Resubmissions

02-05-2024 02:59

240502-dg26eshb97 10

02-05-2024 02:36

240502-c3k9csef7t 10

Analysis

  • max time kernel
    300s
  • max time network
    303s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-05-2024 02:36

General

  • Target

    a ton of ya/ya - Copy.exe

  • Size

    63KB

  • MD5

    222c2d239f4c8a1d73c736c9cc712807

  • SHA1

    c3aa61bd6f8cc640bcfa74c40d9283c9c08c7b3c

  • SHA256

    ff43049677c57277f12a1d97f02af3029d7b75b5ad40303a28f1b0452997969d

  • SHA512

    1f2fea85e45e93916306c234b916d6b4b200dac9656e44f4555f825dd8677cb5e927bd5e7a74bf2fb2f6972a3e6e2d294a6104add162ba3d53a0e6cfedef6a02

  • SSDEEP

    1536:tJc/5q1qoR5PDdAZcIED4VuCkbFybjQ9f0jQRmONww+W:7c/iqoJekbFEQ9W+mONP+W

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:23638

209.25.140.1:5525:23638

bring-recorder.gl.at.ply.gg:23638

action-yesterday.gl.at.ply.gg:23638

147.185.221.19:23638

then-wheel.gl.at.ply.gg::23638

then-wheel.gl.at.ply.gg:23638

teen-modes.gl.at.ply.gg:23638

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    uwumonster.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 59 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 40 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 18 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a ton of ya\ya - Copy.exe
    "C:\Users\Admin\AppData\Local\Temp\a ton of ya\ya - Copy.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4404
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "uwumonster" /tr "C:\Users\Admin\AppData\Local\uwumonster.exe"
      2⤵
      • Creates scheduled task(s)
      PID:1968
    • C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe
      "C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe
        "C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1584
      • C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe
        "C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3908
      • C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe
        "C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1208
      • C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe
        "C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:4628
      • C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe
        "C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe" /watchdog
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3124
      • C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe
        "C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe" /main
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4136
        • C:\Windows\SysWOW64\notepad.exe
          "C:\Windows\System32\notepad.exe" \note.txt
          4⤵
            PID:1672
          • C:\Windows\SysWOW64\mspaint.exe
            "C:\Windows\System32\mspaint.exe"
            4⤵
            • Drops file in Windows directory
            • Suspicious use of SetWindowsHookEx
            PID:4368
          • C:\Windows\SysWOW64\mmc.exe
            "C:\Windows\system32\mmc.exe" "C:\Windows\System32\devmgmt.msc"
            4⤵
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4636
            • C:\Windows\system32\mmc.exe
              "C:\Windows\System32\devmgmt.msc" "C:\Windows\System32\devmgmt.msc"
              5⤵
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Checks SCSI registry key(s)
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:4964
          • C:\Windows\SysWOW64\mmc.exe
            "C:\Windows\system32\mmc.exe" "C:\Windows\System32\devmgmt.msc"
            4⤵
            • Suspicious use of SetWindowsHookEx
            PID:1076
            • C:\Windows\system32\mmc.exe
              "C:\Windows\System32\devmgmt.msc" "C:\Windows\System32\devmgmt.msc"
              5⤵
              • Drops file in System32 directory
              • Checks SCSI registry key(s)
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious behavior: SetClipboardViewer
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1936
          • C:\Windows\SysWOW64\calc.exe
            "C:\Windows\System32\calc.exe"
            4⤵
            • Modifies registry class
            PID:5532
          • C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe
            "C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"
            4⤵
            • Suspicious use of SetWindowsHookEx
            PID:6104
            • C:\Windows\splwow64.exe
              C:\Windows\splwow64.exe 12288
              5⤵
                PID:6068
      • C:\Users\Admin\AppData\Local\uwumonster.exe
        C:\Users\Admin\AppData\Local\uwumonster.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4592
      • C:\Users\Admin\AppData\Local\uwumonster.exe
        C:\Users\Admin\AppData\Local\uwumonster.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2392
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService
        1⤵
          PID:4416
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
          1⤵
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:4612
        • C:\Windows\system32\browser_broker.exe
          C:\Windows\system32\browser_broker.exe -Embedding
          1⤵
          • Modifies Internet Explorer settings
          PID:2084
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Modifies registry class
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2320
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Drops file in Windows directory
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2816
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Drops file in Windows directory
          • Modifies registry class
          PID:1924
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          PID:2868
        • C:\Users\Admin\AppData\Local\uwumonster.exe
          C:\Users\Admin\AppData\Local\uwumonster.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1048
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Drops file in Windows directory
          • Modifies registry class
          PID:4928
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Modifies registry class
          PID:2608
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Drops file in Windows directory
          • Modifies registry class
          PID:3808
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x2b4
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2100
        • C:\Users\Admin\AppData\Local\uwumonster.exe
          C:\Users\Admin\AppData\Local\uwumonster.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2120
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
          • Drops file in Windows directory
          • Modifies registry class
          PID:2916
        • C:\Windows\system32\OpenWith.exe
          C:\Windows\system32\OpenWith.exe -Embedding
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:5584
        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
          1⤵
            PID:5940
          • C:\Users\Admin\AppData\Local\uwumonster.exe
            C:\Users\Admin\AppData\Local\uwumonster.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:6068
          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
            1⤵
            • Drops file in Windows directory
            • Modifies registry class
            PID:3196

