Analysis
-
max time kernel
1430s -
max time network
1167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-es -
resource tags
arch:x64arch:x86image:win10v2004-20231020-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
02/11/2023, 20:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://helixngc7293.itch.io/yandere-ai-girlfriend-simulator
Resource
win10v2004-20231020-es
General
-
Target
https://helixngc7293.itch.io/yandere-ai-girlfriend-simulator
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3832 Yandere AI Girlfriend Simulator.exe 4244 UnityCrashHandler64.exe -
Loads dropped DLL 3 IoCs
pid Process 3832 Yandere AI Girlfriend Simulator.exe 3832 Yandere AI Girlfriend Simulator.exe 3832 Yandere AI Girlfriend Simulator.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133434291368233812" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1873812795-1433807462-1429862679-1000\{A2F5B278-1DE8-445C-A7FD-232F370E75D3} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1412 chrome.exe 1412 chrome.exe 4464 chrome.exe 4464 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe Token: SeShutdownPrivilege 1412 chrome.exe Token: SeCreatePagefilePrivilege 1412 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe 1412 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3832 Yandere AI Girlfriend Simulator.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1412 wrote to memory of 4016 1412 chrome.exe 19 PID 1412 wrote to memory of 4016 1412 chrome.exe 19 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 4564 1412 chrome.exe 88 PID 1412 wrote to memory of 3888 1412 chrome.exe 89 PID 1412 wrote to memory of 3888 1412 chrome.exe 89 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90 PID 1412 wrote to memory of 1744 1412 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://helixngc7293.itch.io/yandere-ai-girlfriend-simulator1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1b4c9758,0x7ffc1b4c9768,0x7ffc1b4c97782⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:22⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1900 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:82⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:82⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:12⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:12⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:82⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:82⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=6132 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:12⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3276 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:12⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3216 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:12⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1660 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:82⤵
- Modifies registry class
PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2264 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:82⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4724 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:12⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5900 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:12⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5660 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:82⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5288 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3188 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=2256 