Malware Analysis Report

2024-11-30 03:30

Sample ID 240414-r84p8acc7t
Target https://we.tl/t-3egfafPGxq
Tags
epsilon evasion persistence spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

Threat Level: Known bad

The file https://we.tl/t-3egfafPGxq was found to be: Known bad.

Malicious Activity Summary

epsilon evasion persistence spyware stealer

Epsilon Stealer

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Looks for VirtualBox Guest Additions in registry

Enumerates VirtualBox registry keys

Looks for VMWare Tools registry key

Executes dropped EXE

Loads dropped DLL

Checks BIOS information in registry

Reads user/profile data of web browsers

Identifies Wine through registry keys

Checks computer location settings

Looks up external IP address via web service

Adds Run key to start application

Checks for VirtualBox DLLs, possible anti-VM trick

Enumerates physical storage devices

Enumerates processes with tasklist

Suspicious use of SetWindowsHookEx

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Enumerates system info in registry

Detects videocard installed

Suspicious use of SendNotifyMessage

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Modifies registry class

Checks SCSI registry key(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-14 14:52

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-14 14:52

Reported

2024-04-14 14:55

Platform

win10v2004-20240412-en

Max time kernel

125s

Max time network

151s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://we.tl/t-3egfafPGxq

Signatures

Epsilon Stealer

stealer epsilon

Enumerates VirtualBox registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A

Looks for VirtualBox Guest Additions in registry

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A

Looks for VMWare Tools registry key

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\UnityLibraryLinker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Wine C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdater = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\0\\WindowsUpdater.exe" C:\Windows\system32\reg.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 C:\Windows\system32\taskmgr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A C:\Windows\system32\taskmgr.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName C:\Windows\system32\taskmgr.exe N/A

Detects videocard installed

Description Indicator Process Target
N/A N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A
N/A N/A C:\Windows\system32\tasklist.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\Local Settings C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: 33 N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\UnityLibraryLinker.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Desktop\New folder\RAM.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3716 wrote to memory of 4912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 4912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 64 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 932 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 932 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3716 wrote to memory of 5064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://we.tl/t-3egfafPGxq

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb7c3846f8,0x7ffb7c384708,0x7ffb7c384718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:8

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:8

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4872 /prefetch:8

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x498 0x49c

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6032 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3876 /prefetch:8

C:\Users\Admin\Desktop\New folder\RAM.exe

"C:\Users\Admin\Desktop\New folder\RAM.exe"

C:\Users\Admin\Desktop\New folder\UnityCrashHandler64.exe

"C:\Users\Admin\Desktop\New folder\UnityCrashHandler64.exe" --attach 3820 2306591297536

C:\Users\Admin\AppData\Local\Temp\UnityLibraryLinker.exe

"C:\Users\Admin\AppData\Local\Temp\UnityLibraryLinker.exe"

C:\Users\Admin\Desktop\New folder\UnityCrashHandler64.exe

"C:\Users\Admin\Desktop\New folder\UnityCrashHandler64.exe" "3820" "2306591297536"

C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe

C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic CsProduct Get UUID"

C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe

"C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\UnityLibraryLinker" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1816,9038867482443378663,8753410470035365989,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe

"C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\UnityLibraryLinker" --mojo-platform-channel-handle=1964 --field-trial-handle=1816,9038867482443378663,8753410470035365989,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8

C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe

"C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\UnityLibraryLinker" --app-path="C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\resources\app.asar" --no-sandbox --no-zygote --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2324 --field-trial-handle=1816,9038867482443378663,8753410470035365989,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1

C:\Windows\System32\Wbem\WMIC.exe

wmic CsProduct Get UUID

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe

"C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\UnityLibraryLinker.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Roaming\UnityLibraryLinker" --mojo-platform-channel-handle=2920 --field-trial-handle=1816,9038867482443378663,8753410470035365989,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List"

C:\Windows\System32\Wbem\WMIC.exe

wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"

C:\Windows\System32\Wbem\WMIC.exe

wmic path win32_VideoController get name

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "cmd /c chcp 65001>nul && netsh wlan show profiles"

C:\Windows\system32\cmd.exe

cmd /c chcp 65001

C:\Windows\system32\chcp.com

chcp 65001

C:\Windows\system32\netsh.exe

netsh wlan show profiles

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v WindowsUpdater /t REG_SZ /d C:\Users\Admin\AppData\Local\Microsoft\Windows\0\WindowsUpdater.exe /f"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v WindowsUpdater /t REG_SZ /d C:\Users\Admin\AppData\Local\Microsoft\Windows\0\WindowsUpdater.exe /f

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1lhvbgp.a0ne.jpg" "

C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /nologo /r:"Microsoft.VisualBasic.dll" /win32manifest:"app.manifest" /out:"screenCapture_1.3.2.exe" "C:\Users\Admin\AppData\Local\Temp\SCREEN~1\SCREEN~1.BAT"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-79zfv3.tcp3.jpg" "

C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /nologo /r:"Microsoft.VisualBasic.dll" /win32manifest:"app.manifest" /out:"screenCapture_1.3.2.exe" "C:\Users\Admin\AppData\Local\Temp\SCREEN~1\SCREEN~1.BAT"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFC3D.tmp" "c:\Users\Admin\AppData\Local\Temp\screenCapture\CSC410CE8DFD4E543908F19FA38E19F29F2.TMP"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFCF9.tmp" "c:\Users\Admin\AppData\Local\Temp\screenCapture\CSC1FEE75CA419D48E782FFDCA2A20D3B4.TMP"

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1lhvbgp.a0ne.jpg"

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-79zfv3.tcp3.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-f7azm0.kcrz4.jpg" "

C:\Windows\system32\taskmgr.exe

"C:\Windows\system32\taskmgr.exe" /0

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-jpjkrc.xvq0i.jpg" "

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1ca0kvt.h8kd.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-f7azm0.kcrz4.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1e4blq5.nxr3.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-jpjkrc.xvq0i.jpg"

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1ca0kvt.h8kd.jpg"

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1e4blq5.nxr3.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1f8dxl0.xsuk.jpg" "

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-tel2oc.z7q3h.jpg" "

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-g3cixj.qvx7n.jpg" "

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1p3nbj4.lm1gh.jpg" "

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3531763634997537697,3690851474122803661,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4100 /prefetch:2

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-9xdqbw.vyml4.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-tel2oc.z7q3h.jpg"

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-g3cixj.qvx7n.jpg"

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1f8dxl0.xsuk.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1db0hb1.ikenf.jpg" "

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-7ijw2b.rderm.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-7ijw2b.rderm.jpg"

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1db0hb1.ikenf.jpg"

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1p3nbj4.lm1gh.jpg"

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-9xdqbw.vyml4.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1dwpf03.y768.jpg" "

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-70fmuc.4ea7d.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1dwpf03.y768.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-mzkq29.j02ec.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-70fmuc.4ea7d.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-10hkxht.8des.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-mzkq29.j02ec.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1ky0s3d.s25q.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-10hkxht.8des.jpg"

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1ky0s3d.s25q.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1xwnkh7.km48.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1xwnkh7.km48.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-9093ji.hp61s.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-9093ji.hp61s.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-4zb6ol.xedxk.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-4zb6ol.xedxk.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-uku1fk.dn4qp.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-uku1fk.dn4qp.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1x1f18v.5n7f.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1x1f18v.5n7f.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1s9o3xf.k1bx.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1s9o3xf.k1bx.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-ti1vcb.9ehu.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-ti1vcb.9ehu.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-tsnglq.4v6b9.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-tsnglq.4v6b9.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-15hp2qy.frw3.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-15hp2qy.frw3.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-141sy5a.h167.jpg" "

C:\Windows\System32\Conhost.exe

\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-141sy5a.h167.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-jyd8xx.evwh.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-jyd8xx.evwh.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-wamix4.p763.jpg" "

C:\Windows\System32\Conhost.exe

\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-wamix4.p763.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-10z4zfy.lubr.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-10z4zfy.lubr.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-10wv2zt.d1q.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-10wv2zt.d1q.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-v2rz6p.lb9dj.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-v2rz6p.lb9dj.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-18lor70.kaif.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-18lor70.kaif.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-jgcca6.pzcc.jpg" "

C:\Windows\System32\Conhost.exe

\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-jgcca6.pzcc.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1akgifi.d991.jpg" "

C:\Windows\System32\Conhost.exe

\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1akgifi.d991.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-zduvbr.a40x.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-zduvbr.a40x.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1qgla5.5cd8e.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1qgla5.5cd8e.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-sq87jx.lq69.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-sq87jx.lq69.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1aurlhv.6ic2.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1aurlhv.6ic2.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1j9jpqp.yef8.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1j9jpqp.yef8.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-19f6mc9.j32h.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-19f6mc9.j32h.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-3ps4ic.ygwx3.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-3ps4ic.ygwx3.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-4p8gal.arnfg.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-4p8gal.arnfg.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-s1a9de.8s2m.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-s1a9de.8s2m.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-wju1he.c8ewk.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-wju1he.c8ewk.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-tvxss8.uoz6e.jpg" "

C:\Windows\System32\Conhost.exe

\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-tvxss8.uoz6e.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-192ayyi.3yyyl.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-192ayyi.3yyyl.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-w4qxrp.4ns7.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-w4qxrp.4ns7.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-11rx510.0u5l.jpg" "

C:\Windows\System32\Conhost.exe

\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-11rx510.0u5l.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1bl6b35.tqwk.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1bl6b35.tqwk.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-vin2a.03pcm.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-vin2a.03pcm.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-lo7rny.g46t.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-lo7rny.g46t.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1oz1bfy.yr5m.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1oz1bfy.yr5m.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-8j3mdz.rqgrh.jpg" "

C:\Windows\System32\Conhost.exe

\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-8j3mdz.rqgrh.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-3gw51w.zkm7x.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-3gw51w.zkm7x.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-gvryvy.sxfw.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-gvryvy.sxfw.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-13qw133.6u3v.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-13qw133.6u3v.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1hlcoo6.hyti.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1hlcoo6.hyti.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-ikyqsa.8z88h.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-ikyqsa.8z88h.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1dlhr37.8vs7.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1dlhr37.8vs7.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-17e5qs9.q4uu.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-17e5qs9.q4uu.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1khwdzf.gj02j.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1khwdzf.gj02j.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-ayy21t.vq2rt.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-ayy21t.vq2rt.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1k61qh9.ybdt.jpg" "

C:\Windows\System32\Conhost.exe

\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1k61qh9.ybdt.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1kfn7f2.02up.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1kfn7f2.02up.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-xuwctz.3q0aa.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-xuwctz.3q0aa.jpg"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1csm3b2.hvkr.jpg" "

