Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/02/2024, 20:20

General

  • Target

    strawberry_protected.exe

  • Size

    3.3MB

  • MD5

    b7611c29b42ce148e042799394e466cf

  • SHA1

    0da0a1ca8da7eeaf1019b34989e0fb5d129b9bb8

  • SHA256

    8b03321c8fca8ff5eb5b063cb28468bfb800513e03532313690ebdd477917ff2

  • SHA512

    b3caffc5738e323d1bd168c9f32f73501de9d0e14d0047dd3d04cfda017ea9b22ab92fca8641fffde20c7411e5b0f217c5e82275edb057f437b7cc8208f76032

  • SSDEEP

    98304:9BbvJCdtDQl8rr6P6xF5RBJAPlz20JUY8tm:9Bbv8DQinM6bAPcH7g

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 7 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3232
    • C:\Users\Admin\AppData\Local\Temp\strawberry_protected.exe
      "C:\Users\Admin\AppData\Local\Temp\strawberry_protected.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1160
      • \??\c:\users\admin\appdata\local\temp\strawberry_protected.exe 
        c:\users\admin\appdata\local\temp\strawberry_protected.exe 
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1196
        • C:\Users\Admin\AppData\Local\Temp\KDMAPPER.EXE
          "C:\Users\Admin\AppData\Local\Temp\KDMAPPER.EXE"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1388
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" add "HKCU\Software\Classes\ms-settings\shell\open\command" /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\istanbuljack7888.vbs" /f
            5⤵
            • Modifies registry class
            PID:3564
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" add "HKCU\Software\Classes\ms-settings\shell\open\command" /v DelegateExecute /d "0" /f
            5⤵
            • Modifies registry class
            PID:3848
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C computerdefaults.exe
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3192
            • C:\Windows\SysWOW64\ComputerDefaults.exe
              computerdefaults.exe
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4848
              • C:\Windows\SysWOW64\wscript.exe
                "wscript.exe" C:\Users\Admin\AppData\Local\Temp\istanbuljack7888.vbs
                7⤵
                • Checks computer location settings
                • Suspicious use of WriteProcessMemory
                PID:2544
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts
                  8⤵
                    PID:812
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C schtasks /Create /SC ONLOGON /TN JavaAutoUpdateTask_D5RQ1w3h2OfiPyhQq2HB040MX /TR "C:\Users\Admin\AppData\Local\Microsoft\Windows\GameExplorer\D5RQ1w3h2OfiPyhQq2HB040MX.exe" /RL HIGHEST /IT
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4220
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /Create /SC ONLOGON /TN JavaAutoUpdateTask_D5RQ1w3h2OfiPyhQq2HB040MX /TR "C:\Users\Admin\AppData\Local\Microsoft\Windows\GameExplorer\D5RQ1w3h2OfiPyhQq2HB040MX.exe" /RL HIGHEST /IT
                6⤵
                • Creates scheduled task(s)
                PID:2852
            • C:\Users\Admin\AppData\Local\Temp\rdbxkwrd.exe
              "C:\Users\Admin\AppData\Local\Temp\rdbxkwrd.exe" explorer.exe
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3860
            • C:\Users\Admin\AppData\Local\Temp\chromedriver-win64\chromedriver.exe
              "C:\Users\Admin\AppData\Local\Temp\chromedriver-win64\chromedriver.exe" --port=59860
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3112
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --allow-pre-commit-input --disable-background-networking --disable-backgrounding-occluded-windows --disable-client-side-phishing-detection --disable-default-apps --disable-hang-monitor --disable-popup-blocking --disable-prompt-on-repost --disable-sync --enable-automation --enable-logging --log-level=0 --no-first-run --no-service-autorun --password-store=basic --remote-debugging-port=0 --test-type=webdriver --use-mock-keychain --user-data-dir="C:\Program Files\scoped_dir3112_628884711" --window-position=-32000,-32000 data:,
                6⤵
                • Drops file in Program Files directory
                • Enumerates system info in registry
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:1620
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Program Files\scoped_dir3112_628884711" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\scoped_dir3112_628884711\Crashpad" "--metrics-dir=C:\Program Files\scoped_dir3112_628884711" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffb7e229758,0x7ffb7e229768,0x7ffb7e229778
                  7⤵
                  • Drops file in Program Files directory
                  PID:4684
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --enable-logging --log-level=0 --user-data-dir="C:\Program Files\scoped_dir3112_628884711" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --enable-logging --log-level=0 --mojo-platform-channel-handle=1776 --field-trial-handle=1944,i,5101198201121239582,13051674202015226903,131072 /prefetch:2
                  7⤵
                  • Drops file in Program Files directory
                  PID:1572
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --enable-logging --log-level=0 --user-data-dir="C:\Program Files\scoped_dir3112_628884711" --enable-logging --log-level=0 --mojo-platform-channel-handle=2140 --field-trial-handle=1944,i,5101198201121239582,13051674202015226903,131072 /prefetch:8
                  7⤵
                  • Drops file in Program Files directory
                  PID:1584
