Analysis

  • max time kernel
    267s
  • max time network
    273s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01-03-2024 23:29

General

  • Target

    Cheat Engine.exe

  • Size

    371KB

  • MD5

    ea1a9d53dab1e72847b024a22d372d62

  • SHA1

    558271c71a9df6da04f87564cf34e854abdf25c9

  • SHA256

    8bc19af09574a0cc32c58b4e9ab4d3a496eb48465a226a97be32aaf6ade4901a

  • SHA512

    5ad2a9a45a0b12e02556514cd3208a8226314179eed5aa4f72d909edac1babe86f933a20a504839f01a6a9361dd7f49133804382742782ab9a5c38da50edc595

  • SSDEEP

    6144:Cl010wHB5zP3sHFQJZBuMLI/NCVpdIAkttAqgmMk044tmZ8B+gugEkkoSE5f:2010wHrzPcHFQjL2CVpGzJ+44EZ8B+gd

Score
8/10

Malware Config

Signatures

  • Manipulates Digital Signatures 1 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cheat Engine.exe
    "C:\Users\Admin\AppData\Local\Temp\Cheat Engine.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:232
    • C:\Users\Admin\AppData\Local\Temp\cheatengine-x86_64-SSE4-AVX2.exe
      "C:\Users\Admin\AppData\Local\Temp\cheatengine-x86_64-SSE4-AVX2.exe"
      2⤵
      • Manipulates Digital Signatures
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Users\Admin\AppData\Local\Temp\Tutorial-x86_64.exe
        "C:\Users\Admin\AppData\Local\Temp\Tutorial-x86_64.exe"
        3⤵
          PID:1556
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4788
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe7fb73cb8,0x7ffe7fb73cc8,0x7ffe7fb73cd8
        2⤵
          PID:1696
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,3818104842773602967,3843968850848665601,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:2
          2⤵
            PID:1028
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,3818104842773602967,3843968850848665601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2136
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,3818104842773602967,3843968850848665601,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:8
            2⤵
              PID:3536
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,3818104842773602967,3843968850848665601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1
              2⤵
                PID:1000
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,3818104842773602967,3843968850848665601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:1
                2⤵
                  PID:2464
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,3818104842773602967,3843968850848665601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:1
                  2⤵
                    PID:4260
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,3818104842773602967,3843968850848665601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:1
                    2⤵
                      PID:1944
                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,3818104842773602967,3843968850848665601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3300 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5072
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,3818104842773602967,3843968850848665601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4504
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,3818104842773602967,3843968850848665601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:1
                      2⤵
                        PID:776
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,3818104842773602967,3843968850848665601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:1
                        2⤵
                          PID:1996
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,3818104842773602967,3843968850848665601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:1
                          2⤵
                            PID:2548
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:2528
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:808
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:1108

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                656bb397c72d15efa159441f116440a6

                                SHA1

                                5b57747d6fdd99160af6d3e580114dbbd351921f

                                SHA256

                                770ed0fcd22783f60407cdc55b5998b08e37b3e06efb3d1168ffed8768751fab

                                SHA512

                                5923db1d102f99d0b29d60916b183b92e6be12cc55733998d3da36d796d6158c76e385cef320ec0e9afa242a42bfb596f7233b60b548f719f7d41cb8f404e73c

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                d459a8c16562fb3f4b1d7cadaca620aa

                                SHA1

                                7810bf83e8c362e0c69298e8c16964ed48a90d3a

                                SHA256

                                fa31bc49a2f9af06d325871104e36dd69bfe3847cd521059b62461a92912331a

                                SHA512

                                35cb00c21908e1332c3439af1ec9867c81befcc4792248ee392080b455b1f5ce2b0c0c2415e344d91537469b5eb72f330b79feb7e8a86eeb6cf41ec5be5dfd2f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                ea5ccf2b197813ce37d86d31f01382d0

                                SHA1

                                37f680a5e69300b28ba82934b1c56184f6a464a9

                                SHA256

                                fdc38b1d4fd727c62757892a8f42e5b6b0fb75598498425be3d80ad9d6896462

                                SHA512

                                d1ca524ec43ef859361a8ee9a19c65230b32376afb2dfb78f6f81b4dafc48e697f904fd4197735151ec6d40d333dfc01a49df4d79e167ba9b3b78f8aa2ea3e1a

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                bca7e1b0c39fb10daef47638a518b153

                                SHA1

                                50920d3aa2052912697735337d50a73b6828930f

                                SHA256

                                88293e248b6aa688005d39783493d8220740d32c4c1e30e943e33d84a4036736

                                SHA512

                                a13617fb8a53f2f22e4a16b1722af71cd67592906280ce6091194b3a8c65add9dbdae6124fc10939c2037887c76bb80a2b4bf8c15725d215edf315cd2f78d4b6

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                c5a44c333bcf4169ecd69aea0fe4e276