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:12⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4720 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:12⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4596 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:12⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4612 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:12⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:82⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=4620 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:12⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=2312 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:12⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1928,i,15042109925189139702,145331237603581251,131072 /prefetch:82⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3640
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4888
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Win\" -spe -an -ai#7zMap22157:68:7zEvent219041⤵PID:2004
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator.exe"C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3832 -
C:\Users\Admin\Downloads\Win\UnityCrashHandler64.exe"C:\Users\Admin\Downloads\Win\UnityCrashHandler64.exe" --attach 3832 15186955509762⤵
- Executes dropped EXE
PID:4244
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x468 0x4a01⤵PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4cc4990c-2ae0-4d62-a47d-5941d898bf58.tmp
Filesize6KB
MD5e2b31c1ddf93858ae40a5af156323c72
SHA143e40f4d2c4b23f8ce4d5dc44a26cf586f19ad40
SHA2568f2b3928b9ed6a4dfef07cb0ad2012b40466014d63656608f70a6e400bce6bb6
SHA512ed5436ca7818e035458e09cc40159cbc8482ebbaff6233d66375f2352c9f62a7742d23d73cf919848240c35fcfaf912886a60e4528e3d9c88bae6a79074d70cd
-
Filesize
1KB
MD5af36b904cb90608f98020e2324d97dc7
SHA1de8100bba7ddabfa139b9317d686bb1f2b01a500
SHA25675564dc25b01baa6cda29d57e6e04a95483f19bf0500e096d71a6f901ee8f5ae
SHA5121cfab0dcbd49efec8952de40fcaae86cfeaf0aa6574ddbb55d11bb878d2568e2c1e627f3e62a71f4bca976b3057ac8f6da1c3b985fee4d845bccd73010c1d81b
-
Filesize
336B
MD51d81b744acef8680d8dd67e0a4b88161
SHA1b43bcec5d6ffc9036153f975d6af7dee57e9976d
SHA256be0d374b4c548b4b5d350abbd6cbdfe1383cc5234af2fd183f70392b405201d2
SHA5120ac0a4f0292775085e9a515af5e9973033bebb36931c62d8d0dc017646d3713b3480b702493025296e3e56bab7b20a8208728bd9549d4b03ac6b3c11d2ef7430
-
Filesize
264KB
MD5314b89b12552f17362a501b74479054d
SHA15fc50ad72d2b81c53f47e1605277719d8e7fad0e
SHA256797494be9f356deadbeba946986e0c5c011df3ee7e352df90ef4eaf76d40f2b2
SHA5125fc2c7e0052f9736fdf0a3550d8df7991e317d8820e1bee3684940823eebf32b500627e0deb0356958954b79dd7bc83b10ead9b2d737bf45445b53bf74da7955
-
Filesize
4KB
MD56ea51383d54b884291e3c2bb0a0447ec
SHA189d347cf55a5c7274503d5f478ae804af5586d15
SHA256f50e17430aa80084cdc9536810095bbdf47d83b260477839a13b41d3ef1bd055
SHA512f0cb912a2d466277da73103209c22943de947ecb8abfc5f859c28b3e0056f7d29420a49979b5b25aa3b3aaa0f98bdebeb9742144f5b5312a752ea5f87ef29281
-
Filesize
5KB
MD5996a033d4be8ef871e9c0dbe9761f7f3
SHA1f340732c3e2892c4ae4236990a166dcc2556f24f
SHA25671712607123f7e94cf0b11914e26f5b44277d34cfe0f0695901494aaa23f3f1c
SHA512ce21ac4460caae951685ebd229c267a8450b082301b80d33a97b3449719c38fed91e5d2d6416929a2888f0555d9cf4773f6cabf25ce0bda4f5fd088d05be2093
-
Filesize
5KB
MD552515397f342311e63536cb0b6874309
SHA1734876d1e7f49db41d6239d0356c663d4095d102
SHA25635dd2d3fdaead0cf66a300accd7df3bbc5008c3b8cfea61b09684e9414a9ebbd