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --enable-logging --log-level=0 --user-data-dir="C:\Program Files\scoped_dir3112_628884711" --enable-logging --log-level=0 --mojo-platform-channel-handle=2276 --field-trial-handle=1944,i,5101198201121239582,13051674202015226903,131072 /prefetch:8
                  7⤵
                    PID:4688
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Program Files\scoped_dir3112_628884711" --display-capture-permissions-policy-allowed --enable-automation --enable-logging --log-level=0 --remote-debugging-port=0 --test-type=webdriver --allow-pre-commit-input --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1944,i,5101198201121239582,13051674202015226903,131072 /prefetch:1
                    7⤵
                    • Drops file in Program Files directory
                    PID:4612
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Program Files\scoped_dir3112_628884711" --display-capture-permissions-policy-allowed --first-renderer-process --enable-automation --enable-logging --log-level=0 --remote-debugging-port=0 --test-type=webdriver --allow-pre-commit-input --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1944,i,5101198201121239582,13051674202015226903,131072 /prefetch:1
                    7⤵
                      PID:1400
                • C:\Users\Admin\AppData\Local\Temp\msedgedriver.exe
                  "C:\Users\Admin\AppData\Local\Temp\msedgedriver.exe" --port=59979
                  5⤵
                  • Executes dropped EXE
                  • Checks system information in the registry
                  • Drops file in Program Files directory
                  PID:4112
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --allow-pre-commit-input --disable-background-networking --disable-backgrounding-occluded-windows --disable-client-side-phishing-detection --disable-default-apps --disable-hang-monitor --disable-popup-blocking --disable-prompt-on-repost --disable-sync --enable-automation --enable-logging --log-level=0 --no-first-run --no-service-autorun --password-store=basic --remote-debugging-port=0 --test-type=webdriver --use-mock-keychain --user-data-dir="C:\Program Files\scoped_dir4112_330077283" --window-position=-32000,-32000 data:,
                    6⤵
                    • Drops file in Program Files directory
                    • Modifies registry class
                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                    • Suspicious use of FindShellTrayWindow
                    PID:2996
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Program Files\scoped_dir4112_330077283" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\scoped_dir4112_330077283\Crashpad" "--metrics-dir=C:\Program Files\scoped_dir4112_330077283" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffb6f7d46f8,0x7ffb6f7d4708,0x7ffb6f7d4718
                      7⤵
                      • Drops file in Program Files directory
                      PID:4544
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,9152526060851692959,8554881194437939840,131072 --lang=en-US --service-sandbox-type=none --enable-logging --log-level=0 --user-data-dir="C:\Program Files\scoped_dir4112_330077283" --enable-logging --log-level=0 --mojo-platform-channel-handle=2196 /prefetch:3
                      7⤵
                        PID:4520
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,9152526060851692959,8554881194437939840,131072 --enable-logging --log-level=0 --user-data-dir="C:\Program Files\scoped_dir4112_330077283" --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --enable-logging --log-level=0 --mojo-platform-channel-handle=2128 /prefetch:2
                        7⤵
                          PID:752
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,9152526060851692959,8554881194437939840,131072 --lang=en-US --service-sandbox-type=utility --enable-logging --log-level=0 --user-data-dir="C:\Program Files\scoped_dir4112_330077283" --enable-logging --log-level=0 --mojo-platform-channel-handle=2824 /prefetch:8
                          7⤵
                            PID:4628
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-automation --enable-logging --log-level=0 --remote-debugging-port=0 --test-type=webdriver --allow-pre-commit-input --field-trial-handle=2088,9152526060851692959,8554881194437939840,131072 --lang=en-US --user-data-dir="C:\Program Files\scoped_dir4112_330077283" --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
                            7⤵
                            • Drops file in Program Files directory
                            PID:3824
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-automation --enable-logging --log-level=0 --remote-debugging-port=0 --test-type=webdriver --allow-pre-commit-input --field-trial-handle=2088,9152526060851692959,8554881194437939840,131072 --lang=en-US --user-data-dir="C:\Program Files\scoped_dir4112_330077283" --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
                            7⤵
                              PID:4656
                      • C:\Users\Admin\AppData\Local\Temp\LOADER (2).EXE
                        "C:\Users\Admin\AppData\Local\Temp\LOADER (2).EXE"
                        4⤵
                        • Executes dropped EXE
                        PID:2380
                    • C:\Windows\Resources\Themes\icsys.icn.exe
                      C:\Windows\Resources\Themes\icsys.icn.exe
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Checks whether UAC is enabled
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4540
                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                  1⤵
                    PID:1696