C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\2024314-2340-1csm3b2.hvkr.jpg"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 we.tl udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 google.com udp
US 8.8.4.4:53 google.com udp
US 8.8.8.8:53 we.tl udp
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
NL 18.65.39.126:443 we.tl tcp
NL 18.65.39.126:443 we.tl tcp
NL 18.65.39.126:443 we.tl tcp
US 8.8.8.8:53 126.39.65.18.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 wetransfer.com udp
NL 18.239.94.115:443 wetransfer.com tcp
US 8.8.8.8:53 cdn.wetransfer.com udp
US 8.8.8.8:53 tagging.wetransfer.com udp
US 8.8.8.8:53 cdnjs.cloudflare.com udp
NL 52.222.139.69:443 tagging.wetransfer.com tcp
US 104.17.25.14:443 cdnjs.cloudflare.com tcp
US 8.8.8.8:53 83.39.65.18.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 115.94.239.18.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 14.25.17.104.in-addr.arpa udp
US 8.8.8.8:53 69.139.222.52.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
NL 18.239.94.61:443 cdn.wetransfer.com tcp
NL 18.239.94.61:443 cdn.wetransfer.com tcp
NL 18.239.94.61:443 cdn.wetransfer.com tcp
NL 18.239.94.61:443 cdn.wetransfer.com tcp
NL 18.239.94.61:443 cdn.wetransfer.com tcp
US 8.8.8.8:53 public.profitwell.com udp
NL 18.239.83.61:443 public.profitwell.com tcp
US 8.8.8.8:53 auth-session-caching.wetransfer.net udp
IE 52.30.32.26:443 auth-session-caching.wetransfer.net tcp
US 8.8.8.8:53 61.94.239.18.in-addr.arpa udp
US 8.8.8.8:53 61.83.239.18.in-addr.arpa udp
US 8.8.8.8:53 26.32.30.52.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 api.amplitude.com udp
US 8.8.8.8:53 api.lab.amplitude.com udp
US 44.230.178.243:443 api.amplitude.com tcp
US 151.101.2.132:443 api.lab.amplitude.com tcp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
US 8.8.8.8:53 e-10220.adzerk.net udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 132.2.101.151.in-addr.arpa udp
US 8.8.8.8:53 226.21.18.104.in-addr.arpa udp
US 8.8.8.8:53 243.178.230.44.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
GB 142.250.200.34:443 googleads.g.doubleclick.net tcp
US 44.212.216.57:443 e-10220.adzerk.net tcp
US 8.8.8.8:53 226.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 34.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 57.216.212.44.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 bat.bing.com udp
US 8.8.8.8:53 connect.facebook.net udp
US 8.8.8.8:53 cdn.treasuredata.com udp
US 8.8.8.8:53 c.amazon-adsystem.com udp
US 204.79.197.237:443 bat.bing.com tcp
US 8.8.8.8:53 nolan.wetransfer.net udp
US 8.8.8.8:53 s.amazon-adsystem.com udp
NL 18.239.50.85:443 nolan.wetransfer.net tcp
NL 18.239.69.6:443 cdn.treasuredata.com tcp
US 52.46.130.91:443 s.amazon-adsystem.com tcp
GB 163.70.151.21:443 connect.facebook.net tcp
NL 18.239.70.203:443 c.amazon-adsystem.com tcp
US 52.46.130.91:443 s.amazon-adsystem.com tcp
US 52.46.130.91:443 s.amazon-adsystem.com tcp
US 8.8.8.8:53 eu01.in.treasuredata.com udp
DE 3.126.72.131:443 eu01.in.treasuredata.com tcp
DE 3.126.72.131:443 eu01.in.treasuredata.com tcp
US 8.8.8.8:53 www.facebook.com udp
GB 163.70.151.35:443 www.facebook.com tcp
US 52.46.130.91:443 s.amazon-adsystem.com tcp
US 8.8.8.8:53 lebowski.wetransfer.com udp
US 8.8.8.8:53 cdn.brandmetrics.com udp
DE 3.126.72.131:443 eu01.in.treasuredata.com tcp
IE 52.212.176.246:443 lebowski.wetransfer.com tcp
US 172.67.69.191:443 cdn.brandmetrics.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 21.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 85.50.239.18.in-addr.arpa udp
US 8.8.8.8:53 6.69.239.18.in-addr.arpa udp
US 8.8.8.8:53 203.70.239.18.in-addr.arpa udp
US 8.8.8.8:53 91.130.46.52.in-addr.arpa udp
US 8.8.8.8:53 131.72.126.3.in-addr.arpa udp
US 8.8.8.8:53 35.151.70.163.in-addr.arpa udp
IE 52.212.176.246:443 lebowski.wetransfer.com tcp
US 8.8.8.8:53 collector.brandmetrics.com udp
NL 20.50.2.28:443 collector.brandmetrics.com tcp
US 8.8.8.8:53 ekstrom.wetransfer.net udp
IE 52.212.176.246:443 lebowski.wetransfer.com tcp
IE 54.76.94.58:443 ekstrom.wetransfer.net tcp
US 8.8.8.8:53 safety.wetransfer.com udp
NL 18.239.50.85:443 nolan.wetransfer.net tcp
US 8.8.8.8:53 www.datadoghq-browser-agent.com udp
NL 18.239.48.211:443 www.datadoghq-browser-agent.com tcp
US 8.8.8.8:53 backgrounds.wetransfer.net udp
NL 13.227.219.41:443 backgrounds.wetransfer.net tcp
US 8.8.8.8:53 191.69.67.172.in-addr.arpa udp
US 8.8.8.8:53 246.176.212.52.in-addr.arpa udp
US 8.8.8.8:53 28.2.50.20.in-addr.arpa udp
US 8.8.8.8:53 58.94.76.54.in-addr.arpa udp
US 8.8.8.8:53 211.48.239.18.in-addr.arpa udp
US 8.8.8.8:53 prod-cdn.wetransfer.net udp
NL 18.239.50.111:443 prod-cdn.wetransfer.net tcp
US 8.8.8.8:53 download.wetransfer.com udp
US 8.8.8.8:53 browser-intake-datadoghq.eu udp
US 34.149.135.19:443 browser-intake-datadoghq.eu tcp
NL 18.239.69.98:443 download.wetransfer.com tcp
NL 18.239.69.98:443 download.wetransfer.com tcp
US 8.8.8.8:53 41.219.227.13.in-addr.arpa udp
US 8.8.8.8:53 111.50.239.18.in-addr.arpa udp
US 8.8.8.8:53 98.69.239.18.in-addr.arpa udp
US 8.8.8.8:53 19.135.149.34.in-addr.arpa udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.129.233:443 cdn.discordapp.com tcp
N/A 127.0.0.1:62009 tcp
US 8.8.8.8:53 107.211.222.173.in-addr.arpa udp
US 8.8.8.8:53 233.129.159.162.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 wetransfer.com udp
US 8.8.8.8:53 donny.wetransfer.com udp
US 8.8.8.8:53 z.moatads.com udp
US 8.8.8.8:53 cdn.lamp.avct.cloud udp
US 8.8.8.8:53 servedby.flashtalking.com udp
NL 18.239.83.125:443 cdn.lamp.avct.cloud tcp
NL 18.239.83.125:443 cdn.lamp.avct.cloud tcp
IE 54.74.216.13:443 donny.wetransfer.com tcp
US 23.53.113.212:443 z.moatads.com tcp
BE 104.68.68.28:443 servedby.flashtalking.com tcp
BE 104.68.68.28:443 servedby.flashtalking.com tcp
US 8.8.8.8:53 measure.lamp.avct.cloud udp
IE 99.80.74.93:443 measure.lamp.avct.cloud tcp
US 8.8.8.8:53 px.moatads.com udp
US 8.8.8.8:53 125.83.239.18.in-addr.arpa udp
US 8.8.8.8:53 13.216.74.54.in-addr.arpa udp
US 8.8.8.8:53 28.68.68.104.in-addr.arpa udp
US 8.8.8.8:53 212.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 93.74.80.99.in-addr.arpa udp
US 8.8.8.8:53 ipinfo.io udp
US 34.117.186.192:443 ipinfo.io tcp
US 8.8.8.8:53 192.186.117.34.in-addr.arpa udp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 whoevenareyou.equi-hosting.fr udp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 104.21.40.54:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 162.159.129.233:443 cdn.discordapp.com tcp
US 104.21.40.54:443 whoevenareyou.equi-hosting.fr tcp
US 104.21.40.54:443 whoevenareyou.equi-hosting.fr tcp
US 104.21.40.54:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 104.21.40.54:443 whoevenareyou.equi-hosting.fr tcp
US 104.21.40.54:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 8.8.8.8:53 119.176.67.172.in-addr.arpa udp
US 8.8.8.8:53 54.40.21.104.in-addr.arpa udp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 8.8.8.8:53 dns.google udp
US 8.8.4.4:443 dns.google tcp
US 8.8.4.4:443 dns.google tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 8.8.8.8:53 nolan.wetransfer.net udp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 8.8.8.8:53 backgrounds.wetransfer.net udp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 8.8.8.8:53 d9.flashtalking.com udp
US 8.8.8.8:53 data.ad-score.com udp
US 130.211.115.4:443 data.ad-score.com tcp
IE 54.75.228.101:443 d9.flashtalking.com tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 8.8.8.8:53 101.228.75.54.in-addr.arpa udp
US 8.8.8.8:53 4.115.211.130.in-addr.arpa udp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp
US 172.67.176.119:443 whoevenareyou.equi-hosting.fr tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 dc629a750e345390344524fe0ea7dcd7
SHA1 5f9f00a358caaef0321707c4f6f38d52bd7e0399
SHA256 38b634f3fedcf2a9dc3280aa76bd1ea93e192200b8a48904664fac5c9944636a
SHA512 2a941fe90b748d0326e011258fa9b494dc2f47ac047767455ed16a41d523f04370f818316503a5bad0ff5c5699e92a0aaf3952748b09287c5328354bfa6cc902

\??\pipe\LOCAL\crashpad_3716_PSVLBOLKEKZPJHLB

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 cff358b013d6f9f633bc1587f6f54ffa
SHA1 6cb7852e096be24695ff1bc213abde42d35bb376
SHA256 39205cdf989e3a86822b3f473c5fc223d7290b98c2a3fb7f75e366fc8e3ecbe9
SHA512 8831c223a1f0cf5f71fa851cdd82f4a9f03e5f267513e05b936756c116997f749ffa563623b4724de921d049de34a8f277cc539f58997cda4d178ea205be2259

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 61668b7cdeae997f398a890fb2fa6703
SHA1 602eca8e941ba00b7ba150d970f94984c5be4d61
SHA256 dd90659a1b9a926565091348aedd66a59e1c62411a86fe5f18725d51b29a8238
SHA512 f62564ee926b5994792f16fdde76957d4270a295f0db5906776f5d4f42c8d1467294a88f2187a50349f1ed913561cca51995e4e9ce78aca3cb625badf2c1b43a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 62ee50525d765bb82e4316d41fd56c39
SHA1 879c4a8efb11a58d935606eed583c5e183a787c6
SHA256 d8b9d07b53bed32aa24ae1c1ca2b761323652cbba13a179558c052a943a84b24
SHA512 3246cd1da7c346b8a04146fa8b63bc3dfc8976f699e6cc9845e192f53e40e93b511b88cbf449080e228c470ba24caf189117833f899d57e3629ce1c8c3b9ed5e