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\uwumonster.exe.log

            Filesize

            654B

            MD5

            16c5fce5f7230eea11598ec11ed42862

            SHA1

            75392d4824706090f5e8907eee1059349c927600

            SHA256

            87ba77c13905298acbac72be90949c4fe0755b6eff9777615aa37f252515f151

            SHA512

            153edd6da59beea6cc411ed7383c32916425d6ebb65f04c65aab7c1d6b25443d143aa8449aa92149de0ad8a975f6ecaa60f9f7574536eec6b38fe5fd3a6c6adc

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8S7W85J5\edgecompatviewlist[1].xml

            Filesize

            74KB

            MD5

            d4fc49dc14f63895d997fa4940f24378

            SHA1

            3efb1437a7c5e46034147cbbc8db017c69d02c31

            SHA256

            853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

            SHA512

            cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1G6WS7EK\js[2].js

            Filesize

            270KB

            MD5

            221a7422f276797520512a31aa6317fc

            SHA1

            b8564a77ad0ce675e21610030fc960cfdcc4bda8

            SHA256

            48d43eec831fe3238ff9ccf41f9c1a6f32d5e24cea79a52219398042b25c48f8

            SHA512

            1d9ebdefd8c4c45b2a4772bae4bbd8be20f5e4e102aa0bb8f204060f947b41967b4138e089d3fae4c3592b39aac99d4d103636c8b8ed5a03909675177b9fe3db

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\5PGROS7F\recaptcha__en[1].js

            Filesize

            505KB

            MD5

            e2e79d6b927169d9e0e57e3baecc0993

            SHA1

            1299473950b2999ba0b7f39bd5e4a60eafd1819d

            SHA256

            231336ed913a5ebd4445b85486e053caf2b81cab91318241375f3f7a245b6c6b

            SHA512

            d6a2ed7b19e54d1447ee9bbc684af7101b48086945a938a5f9b6ae74ace30b9a98ca83d3183814dd3cc40f251ab6433dc7f8b425f313ea9557b83e1c2e035dff

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\79SZ112Y\styles__ltr[1].css

            Filesize

            55KB

            MD5

            2c00b9f417b688224937053cd0c284a5

            SHA1

            17b4c18ebc129055dd25f214c3f11e03e9df2d82

            SHA256

            1e754b107428162c65a26d399b66db3daaea09616bf8620d9de4bc689ce48eed

            SHA512

            8dc644d4c8e6da600c751975ac4a9e620e26179167a4021ddb1da81b452ecf420e459dd1c23d1f2e177685b4e1006dbc5c8736024c447d0ff65f75838a785f57

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\BRNZEMYQ\www.google[1].xml

            Filesize

            98B

            MD5

            baa1b6df299a85767c707128902f3f40

            SHA1

            f56544030d771a99ceeaa0f728c870f61e232976

            SHA256

            427be0b521cdfa595db34f2afed7568f212d12eca5ea6ed5758bc45852be7e69

            SHA512

            110677b0ff22d0ce169d3c49218f0828d780550c548ce59908511e8d3ecbf7fd77509dc0bbb8a03206c4f3a58e0f138fdced9a61de3a941e026a407003191ae7

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\PVPJ25MK\favicon[1].ico

            Filesize

            5KB

            MD5

            f3418a443e7d841097c714d69ec4bcb8

            SHA1

            49263695f6b0cdd72f45cf1b775e660fdc36c606

            SHA256

            6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

            SHA512

            82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\UF71N1P3\PCOP[1].ico

            Filesize

            6KB

            MD5

            6303f12d8874cff180eecf8f113f75e9

            SHA1

            f68c3b96b039a05a77657a76f4330482877dc047

            SHA256

            cd2756b9a2e47b55a7e8e6b6ab2ca63392ed8b6ff400b8d2c99d061b9a4a615e

            SHA512

            6c0c234b9249ed2d755faf2d568c88e6f3db3665df59f4817684b78aaa03edaf1adc72a589d7168e0d706ddf4db2d6e69c6b25a317648bdedf5b1b4ab2ab92c5

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\USYYQCUR\suggestions[1].en-US