SHA51283f7ee34c0a939cc2c6076282a5fe12e097e36f65fcfb5ce08096543618ff95911eb001286eebe486065afb24d4b3268cdbe4abe9aa6b3ed1409bb197368dbf4
-
Filesize
4KB
MD552e0585247a82d129b9c1ed8b514c8bf
SHA11c2732fb9f11bfc2e911a6d27cf8588e921fc43c
SHA2560bf1b015bcf372debc138f8268578cdd277c851835894cc8b55bf4f24e3f1b98
SHA51297980d81f630fbbe695e740a1c2a3e25fdbd9f896616bdc028e78b3547089b58ee15ca6cf4c933f0469d973abd4a08082ab34033969dbd812cd80484616f72b5
-
Filesize
3KB
MD5990881f6682fd4445d9b12190001b994
SHA1f7cdee6212913f2edf8a6dc9cb9dec3cfb2d7e95
SHA25626c287600222e2ea8193d50d27b9469031e3c8ead7de8c404b992e31b7742ec9
SHA51293b36c1cac50d0dea2ab3b44e6a42dcf2ed428d47018be4e71ae50165ba1a7924034cc550a6e1dad88a4c79818722ab80fd7505e749b8c7f79e90a6f5230c2be
-
Filesize
1KB
MD5fe0e2c36f302fdde4ad16a898854ed20
SHA14704a00e46be481551162eeb26541b4004afd59c
SHA25612aa4a846e01e610e013785fc3ad5d65a1d4b1bf17b00637be1f444d9b72f391
SHA512efde3a0b76494f9682b2e0360cff3d092fb31e9f12e41b39ae3cba29888a1b2c765e09d145f5b0d378a96bbfb01cc555a5512c1c7efe320610af652b60cf88eb
-
Filesize
874B
MD5aab2766b6f1261e77ac523880c2ec7ec
SHA148b5bf9c78f6fc9b3eb5ca2b9e18b0c008e0d08c
SHA256ef62131d5879f25549c4ec3a317d1ec8a1ee999131fc3660d7a956961db7485a
SHA512d1f0337865dcfbc2ba6e92aaf2426164cb4d079a50e7e31afcda5f979063507decc8e374b33ebeabf63a94e94737f2b36e668c3383a13d2b0fb3a52edb898011
-
Filesize
874B
MD5ed6cdf92b0104db33acc4f6f009e8663
SHA1967543fb7b70d51e1b6f6b5fa5b32ae95c4bae7b
SHA25682525bad46cf243a0b9bdd2c69eb5b9fcc756c74f051ce93d5c0266cfb726031
SHA51277cba174113fba69480ae38df1571c87020b50a63fe090de861978807d7e743d30bb76cdc7a7711ea326241d6d8bd012e9de897d88eee382057502ef6430a3e0
-
Filesize
1KB
MD50a87391952969e241bf6d79b16378beb
SHA179108df5d0b267fe04d442641bdfb20ea1602654
SHA2561c6864746e576a33c7d1ea82ac9793c6425eaa74504a2477cbb058e48f14ca38
SHA5124e6c4bddbf06691a051e5cefd073a15243cc0fada33adc547ae1000b6811027609267062e9a582121b5ba68f02c19a231a7bb86834b35831823a402e9826cc80
-
Filesize
6KB
MD5d0926ed4f4fbf6cfdae6a70033dcd75a
SHA1be052931aa1248d3075a35f13c2f61f985678c7c
SHA256bc068474949ba101c28c6e5ec8d8de8d6ff8c0ce007e1cb2ebe8947b5c6b5a23
SHA5127e863596726ebc4ddeb0f715d252ba5043430c94d46a8767f6e25abf2671b3a4c7ca98c2a24f5636c199a62b99d1b04636bd4fc599fcf45007a854cf00c77b43
-
Filesize
6KB
MD5cab646852b85142015a23d1c40160a8e
SHA1fc01dd692689075688b4a68ec32734613e147cb6
SHA2569f5389c692ced917c08c9125a7361ff887774bae935940f05e3ee140f56e9d75
SHA512ca61d16c5251fd38619ac3256e0fb6adf7baaa906626bfaa3f9c483f17add55852b579c197cad3403b715df4108af42a42138d74f109f7f3ab1dcc6f3e758720
-
Filesize
6KB
MD5db5fb1c4376b34c63aee39ec7bf8ad5d
SHA1c30eaf6759682530b64b954246ad7d9cdeb8a67c
SHA256eb9096295a8fe105bfe08115870e805fdd934ee4f1bd541719f2432931bf8000
SHA512c8d85b6e2776fec9ed4dfe73b2c7d02c331501e17c6c29496d17c87cc612bd3af2ee01cefa0a97162387a9a12a93b7bf38d8a9633ef688cef729a9660111c066
-
Filesize
6KB
MD5d17c9fea8d1cb73a84ca1d8cf842c5d7
SHA17ab092d0fb14f26243bdecb79d4c43769c696c90
SHA256f85a246bb886c03a3fea46266d1037dbf14e9680cb43518eccae063e170637fd
SHA512e3d38ae78d719e1fbc5ea2bcc4390e555e080c599b118597c670d47fbcd15b8ef054e331b825c607ac2872cc1814c07a6aed7d060ef24be2097c979d8254a374
-
Filesize
7KB
MD5fd03d29df637356def47021e04148a64
SHA1c4049bf8b7576a709ff5229d0c5387fff767ba81
SHA25678d5ab6ae62c3c83ba207a2d7c489fb0d902590641700c025a35e9d9326d7a03
SHA512c6c93007b79d864dbf33f52c67a9a6e9d7dfa309ff76c6d9f30716e16d74e9c3bd7ea15e4111281ad14f384c25fb5c1b55745e9e38d784c399453ed310490a75
-
Filesize
6KB
MD5c9f23870f2225b7bed8478b1979f7b78
SHA11ce78f4138a034969d1d299388d5797f9a2a6f41