                  Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Program Files\scoped_dir3112_628884711\Crashpad\settings.dat

                          Filesize

                          40B

                          MD5

                          963c3306a5a60997844e61a1c0747eb2

                          SHA1

                          e14fa18067f3063cb8a907e03e704e19ceb42ae2

                          SHA256

                          e4a7b3671d2fb857cf563f92543e94f4292cb5ab8dc128836a8bb8add05bad42

                          SHA512

                          4c931b20190d8bae237a51aec6edeac10ca909be3c4cb159a837099d5904e23ba651af5cb6ef5ed652f25e4b11dfcc5e4e6f46b4743b5a1208b50be931b92e20

                        • C:\Program Files\scoped_dir3112_628884711\Default\Affiliation Database

                          Filesize

                          12KB

                          MD5

                          02b38d8d677675ff2ebd9d676f3ea251

                          SHA1

                          fee3c6dc6db86e605ceb920330d4d322f3579e18

                          SHA256

                          92a3a61fe42ce50b01e3ab7103187262586e155e934696455f4f39ad15e39750

                          SHA512

                          2eff76a3d1db5eab5d175b76a3077123302b689dbab0d0d9cac414df4c81d2dbded547d0f49b9be44f0beabaef4feb2353b49fcf0ffe176b94a6633be1bc5e91

                        • C:\Program Files\scoped_dir3112_628884711\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          48B

                          MD5

                          48192602c50341e19eb0d2308facc2a4

                          SHA1

                          09819e9da39858743b9a436ee98e89f3748c028a

                          SHA256

                          6a8d2327f0915485121c8b75e3f410a8c72fa9411a9e10efece30fae4a46a3f0

                          SHA512

                          f4539f3acff428607f29e085ce59abea9354409e18ee5ed368cbae3356ad40e506c6c385419367d306112b01c174614ca2f9f1708cec65d176fe475e68cfc6b2

                        • C:\Program Files\scoped_dir3112_628884711\Default\Code Cache\wasm\index

                          Filesize

                          24B

                          MD5

                          54cb446f628b2ea4a5bce5769910512e

                          SHA1

                          c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                          SHA256

                          fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                          SHA512

                          8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                        • C:\Program Files\scoped_dir3112_628884711\Default\Code Cache\wasm\index-dir\the-real-index

                          Filesize

                          48B

                          MD5

                          f25ab86a66737826d720977431d2bb2c

                          SHA1

                          2a3ddddceacc52e4e265c079a74c5d4f7e3b2a40

                          SHA256

                          7a438e9de599ad64a3b8318cb819bc4aa0fb827ccafaef01caed05d2d9b167a8

                          SHA512

                          b017dd46acf342737d09648092f2f9ecf2bcd99a6346519645d96556f3272df70024c78d586c67e5286540c296d79555613f74e6f5541aba22898a4c6f3b9aaa

                        • C:\Program Files\scoped_dir3112_628884711\Default\DawnCache\index

                          Filesize

                          256KB

                          MD5

                          7af1745ce4d17d63d4fd209943023bc7

                          SHA1

                          dad3405556ee26e69cd4278fae4fc0d7c971230f

                          SHA256

                          4035301817ba436c72e5b78d5db5eb6fd94754cd76be236dad665ab52f76f1f3

                          SHA512

                          34c2f50eb223fe6b935ef2914e6444e6d721fd6d0f4b33d83f02a6be6caf4e393fd3a49363f79d97adda0f22d2761cc6ce74c154f527e4ebd6cbb4851e19dc3a

                        • C:\Program Files\scoped_dir3112_628884711\Default\Extension Scripts\LOG

                          Filesize

                          131B

                          MD5

                          74676aa922273a3cef4347eed71ab0ad

                          SHA1

                          a771e6a153d67064ee8acdded69de6c031910700

                          SHA256

                          d61bad6a95654ec927b81fa480b3615bc12ad2ed3110b050e63f3cc73abf2d43

                          SHA512

                          5965af6ab22f22001a36aada3ec9e3129f94e9b58d4fc782263dee1e6a1ff85b7401d67863a3f71849e9295b7457f5a25fa762bbc70c791996cf0d59c518ba46

                        • C:\Program Files\scoped_dir3112_628884711\Default\Extension Scripts\MANIFEST-000001

                          Filesize

                          41B

                          MD5

                          5af87dfd673ba2115e2fcf5cfdb727ab

                          SHA1

                          d5b5bbf396dc291274584ef71f444f420b6056f1

                          SHA256

                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                          SHA512

                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                        • C:\Program Files\scoped_dir3112_628884711\Default\Favicons-journal

                          Filesize

                          512B

                          MD5

                          9c0a8dfb75f9d3d4ee244812f0e16f6f

                          SHA1

                          bedfeb7a1d8b07de0cc381f799401fd6fbe7a9bc

                          SHA256

                          ff81c0d63ca4a042a4faef6b1ad5b5afdd4ba8680c431b5ba36fda9c2300ff06

                          SHA512

                          f8dc3a78cc259af72bc181ed5e3da710456dea8cfdaaa58b8816d9947efb84e9a462e1d364c3c63616e69ceaa4975c4ec6b4e1ca5605d2a4a222b8de20377390

                        • C:\Program Files\scoped_dir3112_628884711\Default\GPUCache\data_2

                          Filesize

                          8KB

                          MD5

                          0962291d6d367570bee5454721c17e11

                          SHA1

                          59d10a893ef321a706a9255176761366115bedcb

                          SHA256

                          ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                          SHA512

                          f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                        • C:\Program Files\scoped_dir3112_628884711\Default\GPUCache\data_3

                          Filesize

                          8KB

                          MD5

                          41876349cb12d6db992f1309f22df3f0

                          SHA1

                          5cf26b3420fc0302cd0a71e8d029739b8765be27

                          SHA256

                          e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                          SHA512

                          e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                        • C:\Program Files\scoped_dir3112_628884711\Default\GPUCache\index