            Filesize

            17KB

            MD5

            5a34cb996293fde2cb7a4ac89587393a

            SHA1

            3c96c993500690d1a77873cd62bc639b3a10653f

            SHA256

            c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

            SHA512

            e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1G6WS7EK\Dahk90Fxhr1MEtfyZ-6_j6N-qVuiwfy-NjSFsUln5nQ[1].js

            Filesize

            17KB

            MD5

            5bc0a82a24abe097e6f6c1098bef9591

            SHA1

            2da9f4ad273be56e0bfbefc24209cdeba5f9f270

            SHA256

            0da864f7417186bd4c12d7f267eebf8fa37ea95ba2c1fcbe363485b14967e674

            SHA512

            14351ce0be86a502718daa7a695ea4404d215af58acac418a0e7963219300f749b1feb9d7cbf3cfa088811fb5daf6948379f4421cf67b41974eab5db55924d8b

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1G6WS7EK\KFOlCnqEu92Fr1MmEU9fABc4EsA[1].woff2

            Filesize

            9KB

            MD5

            df648143c248d3fe9ef881866e5dea56

            SHA1

            770cae7a298ecfe5cf5db8fe68205cdf9d535a47

            SHA256

            6a3f2c2a5db6e4710e44df0db3caec5eb817e53989374e9eac68057d64b7f6d2

            SHA512

            6ff33a884f4233e092ee11e2ad7ef34d36fb2b61418b18214c28aa8b9bf5b13ceccfa531e7039b4b7585d143ee2460563e3052364a7dc8d70b07b72ec37b0b66

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1G6WS7EK\KFOlCnqEu92Fr1MmEU9fCBc4EsA[1].woff2

            Filesize

            1KB

            MD5

            52e881a8e8286f6b6a0f98d5f675bb93

            SHA1

            9c9c4bc1444500b298dfea00d7d2de9ab459a1ad

            SHA256

            5e5321bb08de884e4ad6585b8233a7477fa590c012e303ea6f0af616a6e93ffb

            SHA512

            45c07a5e511948c328f327e2ef4c3787ac0173c72c51a7e43e3efd3e47dd332539af15f3972ef1cc023972940f839fffe151aefaa04f499ae1faceaab6f1014f

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1G6WS7EK\KFOlCnqEu92Fr1MmYUtfBBc4[1].woff2

            Filesize

            14KB

            MD5

            19b7a0adfdd4f808b53af7e2ce2ad4e5

            SHA1

            81d5d4c7b5035ad10cce63cf7100295e0c51fdda

            SHA256

            c912a9ce0c3122d4b2b29ad26bfe06b0390d1a5bdaa5d6128692c0befd1dfbbd

            SHA512

            49da16000687ac81fc4ca9e9112bdca850bb9f32e0af2fe751abc57a8e9c3382451b50998ceb9de56fc4196f1dc7ef46bba47933fc47eb4538124870b7630036

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1G6WS7EK\KFOlCnqEu92Fr1MmYUtfChc4EsA[1].woff2

            Filesize

            11KB

            MD5

            29542ac824c94a70cb8abdeef41cd871

            SHA1

            df5010dad18d6c8c0ad66f6ff317729d2c0090ba

            SHA256

            63ef838f895e018722b60f6e7e1d196ff3d90014c70465703fc58e708e83af64

            SHA512

            52f91e02b82f9f27d334704b62a78e746c80023ee8882b96cb24cb4043f9a256f395d24830b1f4513bd7597f8c564af20db9c715ab014eb2ab752fd697156591

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1G6WS7EK\api[1].js

            Filesize

            850B

            MD5

            ee87fd4035a91d937ff13613982b4170

            SHA1

            e897502e3a58c6be2b64da98474f0d405787f5f7

            SHA256

            7649b605b4f35666df5cbcbb03597306d9215f53f61c2a097f085fa39af9859f

            SHA512

            9e27179bdedb6fe008ab8dc0827d479c674e7e21ad44081c78782f29dd5b91ad2d5bf4f6912d6d1ad3275eedce659e26ace02f769c6b7f4b1f660a3c628feab3

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\1G6WS7EK\logo_48[1].png

            Filesize

            2KB

            MD5

            ef9941290c50cd3866e2ba6b793f010d

            SHA1

            4736508c795667dcea21f8d864233031223b7832

            SHA256

            1b9efb22c938500971aac2b2130a475fa23684dd69e43103894968df83145b8a

            SHA512

            a0c69c70117c5713caf8b12f3b6e8bbb9cdaf72768e5db9db5831a3c37541b87613c6b020dd2f9b8760064a8c7337f175e7234bfe776eee5e3588dc5662419d9

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\5PGROS7F\KFOlCnqEu92Fr1MmEU9fBBc4[1].woff2