C:\Users\Admin\AppData\Local\Temp\.ses

MD5 6fce0bf3f5ecc1aca4c6aa2151447e9e
SHA1 d4dacd14e55e50a19d060aee98c8f58f871b7ba9
SHA256 d1f7afff157c9180430e98990eb8497bc06cb249415e463c0946341a03175da4
SHA512 58fae693cc4c93a5c14b59fec7195bdf90e93e33bfc684d59c9a21c2db03059b6e1c452d51b716b27aff65eabf13baea0d0847fc17f07c02c72ac4a658afde46

C:\Users\Admin\AppData\Local\Temp\AdobeSFX.log

MD5 17fab2ba1fa5d28e971c05ac0ecc616f
SHA1 9e75dbed6aa377328d604131c9d4068770e3fd3f
SHA256 d9191d741856527b2219610cfd1adf9f948fe9343e034265b44add6774ebe9de
SHA512 9f7db7e02b59b08315a76d6d745ec5134ca1c6ad6c64974f762890494a1e3b349fbec7cb87abe9d2083a9aa97b39ee1134a3267aa4c859fb35c0e9ff0fb941d6

C:\Users\Admin\AppData\Local\Temp\aria-debug-1744.log

MD5 522cbb7a9f43d044492f4a5f4026a007
SHA1 0c59f3492e6fa0e9a0b923acded8258b80e47edc
SHA256 07759da91eb3292408718df0228fa5b4d98bc59e2d1062f8e98f2c242b123433
SHA512 bc978dae8f0eef1c4983b3e77c374e0970eaf0f7495c78760e4457bbc32d0053792ceefae2792d071c45879b21237715dd42c0088285362738f9f278c2d87e83

C:\Users\Admin\AppData\Local\Temp\chrome_installer.log

MD5 708f6b62b1d3e1dd74ebf0f59e8c30ca
SHA1 16908f44eba4e94e86a2c0de3a5a4daace183252
SHA256 f23bca194ed1ffd1ad3690002467a1debd9886cf740ef999094600248b595bb6
SHA512 9a39f33831e281ff9776e57cfdca71eb974538854c67ee2a073f2e789fc324f32e20c1cfec64a2e8c7091ca4806ba39cbb4f7dc0ea1222e6312f628ff1661708

C:\Users\Admin\AppData\Local\Temp\dd_NDP472-KB4054530-x86-x64-AllOS-ENU_decompression_log.txt

MD5 870b479c23870e9bd360ca30243d3df7
SHA1 88cad0bf9e2841825479d0e7586af51ac9caceb9
SHA256 674ff537e73f4f8f8fde5d4b9b9bd3f2df2f5e8f850e9ae66053b66e6d465668
SHA512 8d229fb0566cb6411abe65802e910b68257bc31d8b1bffd5306709e8b63dddd1d8cc168e50e55bbaab90c783cfc1f0159953e2e6e47ce83a62ce1f5122305ef1

C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI5071.txt

MD5 dab3649c62c6bf1f95c842e79db88a0f
SHA1 f219d88fc9125a69ffbd65439cfa149e8f7d04fc
SHA256 8487f35c49fa7de6da2d62b6745320d5864c54c942f1cea5ad180875a78900c7
SHA512 01607e01cbd71bd6c2bc6f7edffb459e00d22f8afd06e45cdeb62dfdf7e06c77eaedc9df070422417495a0aa2d9f688ec2ec9eb36e8fcae47e57c36c79cfe2bd

C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI5057.txt

MD5 89a8486435047bc947b4e1a3a31cc254
SHA1 61a3c6b7cce1988ccb465227861e3b8a15addc58
SHA256 0771b9259acca409348538c4eecc98a3e0ea229c2158fa6e84a1a2b8bc10bcac
SHA512 6a495c551d3360e36ce6fd73aeae4b0091691622fca111254fd0b32d93433d2185b22f31dbd67be60ea1e6ea0302094240ada0e31f24eb6a7e77eb19ded924bf

C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI5057.txt

MD5 cd0e281c305c9a43e1688322cb501493
SHA1 ed15275f2bd423b100984b1d0410866328e72d95
SHA256 72f2a6c883162852119a6efa966446f86f8f6158d9fc80352e47fa16822e5910
SHA512 6c18f4eb045f2d3759265669c920a9035e743f65e10e85a84821efe13cb6177dfb27df222a53ccf4a87d56f474d24d827852a183a2879b09ee4dcaac9a42fe43

C:\Users\Admin\AppData\Local\Temp\JavaDeployReg.log

MD5 852d91d8c15acd696ff13a9813bed006
SHA1 b79f9099031265d08dc4bec5d39af60d3aeb01fc
SHA256 dce30aae33e06b5295d7f810045f2beeae26e4df77dfb2b02d5208a90c18dc1d
SHA512 46afb7d5fc0d7279cc985ee75e4940ba5da72f52e2ad2913dc1fec4e4fa6ab0d4b56d5552a1952d896ad1710c8d01e79e6fce2008bd5e161eb004f8234b619e0

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20240412113903.log

MD5 fa91bcf7cf93d9cbac68d1e4eda475bc
SHA1 aba88470e803190f836006ae6ee092426a3cf9b7
SHA256 000b61e4678e2b76f4275966ae4e6da786e3ee313a23477a7e95f3178534d39d
SHA512 26585552b783d7caf5e2e43c560df4ec389d79c87b4a72a73b170ccebf2d113b87ea3ca87d132d7017418c70f62955cc45f2f5faf48243e6a1e47a6ec432a371

C:\Users\Admin\AppData\Local\Temp\Microsoft .NET Framework 4.7.2 Setup_20240412_113826118.html

MD5 811ab947cdc4408fb677ed6166481448
SHA1 f6a445bf772ecb12a1554b69d9e769da0d2ea49c
SHA256 e5936c7f02ec4ba70cf28a1bd2edfa7b9c791001ec3af52e411132e553c99d82
SHA512 1f2006201b968cf4d68200e957813443ae213b55c10f12ac4f808ec482c670e83c3c3ecdd7fef5ae4648d353edbe4fa0df75b3c4912c833d0cc3613183dfb643

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20240412113903_001_dotnet_hostfxr_6.0.27_win_x64.msi.log

MD5 0062dbf7ea2975ab0da1e39b61f83103
SHA1 e7c14b1229d893e91c9e040ce48b121d83c05c48
SHA256 4abcf68028f1eaf2c28172cead3892c5bc5ed5bf2d1a05b353633e52f7b939f3
SHA512 3c1320497275ea28a83cd2b76cbdc13f0f18c5cae1e674d37771ab94407a84743b32f5eb26587edaed4d9548a0de99434d65b30f4fd76c947218376fd8ae277a

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20240412113903_000_dotnet_runtime_6.0.27_win_x64.msi.log

MD5 6bc72dc3465854d047084e8635dc14b7
SHA1 aa06b19592619ca5cfba1aca66ab98d01ef4af23
SHA256 8efdfd8b268a259e9ad3802b45773c70b7a673058897f5bcfa8ba7c523362d6e
SHA512 964ab2b259b2dc1d92ca5b72657c0b1f3ed8d8474990116a2899118a306371b861614533778df9b9761718c9838d1bc1786fa2f0a670e59eceb13160e5531318

C:\Users\Admin\AppData\Local\Temp\jusched.log

MD5 493e53d24fd9d01a58d3ca4aaf11803a
SHA1 cd64288413ef5a9a8851101de49565f5a484eb46
SHA256 7e3b311ab357522cdc39dce79ff65e74b52bb3303c01f153b3614b9f4af806f5
SHA512 920d5dc8163f8a58894ebab89b669f80c5e8b51190caa8412fa3becaeb164c63d5181a319e7728819b2eb90bfb2b7ded8dfa33d84de488a8a019fe17843ed94d

C:\Users\Admin\AppData\Local\Temp\jawshtml.html

MD5 b2a4bc176e9f29b0c439ef9a53a62a1a
SHA1 1ae520cbbf7e14af867232784194366b3d1c3f34
SHA256 7b4f72a40bd21934680f085afe8a30bf85acff1a8365af43102025c4ccf52b73
SHA512 e04b85d8d45d43479abbbe34f57265b64d1d325753ec3d2ecadb5f83fa5822b1d999b39571801ca39fa32e4a0a7caab073ccd003007e5b86dac7b1c892a5de3f

C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI5071.txt

MD5 abb5b839c05bae4fe4eee58d5ecf81a0
SHA1 1ae68a169db29717c37ed7a975349110a7f99e9b
SHA256 edc3a141fd5db9f916bb0ec27597b1d467a9fd234dc4310bb59e7c3b0bbd6748
SHA512 549959f601d27249393a5fbf08502aba35e9670a940960ed6477f288eaa8120bb135b4e4c0c83d215576ffeb416d89ec3bad3842c619d02065a7b488a0785a37

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20240412113923.log

MD5 f4cd2098a6909e8983541f46f0605888
SHA1 9883725a5c3e633f4784a192cc59f90f98b8584e
SHA256 c446070d96f2d671e03f53cabc5377f16fa21af6ca576c03235bb6c75cbfada8
SHA512 7f0a23906d76046081d0f85609c314745c15dc3587ba390d110e6f0bd39b7eec99665d8608bd5cf8889e2c07cd5cc988503cd702c47a0faa0f48343c82a9a24f

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20240412113903_003_windowsdesktop_runtime_6.0.27_win_x64.msi.log

MD5 9b1882afa250c453b7785282bcda10be
SHA1 0a2182f6d5a875cb2f33093817e018e0d00bf787
SHA256 344e89cfea813e19beda35fe403af7f78bb5be97748bb7dcc0b404179ef4214b
SHA512 2896dc1ed96fb93636b8f944974c01697b699973a714eb02f0d2a7db07a1b8315933dcd5bc81740d85ea2423394f04f454ff87e66c5925631410caa7fccc45c0

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20240412113903_002_dotnet_host_6.0.27_win_x64.msi.log

MD5 846037a1fed71d448eab76e1e200cb3f
SHA1 da8a09cfe5f9835393c6a3030f9b96eeaecd7636
SHA256 0c739de9d5cb43ee6989e254f57d394623e061134b8d482aee1d1c1dcc30dc35
SHA512 875f3e03c302ad1e0eeba65fa865ba4bc1f30840a8c160b2b7c2f211fb15c19e2c7ce9aee6214233838821cb2fbfeec2963c7906ac18700f5eeb73d2813261e8

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20240412113923_002_dotnet_host_7.0.16_win_x64.msi.log

MD5 177272bee61ce5b396373721cc58bc94
SHA1 61a12ed5afc9f5cebc2539e79c473599f2f102cc
SHA256 5c25c94554f7f80d796b57683ad1e20d332082b56fde87054115a9308203d0e4
SHA512 cbf6a270362d6c93e8a2b418778c82d4cf41597b1fe01736c1186e1f20da16efbb1f94426c6717a82eecb88150ede10b3181e3ff0d175b9994ef20b93c8f8061

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20240412113942.log

MD5 b96cec268aecc506063ca0ddf516c38e
SHA1 9b74f28951ec23b65f1dbcafd1539cc4555fe939
SHA256 84057e2d6fff80447dc28223afac18ebdaf3c063b1abcbac99272ee8d5b803f0
SHA512 1dea4a50f736c6f5a113abc979188adb3c1a5db1e223124eb2027ba177c8a0ce5e5dc04fa7bfb8a6346a11e9ff55a759eb811ceb5f823a1b23ef5c709967f71c