                          Filesize

                          256KB

                          MD5

                          2b4d8e5ff0b2cd64677f76fd108c8469

                          SHA1

                          338c5a68141d24eb26c3fa329ebf8c910cdb99b9

                          SHA256

                          9e7781a8c537da7a62efaa7c2da2eabdd0aad86cbbb98e80788aedbba3da104d

                          SHA512

                          09dbc4a857e578b150531334050cfffb27447a6e24bdae4723fb45a8e657e8fe33acd8cd704bdcb52ccd5990a8413b0750a9bd585a61185ff6d2547edc1e9b50

                        • C:\Program Files\scoped_dir3112_628884711\Default\History

                          Filesize

                          148KB

                          MD5

                          90a1d4b55edf36fa8b4cc6974ed7d4c4

                          SHA1

                          aba1b8d0e05421e7df5982899f626211c3c4b5c1

                          SHA256

                          7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                          SHA512

                          ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                        • C:\Program Files\scoped_dir3112_628884711\Default\Local Storage\leveldb\LOG

                          Filesize

                          135B

                          MD5

                          75aab84d2ab7abe09a17f315b9529aa3

                          SHA1

                          2af6b964cf2bd9eddff812d40de193fa0483d5b7

                          SHA256

                          e26f52a04332d685d40b3e5dc8facce67707cd5797c646013814badac779dfad

                          SHA512

                          67b13f67955be5386555cd4fe1155bec313a6ac1481c84e8f6a5f635e06a6fcc4906c0fef69db4359cd420bd8fe89bcab05567aaff19177ccfd6d7c604836ef9

                        • C:\Program Files\scoped_dir3112_628884711\Default\Login Data For Account-journal

                          Filesize

                          512B

                          MD5

                          cd31a18e1d01d6ab378714180f6408dd

                          SHA1

                          5e32059de79c3ccf64cb730abf4fe1f1c6abcc50

                          SHA256

                          d8b7f220f811f2c07df22d859f193835b7122f36adebfe59d60392507a080e7d

                          SHA512

                          eba1b982735f836dfb3dbad77599a84825f52e3bcd04b19e4bf78c4091ef62674f0efde6bd89fb000a584e583740b807882090b23677d8ead54e0d03f4570ccc

                        • C:\Program Files\scoped_dir3112_628884711\Default\Login Data-journal

                          Filesize

                          512B

                          MD5

                          6fb0e887a905dea1bb265006dc0b66f6

                          SHA1

                          91fcdb2fdf19d2e535b4518859abe74e6270d39e

                          SHA256

                          aede0698d8abc9c1afb06b0739767bfb60bf759824317ea9bc66b149e1a5348b

                          SHA512

                          e67536d16c5ed574d3998218e9bf490829d2cc9122bcb997965d041f371635668c4cece72644f798710e3d495ccedc2ae4239f1672975e45a1c2afdb6c6c8250

                        • C:\Program Files\scoped_dir3112_628884711\Default\Preferences

                          Filesize

                          713B

                          MD5

                          e048a8596409adadfe3ff10db8e5efbb

                          SHA1

                          332d79dfb5c30c125c8b030caaf0b007b1b1af31

                          SHA256

                          e19cd56e347efca1cadfc1fd6875ef82b35631e5cb7f9b54aa4bb9ea71ff66b0

                          SHA512

                          1758879d426dcd224c06dfc32ba2930f453e52bf8b9a85c3149cab82ba4c19a6637d6a27ce605e8925c17352ba7eb93223fb7d1441cbfec8252569a08cb11f5e

                        • C:\Program Files\scoped_dir3112_628884711\Default\Site Characteristics Database\000003.log

                          Filesize

                          40B

                          MD5

                          148079685e25097536785f4536af014b

                          SHA1

                          c5ff5b1b69487a9dd4d244d11bbafa91708c1a41

                          SHA256

                          f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8

                          SHA512

                          c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f

                        • C:\Program Files\scoped_dir3112_628884711\Default\Site Characteristics Database\CURRENT

                          Filesize

                          16B

                          MD5

                          46295cac801e5d4857d09837238a6394

                          SHA1

                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                          SHA256

                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                          SHA512

                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                        • C:\Program Files\scoped_dir3112_628884711\Default\Site Characteristics Database\LOG

                          Filesize

                          285B

                          MD5

                          2e604fe5e873cfadd5ac1255501ed9c3

                          SHA1

                          325d56d3dfcd89f7f1b9241efaca0c856bb312cd

                          SHA256

                          59ea6472087ce00ed422091e7f1e2ca4c5291c1100f82e0d98fdf5290770d264

                          SHA512

                          50c814ee378597973e7d08eb2166633382f7cec1f1d620dfd73e4baba0c7720dc78de948f545625057a8157795ec10abb1d7a68a9b8a9e8319e61a36197ff094

                        • C:\Program Files\scoped_dir3112_628884711\Default\Sync Data\LevelDB\000003.log

                          Filesize

                          46B

                          MD5

                          90881c9c26f29fca29815a08ba858544

                          SHA1

                          06fee974987b91d82c2839a4bb12991fa99e1bdd

                          SHA256

                          a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a

                          SHA512

                          15f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625

                        • C:\Program Files\scoped_dir3112_628884711\Default\Sync Data\LevelDB\LOG

                          Filesize

                          259B

                          MD5

                          ac05a74e4a4be151687cb871824fbeea

                          SHA1

                          b9bc6aad295e86ddb7d32bc71328e2fca83328a7

                          SHA256

                          bbc1d00b855e2c2a79a475fcdb773d233074d1d49cb777b0fa52f9d11999c481

                          SHA512

                          1410619298df31e5fa26c2850e2068f0c6b100f8ee1b987c438e5bcfd453a152e1209971b73ae57dd8e9f4541d19a5f75d978ee40bbd7b91c8086352f756bfee