SHA25684c694f92c6faf851f6ceae3619d4425aee2baffdf065cb26fd02ec809232071
SHA5122377dcf75c9fc68842cc3a2f87be2bd5a80eed27ac3af4bf99347ad2b3a13b1f3b28250fc4e198b4b7ae2f5cac677c82974543fbf918f9f0a53493534e252e7a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe584755.TMP
Filesize120B
MD59aa2da7ff25cc87a6f9a36b0747f5383
SHA12ee93340e38a49ee29319659dd561efaefe1f526
SHA256216a32b67f9cc0f38ccf43f603a82e53dfd84e7cbd2d496e552359f5d4008ae6
SHA5129db85b80313f0061462448473294f966619e63fa86d9d2634ab909327d254fac74dcbba9f7fd5e5ba64d3c9f05442a92d91fedb4925c2a9244801182e95b3b4a
-
Filesize
109KB
MD560ff1e101335191f297961c5d4351076
SHA1e6d98534de2b4f8d26dd4da1c1874a595f2579c7
SHA25629810bb6939dac4bfbbaabbd44d92c49cc6d4e737d97a0078b658b36ffa726ae
SHA51246c73d8872b4713e7ad8eab15726c0aae179327a99b53dca8a5e05765240c7602d12d8f413a485e835a7e942aca531c3b29709ec24f5c4431a2421324e33dc53
-
Filesize
109KB
MD54344d9c847436f5d6a50371eec547a5f
SHA18916aa9580b6e3400249ffafc9f24ef7710e0313
SHA256670ef91beacbd307a84eb83ac07e7904f6f2e4b67c5cfb0ca8a06f27fc1fa19c
SHA512482b9830dba48b1738d75e44c6292ca4c4ff005ee3467a4f87aaa42a1b98b817ac21cc3e11c1448815dbace165bd52e241ab1dc824efb8ffe929376e04092bbf
-
Filesize
109KB
MD5b68551bb2718bd0fa319d4ed082ac1bf
SHA1b4fa318ffe63115ee193294a44e23035d28eef42
SHA256f78c0116b6d8b2c4e5de61c6b38802849a9f2785d0992a4e2e86cb8d1e38623c
SHA512de97a039385dd49f83c0209b43ebb9c354eeb75c5b032e21bca665140c1f72c1fdcc0e8ff97452b2274e79b38df7198acc09ccc5c2e56680e5f70bf5a8093d96
-
Filesize
109KB
MD50c95f56fce0311e4aa3ad898744da905
SHA196e334b8a19932724179a2fbafdc5407e4de7e18
SHA256d3b58f5a5c4f42a6eb3e5348197e3a5b92977fd58a0d276932bb11a63625ed13
SHA5129c69457e49f74de09519919af6c4e14afe0635e490f75dce43ebcf1de8481511b1b721c1315e24e3a06828ee99bde2733082e566ab620d3ac0837efc591b51a1
-
Filesize
111KB
MD5ad313946e1c1d9c9641c4157e9914aa3
SHA10d64ddd7a765d51af9347d5621ec8460bf3a9213
SHA256b885b0e8b26888e55de4abe966680fe8be7f653f4728013e1a9d6f114234ae18
SHA512c21411b665a5c5b0e3138338aed683eff413b987c13fa1c41f1a706de4197c99aec3824e57e3f8f124a00c80ddad9e3bb18d42b4b5434046361ab3b2b49833eb
-
Filesize
108KB
MD5fab871de65ef9f542fd53e19de51a442
SHA106f6f8e70d77dabbeff6380f5022425c69c32afa
SHA256bba8868aab37b7ad9dcc3f21f05dcc0de2f9c8875e2a4967f00cf9be14fd07c9
SHA5127d61742fa9b812c42f9edfe598a98a95bcf5737af41af43abf4fe8f760b2b375912e9f6547efa78004b09e4bf3158604fc38b5b1506794b88e851f8bacaee26f
-
Filesize
102KB
MD58faebbe607243cb68a3c32d298a7b8e6
SHA1d62a43ad7f3fa1f2ec4d38e2253fc771f659c516
SHA256637b26ad69566fc5780c220fa9082ec9cc4cc4bf273ec8d5e2a007a2356e86c3
SHA512132adf74d878667eba4f53560137c09de39022f58550b78449434e6a39ad2d4679b0710e10965ee1acaa88d63bf44455f2bc4a54b0122e00beb9edcc8e88ab9f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
619.2MB
MD537e92764cc923b3b78df4e420dba2958
SHA1119cdf10c0fff08feeea0314e9360e13a2b056cf
SHA256f7a18b80e93c63e26b02da548a7a974292157876ea5c1b444ac844b1cbfd3ac2
SHA512cfb71e646476308b3a8f45bb4d159e591629acc242920c87951b515d66e2e3330ba6c03390aaf6e0183e9c723cc76943bf204b4478e7898c2858e06933e860a3
-
Filesize
7.4MB
MD5be7deca6b07b23c990ad77f990baaa0d
SHA16d95ea368912ce3fef1d070a0692f03f3d8364ff
SHA25694ffe06398ad73eeb6d88627aa35f7e9430df66f43b1c5cfd7b9ea793d2ff022
SHA51234a4f67fa44a74b170d780fced3bf872776f4cdaebec3a4b8a9d1b4220c12e2294598646408fd6033d1b7657a122cd8fe70646b57a11df453f523fdc9022bd72
-
Filesize
7.4MB
MD5be7deca6b07b23c990ad77f990baaa0d
SHA16d95ea368912ce3fef1d070a0692f03f3d8364ff
SHA25694ffe06398ad73eeb6d88627aa35f7e9430df66f43b1c5cfd7b9ea793d2ff022