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20240412113923_003_windowsdesktop_runtime_7.0.16_win_x64.msi.log

MD5 b85584375dcfa5e418961415fe20f09e
SHA1 707f7e008ab93046979b2ab64e5d59b3ce426339
SHA256 7c4cc64c9f4a4407274f9376bea01f705f7c2940c982a643adabe53ac6ae5a94
SHA512 bec03c713a00148c78d7599762c3aa8214925a1b686b95276f6b8e2792c16012a94f00a08a4a644fb639af55f9bf56d9fa8e5e566e25c421c6d8cb94713c001b

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20240412113923_001_dotnet_hostfxr_7.0.16_win_x64.msi.log

MD5 c4246ec9e4680e399001cc956c409516
SHA1 015060b459ec3e7a0dd87829dc3ab57895b21357
SHA256 336b8a82ffb868edbc51dceba14ace2918f65ad7dfea348815b67334bed67b02
SHA512 17b86b4c3dbe402060b0168bac6a7cbe09e5fc88288571c72d53a15d627d0a636f30d5fbc0a67cfdeb20e5d6284fdc69e7c8ee9c23e203641e8ed6754f5e5340

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20240412113923_000_dotnet_runtime_7.0.16_win_x64.msi.log

MD5 4e1af3418e47eadb7b3cc2d7fa336807
SHA1 c5630b597ab49275e533d4f6a093aad59666c75c
SHA256 250998195e32aa5e5418a7e478b9291f684727a6c0f732664032b1004d5525a5
SHA512 d980bc048d3775b2edc54fb0d81d5d2fe406eab3eb4f60c22cbfb53c4b3fd4a44572a3d6a233f7dd7d90283ebb52f08609320295894b006a1bea323cf27d896e

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20240412113942_000_dotnet_runtime_8.0.2_win_x64.msi.log

MD5 014737674bb0b5619c90a001c66658ce
SHA1 6d9b6f156a4c875afd30a263e8280a2034ae1a76
SHA256 f22b184245d25a61c25278245d0c232bf8a31fbb7efe54f121b4e6861de81274
SHA512 ec2ae7d4bbd803d246daa7639c42c7878e7b7b762bc0cc591bdfccfa6df88109a83945e99736976eeb58397444a045721169d97cd6c083c2ecf0f64cc0be797e

C:\Users\Admin\AppData\Local\Temp\tmpA506.tmp

MD5 bd2866356868563bd9d92d902cf9cc5a
SHA1 c677a0ad58ba694891ef33b54bb4f1fe4e7ce69b
SHA256 6676ba3d4bf3e5418865922b8ea8bddb31660f299dd3da8955f3f37961334ecb
SHA512 5eccf7be791fd76ee01aafc88300b2b1a0a0fb778f100cbc37504dfc2611d86bf3b4c5d663d2b87f17383ef09bd7710adbe4ece148ec12a8cfd2195542db6f27

C:\Users\Admin\AppData\Local\Temp\sa.9NCBCSZSJRSB_0__.Public.InstallAgent.dat

MD5 b8c29b7b6ee09f09fc748dce14c62428
SHA1 74927063840a3df865b5a30819eff04fc2e33ca9
SHA256 4802f60bf69752abc5ea68fa263645ae4f94f88181783d053fd44a6061303031
SHA512 e264791169932a392595547a71f31ddf0bae36e2b19ca28a1c219e69f93ed4787a652478aa89a8534b4ee72f45b08040650f3d409ac0c1b48b97f0c0605accb3

C:\Users\Admin\AppData\Local\Temp\QUBJEIMO-20240412-1143a.log

MD5 3c1cd4234b0f0a9770a0d2825592ab88
SHA1 db5ca5e8ab068af85b4e5b5748193e324045d850
SHA256 4e17bbc446ace41dd4bfe92cd282c99f623452849d828f00e8a353752c6f5e8d
SHA512 6dcdf27fba36d8540fb8c396cf62671c7069c26a27ca77dc95e0119a7b9da69a00a64af31c4398bb807ff7610d2eb2f0b7894d813c1f068dcf686c47b7c347f8

C:\Users\Admin\AppData\Local\Temp\QUBJEIMO-20240412-1143.log

MD5 9c717cdbb5f12022e0161e1d7a6c8ed2
SHA1 f33cf4096ba68b132090d0f57651e69e7436d9db
SHA256 a0bc7d66628c0ee934d325ca50b2b89ba71fefd2cc3a8549dfe12e4d8feaa3cb
SHA512 1b4ac51eb7e94ea6c7a870a9aa5b6c12f0e44904f40923f6ce08018f635f8acace1fce0341601947ba37b919e4e57a885a8289c9e882e1d7f24d1529691e68ec

C:\Users\Admin\AppData\Local\Temp\msedge_installer.log

MD5 8a663a9b3329a27369744844472fd3b3
SHA1 371a7aec382f358f5b0e26663db9fdc332ce9fcf
SHA256 0003e869cede14081781403e368444a4616e8d6ef4ea74a65b95022ca0e1cc6a
SHA512 8180bd079815cae4248da6454629b6a9d0dce9814ea7a396bed845fbe20209c837f8379077f411544023e6ba1e186bf4aec75643a2bb53aaacb68305e9c8b63f

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20240412113942_003_windowsdesktop_runtime_8.0.2_win_x64.msi.log

MD5 e4d0b4ec0d589bfa00be19733b95827c
SHA1 7bf618f26d805b5004a9945a7ce76b177474f1ec
SHA256 c9f2b3a49b15683b3947312a5e99ffcf6e13051bcf95fee5c2379450eafda04a
SHA512 a65d4be5b8e3fb555ad943a6dc5fa5611ed442460ecafa184060f6f1dd9d5908e8952309e291edb6387fb56718f30c7802a273740500abd7def9f0eeb5cdd667

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20240412113942_002_dotnet_host_8.0.2_win_x64.msi.log

MD5 e24363966c6ac57c86b44c1beb39c858
SHA1 843266dd524784295018a0e0497b477104a19d9f
SHA256 3c97aaa3d2b573a4ba6bfd4c92d31c4f2424cb8cb722ba5b3c3ffd02a834aa1f
SHA512 9a525d3f759aa0f7ff5475018c4e07d1febc26e0678c42caafb8e53d12cda2427567d9231200c3acd9be5b5a90797b42e27aaeb72b13027d4ace78fbda81afbc

C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20240412113942_001_dotnet_hostfxr_8.0.2_win_x64.msi.log

MD5 741cd516893e7db67ead647a1d62a6c9
SHA1 7139d253d90df44d7ab3e4af9bd00ead06308f87
SHA256 db8724b1166140a32160cc5a62ece5d0043b51ad42f80c3f26a5970d001379be
SHA512 0180590bd44a36a3799ccbfbe9171c02a4440d27a712087d08a86c79e589150fecef0da500c86994ff146314ad0c66c167846ce8d6620f4ff6a074850642ed02

C:\Users\Admin\AppData\Local\Temp\wct6C94.tmp

MD5 fb4aa59c92c9b3263eb07e07b91568b5
SHA1 6071a3e3c4338b90d892a8416b6a92fbfe25bb67
SHA256 e70e80dbbc9baba7ddcee70eda1bb8d0e6612dfb1d93827fe7b594a59f3b48b9
SHA512 60aabbe2fd24c04c33e7892eab64f24f8c335a0dd9822eb01adc5459e850769fc200078c5ccee96c1f2013173bc41f5a2023def3f5fe36e380963db034924ace

C:\Users\Admin\AppData\Local\Temp\wct9F87.tmp

MD5 e516a60bc980095e8d156b1a99ab5eee
SHA1 238e243ffc12d4e012fd020c9822703109b987f6
SHA256 543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7
SHA512 9b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58

C:\Users\Admin\AppData\Local\Temp\wmsetup.log

MD5 f33e8a613a4dc86d565ba9c3c2f484c8
SHA1 11430fe1a6fb305fbaf8249c5d6ff61045d74197
SHA256 39531794e6d66a5418df8dee678fe9bc6afbef2302b19e5a3c58bb4718bcdde2
SHA512 61bf9dbcc02a1313e265c2cfc09cc1cbf15be89fbfda33924ae68f6d73bb747a70746d54bc679a03b0e5375dc04d8aacd33af1c6d94700074de204b070fffa94

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 40656b7f7109740ec7c3f57cf646ecb6
SHA1 734a66048cd1d93da35aad2661f3528f913824a0
SHA256 b577f89980a0b385c6d68e540d00a3230ef01b0152afa932ab4afcc35b3bf54e
SHA512 0cc9e2e56ff3d9316e5addf47a7a6bf7173ec19441e252f6af232c4d2b5bf5f1af8e769ed55ad37b7e9775022cb9b63892b2749c61ac45a933654c74b3d41f5e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 f69cb10fe49c628ece802583c57d0652
SHA1 d1c6c6a29dce843669b9856b5fca3e550f2b638b
SHA256 8f6d91f846510ef512eb0e823f0ddf26c5a3bb5db4729104f1673283dc144ee9
SHA512 b0a904ff6f235c6e1ca7ce9f67fd4f8c2b5f55eaead5095689274c102f7ea64c076ae7c8cceb8d4319d284e6760f0abe59f994944dfe4b900b3086df80fd1385

C:\Users\Admin\Downloads\RAM.zip

MD5 8ccadac01052f1fceed3dede2d4a60fd
SHA1 370f28efb65f66fb96dd35e58b11e413aa19dacc
SHA256 fdd007648db87d5820a49de9d345426a4f7c44dcbe8042e749f9f59a70794fca
SHA512 56271364fa142e18aba05a62dcf15f60392565119ca0700b9009cda91dbff007b03f61747b063db426aa8ce9470242bacd2a8a563e6ebc3f28817d51080e9a2d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 b99f3598d7a4f9f49f98d819f14bc691
SHA1 30a82e8ba431164d076e7631ba1bd26ecf92e51a
SHA256 03b9f073bbfe5c69bc0fb2f241b1504e024d11c14ad3dd9759c23b32bd1423b2
SHA512 01ce5fbb436a3d1ead16ea5528e68c3408fd78c7604378558308032723e1d45c56de19ffffc94297cc91f6bbc5c2f73ce490f1077d67ebb6ca2d6f05020cd617

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe581681.TMP

MD5 0cd4f6d6359fcf143093865bf001feb0
SHA1 634325772e99883bbaaa54bc5a1dae594a6b8492
SHA256 7c1dc42832563d6a572d035ee0cb6faef627cbd0c0a9cabcfd0a8c9ae90dc9c4
SHA512 cb7cc383becf93c0783aa73dcb764e09e274c3af4db33271815fca5ddde1e57896e88e05ab55bc4a309fa21988c08ba72ee3c142b0c25aa3cbb1d8c49e809f21

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 1a0c45a77431516229f7e3125e70be8f
SHA1 7bef6806a1a21556db37a9b1b2730eb5e4167e3c
SHA256 fb718b9107bf021959d231c7bd5739efc1c3ab1055a45252fdcf735c582c6581
SHA512 95516d761d264df6819d03d1cb4caae8083d35cf664f639510d54f858019bb8dba8763775b6f3f0929d51ed8bb70d193b0224d99906b0008ac462584f49224bd