                        • C:\Program Files\scoped_dir3112_628884711\Default\Top Sites

                          Filesize

                          20KB

                          MD5

                          0bc9e238407dce4e0b83b777f7437894

                          SHA1

                          7d151fe175e32eee2cdab83da6915c6d673984b3

                          SHA256

                          b25b1558e58307d4682d67ccdf868a9a0acce7ee98a9da7f191334bed4e5d9ca

                          SHA512

                          430d6445ac40e17d4c54f0299b35fede60d505160e55c4e970b7551c1c6bac123bac7e5bb1a904b685b24bccf97192b7712c62a9662ad0eefd76065a6fcdd20b

                        • C:\Program Files\scoped_dir3112_628884711\Default\Top Sites-journal

                          Filesize

                          512B

                          MD5

                          3ad99c66ad8068c728c971fc34c9ed2d

                          SHA1

                          d404f24f66602220e87388584fefd0950774d5a8

                          SHA256

                          40b2fe4ef260ed023c58ca6e321e95b1f91d960f3141e506d88fae3737c51ebb

                          SHA512

                          8c6f3a517c15587a63bad3c8e82ca894497d104320ca7068f88f0e995c552aeee35d8aa8b3434a66b879a0a84aaadbfc3e52f7fed9ddaae1e92ac5037ad5dc37

                        • C:\Program Files\scoped_dir3112_628884711\Default\Web Data

                          Filesize

                          88KB

                          MD5

                          6f716b75bad3a352ea4e6f5e6963e7bf

                          SHA1

                          5a9c19e1c1181b15dc95b6ff79958ce770737d2c

                          SHA256

                          66b44845c214cbc5aaf0a7385f328cd850834e035c9d65872baf5cb3be986bdd

                          SHA512

                          52cf9d797d03eefabe478ee041bb1e95622addfadd5f5a58dbf30322ceda33a8b0f4b4e76535c0258824b7a7f9ecafb91349ebb83afd49efaaeae5b1281599f9

                        • C:\Program Files\scoped_dir3112_628884711\Default\Web Data-journal

                          Filesize

                          1024B

                          MD5

                          d2fc58f371c590aebf2338e05bfb0124

                          SHA1

                          da87ca6ac4e1fcf3a6c6d08fc450342a043b3826

                          SHA256

                          0c6951962f8d56890ead75ddc6f890f48ad88f5673dd3c2e91b1554cff3a5f50

                          SHA512

                          b56579ad56087ff27660956546e8eb92e34e2a6c5a4f6431d1791d3d1fc509063cc672016491757a44bf015f1c636b560cca84637c0e7a77d1a0c1c66fb51b0b

                        • C:\Program Files\scoped_dir3112_628884711\Default\shared_proto_db\metadata\LOG

                          Filesize

                          137B

                          MD5

                          dde9a3b48658e6be8e99725f5cc59467

                          SHA1

                          8b5092b431068bb5546b8d18a3da6147f678c2bd

                          SHA256

                          cff2bebc86ef8edbbdbcc93442c9af72b1b93269f3f92e05fe57f3b57c68976c

                          SHA512

                          33ebb157835ebe21b83d1748744cd33f17ac7633232b4d08963c70aff83142c5585d9e7e5db1aba36a0013a5db891f58b062d86b22934f954b1f87cebfc965c0

                        • C:\Program Files\scoped_dir3112_628884711\DevToolsActivePort

                          Filesize

                          60B

                          MD5

                          6f00b97fd0b8a9f1dc8f732bed5b62d8

                          SHA1

                          63feafa3e5de89eed4e8de400da033285f3d1784

                          SHA256

                          5d6067990a03c7279b3b5c235227de1f1ea0701fa7b502737bcd2848edfdafb4

                          SHA512

                          cb5326154af96acfb33f0449eb488d44a7a084c92a2cd8709a6f120d39debc947987e9edf65a09e23def7439d275f6e17c3cb884734436a2b24b27b7a6070050

                        • C:\Program Files\scoped_dir3112_628884711\Last Version

                          Filesize

                          14B

                          MD5

                          9eae63c7a967fc314dd311d9f46a45b7

                          SHA1

                          caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf

                          SHA256

                          4288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d

                          SHA512

                          bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8

                        • C:\Program Files\scoped_dir3112_628884711\Local State

                          Filesize

                          78B

                          MD5

                          8b61e917846ffa930e0cb308c1f1a026

                          SHA1

                          3d9e507a7a41e36a1c25659ad72a448368134fad

                          SHA256

                          bfe95ecd1ff945712f2697925858b4a50834f6b96d90ab230b448317fc602aeb

                          SHA512

                          244ceef0649f72c7371c96667cc829bfbf6c853d173d89a3f206b3384ca95f48f5d5a4defec7897d84a876336942308a9d3357db3ff56cb80c6d9aa1ce5b5fe9