SHA51234a4f67fa44a74b170d780fced3bf872776f4cdaebec3a4b8a9d1b4220c12e2294598646408fd6033d1b7657a122cd8fe70646b57a11df453f523fdc9022bd72
-
Filesize
1KB
MD50d831c1264b5b32a39fa347de368fe48
SHA1187dff516f9448e63ea5078190b3347922c4b3eb
SHA2568a1082057ac5681dcd4e9c227ed7fb8eb42ac1618963b5de3b65739dd77e2741
SHA5124b7549eda1f8ed2c4533d056b62ca5030445393f9c6003e5ee47301ff7f44b4bd5022b74d54f571aa890b6e4593c6eded1a881500ac5ba2a720dc0ff280300af
-
Filesize
59KB
MD5f7be9f1841ff92f9d4040aed832e0c79
SHA1b3e4b508aab3cf201c06892713b43ddb0c43b7ae
SHA256751861040b69ea63a3827507b7c8da9c7f549dc181c1c8af4b7ca78cc97d710a
SHA512380e97f7c17ee0fdf6177ed65f6e30de662a33a8a727d9f1874e9f26bd573434c3dedd655b47a21b998d32aaa72a0566df37e901fd6c618854039d5e0cbef3f5
-
Filesize
3KB
MD5e7c0101127d2cfe48769c725ab435de0
SHA1f395c13d7665ecb50c6d86f27246881e29e7a8c4
SHA256fe53083dc1c5294b27692fef07dcd694e57f78ec38f4f7ce9eeb27ce6d9e5454
SHA51297ace0383ad049c80ba3584b72ed2842b754219c79e4915211a8c27e702d853022b557320dd640928de765b0c53925c467a3e03cfcc25e7981a6c8fb635f096b
-
Filesize
1.1MB
MD56d7e8b6b99c23c5840fe69a9203389ce
SHA1fee612f4afe500c16e7e3b836cafa521221bafa3
SHA256161b15fd38cfb05fec0788d477047d10c6f69d7037ddb623bf8d08904c30c483
SHA512657a4137d268241c3539303135999828c5b103102ff31d102c894c10403b2c5095d07ee5d4ba189289e563152d73761dbc21ded829b652f9372887f5dd479333
-
Filesize
1.1MB
MD56d7e8b6b99c23c5840fe69a9203389ce
SHA1fee612f4afe500c16e7e3b836cafa521221bafa3
SHA256161b15fd38cfb05fec0788d477047d10c6f69d7037ddb623bf8d08904c30c483
SHA512657a4137d268241c3539303135999828c5b103102ff31d102c894c10403b2c5095d07ee5d4ba189289e563152d73761dbc21ded829b652f9372887f5dd479333
-
Filesize
28.0MB
MD57f72825d420479ec0809f1e4f6088834
SHA18ea7ad5e8c2af002230d54b73a831a9a9bcb47fc
SHA2568301342be84e9a720ca43dc99c8275ad179e4952e80728d03b51bc45e2a2403c
SHA512669feb708c1bc4463d0ccdc257f5fc030efe3420b2d7450862cd9266bd6dd0e4ac77cab591d15a0d698c4dced912a8f78e557a11133cfc2b2ea1fb4ac12a7b5a
-
Filesize
28.0MB
MD57f72825d420479ec0809f1e4f6088834
SHA18ea7ad5e8c2af002230d54b73a831a9a9bcb47fc
SHA2568301342be84e9a720ca43dc99c8275ad179e4952e80728d03b51bc45e2a2403c
SHA512669feb708c1bc4463d0ccdc257f5fc030efe3420b2d7450862cd9266bd6dd0e4ac77cab591d15a0d698c4dced912a8f78e557a11133cfc2b2ea1fb4ac12a7b5a
-
Filesize
638KB
MD50ec2a611d92651124428945d1d486977
SHA101a1f938454d7290d504f2e3e50ea142623c9ec5
SHA2569a29b6c1adffd3fde6084e409dd15bc74a64464f076419979529389106f23bca
SHA512b3aca02a2792133374fc3bb8dd44ed50f165b1f0224f41b656c9b9b9258598fb5ff2f8c8859542c77cc4bd3ea211c0dfc7a244671e2c17f5fccdb4e04317d173
-
Filesize
638KB
MD50ec2a611d92651124428945d1d486977
SHA101a1f938454d7290d504f2e3e50ea142623c9ec5
SHA2569a29b6c1adffd3fde6084e409dd15bc74a64464f076419979529389106f23bca
SHA512b3aca02a2792133374fc3bb8dd44ed50f165b1f0224f41b656c9b9b9258598fb5ff2f8c8859542c77cc4bd3ea211c0dfc7a244671e2c17f5fccdb4e04317d173
-
Filesize
55KB
MD5878ca12cb0498691c53669ef98c9afc9
SHA174fa11ced94b47cc8ac830e4c35d730cc7465ab4
SHA2567f6076a3ce98fcfd2e65b69c0985d9b3539c7b2aae75ae12e7dc8be97557b14d
SHA512b763db7ba9317685742d93c561d7192b731543eb3184ee82681a8cb9e1fea47b4561177e4f2258836b6f1c3fabcb37391a6883855063b087221d1481dc0584b4
-
Filesize
20KB
MD5f3ae0bbf2fba7b098568a1021715d03d
SHA1029fe6881ac49e6005a26a8792a27afe45cd30f2
SHA256163aad373f543ee9a5a9eb5066ad86eabe48149dfd97d84716d17f3d4d8e33aa
SHA512d8821133128d4475b600591bc0ba0043a44d77f98780f8257a45f28bd8da245ce92a9bcd22e0e42c2ba2e8c60cc544376fd6671a68f8d039cb83d243fae13eb6
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.AccessibilityModule.dll