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 be81156ec3c57195c421907bab2c1c88
SHA1 d52c330ca61f06e6924036950d3d9f5642533f25
SHA256 c052aa28693a732d7b4b7769b886cddae0176eec1cf04abeecd596727a3442eb
SHA512 e1a2ac8ae6490446a5a582579b4932baf2cd78eb364211a25f26b55800623b8f1aee5a6e76c18042b5436ff43bd7010d92cc6f1e1bde21d45096e218639c932f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 329a0397331dd6cb3800dfa7679954b5
SHA1 61d25c8492598e6e1ce821b2bd08d10e14138918
SHA256 fce207d825b042896a04bffa924e59801b0fe4511036427ff801461e762d8b47
SHA512 d09be39f9764518302d896b8be3b66badf46445fdc308aad07c1e3b1066cd065bcbf7891bea87fbc4fad24e5a566f5469764b7c0b56651e50d83a81a676ac5d9

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 4f5d66200eaae9076ba20cf5213ff653
SHA1 70d5d0c0db578394be09d8cd6358863834fb708e
SHA256 86e2df8cfa1a9507fe63b4f09c3ceb6a93a40bd59f6189806ddfe6edecf6d31a
SHA512 d4e488bae5d460ebfa17e777b212fe180bbbb4b8af01dba23ab99cd634c297b1b8f9abd5d27745206369c5a7c66c4f31f25f0c3d46a39a9f0d164c4714020005

C:\Users\Admin\AppData\Local\Temp\2f4NkYHyqbfPqEmCBPm0QYjGXPx\chrome_100_percent.pak

MD5 9c1b859b611600201ccf898f1eff2476
SHA1 87d5d9a5fcc2496b48bb084fdf04331823dd1699
SHA256 53102833760a725241841312de452c45e43edd60a122546105ab4020ccef591b
SHA512 1a8ec288e53b9d7e43d018995abe4e3d9c83d329d0561fbb7d022e8b79ffecf033e995b9bc6af352a71c646a1e8afba4addb54deab7455f24b7a279a3dd7c336

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\d3dcompiler_47.dll

MD5 7641e39b7da4077084d2afe7c31032e0
SHA1 2256644f69435ff2fee76deb04d918083960d1eb
SHA256 44422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47
SHA512 8010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\chrome_200_percent.pak

MD5 b51a78961b1dbb156343e6e024093d41
SHA1 51298bfe945a9645311169fc5bb64a2a1f20bc38
SHA256 4a438f0e209ac62ffa2c14036efdd5474b5ecaa7cbf54110f2e6153abdfb8be9
SHA512 23dedde25ad9cb5829d4b6092a815712788698c2a5a0aefb4299675d39f8b5e2844eabd1ea42332a0408bd234548f5af628e7e365ab26f3385ebfa158cdd921d

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\icudtl.dat

MD5 599c39d9adb88686c4585b15fb745c0e
SHA1 2215eb6299aa18e87db21f686b08695a5199f4e2
SHA256 c5f82843420fa9d144e006b48d59ba7ef95f7e6cb1ea95b27fcdd2c97f850859
SHA512 16194186a8407b29f799d4b02f5674e4fbd5d91163fad9f8dce6ceedd865b754a681aa960d0f3f1b62cb21d5443879f1b8e9b691c19c5802d5bdfe4ed645b8bc

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\ffmpeg.dll

MD5 12cb29b61007fd6cd166882635241038
SHA1 31bacefd2d7238fb5ac77f728bb39a27b400dbb0
SHA256 2e60bc5a05d3e98d12d2bd577d63b6dc77bd1b3734633259fcaf50fa3688ca9c
SHA512 cbfab7708a01fe47904facfdf9604025d6f1c680e40ada0b4c1b1ef35a4eab7de5de96c22d0491c6d202175d2c66693216efab6cfab73e316d466811d834b126

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\libEGL.dll

MD5 979b72ca6e98fc7fdcfcc50d77906fb5
SHA1 dc4b874f495ed73c90b39feb566a48a081371c4b
SHA256 73d1f5880980a2ccb8e5a15e285a4a11fccd80754829e85aa9a3b8ffecf39dd9
SHA512 bd4d25a591d1c52d9a4a850a5bccbbf5ec8d174f5f093c0fd611a18af8d337b918464220a4f9591d03582aadf1c9cb392596a5449fb7d0a928889b0f65f8c619

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\LICENSE.electron.txt

MD5 4d42118d35941e0f664dddbd83f633c5
SHA1 2b21ec5f20fe961d15f2b58efb1368e66d202e5c
SHA256 5154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d
SHA512 3ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\libGLESv2.dll

MD5 5300049a47fd88310ef94f9e37eeb247
SHA1 89672d16382a75781eeca002c850c17cfc46e851
SHA256 33863ea4047e4eaae8f24bfa3491bb809d4c3d44489ae2bbe5e3af9e5cc1fe50
SHA512 b38ef83cb40923654ae1efcdb8af63e1fb47f640a0cbeac350b97f24da1365da23d757cacef1f9e994ace0b076b4bc1408644347aec3c94995bb27d184a93c09

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\LICENSES.chromium.html

MD5 df37c89638c65db9a4518b88e79350be
SHA1 6b9ba9fba54fb3aa1b938de218f549078924ac50
SHA256 dbd18fe7c6e72eeb81680fabef9b6c0262d1d2d1aa679b3b221d9d9ced509463
SHA512 93dd6df08fc0bfaf3e6a690943c090aefe66c5e9995392bebd510c5b6260533b1522dc529b8328dfe862192e1357e9e98d1cdd95117c08c76be3ab565c6eea67

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\snapshot_blob.bin

MD5 19f1e25cc7c427dbfb519ce6dc2c7e64
SHA1 5578aa048412482650bb51b04ccbf038155f5c8b
SHA256 b6531c8ff3a288d00e4625cfc5019ccdac9cb8a53e723792616aace3b27f90c3
SHA512 ef07c82a8a3f36bc8492d0c0a964ee57c3bae3188c7c67eb555b9d117739b5a09e44183dbf9f2cf17ac386d7d777b62b534b2f55edec977c75ec3d6b5b535620

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\resources.pak

MD5 2db0729cb0a452b13400e0ad97a46a8e
SHA1 2aaaa7e0e932e7b46958214cce81d60099cfc2a0
SHA256 af41c2d4484ee3b86b63bde75f150bf67f78a6257d91b397b6b15d47b041e177
SHA512 967bcac22315ecbe76c5a1cec4439523a92710791ea6112aedeb2d294419714e7aab5526f868898c6c2cb83886dc98c694dddd314766c2ae373f55f3529a65fb

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\UnityLibraryLinker.exe

MD5 3f07334dc5144f7e22b4aca05223502b
SHA1 77d8ac3a2706a27ef4d93b84c855d145cf01c75d
SHA256 7d9ed7ca12f61c1095af46fb7d33dd66c437553eafa4c088a9d88c40a77e61fb
SHA512 bd9234a6969ffb121a5875c72e4dc446e6923d6944e7d7d7b6c989ba65c0bf96a352307d7b392a9bddb0eefa13bd4b83272b5fdd7ff184caebbf2b48cb2bcccb

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\v8_context_snapshot.bin

MD5 c384ae622a7a6c7ec328678af12922c2
SHA1 25165dcaf78d3d29a16e4f979370e0b009ede240
SHA256 977a027c50bd79e93ec015fbebaccfaaa8885b88c76f7e5a2c33337d6d5173c3
SHA512 d0571f5e18dcf14a591a76243d52094bb843b0779630f31cbb66fd738c1c35d10bb7ef751eb01a953305ee19f2777f4d3ca6f9b132199b2af357c0b03185d9a7

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\vulkan-1.dll

MD5 ad4a5dcf631afd553b4fed8a269c7897
SHA1 f1bded0b28ee8aed4a52a6d19d871eba4828e0f2
SHA256 3141825bfa3a8cecf8b59767e8b6ac41c20685932d6000b9c6cd0e40ddca12db
SHA512 8e01379201f2a907cff7f32dfbac6b1eb8ee014312755884b35e4065477d8a8069e3188086d7cced11d437b461211bca6abb6e582e98473883cf35faad41eae2

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\vk_swiftshader_icd.json

MD5 8642dd3a87e2de6e991fae08458e302b
SHA1 9c06735c31cec00600fd763a92f8112d085bd12a
SHA256 32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9
SHA512 f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\vk_swiftshader.dll

MD5 37bba2c66e2364a5b3e6666864f3b604
SHA1 f2ecffd48760482ba055aa50cd78c5ac02d09ba2
SHA256 23e6927733549be11d506b862cc7148b7b08b50b4387837db522ec9380babc46
SHA512 6e7835fce0e988c997049796125b4f2ef83cb9c2e326edeb54d4bad77fa31bf4b4227aeb1db445d3ee21e6cb959d65310a1bbda2d14e567d4123cf6544a947ea

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 120e2a400c9bcdb19732e7ac8812b9fa
SHA1 e7610594ff75bb0d78c9a16e098d4b4a2a35a9ff
SHA256 4c2a5ffc1ccb068ff853568b354bea98ea1458109148d6720403cd637b68980c
SHA512 54de4a13ec40f82a8e78d5a6a65b41786825674518b8499c31816d02ee694481344efefabc04dd4f97803eb37909a647845bd90e4209e03f320b2513aac445d7

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\am.pak

MD5 b319cd4192f5bd03bab4644ee51e4ebc
SHA1 49c52f43f542022a97d2ae18a56a266deb901496
SHA256 ab1d0f3bedb5806fa7268773b6193928cdb40e641d8563c14df1bf962434d5f2
SHA512 3fe8284422bb7de7f2e3e121b8657b7686586d597b4d453b2e38f119fd25bddd61c1218f22cc8e4bbf37f393411bb866c0d6c166207b5bbfeb45f5459e29e370

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\ar.pak

MD5 d7eecfb7cc52b3dfb69d8047dc6aa12d
SHA1 fa5e4e98395c4bb14259c2e3c36fc84b55f0c3d5
SHA256 e38cd21fb917db4671ab331ee505948e109e2a0c6a2f3ad0e64d09863efb7df8
SHA512 2ebc6f7749e50bb3a9c27d2235be1478fc2d58a7b6f5c4cbbda09ad4f28ee3873881dda16ea668eeb63dd259a23ac68c73e4ab4295d51a22c36284d9c8667ed1

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\bg.pak

MD5 8448caa7a70f74dc0c6e453e7487bedb
SHA1 a7f67df94ee9532d26c6e6e827d61414f4516d0c
SHA256 19f49a247dfa1328799a1be9a556d940618ceefc04a5dfd813e5c023d086a41a
SHA512 337293839e64f514152c7558f2d1cbb301730675936ecfc11242d1346c9da535896dddaa8ad563a40303cdc8884f80af679c324b31325d40b7141a8738ab14bf