                        • C:\Program Files\scoped_dir3112_628884711\Local State

                          Filesize

                          902B

                          MD5

                          c4485682797ad930425904384f291569

                          SHA1

                          596131c21b506dee8ddd466a0c2e5d7a4406bd87

                          SHA256

                          f1612aaeaf44f9ffb7e2b10c2251984f95584e6f76ebab925bf40b98cd5baf24

                          SHA512

                          4449ded15b65dc6d429497e7d3ca65d36074e374c09b74b22e668f9c4f5c28e9dbcb946be0fae68a3d51fa8d1027152b55c476dd29538d5d2246ce9aef468589

                        • C:\Program Files\scoped_dir3112_628884711\ShaderCache\data_0

                          Filesize

                          8KB

                          MD5

                          cf89d16bb9107c631daabf0c0ee58efb

                          SHA1

                          3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                          SHA256

                          d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                          SHA512

                          8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                        • C:\Program Files\scoped_dir3112_628884711\ShaderCache\data_1

                          Filesize

                          264KB

                          MD5

                          d0d388f3865d0523e451d6ba0be34cc4

                          SHA1

                          8571c6a52aacc2747c048e3419e5657b74612995

                          SHA256

                          902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                          SHA512

                          376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                        • C:\Program Files\scoped_dir4112_330077283\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          c3aeda9d41ee510635abc9fc2a255703

                          SHA1

                          c6e057de5349b0976f708da6187a99aa3c277f0e

                          SHA256

                          630cc2680569507f12d19b9bac7528c7a3ee9df25e450e1240acfccb1a3d1377

                          SHA512

                          f937fbb22cca170ebcde08652c7e3b70959f6bc060dd282b2580796050b66cbe9cba6f3d96e2c66132708011ec4a700de844d670dc3111439dfd7cf61bc71015

                        • C:\Program Files\scoped_dir4112_330077283\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          67932a78507952f6fea5b9072548b07e

                          SHA1

                          632f86dc4d4770343ac5354643b4fd6ba2790535

                          SHA256

                          6588e0390c4578080815ece56f9498fe99d6a730c2b4013008fd7278a83708f0

                          SHA512

                          36ceaf6a218d0f55b75238a99a17beaaf73f86c9d8edda71ba6694359289fde3e537f777d65978326ae133f50956c732e689ecd97b1350b9957d47e3ae4ad137

                        • C:\Users\Admin\AppData\Local\Temp\Costura\14AB1F611E6F230882BCE5B215C3F3AB\32\sqlite.interop.dll

                          Filesize

                          1.4MB

                          MD5

                          6f2fdecc48e7d72ca1eb7f17a97e59ad

                          SHA1

                          fcbc8c4403e5c8194ee69158d7e70ee7dbd4c056

                          SHA256

                          70e48ef5c14766f3601c97451b47859fddcbe7f237e1c5200cea8e7a7609d809

                          SHA512

                          fea98a3d6fff1497551dc6583dd92798dcac764070a350fd381e856105a6411c94effd4b189b7a32608ff610422b8dbd6d93393c5da99ee66d4569d45191dc8b

                        • C:\Users\Admin\AppData\Local\Temp\KDMAPPER.EXE

                          Filesize

                          12KB

                          MD5

                          f9186fc9710598c0179e5746271dc8e8

                          SHA1

                          125a722ed76138df9f45355651c5ddf4bea7608a

                          SHA256

                          f084abb4903669821e132b0c2dc9110c21695e9367dc458736e4746cc05d2e71

                          SHA512

                          f79e1375ee35462ff1fb2c7bb608694e524d1563c38b25295d2ca1d22ad861f774c98ea490c00760fb9bdc93f8ac7426624a00601ea9359c93827df6ddc7c292

                        • C:\Users\Admin\AppData\Local\Temp\LOADER (2).EXE

                          Filesize

                          369KB

                          MD5

                          506b42dc3f4bbad912650378ca9f747e

                          SHA1

                          8b2603733fa90b9ad131153df6fedb5f3bea05ef

                          SHA256

                          a224b745b9750ffcf4ddce81df5e908bae87e765e6727dfa2fdc62b892181934

                          SHA512

                          ea46d3977467e46e81aa280afafa2ace6f7020c06accdfccb01ef1d36753de59d88a3bc5e216a0e6cab464cc0beafdeabbdd556a26d27ceadfe9bfc1bec722ba

                        • C:\Users\Admin\AppData\Local\Temp\chromedriver-win64\chromedriver.exe

                          Filesize

                          16.1MB

                          MD5

                          1db95405cb7c004d4bb3b7743980e8dd

                          SHA1

                          9ac1d84748f2325bf00ed716d7c1f8566ff1d894

                          SHA256

                          f1abea20acda7d68184003a299f7840caa68f8d81842677c047b1947df708ae8

                          SHA512

                          ee74b98aa064a2f78ecea87e3cbabea31d9a01b844fa187fb70ac5de8f801f0d702561914d2415a5ddd9512fc95ce943b8001a7195d84577384b526b85ea39e8