            Filesize

            15KB

            MD5

            285467176f7fe6bb6a9c6873b3dad2cc

            SHA1

            ea04e4ff5142ddd69307c183def721a160e0a64e

            SHA256

            5a8c1e7681318caa29e9f44e8a6e271f6a4067a2703e9916dfd4fe9099241db7

            SHA512

            5f9bb763406ea8ce978ec675bd51a0263e9547021ea71188dbd62f0212eb00c1421b750d3b94550b50425bebff5f881c41299f6a33bbfa12fb1ff18c12bc7ff1

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\5PGROS7F\KFOlCnqEu92Fr1MmEU9fChc4EsA[1].woff2

            Filesize

            11KB

            MD5

            16aedbf057fbb3da342211de2d071f11

            SHA1

            fdee07631b40b264208caa8714faaa5b991d987b

            SHA256

            7566a2f09ff8534334b7a44f72a1afaba6bdbb782209be8804636ee8b963c75f

            SHA512

            5cd45dfb0d0ee44afd9b3ffd93c2942c2f04e359d067d4631edd67a2ee09149766294b29c75aaab7436dacc775a8ca02392c5e4cfb8d7fede19c028448507e0e

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\5PGROS7F\KFOlCnqEu92Fr1MmYUtfCBc4EsA[1].woff2

            Filesize

            1KB

            MD5

            7cbd23921efe855138ad68835f4c5921

            SHA1

            78a3ae9ec08f2cf8ebb791a2331b33a03ab8cc76

            SHA256

            8eaae4c8680e993b273145315c76a9a278f696467c426637d4beab8cb3dc4a3d

            SHA512

            d8a4db91d2063273d31f77728b44557612b85f51143973caa3cfd60ab18f8c3e4b8cdaab43af843fe29441cd1d8299bf2f139a78e47bf740277b33a377377177

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\5PGROS7F\KFOmCnqEu92Fr1Mu4WxKOzY[1].woff2

            Filesize

            7KB

            MD5

            7aa7eb76a9f66f0223c8197752bb6bc5

            SHA1

            ac56d5def920433c7850ddbbdd99d218d25afd2b

            SHA256

            9ca415df2c57b1f26947351c66ccfaf99d2f8f01b4b8de019a3ae6f3a9c780c7

            SHA512

            e9a513741cb90305fbe08cfd9f7416f192291c261a7843876293e04a874ab9b914c3a4d2ed771a9d6484df1c365308c9e4c35cd978b183acf5de6b96ac14480d

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\5PGROS7F\KFOmCnqEu92Fr1Mu4mxK[1].woff2

            Filesize

            14KB

            MD5

            5d4aeb4e5f5ef754e307d7ffaef688bd

            SHA1

            06db651cdf354c64a7383ea9c77024ef4fb4cef8

            SHA256

            3e253b66056519aa065b00a453bac37ac5ed8f3e6fe7b542e93a9dcdcc11d0bc

            SHA512

            7eb7c301df79d35a6a521fae9d3dccc0a695d3480b4d34c7d262dd0c67abec8437ed40e2920625e98aaeafba1d908dec69c3b07494ec7c29307de49e91c2ef48

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\5PGROS7F\KFOmCnqEu92Fr1Mu7WxKOzY[1].woff2

            Filesize

            5KB

            MD5

            a835084624425dacc5e188c6973c1594

            SHA1

            1bef196929bffcabdc834c0deefda104eb7a3318

            SHA256

            0dfa6a82824cf2be6bb8543de6ef56b87daae5dd63f9e68c88f02697f94af740

            SHA512

            38f2764c76a545349e8096d4608000d9412c87cc0cb659cf0cf7d15a82333dd339025a4353b9bd8590014502abceb32ca712108a522ca60cbf1940d4e4f6b98a

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\5PGROS7F\webworker[1].js

            Filesize

            102B

            MD5

            284b36421a1cf446f32cb8f7987b1091

            SHA1

            eb14d6298c9da3fb26d75b54c087ea2df9f3f05f

            SHA256

            94ab2be973685680d0be9c08d4e1a7465f3c09053cf631126bd33f49cc2f939b

            SHA512

            093f3f5624de2e43e43eb06036107ff3260237f9e47e1f86fdfba7c7036522187a9b47b291f5443c566658a8ef555e5033c7f2ac0c9f4fa8eb69eb8e2540b372

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\79SZ112Y\KFOlCnqEu92Fr1MmEU9fBxc4EsA[1].woff2

            Filesize

            7KB

            MD5

            207d2af0a0d9716e1f61cadf347accc5

            SHA1

            0f64b5a6cc91c575cb77289e6386d8f872a594ca

            SHA256

            416d72c8cee51c1d6c6a1cab525b2e3b4144f2f457026669ddad34b70dabd485

            SHA512

            da8b03ee3029126b0c7c001d7ef2a7ff8e6078b2df2ec38973864a9c0fd8deb5ecef021c12a56a24a3fd84f38f4d14ea995df127dc34f0b7eec8e6e3fc8d1bbd