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\bn.pak

MD5 124d35950327fec461c07dfb6dde72eb
SHA1 f3d7791dd6bdf88f65a62ec2e8170ee445b6a37a
SHA256 def934201f35a643c8b097be42fe86f2a08cef5523cb61e2d94cb33ae373f502
SHA512 05a993c9ba52083b8a7f0b3662eb8e4a873d23f309d334cb4e4088fa5e33d8503fdc6d19f247c4920cdd91a165995c514b2a061c26fc44f89e864516ffdde9b6

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\da.pak

MD5 66e780528890dc0f484a3d6938ac281a
SHA1 5f46f7915cf101b88d29213b457f37e24d5a083e
SHA256 e698945093c1f562d0e591c03d9670a9b01d0eaa56a2c80c1d12d91d88b7b407
SHA512 9cbc2b054bd3f9d39050a4a189fcf0127a43b9991ecdc9453679c53b38cf8a25138057648a756e01fc9b4825c009a8894ef68b94faca83cd35d268fb05556af1

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\cs.pak

MD5 2c9e55ed46954a8eaa27105f3f074ca2
SHA1 bb4a36964cd1e8f140c9937586b5215fbd7a9632
SHA256 86f1847450d5c341893fa097fa6d4e0964963c0c2466a985d014dab0b65f34e6
SHA512 cf7141a3db9d44c0940e88ded1f326b5ca4031d18f8a8236b313c6a6c41289e9dfd12c3367181edcbd5425deb584b082df004bd6db0ca55a1da151703af575bf

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\ca.pak

MD5 90d8b16ace2fc684d0ddde0d71f64831
SHA1 ead7dbeffb3c102d3547c8c256135991b547ade9
SHA256 020350f4a902c79e0f1f5366e209b2c309ac51b6e72d9ccf51cdde2fab756e3e
SHA512 bfeec65e7c001d7a29c18e6bfc2b4c6688c828419d0e9823d524a7b35c24a3303c1cfb8f14a98d965d4ab41c5110842ec64cb7a2928309b0bd31291e85b168b7

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\de.pak

MD5 8e560e240bb79e453167f70409226619
SHA1 bde183d2191d42797a300f0c4cd83e1db278c928
SHA256 61c4a4b5c309128ba86a5345db04798be0680905543c6986f7b3cc4b1ba72729
SHA512 5564555eb203fe86e9630dc223e4012c7e3501d68554b6b7138a3c6064d39b868e7e2e0e8b994169e918e9c6f67066440b89c7ab10f48731a84fab84c2e7ff82

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\fa.pak

MD5 46412682e8d0743714fc28a520aeb35d
SHA1 dc6bd723efd460a56d205bc199e3be4c98698ba4
SHA256 9861d5260b98b384603ef02e97dac0295fd255e550b57fd427bbef24b1cd7b17
SHA512 c77c5344c6a7af4035f865aa7e3a3aaab39b11c4a3bdd94aa99f15dbc6ec7cf4b6057ff48fd55e2ff41041728fecf80dcd488578dc1db249ab1b7598fa438f14

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\et.pak

MD5 3ca246cd997a68bb4a6daa8b3b81908d
SHA1 842bf5f6bdd29ccccb24ea412497acdb37a5f805
SHA256 25c1e1306160779466d8c039ea296db65d12dcf21d2ad794a36ab62b1a7901fe
SHA512 32135a0c29bf666833292b557634d4510c185f711d7ad8625e981811ea082dca0d1714f481c9c8ce8b3acefd18469093d48fc05bc0160ffb87d1e2b90f4cba1c

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\es.pak

MD5 09e0feb85585bb4a220a3ab3f21adb9b
SHA1 e564afb37d5f5305585ad1081a26b34ebee73ccf
SHA256 cf7ea140dceac78042e0d35da45a4fe732eb04e1d2b138bee4cc2dc5e7e9a0fa
SHA512 8317bd2b4f509edabac1a74ec32bcfd54b14598799537d90178ec349cd71fe967d5c677403c85e305a6f2e94722c20a83e65c0bdb29a6265c5355683856f4ade

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\es-419.pak

MD5 f9958dd6ce0ce1acea070bbf317b1160
SHA1 0dbc4020e505a053cdbe6a0a9506829498a8a25c
SHA256 ea868929f537d48e846f86020762c59c77a0ec67765c3af22e08fcc853f94c2e
SHA512 35a6e5fdff6b4e3a076eea70b7c551f1d303b4db4e63aabbbde54b4fefe40d750a03440bed7851f12750661ff8b87c5ce3382b0c71d0e171f729a7a82f968cf6

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\en-US.pak

MD5 b58cb46758c6bc8fe4385ec2ce4e50b7
SHA1 34026e96e02220cea46a31c2319f695ca2e0a914
SHA256 e34c459684971971765943e8b5b2d1751b329a9502f0fd6649679823f725b8c3
SHA512 702384f9d6d77da08fc8c49a5f65957c56e363e1ad37f9d0611092d248db1f79636a6cf336e55669e002194f589f584b5663b4d77e54fa95e18f84eb4864d7f5

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\en-GB.pak

MD5 05f7b55019ba0a9da84073cec0a954c3
SHA1 b46462fa8c614161ec42fa791e4ce3163c92ea8c
SHA256 a690e642a6b781efc3da2e8c83e554d6e8b9ae6ac34f6f0a4f327dd9ea7cb7f1
SHA512 30e93503db60b8c7a8dc902efa960583316cb83337eca102f0bdafc47d3b59ad5ea1eb99b5b9deb0ff66345d551485963e4c61ce555298880aafcd298057fd34

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\el.pak

MD5 b3724a4dcb17bd341da403acfdff0bf5
SHA1 05fc9eb29381f1befbafb937c564a87205779264
SHA256 0adb6e5173572ab4a3df5671cf053196f158294bc1e07275a7e6fb6d8da81b06
SHA512 3ccd57eb43840573bbd7e6d8b24028213acf58040b2795a975ca4750e4a9500d8af74bebac1b47f2d9b87204c68707d53b0d927c0aeac1fa1bfdb1c899e66f37

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\fi.pak

MD5 a3b5292c5e2e981dc4ce9504f638a542
SHA1 6cf480f3d7cb5df71bdd4089a1821f2eb2dacecc
SHA256 f4f2438a3810ccda4740442cdd964e43883cdeb820715cbd7be03cfa6b1e55ed
SHA512 6ed819896e2aa72d73bd2af731f7f714119fbe7d1fce5909d1a9d9ecb99c6369505e6d33f1f9ebadcb0da608f9aec365bc6cb5f6e22373d577cced7e317772c4

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\fil.pak

MD5 7c3df3c13393e1b24e4e96f2b9082a6a
SHA1 caae1c99b589e14184e9f2c89f698a2558f4ec3c
SHA256 27196aee4a6248bee44ea2b5a3de90ccc2cd53f8ce1beeb796aa4d7e25bd43ae
SHA512 2d85d37d9560cd6ff460e32c3c569851ae28d794b5319ce74c010cad527c4004e54c993d5440bd22d6e51d86c4c4683f8db03c38abca4839a10e2efe46ae35e4

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\fr.pak

MD5 a17cca5f1db7cedccda9c5a7784bebd0
SHA1 c5e0a0d24a14a535406886c00ad10d20638341b4
SHA256 e8da96855f7238a6ee3162b08d46e5ab84d98179dabf535060ef5fccdb36bc79
SHA512 0bb2217e44f1c8cd9e4cc2127454e1fd137c6fa101914bd230b9089d6317f599c9dfdddafe3d5cbc0fdc036e7b4f6e5cb528bddc572b5e26c8e0322f1a7d0b97

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\gu.pak

MD5 10c1dc999bc7ab62e1f26b0497afa7bb
SHA1 68da1055b8acdf016b152a2f401322d3d76885b5
SHA256 b9690f3c550deb0827e409015abf3bcaab01c9acd33e96932e85ac84ff4c7831
SHA512 c10a956fdfab446b74f1dd2a169201f0b7ddc4ff1d7a635b9c81f07942ea0d34ea327e2e7f07e3a672ac85c8b8ce7a0e871d02946da4fb5e8e75713e56cbce61

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\he.pak

MD5 5db44f8dc63c819b0ae2a5458e36447f
SHA1 6b440ad4bdef6acd31ca8be5d085db26a49a209b
SHA256 bee5f133cc85f8ca280f9f41df6790aa65161fe8dac8dea7e26fc609240e84a1
SHA512 cd0d104597c5c926480443b5d1a16526ec0e48c3d6dca6233ec7cfa63f01f2f5674d9ac9a86a45b789a94fcb3b63aeaf92351bac2f4920a25dd8d4fcd1edce19

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\hi.pak

MD5 815dfb3eeb9a69919ecf2562b6d4ad34
SHA1 2d0fb4c2a19b7a991974783b51b13c7b3610b686
SHA256 a480e95a5cf338a90f7d077e4147f45696db9ad6e8cae1765ccc5ef05fb48505
SHA512 0e6c8374ed7f6f3b523c2dd5455b598ab0650da8ce3a8243a1a42c6327db9a694947a508a90edf95685c84120cc73964a16c7ec49835ea398dcc6186d08ef1b0

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\hr.pak

MD5 ebdf0ad52e9a0f8c8735614775ff5a94
SHA1 787feb9f703daa094814464b090aa5d36725e007
SHA256 b9c21e5187e8649157f5e49e014b8c285866ec839638344a31234b60a17e7d47
SHA512 e2853884687393fa2b0f8e4b27af5664c223fd5bb2862e5ef788f912771eb9d61e7ca1fc39f29ab679f49986b5a95b9da44727c69c99dfd3bb8ea2f4e974ada3

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\hu.pak

MD5 4b5fea4bd49738337ab10bb3f1e6bda4
SHA1 0f27220019e099b658a9c563995dc2b022fb1d68
SHA256 e526c9c9a8c4d27c432d3cc30766fbdec6c536b696a7ccb7e9376f0e55147b90
SHA512 4e271f8ca0028ff5b8a86e8610174739d2d2b7a267381562bbac3543d03f6895b3361c2f6fcfbcaea6f5aad1690e878ae0de5c905de12b213c2c5c396caafa66

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\ko.pak

MD5 e2a95b73f9081efce223a180b7791c16
SHA1 addd6ac05707597b917ff9f7c3f7524be26df7ca
SHA256 afac9566a4e1fdb2be75faee46bf9182f81b85373d60cb583f1051b12d9719e9
SHA512 70eb91347c21f0e648e9fcf82ffbef5e3eeb6c0268f85fddc7ad4eaea2e22eadeab653476196240a75361505f40b0bdf8602b0f414faaa77354f0fe76ba4e09c

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\kn.pak

MD5 5a599f47d2e2ff1aaf4c8ccf8bafd10c
SHA1 32aa52f2e90348725eb619187272e9c5a7396bd9
SHA256 e55425a4ab6425f60a9389e5c19dcd5bf437816ae09a21cd53750819040143d2
SHA512 7ecb69b70d5782e22ef9047fbfa29c0778e894c5cd987d33d65e68616ba2a42a133abe16f2af70aee4fdcb34c7e8e3d3bc3c556c754a010132610628516ad456