                                SHA1

                                7e0e0e370e440ca53cd23a12fbe10cbc3baf348f

                                SHA256

                                a40c61da6009a7d52ac835874249b4994b85177bd9359911ba6613a57294bca2

                                SHA512

                                07f401221ca352f70f2237bc009055601c79f40d9615adb5953745c6fc540a8a9d84005353d3ac085a82b483de8f9dfeb6732ad53b2fe7743b115c03b3de645b

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                206702161f94c5cd39fadd03f4014d98

                                SHA1

                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                SHA256

                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                SHA512

                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                9aaa0f478416c6b214e606f5bf9ea13a

                                SHA1

                                ca9377c0727c70b9ed24b8e6ab8d65ab7ca08e73

                                SHA256

                                ab7f102662490c065c76892dfd0524ea35b9c56716653e79e09b28ca0af0eda0

                                SHA512

                                8b08f76abe0654f8bf2deeba153aa45c70307b9207332b3549e725cfbfe77631b5030353d8d3cafe37bcd43bf511f7982b71f1ee6f3e923defa60bdbadb87ae0

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                611bbe98d525f84b62222d7d0a33c57f

                                SHA1

                                4274fe901a5d99e6fc2782e063d1297b4c8758d1

                                SHA256

                                706d1d34e047a780f7298c062eeafe8cf02ec8f20f66028134962e844327ddf3

                                SHA512

                                82ea31d21487f5a0b4b8b473025cccda333c98395e7b500fa46991ad1e29fccb7dede78e1793e02e5858fda5f9f4245a88d3540e5ed96ebd6b232fc41d41b070

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                Filesize

                                264KB

                                MD5

                                93fd095eac72b7d0d9ff78f9bae62b43

                                SHA1

                                d3f89ac3e3058f3f32d3bd4151aa27a6b37c258f

                                SHA256

                                f70c4741c6f81634367651efc68524528cecceaffcb4a54157a6bea15bc76d68

                                SHA512

                                3fd053a5339242cd31763f321852b70b67d19f8f4fae3a606dfbae71691afb9451fde654c876ae488cc7847afdf8178fcd696281feb4ddd5cc90a27639ee980d

                              • C:\Users\Admin\AppData\Local\Temp\Cheat Engine\{35E6C99B-39E4-4527-B6CD-F7E8353248B3}\ADDRESSES.TMP

                                Filesize

                                7B

                                MD5

                                ecdf0684a14d5b747c245d659b5f33b1

                                SHA1

                                fee7035409106461ca06d14236db42543aa042ee

                                SHA256

                                631bdc5422d1339287bf86b7a204f35956f676d473b27879f304d608238c318d

                                SHA512

                                e4cdd4b29e1a8cb4d1161a019a304122df5299d62001c3a03426d89b9b7f1fe69e3c3adff0bd036f333490d8673081da50b3165d44c4978e00980b4df7aa920d

                              • C:\Users\Admin\AppData\Local\Temp\Cheat Engine\{B0AB4E02-56AC-4E9A-AF8E-A72C6CA387E6}\ADDRESSES.TMP

                                Filesize

                                637KB

                                MD5

                                d670cc004da85e8cdea99a7d3cfe062a

                                SHA1

                                f2244f3832391180525f5e813f7b13e9fb54d36c

                                SHA256

                                f1ded386030fcf422c5d2653c3884bac14a433af5e3bd8d5b3934bb940f7f9c1

                                SHA512

                                1957411bcbcaeafb6887ed4c715905025feab58840e17e36fc93e3af2dd47c8cc0065719531305c961ad0acab64b09acd8ec9577dc15c605b22f50935d0459da

                              • C:\Users\Admin\AppData\Local\Temp\Cheat Engine\{B0AB4E02-56AC-4E9A-AF8E-A72C6CA387E6}\ADDRESSES.TMP

                                Filesize

                                637KB

                                MD5

                                ca65fd4ea3d79df9e380d1cc5c48934f

                                SHA1

                                bfd6dfb2b1a7e3f616ad5416cdf4bc20bfbff67c

                                SHA256

                                54d52459f754510a024f0da8fd203a336168f174df4b5581a26c40bb650dec66

                                SHA512

                                9db88e9facd27341895ebab51197296c3cac698937d59d5960ee0bb0aacaf57b856ff28467e04a078b779224d338f343bc3d7f43699238a787dddb05f9f0c1b9

                              • C:\Users\Admin\AppData\Local\Temp\Cheat Engine\{B0AB4E02-56AC-4E9A-AF8E-A72C6CA387E6}\ADDRESSES.TMP

                                Filesize

                                641KB

                                MD5

                                4729c839b4e73d5deea6a69c1a4a6c5c

                                SHA1

                                22b7b6043c56d57c3569e24fbb2d748a01193515

                                SHA256

                                7dc90ca5479b13bc471c8acc107b17b0ada8aeca14b5d7b0a3becede07075d39

                                SHA512

                                be7d0d230c6d563bd10b18e84619da832dc1920ef2d89966ca00e5a8cc667d4361a9ec12d8f39164ee218a0b40724400c4e22adfda02aa8c659f4b7d7fbf6dd4

                              • C:\Users\Admin\AppData\Local\Temp\Cheat Engine\{B0AB4E02-56AC-4E9A-AF8E-A72C6CA387E6}\ADDRESSES.TMP