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\79SZ112Y\KFOlCnqEu92Fr1MmEU9fCRc4EsA[1].woff2

            Filesize

            14KB

            MD5

            79c7e3f902d990d3b5e74e43feb5f623

            SHA1

            44aae0f53f6fc0f1730acbfdf4159684911b8626

            SHA256

            2236e56f735d25696957657f099459d73303b9501cc39bbd059c20849c5bedff

            SHA512

            3a25882c7f3f90a7aa89ecab74a4be2fddfb304f65627b590340be44807c5c5e3826df63808c7cd06daa3420a94090249321a1e035b1cd223a15010c510518df

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\79SZ112Y\KFOlCnqEu92Fr1MmEU9fCxc4EsA[1].woff2

            Filesize

            5KB

            MD5

            6bef514048228359f2f8f5e0235f8599

            SHA1

            318cb182661d72332dc8a8316d2e6df0332756c4

            SHA256

            135d563a494b1f8e6196278b7f597258a563f1438f5953c6fbef106070f66ec8

            SHA512

            23fb4605a90c7616117fab85fcd88c23b35d22177d441d01ce6270a9e95061121e0f7783db275ad7b020feaba02bbbc0f77803ca9fb843df6f1b2b7377288773

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\79SZ112Y\KFOlCnqEu92Fr1MmYUtfABc4EsA[1].woff2

            Filesize

            9KB

            MD5

            797d1a46df56bba1126441693c5c948a

            SHA1

            01f372fe98b4c2b241080a279d418a3a6364416d

            SHA256

            c451e5cf6b04913a0bc169e20eace7dec760ba1db38cdcc343d8673bb221dd00

            SHA512

            99827a3fab634b2598736e338213e1041ef26108a1607be294325d90a6ba251a947fd06d8cb0a2104b26d7fe9455feb9088a79fe515be1896c994c5850705edc

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\79SZ112Y\KFOmCnqEu92Fr1Mu72xKOzY[1].woff2

            Filesize

            15KB

            MD5

            e3836d1191745d29137bfe16e4e4a2c2

            SHA1

            4dc8845d97df9cb627d9e6fdd49be1ef9eb9a69c

            SHA256

            98eec6c6fa4dcd4825e48eff334451979afc23cd085aea2d45b04dc1259079dd

            SHA512

            9e9ec420cf75bf47a21e59a822e01dc89dcf97eec3cc117c54ce51923c9a6f2c462355db1bc20cdf665ef4a5b40ffcfa9c8cee05bb5e112c380038bfef29c397

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\79SZ112Y\KFOmCnqEu92Fr1Mu7mxKOzY[1].woff2

            Filesize

            1KB

            MD5

            57993e705ff6f15e722f5f90de8836f8

            SHA1

            3fecc33bac640b63272c9a8dffd3df12f996730b

            SHA256

            836f58544471e0fb0699cb9ddd0fd0138877733a98b4e029fca1c996d4fb038d

            SHA512

            31f92fb495a1a20ab5131493ab8a74449aabf5221e2901915f2cc917a0878bb5a3cbc29ab12324ffe2f0bc7562a142158268c3f07c7dca3e02a22a9ade41721e

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SLAUSJ2C\KFOlCnqEu92Fr1MmYUtfBxc4EsA[1].woff2

            Filesize

            7KB

            MD5

            585f849571ef8c8f1b9f1630d529b54d

            SHA1

            162c5b7190f234d5f841e7e578b68779e2bf48c2

            SHA256

            c6dcdefaa63792f3c29abc520c8a2c0bc6e08686ea0187c9baac3d5d329f7002

            SHA512

            1140c4b04c70a84f1070c27e8e4a91d02fda4fc890877900c53cfd3a1d8908b677a412757061de43bc71022dfdd14288f9db0852ef6bf4d2c1615cb45628bebc

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SLAUSJ2C\KFOlCnqEu92Fr1MmYUtfCRc4EsA[1].woff2

            Filesize

            14KB

            MD5

            e904f1745726f4175e96c936525662a7

            SHA1

            af4e9ee282fea95be6261fc35b2accaed24f6058

            SHA256

            65c7b85c92158adb2d71bebe0d6dfb31ab34de5e7d82134fe1aa4eba589fc296

            SHA512

            7a279d41c8f60806c2253cba5b399be7add861bd15bf0ac4fa7c96fa1eee6557bf1ebd684e909086d9292739f27fa18947af5c98f4920fe00da3acf209c6260a

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SLAUSJ2C\KFOlCnqEu92Fr1MmYUtfCxc4EsA[1].woff2