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\ja.pak

MD5 640bb80728453be0104566caeeb8eb82
SHA1 362b46036c58421f4b0f9b2f714b21e244aeee44
SHA256 1bfb337c19c9d04bc53df2d2eca6b73c11df33b6fd07a6a3fce5427ef0f38cd4
SHA512 1bd764ec56166ac59fd2acb1ac81140bab2ba7f326c0bbdc9cd30ff6246fcdd98e49310b0528fb0d8a9256ac06ca3e145a3906a1815dbe395d989443650f81b0

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\it.pak

MD5 5b03bfc915b62aceb06b9c670fb77e33
SHA1 9c88ef98dea5a7d7be8571354ad3c033033a40b8
SHA256 1f9a38c852c05577aba397c388b35037eec6b9d90593800b5b57bac437b42684
SHA512 b22c4db0b56c136e9263a15bb2a31a9213ac20321b189cb0572bd1f0b0b9989a7e698d94750d9c5d01557f4b247abf9a8cff1940bab03fdb737a8276d96ed1d0

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\id.pak

MD5 39378b548f712608903ee8aa25db212d
SHA1 7f5a3466a4c8609c6bab7ed3dbc9fed52cfe1e62
SHA256 426a302448ec17e313724b38bda9ad4d5c031da48a1ed3690b547b51a06229a2
SHA512 7d2d823445316f5a63df286af2f1e28b90b8e3a04aabc835020b17f690d95f7ba2d0261876495345876cf826fc57dd0a9577e79af7e609adb8c71b8b4ff03550

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\lt.pak

MD5 720c1b3c95e8613f2cd9e40f3d160ed6
SHA1 1ea62b51f1a2c80b92e3348de260032427a9c79f
SHA256 51027bfd566fa26cd561f9bbfd2b4a6d2e41e0ddd786b7338cecc43423b3e6d5
SHA512 32ad5243df09d642e058550d2ec58a8a8de00cc442da551c195958a95af7c82c4d2b63b27d474a065b0ced5680d3e005b2a36301d02fca09413e165089f47822

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\ml.pak

MD5 a66617706e80fd5ff8ab6ba8dadafef8
SHA1 3718d0afa1bff72ad7164e41cb46981811583422
SHA256 51b2c600046abfa5774b85665d4c882daa3c90bad5559185f9335ff61f04fede
SHA512 4de6fabef9db34791d0d165b5064e68ffa19630482219e4c72e6dc0f9e9e56b1941297862bb2e267cc02c3d3327193a233f642b11cf74e1892270721a2d7dc74

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\lv.pak

MD5 fe9ff0063f35ba05d27cba720e2e69d5
SHA1 16a87c24f027eda9865df7090ac8023c7ae5b57b
SHA256 43bf3b7181b607d8769da6c2cf671e2a429439aee253dd774ab5bf5aa5fedde0
SHA512 794b1b87ca400798574be56cf8da9adef78f1f9f91dd42fb23e6355caf0455f8d982f2b3d9bc252673704375eb4ccf32d58ed1cbbadf8780590e5777ef41c035

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\mr.pak

MD5 da44d4ade4c258629118dbf534f0c2cb
SHA1 d93756c9d2d2db7755b4b7d47042a451435cca7d
SHA256 fcf1d938863cbc4d4a1d62de0eacbfd17fee4a0f5a9fcc09627bc22a98e268c4
SHA512 827c291ccfea31799e2fd48ee35aa179006a7bb3420c0346b5f1291abb4560f84b952a2bae820ef129ad77719edb16873328e7f0d030f9e2970e0c620fe59328

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\ms.pak

MD5 63c4977a1e8f5ab37881705d084b47ca
SHA1 f716932d886b8a5441397dd6a8625cef88e85bcb
SHA256 8b18fef24ad28663e4dc5a5113a35111a78b848d70ea7fef4156ad75bdb4fea9
SHA512 3afd4f8db5a0880319b13009bcdc14892b8710b2ac91dea8641f1f632866ac564791f1d302e1208aeeb9977e613fefd6bc7c0a0fd5cb5d031a768362bc0d85ed

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\nb.pak

MD5 23d5480b833f65f1f55cc3bbfbdf53c0
SHA1 639eff4556e4d6c879abf305176f23c014927042
SHA256 7ce821732e743c2da1f81527355226df11a21eec137940a034afeb34618c5daa
SHA512 b46b25a4dc294dab0f34e5ec733dfe7e1c73c6ce2817640a620e9a0c196292a7a4737f0f10806efba4d5831d5a2f0833925083983927b0d74cbc5c46e9c8b953

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\nl.pak

MD5 6e404adeb945cb7952a8c4129e098759
SHA1 a870715beab03f3a53c74b5aac2f314b517184b3
SHA256 7531e450f725f7ac75ceaeceb09155786d367a4456f4e71e7523af9219748434
SHA512 30917740d923ca25fb9f3c32bca100d58388f5c6d3516a29f3a39d1ca8ab3e4058b271224c8b9554479d91718cca3dc1c9cb08b38b19ccc36a0d57ed0146ab70

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\pl.pak

MD5 def25f809c246d15d8a2f41a78b504c9
SHA1 4462b50e5613b1519987584d974fa0efd1812ced
SHA256 165005f81f071a315d0c4183fb3bc899e464c4cbf2dc450ffa09ae6bb5d517d2
SHA512 e6f17d5426ba98348209a51632db0cfe19287baf3752948bd76acb77b7eca51aae905adf7c316b17cc44856231d034f044cc056b0e0f1ce3b4999dea29597cc9

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\ru.pak

MD5 d269143626296c69906523810139e9af
SHA1 43abe13a4837892644774bf06eb89cafec49ac95
SHA256 b1bd2d1cc678784ab73a691d4a3dc876be78eee0a30661ac2666a9b8ab864ecf
SHA512 76b0cc1841dba7d4b4175b0c10d6c36c7f3e8ea4ad0b4e4c091391e2754913cb6c02f0285b73372d604a395b23995998090a0c68b607b4106226b7ac67ceff23

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\ro.pak

MD5 1ab0cbe10cb7c3d5beadc7b04a881885
SHA1 eca1fe3842b4a1b070a0f9ba1a27fd3e6284ba80
SHA256 9a80b326b712debc0d6e9639b45352fed1c4a49ec37490b49b8506c636fd2947
SHA512 581e42422db7ead773990036ce49a5d2589f3af610604582a4820dcee1c37d2923fbace738a42cb8b87407915e1693bbca6a2234a0716c7c8d875ca30915289b

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\pt-PT.pak

MD5 b7598cb8f05f465909ddb0045d60162e
SHA1 b794c944dd5287e550a3e46bc9a0584d3d753eb1
SHA256 c338f6de946cca52c457d236037cf1c9f13b6c73796b713f390524f321b401d6
SHA512 a53e9d6af760c4aebd418de134ba23ebc27076b02082e9eb1afb1bb7ec93a45ea22a4961c49023d7ca8b2d3aa99462ec35180797982a481ae823ac19b4b96f84

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\pt-BR.pak

MD5 7b7bf21b01ccfb27af8cd37d738f1106
SHA1 da1db09ee88c005610ed08dcde1b2cd73bcebd84
SHA256 1feb01da1f443fee8ff01c3b585d8f0ebe6a5e242483cf6f0f93088e76913e76
SHA512 ea0bf1357616fd33b41c7189eafd2948324bbfdedb043974dcd0f78693fe868a4d37ee2c0e979d9795cad63cbe70fba0794641beece737886cf92bc29622e464

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\sk.pak

MD5 3ee3730ba0f6894f2651e4e1be37a214
SHA1 3a3adb77fcb6d0514a221e6671d815a1cb7a2c35
SHA256 23c8d9722e0a2e22fbc8ae1bebb9cff456fe026c986a211565fa9398376e64af
SHA512 000928407693007645230ab593a6055e6005e6c2cb362057ce8a1915ad96030a03b134ee20e3197daac9920c69df188867d3c5a603a3e36c2eccb0bdcd549206

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\sr.pak

MD5 0cf9aea120b76672d2b5e30e928459c5
SHA1 0219aaa5d84847fe86762baa82b7b8b301239c9d
SHA256 b6aeb180462d8f312762a419b45c910929e2322d45bbf2b84b0871ccf7838945
SHA512 e79a0800571ab7b64602db4941b689231edb20d65a89272b7dcae53426b7811791df8f6ef174c83680a6adf931efc3d47f133b971254c139e8b04953b8a10979

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\sl.pak

MD5 c20064c5c0dae644ce4ccc0a2234c128
SHA1 a50411c1431ae1f4fac74a34f1716809a0623380
SHA256 576891a9a61b9cd50024e507e93d32476332977db8e29ef3d46427015d4d26e6
SHA512 04f979cfc813c6b1d3a5d9b3b306c415529a1fb72e415e2742ee25ccebf04bbe3abca91bd66aa3633a97a1383f3c4b915319b8d0b25c0ef6eb8c2e08312dc01e

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\sv.pak

MD5 007d56b78104f7e245f7c84f07949f25
SHA1 8e3104a8c26f8418f44e19640d9babcd68a640c1
SHA256 e6c9329d7184190a0282f6440dcad5531f9656514a37b7dcb5a510ef17f3793c
SHA512 30c492d48aff33af8a0290cbe29864ff5c7d46dc50f5c4c6d5c96e6aa273926840b28b78958070e1534038e66c0142ab65153d32d28b56fb5dca28844370a946

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\sw.pak

MD5 89c5dce32ff87d5fb2b8e815f7e4cbab
SHA1 ca3138ea6103a5ba39e35c53e980b44c9889d386
SHA256 ca8d57f632880f7b736ef7f8c5f35ddc867e50919b1f7d835bae76f823ebed13
SHA512 9e3ded0e33f9441f31e95317ac6a7a140ee5c63bea8b1bf8c03952804fb6783e61e7971d5cbe1c698d3c4067233b78bf37099054fcfe38b091829f5435e6d435

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\th.pak

MD5 1a66feba0d44231b935d83a7f36a09a0
SHA1 3e674234b10350ebec218c904a9c90f3edd29711
SHA256 11fd04f3b33d09041d646d34e61fa15b96c12dbc62e229b64306356de6155cac
SHA512 b7617094a6d27670c0720dc5dade4a866ecdd68c45c1b9e6dfe1c3074dd1957bd7459210d111ef33727122666b24c2449cce9f3e903aae59dcbe438b38c8a021

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\te.pak

MD5 1eccb7be373fc3144ada2df9e493cc07
SHA1 eef3e05afdf910671a046cf90291c17731bdb378
SHA256 bd0a936ab62ab6ab172a192b7c082b824706f6b3d88580a6b6be32809354fc2a
SHA512 ea30d14fb7c2ad54263e12eb8469e6b058afb30448900b55d944aa87e266d735f2a04d2f29303087f2d13f379483d681285182e6ad2bb25bf36e311828e2a08f

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\ta.pak

MD5 3dcd0523ccad674f2e93de57ad0082fe
SHA1 fd4a28ee288a1f33ee7260ae80df93aae9718039
SHA256 72ef4527f01018c90c583e48f37d20bfa684012bc00cb9ab5ffa3e222b9c7f3a
SHA512 2ec95b89051b019e98e6a1852e5e89e1c985a10998af1cb2603e5766698a2880355d8e6b959e60e9edb84354e99d0286708027c39a8add816c172ad1efe35b49