Filesize22KB
MD5fb992af36cca53e7f88070fd930464a9
SHA15eb36a98ec81ee0275b1b7017d1c92b7a070e3a1
SHA256d36ef4e476bfcde3b5bea455f936b79cb3fee779e4e342a1dee0cced9fae794c
SHA512c8e93895fd9f3e1b642b67fc81ead7de93c2ec05318671742f6b2d6ec318c6bb762fc9eb72d4fe469aa47dbc505e66b52b3f44fd5fc7a6e25dc2760eeb9f93b0
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.AndroidJNIModule.dll
Filesize77KB
MD5d0d710de4b0281f54febf1c6a2c958d0
SHA1387b54bb1b451bb4a2c235f53ec871cfce84277b
SHA256418426521ad4190b450c5da746f65c0a3a0ea9a1a6ba6c526483daf7e9666a0d
SHA512b7f2a9aa61ea50135a7e69348afef3783fd4193280491c2f96d84609d297dfe4bd50460b6f1a8add472180a1536699f7543370dc3cd882e26b6f56f7387ebd06
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.AnimationModule.dll
Filesize158KB
MD5b6a37084511b54212a4d2ca22fcd8608
SHA1ba1e053534112b9533b47fdac67bfcb3c8024069
SHA256391eccf31d542cdc06ccac4b0272334079788ac87e233b6a8c44c0a6d2c9d1f2
SHA51284b9ca379ea94817c40a579793bde64e1e994201c4ad8e3c1380acb3025cd14ff765a440402a8c15fc82a0fe9ae5e9fab3cd93a6ede0234e4228fd3b0b872e55
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.AssetBundleModule.dll
Filesize32KB
MD581c4277b46172918f9477bbe6f7c7ab7
SHA1a3f2554fdc265f08b801559303e4a194434db9e7
SHA2566ee0609ffd464609037e35eb1483180a4c493484d2dcb7e12a7351779e134339
SHA51273b2b86ab9660e53615ee950a2bd37f510ed1ce792598f7b46c945a580c59cd9d95ced620c0e176142dd77998a7b6ae306ca0dd8a43ca5fa35ec69488293b6b1
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.AudioModule.dll
Filesize68KB
MD59db2bcedc7d4c42f6eb851d6a3a14fcd
SHA16d8c02e93bf3ce0cc01099ca262efc1edb1afa5a
SHA256213ecd32b5a94e768e8a2648147e7a421b8c049226698141492ccc99a0c9334b
SHA51257c82ec6d4464624c68fd19cd2a7894854b035ac9281f6cb6670753de79dbff5ad13aefed9a5b1d7c4d717b19de5936163a573892a77b3a8b10c43fe598ac677
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.ClothModule.dll
Filesize25KB
MD53cf069a298929672417aaf58d1ca4870
SHA1a28b98770613ec38f5c73927903566aa298febe3
SHA2562cc12c3eb1976b521f37da34dd130b21701c218138d27cab2c14ddb2fa60145d
SHA5123209517147a54ff92166b39d30bd80823d1efaa7cafeb3f451243e2b100175ba00ba0568982133fc4c4a7437efa9a3863bb10c6b0f14b789e404172727eafa9a
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.ClusterInputModule.dll
Filesize21KB
MD572cacfa3ffa4b59dc7e71592851fa153
SHA1b72549baf25a41938dcff1a693353c6605d35269
SHA256467e885b2a618aa8b0a6333f3f329d4094ed2ffe1c5d8bd2097ca62738aab834
SHA5121267381ab97124e346baf6ea1ac88e8f55843202549670771f6b482f69133295e077579a189dc9d362fa84d408ea35582d7a6fb694f4ca45f915339a49337304
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.ClusterRendererModule.dll
Filesize21KB
MD527489090f5a6dac7bd2153b8b3b461c2
SHA1f95b25578b8c91de76678b9370db6aea694b6636
SHA2568414bf5e3aecff3feb0569f886c77429c298ef6c2a0d715a22f91254f59f2863
SHA512399e491e5dc1761cd4dfaaff5276e4d135c298fc526ebad3d9ab84ef820869276bc6db3cceaeacd2dc132db58674d4aaf9334e80c6be3d137b51ba79fc1d6457
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.CoreModule.dll
Filesize1.2MB
MD520d9a7a8c349338fe7f7d04c6684fb38
SHA15fda7531ac4474aa252e1e0631ed1d4395b66f0f
SHA2566ffd6cc4887ff748bde22df53a0c05450f16ada5e37da881794f564e4dffa135
SHA51222fdc06b26dc8f8378e6135ddd179f3d919e40565a480c75bc67eb3f2feb4955c2ff1d86e74f99363643e9c00728abc0fd52c743a40c01fca9a922e0c917fde4
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.CrashReportingModule.dll
Filesize20KB
MD5d2b7b24c7a66a647d33bcd07477c63df
SHA1a813bcc7152501cbe5de8a03b2a94ae5bf81fc95