            Filesize

            4KB

            MD5

            133b0f334c0eb9dbf32c90e098fab6bd

            SHA1

            398f8fd3a668ef0b16435b01ad0c6122e3784968

            SHA256

            6581d0d008bc695e0f6beffbd7d51abb4d063ef5dedc16feb09aa92ea20c5c00

            SHA512

            2a5a0956ecc8680e4e9ef73ec05bc376a1cc49ddb12ee76316378fe9626dccedb21530e3e031b2dae2830874cc1b6bfd6cce2d6d0dce54587ff0fc3780041ace

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SLAUSJ2C\KFOmCnqEu92Fr1Mu5mxKOzY[1].woff2

            Filesize

            9KB

            MD5

            efe937997e08e15b056a3643e2734636

            SHA1

            d02decbf472a0928b054cc8e4b13684539a913db

            SHA256

            53f2931d978bf9b24d43b5d556ecf315a6b3f089699c5ba3a954c4dde8663361

            SHA512

            721c903e06f00840140ed5eec06329221a2731efc483e025043675b1f070b03a544f8eb153b63cd981494379a9e975f014b57c286596b6f988cee1aaf04a8c65

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SLAUSJ2C\KFOmCnqEu92Fr1Mu7GxKOzY[1].woff2

            Filesize

            11KB

            MD5

            15d8ede0a816bc7a9838207747c6620c

            SHA1

            f6e2e75f1277c66e282553ae6a22661e51f472b8

            SHA256

            dbb8f45730d91bffff8307cfdf7c82e67745d84cb6063a1f3880fadfad59c57d

            SHA512

            39c75f8e0939275a69f8d30e7f91d7ca06af19240567fb50e441a0d2594b73b6a390d11033afb63d68c86c89f4e4bf39b3aca131b30f640d21101dc414e42c97

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

            Filesize

            1KB

            MD5

            a240d3899f5c942fa4d758eaa3f6cffd

            SHA1

            ab28b7e179d0b320b32b40f9302c6692bab2f06e

            SHA256

            fd668a44e7e00cb370d96f1ed1de4a6853f0fe2679fbb5e9cc211450d7cd6111

            SHA512

            8d774eda4fba5de333e50be8503c902c5f8aa6bc4516a0cad95f8cb8d697924fb88696b22cc712c6468ee9e8866a29c71d24f16d4e19dd0ded38069602babeee

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_8BB34D7AC6ADCC019FE5325FE9DECAE8

            Filesize

            471B

            MD5

            143f3a15fd530c5f20644efcd42a0efe

            SHA1

            37c9b069ae3fe18c294855473cfc2bfa779841ba

            SHA256

            c8dc8d331c1d13ef74c33bf414d89f7a5631df905f9aa25469d9a2ceb9a1ceba

            SHA512

            bfd0dae8de497f10b477337236b668667ce7f15b970ea7ad5485b803cb927729aeaf0a265dd86e4cdd625f468305318b31ed6fda5beb7a6a913282f30e856aec

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

            Filesize

            724B

            MD5

            ac89a852c2aaa3d389b2d2dd312ad367

            SHA1

            8f421dd6493c61dbda6b839e2debb7b50a20c930

            SHA256

            0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

            SHA512

            c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_D7C1EE155B4C5E8C9EE3042DF21F688A

            Filesize

            472B

            MD5

            d82886e4da51cd825189e243de66e640

            SHA1

            edc8290b23161653889b252b37f19ec019720941

            SHA256

            3d47798cbe8f8488ea79b1ef3fa8e9c89a17ccea4f2305be794601878e3cde73

            SHA512

            ba84e29c4e2a374bb2b836e4dc40ff52db54159c0145f4b1f90927953e285d72a25f358f4ada1450ac4f09f48d7dcb1d7ff77aac5670fea4678094bb3a3c5ed4

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

            Filesize

            410B

            MD5

            c2e336073dde7e224cff0a50d9af12ef

            SHA1

            b6c2d3c62083eb348f441462ff3df0e05dc3420b

            SHA256

            cd0eb4f024c198a43ab46c78d1ca2d3b32e116003fc4d02b2839c1486472102a

            SHA512

            1332655da2ed98c020e9a1d785d6c7c6860d35af8436d53dd9bfa4311c0b84d58236a114f8527fd6ec328573abb8c628250a2559aed7b6c681199a2d17cbf73f

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_8BB34D7AC6ADCC019FE5325FE9DECAE8

            Filesize

            422B

            MD5

            e34749996d1d65302e437d16dea92900

            SHA1

            745f3cdfd8f7b78aeabc00aae9f018581250657c

            SHA256

            027716771d471c4b2e5c09199f954f69c68497b42168b4f1b19cd4b7bc98fc6c

            SHA512

            b4f4cfaab9547a215d6a65ecfddc1b6192583d1e9298c5d2b5ba63e3240e1d04652bc25edd2c2a2fd6c56db5ef8a4d3ce19c0c223e861f449b566e66ff39970f

