB

                      • memory/2520-164-0x0000000005ED0000-0x0000000005F36000-memory.dmp

                        Filesize

                        408KB

                      • memory/2520-183-0x0000000073AF0000-0x00000000742A0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2520-169-0x0000000006520000-0x000000000653E000-memory.dmp

                        Filesize

                        120KB

                      • memory/2520-172-0x0000000003020000-0x0000000003030000-memory.dmp

                        Filesize

                        64KB

                      • memory/2520-173-0x0000000007730000-0x00000000077C6000-memory.dmp

                        Filesize

                        600KB

                      • memory/2520-174-0x0000000006A40000-0x0000000006A5A000-memory.dmp

                        Filesize

                        104KB

                      • memory/2520-175-0x0000000006A90000-0x0000000006AB2000-memory.dmp

                        Filesize

                        136KB

                      • memory/2520-176-0x0000000007DA0000-0x0000000008344000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/2520-177-0x00000000089D0000-0x000000000904A000-memory.dmp

                        Filesize

                        6.5MB

                      • memory/2616-441-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2616-412-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2616-427-0x0000000000CA0000-0x0000000000CB0000-memory.dmp

                        Filesize

                        64KB

                      • memory/2616-413-0x0000000000CA0000-0x0000000000CB0000-memory.dmp

                        Filesize

                        64KB

                      • memory/2616-414-0x0000000000CA0000-0x0000000000CB0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3456-351-0x0000000004D60000-0x0000000004D70000-memory.dmp

                        Filesize

                        64KB

                      • memory/3456-338-0x0000000004D60000-0x0000000004D70000-memory.dmp

                        Filesize

                        64KB

                      • memory/3456-353-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/3456-337-0x0000000004D60000-0x0000000004D70000-memory.dmp

                        Filesize

                        64KB

                      • memory/3456-336-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4504-532-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4504-529-0x0000000006F50000-0x0000000006F5A000-memory.dmp

                        Filesize

                        40KB

                      • memory/4504-517-0x0000000006BF0000-0x0000000006C22000-memory.dmp

                        Filesize

                        200KB

                      • memory/4504-518-0x0000000071720000-0x000000007176C000-memory.dmp

                        Filesize

                        304KB

                      • memory/4504-528-0x0000000006160000-0x000000000617E000-memory.dmp

                        Filesize

                        120KB

                      • memory/4504-530-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4504-494-0x0000000072D50000-0x0000000073500000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4564-228-0x0000000073A40000-0x00000000741F0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4564-218-0x0000000004950000-0x0000000004960000-memory.dmp

                        Filesize

                        64KB

                      • memory/4564-224-0x0000000008C20000-0x000000000914C000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/4564-217-0x0000000004950000-0x0000000004960000-memory.dmp

                        Filesize

                        64KB

                      • memory/4564-223-0x00000000079F0000-0x0000000007BB2000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/4564-222-0x0000000004950000-0x0000000004960000-memory.dmp

                        Filesize

                        64KB

                      • memory/4564-207-0x0000000073A40000-0x00000000741F0000-memory.dmp

                        Filesize

                        7.7MB