SHA2566056c94e523e64e1875e23055cba91ca02f93d8df456c1595da6ab77d336f03c
SHA5121a990b174b6c3fcdd3c262bbe367b00a47ffd3d412eb5148be719f9e4d52a31160d7f1c61e819ea097d06d5ba86edc45d0eeba154f8f8e16af407642c361dfbc
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.DSPGraphModule.dll
Filesize28KB
MD5bd430d703b553c82d044ffe87a94bbf7
SHA1ba133c682e9692a30204a719cf4f9dee08809490
SHA256c903ce6896b507187c6832cf813cac637b225f836c014381bf25a33876028c21
SHA5120f47ac17fbec70092063508ad4c04deba821c8f1ca5ecbec43c7a88bea91e5d7338ba701d29295299b13f0fda1119a7294bf01352b066664547bd7a0118ac45b
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.DirectorModule.dll
Filesize24KB
MD51f4982888b38775020cddb9c3e05e598
SHA1e380673412b6f3bda237f2cce998d2ffda70f492
SHA256b623b401689581414d3b379038c1a7013b6aaf3e5b15be68d03d01e4f4f6c152
SHA5126c2cdb32aba64f4bbf00bfb6a854e6653fd80f5dbe6fb063c9a4e6d95f9f03df7d618fb8e8b48b5824dd1d807ef7f0a17b876525460b30b600f0f62996147b27
-
Filesize
19KB
MD5ad6cccb03c15865138e3f6bd3b307dd5
SHA10026fe3faf6f73a8f3a4ef9c2c2e6d00ab35103a
SHA256558f8a92290b84787aeb5a641a499a5fe00a71b7414a74a9e277946d68547ecd
SHA512a962fa4d1b63ea1755bf218333eb965f84635968205e321c8ef82b607b1b02f1725903c5e35f421b67ce42c06edf2b49f81852c29af0b00f22dcb09a35cb7dfd
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.GameCenterModule.dll
Filesize39KB
MD52fa4a0b59bfd9bf4befe0bbca4f4100c
SHA194d247d5715bcf9cec701e6362ea779b74f81c98
SHA256f16af765778591f56bd36244cead4b0da92ac51aebbbffae3e0bf0a888b9539a
SHA5128dd850ffac0dd9dfd017a642266627f653f3de0cafc2ccceb4095c375fa105a38ac999d02240d4844b99a98f58f1964e0ad3c0ad9c0db378a89f07c970a28dc8
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.GridModule.dll
Filesize24KB
MD599e16de7529f2d5897c082640da66f38
SHA15c4bb6c1320445b24656fc483d9607e2453fdced
SHA256088a7cb48e3b9eeac16fe3a8593964431da6953074bf1ece2695c0e9fe6f6017
SHA5124b7544a5b4929c754ccd548ae5671a97eb4218326647a47ce6c57f9b67000e432f6fa015f0d55b70eee2417147f9732891c8db66382a853963cedc4eee392acd
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.HotReloadModule.dll
Filesize19KB
MD58d76ab1e1c7324a4759996d7c869d1db
SHA1610716adb8e477abc4a58c2ece23eb88efc0c8c7
SHA256a36b7d56375363a0211d274d07c94ee534886b48ff2641d2cade5ec8d5256279
SHA5120490c54a5f6af4e56471ab0900373a74ae809cd25bf80d080f69c31af82383c503f420bb72ca1abe74bedbf435a345714c45d18a52db656abaacb0b91356d88a
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.IMGUIModule.dll
Filesize169KB
MD51c498b2a730add7632e59ef796de1b0b
SHA10e2d321bf71da2cdb09b8c51d8406dd170829213
SHA2568e4d52aabffe22e44fc425ba09d468fa455c62bd6cd629d439f568ef11510854
SHA51255081b398548a653ab408321d9cb96bff0e9402d1d4d22524df02280cafd130803fe1e9dd603210436dcd1638e9b08a7280d16c9ce4b1a383947f2bfc1ba64cd
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.ImageConversionModule.dll
Filesize23KB
MD5757f1931696e372989ada80bfad3a8b9
SHA137a9052b06d862b4b0dca5c3ad5eddff86b5d5da
SHA256478026e15059b1e672eb6bf7636db4dec4856eabdbe546fd936f0ba6e9a4a181
SHA5125a0fe8236c2367d5145575ae8aaec2b97102c2856546af2c33395c882b8eb2196697749c404be32060dbe562a0c32467d9c871a37af5817bdfe029a8faa81060
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\Managed\UnityEngine.InputModule.dll
Filesize22KB
MD5a7516fdcb2f10a912e028ab43bbd50fd
SHA1b2b8b557b385ac8d273c9c4c3e0fef0802fd2f88
SHA25644de3fc73dbd9e04e85183600123b48da4ec66d57fe19fc9cb1034f76e4a44a1
SHA51257b4e2c657382fa4dadb03de71edcc89eaa93160b792a419fc3bcfd258c48df15241ab219997dcf06d3c8caaf468d6a1b340a640a15c560376abaeec0d1a641f
-
Filesize
109KB
MD59d69469c02675a947ce91789994c0fa8