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

            Filesize

            392B

            MD5

            be96047c5f3c7e201be65e62ba177905

            SHA1

            29941c34ca5df4a41654fef882afa33840e24847

            SHA256

            f6d6fca6a99aa56fddde6b591ad2b6d9d1ede139c0e5b9c83fcd1cd009d365dc

            SHA512

            bbdcadcd411543ccf171b025a9af57cc7ca4aadb3f189de80347f834c29227d4fe964ca6239118090069c070bacf303724ddd3eddcbb59c6b4d0b4221fa4be55

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_D7C1EE155B4C5E8C9EE3042DF21F688A

            Filesize

            414B

            MD5

            da0322edb6967485b0c611c91dd059b5

            SHA1

            79f0fce7e63a6f3dfe383ec7557fbbc9a22c572d

            SHA256

            3ef4b01251a71b5f4c76f1d073d4e1886f99e4dc78f0ea57ecf3cf879f2ca958

            SHA512

            2ded98e737a0e63eddb9f1cbe6aa259ae4f3fd16c932870a1299c60c7517d794ef58542d603840ada81de52e60f39f5cebea923baf6b9bb3a8838e2770101870

          • C:\Users\Admin\AppData\Local\Temp\pjqaxa.exe

            Filesize

            16KB

            MD5

            1d5ad9c8d3fee874d0feb8bfac220a11

            SHA1

            ca6d3f7e6c784155f664a9179ca64e4034df9595

            SHA256

            3872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff

            SHA512

            c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1

          • C:\Users\Admin\AppData\Local\uwumonster.exe

            Filesize

            63KB

            MD5

            222c2d239f4c8a1d73c736c9cc712807

            SHA1

            c3aa61bd6f8cc640bcfa74c40d9283c9c08c7b3c

            SHA256

            ff43049677c57277f12a1d97f02af3029d7b75b5ad40303a28f1b0452997969d

            SHA512

            1f2fea85e45e93916306c234b916d6b4b200dac9656e44f4555f825dd8677cb5e927bd5e7a74bf2fb2f6972a3e6e2d294a6104add162ba3d53a0e6cfedef6a02

          • C:\Windows\INF\c_diskdrive.PNF

            Filesize

            6KB

            MD5

            5fc9a755ab56bf471b03832a79981e4b

            SHA1

            e49a2af7fdf6f9071f89c9e93448e7db5d50ffd0

            SHA256

            a95eda781fa5e24d1d14df34c54bb97164d1f42dcbb82b6ca2e9bc00106e8d70

            SHA512

            1adfcf93baffd76682282e4a061e6e4baa80a65ed92246badaa618ee43918b6a4be8d4c5b93b4635747adee4bd57b15317e940a7aece8e3b921dc1c638acaef9

          • C:\Windows\INF\c_fscontentscreener.PNF

            Filesize

            4KB

            MD5

            b67180e5cabb0cdcd288274cb65c9ece

            SHA1

            4a1e2e7baad4628de54b09634dd40172aed79cc0

            SHA256

            b4fab091ffd2dbd25281934acb36f0394ba4e998311cfeec7c09ce6286be40cd

            SHA512

            cc41c4df44e4ea49d2e467b9a11e29fc92846b228fc1b1f7a9ae51f832f753a15aaafe14ac662c81a7ed431b7824a60895bb965a2df6a539f91a3147674789c7

          • C:\Windows\INF\c_fsreplication.PNF

            Filesize

            4KB

            MD5

            5833f4897bf09d8859d69e63c314fef3

            SHA1

            cfaab724568528bf8e24e693e2c356d090344c51

            SHA256

            446f964e5c38e4774b44bbe46e1bf685506df31bbbb6801979c8113e017958c6

            SHA512

            b9858ed2db310d9d04872c4871521ecb2379d2891cea7ec12744242a0757893a37829328f038605f597f142cd6e7f3ab11accf805d66743a331ceac79057600b

          • C:\Windows\INF\c_fssystemrecovery.PNF

            Filesize

            4KB

            MD5

            db81b57e360eb73506de6873f59022b9

            SHA1

            c53cc07e20e20a0e30478917fcc0989f30c743c9

            SHA256

            103aeba023c9d31bff0bdd5c2f665181187d7e788024f3ad829e34f785bc9173

            SHA512

            380623402a36fc51012379e247daef8e2d8e0b441802aaddfe842054404797ff29910b3a2f95404f63788f4f2ef1051a0ca15f836a15dba3ad9b23a3b61815ef