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\uk.pak

MD5 ba2462d8b3b975bb265bcce6a3410cf6
SHA1 3caba82b3e14350a33711db68d98e6d211ac9fe5
SHA256 1dc63c538f6b96cf4e70284c078a6e18f58f599db2a2ec594da23b244944c9cc
SHA512 a46441e2c97032928dfc19b178cd3261887b7076917a4fe829083151c8298703c3921001cd62c630b35504444f069973605b487c954623ce16682491fccb7d50

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\zh-CN.pak

MD5 c82a124cc6e87ad403a67007b9c1fdb0
SHA1 1d4f1c0a3cda7d4a75a0f4035bc6d2718102f09c
SHA256 f597245963ca7b42b2a7e5e80af5258972002fd4bcd3a21c875e4051df3eb1a9
SHA512 5e45df31658039144316299879b4f1de7eb157fb830d08e8d93d3ccc2e033b1f8e2f59d29e11785ac8346988d5ba2afc373c01bc4a58ba3cc4439d9aff1ada87

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\vi.pak

MD5 806b7d282e74565b95264ebbe6794d48
SHA1 3aabe2d802283fb9b3ef43932c1b7638ef6a1053
SHA256 7b4bf97b78a07422359b709ea17d1d6aa038e12ec420cd0fc7dce4b313fe4af7
SHA512 7380b7a2b239932d1167f194f81a1c867983fe318a1e48d246470de0c94837edd6c0a641e06f888e36ff5041fc2a69d19cf1a46bef816d07fd3ecda42b84e524

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\tr.pak

MD5 2bcae092530d06fba9b23492ac4a1d6a
SHA1 4114af7364210a4bcd10099911083de2abc25d40
SHA256 65105386d6b52445fdc7660648259b43a04849a05035d749858d9f64d4209836
SHA512 e87778246b98d87f2f29e2abb02290b829cdcb753fd9b184fec61b0523452e262527432b73a11eba86d547ffce2ce00b4180ae8367419e2174b825ed290345b3

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\locales\zh-TW.pak

MD5 ad19e8ac7f2b5e5f67b9f5671299d19e
SHA1 4a6936a4971c2b9a414f40de3eb5dafe1b5b3e52
SHA256 e30d22153e0860246c8c37855a385471ad1e74e1eadf56476a1ea980f9204d86
SHA512 4f283deaad6ef0327baf7cdfef063293d27c1746431261553a6c7925832fe77c8017c6d11f36c5ec657ecd3b563099c9e35bd2cbe52c12ee734f4bef9bffe077

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\resources\elevate.exe

MD5 792b92c8ad13c46f27c7ced0810694df
SHA1 d8d449b92de20a57df722df46435ba4553ecc802
SHA256 9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37
SHA512 6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\resources\app.asar

MD5 f309516b1584de8aaff1c9081db29a59
SHA1 35a8caf69a5d050627ca2626d536e0eea7d5d8a8
SHA256 e0e8a04257720176aeee7117386ae5b5dd5d6be44c639c522c4212de57d01478
SHA512 4e75e8f29f49ef9ed9e6e1dc241e6507cf009719df9170db80cde0d2f340552c498897125b8816d6380e20957ef42be266d0629d217e5396c9f77c865b78892e

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\app.manifest

MD5 8951565428aa6644f1505edb592ab38f
SHA1 9c4bee78e7338f4f8b2c8b6c0e187f43cfe88bf2
SHA256 8814db9e125d0c2b7489f8c7c3e95adf41f992d4397ed718bda8573cb8fb0e83
SHA512 7577bad37b67bf13a0d7f9b8b7d6c077ecdfb81a5bee94e06dc99e84cb20db2d568f74d1bb2cef906470b4f6859e00214beacca7d82e2b99126d27820bf3b8f5

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\index.js

MD5 d226502c9bf2ae0a7f029bd7930be88e
SHA1 6be773fb30c7693b338f7c911b253e4f430c2f9b
SHA256 77a3965315946a325ddcf0709d927ba72aa47f889976cbccf567c76cc545159f
SHA512 93f3d885dad1540b1f721894209cb7f164f0f6f92857d713438e0ce685fc5ee1fc94eb27296462cdeede49b30af8bf089a1fc2a34f8577479645d556aaac2f8e

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\screenCapture_1.3.2.bat

MD5 da0f40d84d72ae3e9324ad9a040a2e58
SHA1 4ca7f6f90fb67dce8470b67010aa19aa0fd6253f
SHA256 818350a4fb4146072a25f0467c5c99571c854d58bec30330e7db343bceca008b
SHA512 30b7d4921f39c2601d94a3e3bb0e3be79b4b7b505e52523d2562f2e2f32154d555a593df87a71cddb61b98403265f42e0d6705950b37a155dc1d64113c719fd9

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\swiftshader\libEGL.dll

MD5 2ffc36c5555a36a4f26c1aa7a8108b4a
SHA1 2ec38b17a0e9d5b0a4c397921aa4430607d32edc
SHA256 f8b8b96cc384171268cbd543d9486a97b2f2066d45ac118421ff974baf18d2e5
SHA512 0df87d336e223ade77eecaee88d8af2832f1cec3b5681699646e0be933b3f0acdb3765492e9d8fd713453dea2a7fd38d46c201c96313a06a484f23a78a716cfe

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\7z-out\swiftshader\libGLESv2.dll

MD5 41d3387761bbb79d4820e8d242561027
SHA1 27dfda8ce933af12578fb64f3171f40f56bace55
SHA256 ed005ae1d388e0256e9ae304933980897ec2cfa957ed5babab6ae2a5dcf5c5f5
SHA512 cc396d0c2a94c31b8a42697f456f74e8ede1ad1fbc7eb1e4983544166041ff878048f60af9b1525320770ee477c63d6c466746c2c33fd30bc2d7ec903f8af944

C:\Users\Admin\AppData\Local\Temp\nsiBFD1.tmp\StdUtils.dll

MD5 c6a6e03f77c313b267498515488c5740
SHA1 3d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256 b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA512 9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

memory/5484-969-0x00007FFB8A2F0000-0x00007FFB8A2F1000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

MD5 f3b25701fe362ec84616a93a45ce9998
SHA1 d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256 b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA512 98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\Credit Cards\All Credit Cards.txt

MD5 dec2be4f1ec3592cea668aa279e7cc9b
SHA1 327cf8ab0c895e10674e00ea7f437784bb11d718
SHA256 753b99d2b4e8c58bfd10995d0c2c19255fe9c8f53703bb27d1b6f76f1f4e83cc
SHA512 81728e3d31b72905b3a09c79d1e307c4e8e79d436fcfe7560a8046b46ca4ae994fdfaeb1bc2328e35f418b8128f2e7239289e84350e142146df9cde86b20bb66

C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\AutoFill Data\All Autofill Data.txt

MD5 810ae82f863a5ffae14d3b3944252a4e
SHA1 5393e27113753191436b14f0cafa8acabcfe6b2a
SHA256 453478914b72d9056472fb1e44c69606c62331452f47a1f3c02190f26501785c
SHA512 2421a397dd2ebb17947167addacd3117f666ddab388e3678168075f58dc8eee15bb49a4aac2290140ae5102924852d27b538740a859d0b35245f505b20f29112

memory/4952-1091-0x0000000000AC0000-0x0000000000ACA000-memory.dmp

memory/1872-1092-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4952-1097-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/1872-1099-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4508-1101-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4508-1105-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5388-1114-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\2024314-2340-1ca0kvt.h8kd.jpg

MD5 637812697618a5e791cafc9b99bd16de
SHA1 6a1aba5bc0af1a5a376227bfa6e3761a1a49ab43
SHA256 ef336ed9d9af8541a3e0879f1752d9f79d1797e70df968ff492740c4ff7b62fb
SHA512 3a05b95eb8efb5a08d94563c8eba850b770b6fc652add691dd01e727a57889d6f4be264585fc7e8f810441682e93c563e0fc431f4c9e71709870f56335b2e8b7

memory/2424-1126-0x000001A4B7690000-0x000001A4B7691000-memory.dmp

memory/2424-1134-0x000001A4B7690000-0x000001A4B7691000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 665d57f8d6c8e67de84af7cfb7ff334e
SHA1 11810499f72fc807ff59faac10f3d40f010f1e0b
SHA256 3d6ee3f6820fb5b37ed3b660a25801dce80513a0eaffdaac89350eca34c22d52
SHA512 a81d39dc74b4ff681700911a0dd9ead5c178d1d4563c7eb238fc89ff62f81faaf4ac984334dc686148e2822ea334571135179a5a694858b816b4e47361f67764

memory/6048-1154-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5520-1166-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/2500-1178-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5240-1185-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5520-1183-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5960-1182-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4952-1192-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5240-1191-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4804-1193-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5800-1200-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 aacccb01a9bd4f7af99f12ba7ddebf2f
SHA1 96d62687d54ff0f8aa417c6c0a3283c2ac04fa1a
SHA256 5f2ced36675bb7031232d7aed3a4dacd36d9dccc631f96324cac6eae513bee50
SHA512 bf4887a1d248432529ce1fc7f97ebb26d143b67a750cc0e21b3bf3d4110f3608019dd41e84c9d929dc3b08fbf070c4d5dbfbfd96b7af845c33b46ee06b7cd445

memory/2944-1223-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4624-1224-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4624-1228-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/2944-1206-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5944-1205-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5768-1230-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4804-1197-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5768-1233-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4380-1176-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5960-1165-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/2500-1164-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/3280-1149-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4448-1237-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/6012-1160-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/6048-1159-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/6012-1153-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/3280-1152-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/2424-1137-0x000001A4B7690000-0x000001A4B7691000-memory.dmp

memory/2424-1136-0x000001A4B7690000-0x000001A4B7691000-memory.dmp

memory/2424-1135-0x000001A4B7690000-0x000001A4B7691000-memory.dmp

memory/2944-1122-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5772-1242-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/2424-1133-0x000001A4B7690000-0x000001A4B7691000-memory.dmp

memory/2424-1131-0x000001A4B7690000-0x000001A4B7691000-memory.dmp

memory/5380-1115-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/2424-1130-0x000001A4B7690000-0x000001A4B7691000-memory.dmp

memory/2424-1125-0x000001A4B7690000-0x000001A4B7691000-memory.dmp

memory/2424-1124-0x000001A4B7690000-0x000001A4B7691000-memory.dmp

memory/5388-1123-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4380-1246-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/2552-1245-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/2944-1116-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5380-1111-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5944-1250-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/2632-1255-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5800-1258-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5844-1262-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/3904-1263-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/3904-1266-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4532-1268-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/3652-1275-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4772-1276-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4772-1279-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/6008-1284-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/4448-1283-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5772-1288-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5756-1292-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5212-1296-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5944-1297-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/1012-1301-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5056-1305-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/2632-1304-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/6048-1310-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/5844-1309-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp

memory/224-1315-0x00007FFB57930000-0x00007FFB583F1000-memory.dmp