                                Filesize

                                634KB

                                MD5

                                0bd0193a13e70333ed010cc0b7a3f648

                                SHA1

                                a166468936918c5d211ac3d65588927d073577e1

                                SHA256

                                9bcb13edcbb9c40c1f9b0f53e260fe3d4b47fb7500d72932fd8d5431e67d7a54

                                SHA512

                                98f8669b458cc3e1e085bb99d2733c3449f2f942b91e4d0270dec04612333ab6ab668b6c72988d291cf3bd8b0c1d02012b3970d9df9d0dcdb222d97fd7b5702c

                              • C:\Users\Admin\AppData\Local\Temp\Cheat Engine\{B0AB4E02-56AC-4E9A-AF8E-A72C6CA387E6}\ADDRESSES.TMP

                                Filesize

                                635KB

                                MD5

                                1364316ce9dec253a69dcbaf3159b30f

                                SHA1

                                e708503731fbd25b465de1b04ee0270340b55c47

                                SHA256

                                07afcbce26d07454e7abca04f5e219a502506c376208c87552457597be210d70

                                SHA512

                                b4aa9be1b6a11cc0552d48608f79379747b1010d1f45402cbdc6085b48dfabde1951cfa23fe629189fb589c8e7fd6f8e298b4588cb2d8e404d9cd1672ad128de

                              • C:\Users\Admin\AppData\Local\Temp\Cheat Engine\{B0AB4E02-56AC-4E9A-AF8E-A72C6CA387E6}\MEMORY.FIRST

                                Filesize

                                320KB

                                MD5

                                9bdbd74401ea24fe853f87b477062e8d

                                SHA1

                                f153f10a98a56c5bb7a9050f0dd6f3da1635c295

                                SHA256

                                51b2d15389c021d6aeb3519e5d2277ff7d6578f624f36dfdf3751244db1b22cc

                                SHA512

                                576800b9b78447bb30ebd596aac4da3f44b27daaa20f8995da26623e19db7932daae81aa3ba15419a452c27a68b28a401d46620afb587f2793d3fdb2e49dd17a

                              • C:\Users\Admin\AppData\Local\Temp\Cheat Engine\{B9175EDF-5CA0-4C15-9F4E-54636179BB3F}\inuse.lock

                                Filesize

                                4B

                                MD5

                                d1b3975b3b1aed5a9231936c5bb069b8

                                SHA1

                                35f13bffcfddaac34e7c1b7f201a2d150af6673a

                                SHA256

                                7fad8f30a43c97d3495ccfd5dbd2d32bc1ad5ec7764fab0844a781bab306be8a

                                SHA512

                                0b5275e0b0b6e101de01a692d76d9a6c78d8ff5f8609233d34f79edf029eca76d1308d19f07f74cf8a78a4e7ac7d9d8abb71bf9bae2a1e213f673b1cbbca7f97

                              • C:\Users\Admin\AppData\Local\Temp\languages\language.ini

                                Filesize

                                283B

                                MD5

                                af5ed8f4fe5370516403ae39200f5a4f

                                SHA1

                                9299e9998a0605182683a58a5a6ab01a9b9bc037

                                SHA256

                                4aa4f0b75548d45c81d8e876e2db1c74bddfd64091f102706d729b50a7af53a5

                                SHA512

                                f070049a2fae3223861424e7fe79cbae6601c9bee6a56fadde4485ad3c597dc1f3687e720177ab28564a1faab52b6679e9315f74327d02aa1fb31e7b8233a80f

                              • \??\pipe\LOCAL\crashpad_4788_PETPDQWHFQHAFNLK

                                MD5

                                d41d8cd98f00b204e9800998ecf8427e

                                SHA1

                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                SHA256

                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                SHA512

                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                              • memory/1532-20-0x0000000006F50000-0x0000000006F51000-memory.dmp

                                Filesize

                                4KB

                              • memory/1532-1-0x0000000006D00000-0x0000000006D01000-memory.dmp

                                Filesize

                                4KB

                              • memory/1532-18-0x0000000006F40000-0x0000000006F41000-memory.dmp

                                Filesize

                                4KB

                              • memory/1532-14-0x0000000006F40000-0x0000000006F41000-memory.dmp

                                Filesize

                                4KB

                              • memory/1532-12-0x0000000006F30000-0x0000000006F31000-memory.dmp

                                Filesize

                                4KB

                              • memory/1532-22-0x0000000006F50000-0x0000000006F51000-memory.dmp

                                Filesize

                                4KB

                              • memory/1532-5-0x0000000006D20000-0x0000000006D21000-memory.dmp

                                Filesize

                                4KB

                              • memory/1532-3-0x0000000006D10000-0x0000000006D11000-memory.dmp

                                Filesize

                                4KB

                              • memory/1532-0-0x0000000006D00000-0x0000000006D01000-memory.dmp

                                Filesize

                                4KB

                              • memory/1532-24-0x0000000006F50000-0x0000000006F51000-memory.dmp

                                Filesize

                                4KB