                        • C:\Users\Admin\AppData\Local\Temp\istanbuljack7888.vbs

                          Filesize

                          171B

                          MD5

                          a34267102c21aff46aecc85598924544

                          SHA1

                          77268af47c6a4b9c6be7f7487b2c9b233d49d435

                          SHA256

                          eba7ab5c248e46dbe70470b41ebf25a378b4eff9ce632adff927ac1f95583d44

                          SHA512

                          5d320312b93b46c9051a20c82d6405a3f2c78b23adb3ab3e71aad854b65b500937de7ca2986cf79967386d689beecccf676d89afde8ecc5d5ad0cb4ae2bf38a3

                        • C:\Users\Admin\AppData\Local\Temp\rdbxkwrd.exe

                          Filesize

                          124KB

                          MD5

                          e898826598a138f86f2aa80c0830707a

                          SHA1

                          1e912a5671f7786cc077f83146a0484e5a78729c

                          SHA256

                          df443ccf551470b3f9f7d92faf51b3b85ae206dd08da3b6390ce9a6039b7253a

                          SHA512

                          6827068b8580822ded1fb8447bdb038d0e00633f5ef7f480a8cdeaab6928ac23022a0b7a925058e0926ce9b41a6c8c22a5692e074621b2fccdb7edd29a0d4cfb

                        • C:\Users\Admin\AppData\Local\Temp\strawberry_protected.exe 

                          Filesize

                          434KB

                          MD5

                          d8224065808aa0206e105bf13f6bc851

                          SHA1

                          23109bb31ffeb08f5345bb098789b4f9508fa84d

                          SHA256

                          7e2efea5139af0b0d2f262a4ca8813c7e683c552eb1f0f4733710d9e0c95ed98

                          SHA512

                          f22e905e5074efdcc1c2444c26f401cc2c7b2b6c4febd10f007bd236b1116485ed87678bdfd070a14e49ac502c2ebdcc1c11882699e3a5479843c13f084b8f2e

                        • C:\Users\Admin\AppData\Roaming\Gongle\a3J6QSAGBT\LOG

                          Filesize

                          331B

                          MD5

                          06b499a8bb7cf7c2b1db6f1ff6279c50

                          SHA1

                          4ee0120aa480d9a32afee5a88a72e254d4adb333

                          SHA256

                          500f820d25ad4e63196c614236ae9e88dc4f386d8e0e9bb0917f5e47d824efa7

                          SHA512

                          9faeda92dd38fd0337f11c76efa8c212e5475d15602713cd35f03aa8fdf76918bfb6b78a8520fb896f2be28d1b0a44b4651d0aab271695abedf1f708fc2a054d

                        • C:\Users\Admin\AppData\Roaming\Gongle\a3J6QSAGBT\LOG.old

                          Filesize

                          293B

                          MD5

                          f9ad6b3607287475a6191d6b114d55ea

                          SHA1

                          227d391bf073b7e2963445229a1d5bc832a0a320

                          SHA256

                          1c7a2d94138b81d9146b3f1eb7084b853ed94e43ade4da410eca228279f5fe11

                          SHA512

                          a8c9e1ffab335472f8aa2e3917617248eb7b01cb434d9ebed894e86c58665600a98ab093c92a7d8659ac8bd09bae07d67a12483feb89e9bf3d8b5cd4ae210e9f

                        • C:\Users\Admin\AppData\Roaming\Gongle\aAR7D5NCEV\s5jf5e5i.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite

                          Filesize

                          48KB

                          MD5

                          8c86956bcf39510cba246cf1798054d9

                          SHA1

                          d6a9b22f28d9b37ed7f8f69e638f94ccbf430209

                          SHA256

                          372134119273e105c507cb6cadc670afc142962a119d2e0e41ac7b170645f568

                          SHA512

                          67853d40892eaa0c462e61a2cd2eac299250c860940eac93458d9a77755b08e36b7e8aa23b263743235c9a32de55cac68bb88a502f5c36ecf8d347d443509e3b

                        • C:\Users\Admin\AppData\Roaming\Gongle\aYXEG0L298\LOG

                          Filesize

                          329B

                          MD5

                          ad6298db48d11355a2cf07f0f2832ccf

                          SHA1

                          7f098b7294873f799e4df45012fbde9b4d38acf3

                          SHA256

                          386e35fada28296ac47a5809f33bb6a5dd624191ae186078a74b7a685727bcdc

                          SHA512

                          080aa84ad028709db6bffc9ae45fb90c2165dcd955f88adf79e06631fe4cc0978fa82f00576376c50a68e517ab91c0e537e2194f600fa89dd354c17f55ee4be6

                        • C:\Users\Admin\AppData\Roaming\Gongle\aYXEG0L298\LOG.old

                          Filesize

                          291B

                          MD5

                          b578567522c37580266ce6e9f5484436

                          SHA1

                          1cf910e896e93fcc8f1f60ce437cd0afc956a246

                          SHA256

                          79d2fb3ecf7748711bba13677f61c091fec0d802c5fcfed5e80c01a770a062da

                          SHA512

                          6746bda07b7f0cb2fac49aac76591b62702bfdaea2beb0915b65b2e1187384b06bdba28dbf5d36c30cbbc3ffa6dac8b0aa72b8920e0141fbba84f819128420cc