SHA1ecff270d3b08ee696ad83b06af2c33bb8c381223
SHA256aa4379972d5f039e84c45aced55cd8babb9903def6bd9ea53cf5eeb1d813081c
SHA5122fb769472e23fcfbd0b29d51273bc2f3067cb36591279adcb98db6b04cd94340aa74d5e22656cc55657e58a8c40258454f05ba00615ef1d30df0bf6a618fac76
-
Filesize
4.4MB
MD563fb24a34ddb043ed55d30dfa535713f
SHA1b8188cc457d5ccb12727e98834bd79ba3dcf4e59
SHA25617bd780b0581bad454cc58e848ddca2493f318940ae853521f4da82dd886b536
SHA512a72fbd5319d033d4a43f9f0a7cd23fc365a99fe65d0fd795b6e4b7efe76fb6624fe53e4274a02417391cfb0d6078672788b891bb118b47a71434250f1b4dc17b
-
Filesize
4.6MB
MD5399057cc21da8a0d7ead22a971f226c4
SHA1155c37e238f36609a57e85c76d3c0a2642a0fab8
SHA2566b203e7078654ee3dc159190751a15da29cef25833a12c2d0ba3aab603784b98
SHA512d1dc0a4cc39106ba102be342e455d6af25f1aaf44f46405d062de05aff536e73d23a94185235e1443457a0e64fb79bc3b36d2669cd22feb04197fadb478e0fe5
-
Filesize
1KB
MD5cc8ab18d2aaf870d0ec6e9119cd765c9
SHA188043d73736acd673130eee006124366d25716b1
SHA25606e90a73454cb982205b328201c0973acb7883a01a58f2e9d01eedf0d4843cff
SHA512537e8eb126f831a29f890c62d911029279d30d23fe033445d6f9ea4df3ce8d735d570821ec82d37dfe29307fc30ea666d1e578ede5d699996c7e67ee48d4d1ad
-
Filesize
3KB
MD57feec05721f0e3a90695685386c02830
SHA1598751475c5309adccbaf040a0bc6d59ce0f7b79
SHA25654d8c38984c6b32231695c6874f8e4f23308f65890ec11ed6e007c4db63bf5f8
SHA512fd92e119ce944c57060b56be6ddd8ea4313f2adad3f1994dbbbd5b82e0a0a7170c26fe3608b1a221224d22ccfb68358a55382faec93c13dc39e7ed9adcbe0735
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\StreamingAssets\LanguageModels\es-ES\ivector\splice.conf
Filesize35B
MD5f613ff1ed9f7df0db164adf15caac381
SHA114768865d57598ce48119e8657ecafd0a7d62681
SHA2569f0c5f7c82d18eaf25d8bce470efa9f7741f88411fe428774bc0a9bb69a24756
SHA512a45d33804b2c51377970788781d051b86d69d67b6369d1b8b3d4285d1794b7c179a2fe84b80e20949d8027a6611c83cb0118c1ebc48bef1dedd98306652c3e11
-
C:\Users\Admin\Downloads\Win\Yandere AI Girlfriend Simulator_Data\StreamingAssets\LanguageModels\ru-RU\ivector\online_cmvn.conf
Filesize95B
MD5505902d4fef41ea2f8f4964baec79084
SHA19cf2b6941b3110f2678dac465a25099957f60369
SHA256a2f3571754b64297cb7efb2e7ca3df61995c5a45fcbb97188f90613552bb2dfe
SHA5122a4a55c2f904a829cebbf53e67b4d384fbecbe705feee54c7daa2a386e79c12d896c121a36c437fdb5d1d99f873f2a049c5b9e08ce5a1660dc0fdd96598a9b07
-
Filesize
46B
MD5b27fc1040da427d05c051e24d140661b
SHA150241d8e6ccb8c77d14132f170d01a84002cd29a
SHA256e1ffeac390bbf2c0a1f0b3f0ec3184bbe81cb3e23b56559b9975462425e42343
SHA512ff7b96644a315bd8dfeb4d7aacf4c7d8d5c79f5a03f33383fea1d1d0b737e7913d36022c8277256062797076c11ab59fdac03c6923ed98d742eaf744e8ced973
-
Filesize
120B
MD52fbbe1f53c50e52f2209992ab8825359
SHA17488d6620b6dbd8434c51d77e9c5a557c7c4f270
SHA256a5715a6a0d5edfa2668310736fbe86d36700b41b022e6d3dd5db37e6fcbb59d5
SHA512f4c3af3c4edab9a4da0594bee74738281c88703a81f724694a866e8d476f14ef3d289e48b29525bc55eebd2bde1c1822ac3bcd9ccd7453284ca2959eb10f3f04
-
Filesize
436KB
MD54b76d7ca748279072dda4fdee8af7d7c
SHA18797655919b3a5d862e65c07bebc91bebac1cbf5
SHA2564ff8db20b5c58fc56bb2b7a939e1d34bc8a1e6af92ed6e20f9071c8fc2964805
SHA512f43df8489c8e0efec3bc8db2cdd143391fb1cd452e0f0b619958f122c2770ba33e823a7f3ebf3f6f24e8ce9ee6e3f401c1920cecbb323aac1d0dfaa6bbea9eb6
-
Filesize
128KB
MD5bb858b7256cb4e3a3080baf68ab3da0d
SHA1c38a88fb51b65c17c250535d3a4eb3d9e351c022
SHA256c596fc62dee0782b40423ae8cfd716c844bc93b7f236a8a3bb54067483fa108b
SHA512a82e09cdaa403779ae3756353ffdfa6638fcb393584dbfa6b5ad96dc1f88668cd9b974e7e9275be3bffa9da4ad390979fc6826aa547f031c59af86c4d183b193