                        • C:\Windows\Resources\Themes\icsys.icn.exe

                          Filesize

                          2.7MB

                          MD5

                          3e5b989f1fceb038e6b1f3e98c3b5178

                          SHA1

                          cbace916c86628c82be121a79a14c2b63a708c59

                          SHA256

                          dd7415502e6fba2232535cdfdb1a0265deb9ddb672155d57430068307dffd975

                          SHA512

                          bab00ca31dab573bf77cd4aab86d38e10466269e375da35af82381b2614e26c14f9165ab8c8dcf81924a8067c1f54e2cbd145330dacdd50bf7d403eb1b88946c

                        • C:\Windows\Resources\Themes\icsys.icn.exe

                          Filesize

                          2.0MB

                          MD5

                          134d6982913541154bdfb68dd3391002

                          SHA1

                          b3e5a74182cef1aec75942fab0ef0a0997055016

                          SHA256

                          74607b50546a56540994ad9fdb1c5a53fa63c091e7a92ade4d7a36049ea0bbf8

                          SHA512

                          8040703915a2d4c40dbd226f24acfcd9f8120b4344be01f6cba7c06cba8387ad00072274797bb968055305089b9814be92b16bd013668da9f02a9e606b2ffe0f

                        • memory/1160-0-0x0000000000400000-0x0000000000B78000-memory.dmp

                          Filesize

                          7.5MB

                        • memory/1160-44-0x0000000000400000-0x0000000000B78000-memory.dmp

                          Filesize

                          7.5MB

                        • memory/1160-1-0x0000000077154000-0x0000000077156000-memory.dmp

                          Filesize

                          8KB

                        • memory/1160-2-0x0000000000400000-0x0000000000B78000-memory.dmp

                          Filesize

                          7.5MB

                        • memory/1388-78-0x0000000006540000-0x0000000006552000-memory.dmp

                          Filesize

                          72KB

                        • memory/1388-251-0x0000000009C60000-0x0000000009C6A000-memory.dmp

                          Filesize

                          40KB

                        • memory/1388-91-0x00000000069D0000-0x00000000072A8000-memory.dmp

                          Filesize

                          8.8MB

                        • memory/1388-85-0x00000000066E0000-0x00000000066F2000-memory.dmp

                          Filesize

                          72KB

                        • memory/1388-84-0x00000000066B0000-0x00000000066BA000-memory.dmp

                          Filesize

                          40KB

                        • memory/1388-81-0x0000000004B50000-0x0000000004B60000-memory.dmp

                          Filesize

                          64KB

                        • memory/1388-80-0x0000000072B20000-0x00000000732D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/1388-51-0x000000000EF10000-0x000000000FFBC000-memory.dmp

                          Filesize

                          16.7MB

                        • memory/1388-47-0x0000000005250000-0x00000000057F4000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/1388-94-0x0000000007510000-0x0000000007532000-memory.dmp

                          Filesize

                          136KB

                        • memory/1388-95-0x000000000C860000-0x000000000CBB4000-memory.dmp

                          Filesize

                          3.3MB

                        • memory/1388-45-0x0000000004C00000-0x0000000004C92000-memory.dmp

                          Filesize

                          584KB

                        • memory/1388-39-0x0000000000310000-0x000000000031C000-memory.dmp

                          Filesize

                          48KB

                        • memory/1388-43-0x0000000004B50000-0x0000000004B60000-memory.dmp

                          Filesize

                          64KB

                        • memory/1388-42-0x0000000002660000-0x000000000266A000-memory.dmp

                          Filesize

                          40KB

                        • memory/1388-40-0x0000000004AD0000-0x0000000004AEA000-memory.dmp

                          Filesize

                          104KB

                        • memory/1388-41-0x0000000072B20000-0x00000000732D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/1388-255-0x0000000009C80000-0x0000000009C88000-memory.dmp

                          Filesize

                          32KB

                        • memory/1388-254-0x00000000074A0000-0x00000000074AC000-memory.dmp

                          Filesize

                          48KB

                        • memory/1388-253-0x0000000004B50000-0x0000000004B60000-memory.dmp

                          Filesize

                          64KB

                        • memory/1388-249-0x0000000000A40000-0x0000000000AA6000-memory.dmp

                          Filesize

                          408KB

                        • memory/1388-250-0x0000000000A10000-0x0000000000A1A000-memory.dmp

                          Filesize

                          40KB

                        • memory/2380-38-0x00007FF61F2C0000-0x00007FF61F33E000-memory.dmp

                          Filesize

                          504KB

                        • memory/3232-67-0x00000000006E0000-0x00000000006E8000-memory.dmp

                          Filesize

                          32KB

                        • memory/3232-68-0x0000000001FC0000-0x0000000001FC1000-memory.dmp

                          Filesize

                          4KB

                        • memory/3232-198-0x0000000001FC0000-0x0000000001FC1000-memory.dmp

                          Filesize

                          4KB

                        • memory/3232-69-0x00000000006E0000-0x00000000006E8000-memory.dmp

                          Filesize

                          32KB

                        • memory/3232-71-0x00000000006E0000-0x00000000006E8000-memory.dmp

                          Filesize

                          32KB

                        • memory/3232-72-0x00000000006E0000-0x00000000006E8000-memory.dmp

                          Filesize

                          32KB

                        • memory/4540-52-0x0000000000400000-0x0000000000B78000-memory.dmp

                          Filesize

                          7.5MB

                        • memory/4540-34-0x0000000000400000-0x0000000000B78000-memory.dmp

                          Filesize

                          7.5MB