          • C:\Windows\INF\c_linedisplay.PNF

            Filesize

            3KB

            MD5

            6ac3dafea0e2b4ebfdba5f56b35438a3

            SHA1

            648139ae96bc6fdfa91970f12de22c672517980c

            SHA256

            016e4392c0e3a2f6917f339a8689665aea9f4196a080d642725171d46fbe6349

            SHA512

            0e6a16687de8dc816358e94e48ce36921ac4c799aff062412d8716375a97624f7762965bf027067f8b3e67ff6e9f20e8fdf412ace5bc86a173153a4876562816

          • C:\Windows\INF\c_magneticstripereader.PNF

            Filesize

            3KB

            MD5

            21a08ffba0533138881adbc99e0176b7

            SHA1

            1262421e368e7ac4764e4e71ae9a7aca1f130e1c

            SHA256

            fee5a310ee14551bd5d876a108697ed2069d8ac6bfc70f93969cb998c4d5c77d

            SHA512

            6723547153550822c9e6ec200155c2bb25f1f5f17bf9e13e688addc313a2b8b089d8b7f85d4bae57935bf5aed9d616609cedcd7ffae2a812f194b0c0a3c8a82a

          • C:\Windows\INF\c_mcx.PNF

            Filesize

            4KB

            MD5

            b92498b4cc923803b38d6ae0f9c87581

            SHA1

            26f5d214d7370c72c188aa6718e153ec668b7bb0

            SHA256

            bf9e86e9fcc1af114df995b0892d01ec2e62a8a0193e009a94f17f9414957265

            SHA512

            c76e84e83bcb6948288976ce1910b28f3131d07ee7734df01d53a3af3ff977b9742b588dbd821dc9b301a4aa0bb78605ad5902988eaa85fbd297171ca9897066

          • C:\Windows\INF\c_monitor.PNF

            Filesize

            6KB

            MD5

            f5e1f09f4fe7de5824a0b319f857cca1

            SHA1

            2fdcb9f7bfa12ead42d4aecde4914477a497bdad

            SHA256

            facbf937528564de918565266bba29fb8f3e859ef167eeb0776f09f6ecfcb2c4

            SHA512

            f71443a01cff1fe5031973315eb9a98be30cf3bf39863e13858850e0e75472ca2c18775aac9fdb4b99c60c44a8d5b4078c621a7d0f58ebe0baed77bf95351f2a

          • C:\Windows\INF\c_processor.PNF

            Filesize

            5KB

            MD5

            dc9be160536a51b033fb9b6d1015bffb

            SHA1

            c128c7f67e2daafed2af35659af366fd8cd56d06

            SHA256

            57bcc23d44f6ee6286216f335861f4abd8f3819233068a29f7e21df6b4fb9fa0

            SHA512

            26114e7c3cf64343d5f2757675f73354d43a6b12774db7d0afd3f9b91a1f1c41b4cb0b4eead08b873366887ad8add3efdee850bc4afbf33b74c5e069e46c4775

          • C:\Windows\INF\c_sslaccel.PNF

            Filesize

            4KB

            MD5

            5b7d15fdb0710500928b2e38e463b10b

            SHA1

            ff338ddcd826b90f3f175ac4e8fb7070452dd37d

            SHA256

            e11ce784cfdc120a895c1dbec842e852759b7bff194469d4a189fa37566c5bba

            SHA512

            2c93dc15e59dc0cbcf3efe32d239b98eb78ae2e3d41fe548cc6f4a700c14491f1caf0f0e332f5f923533242461f94e7cb36f585480c07e438f3c40a6b6574801

          • C:\Windows\INF\dc1-controller.PNF

            Filesize

            12KB

            MD5

            d771226582ce6dcdf624e8b31c1bb5e5

            SHA1

            fcb60e71e298d2ddee406749b85e968b0d80e3bc

            SHA256

            e7e02b4ec3083e17e787c9563714ce8fb3e86e253689ed93a67f62c2ab3af21a

            SHA512

            344e6ffc062378c2034369b9e66f5756bc43be51fe97b5a9d78545082c1ffe7e90b8d98861b053f8b9d0ff99184a57ffc08749cf7d30254b10fdce6059b6bb5b

          • C:\Windows\INF\digitalmediadevice.PNF

            Filesize

            7KB

            MD5

            41649474c36985979e6358ec47752eb9

            SHA1

            2eb4997a5e2924a8aeeafecc75f081c6779a91c6

            SHA256

            63176399eaa7d48ccf5b00effafe38f0aff140d6a20a438e68d23b393161f3e4

            SHA512

            0547c0f5fffd1d0f3f28b4d3ee643f08c3cc0c209611a6777a8347f04e074dbc9a81235e7877d52292cbf1e2f571c9b2c4af03b3932c9ca30717615f1c60a7ff

          • C:\Windows\INF\remoteposdrv.PNF

            Filesize

            8KB

            MD5

            ecc89cf5d89042849f533c0ce16a5acc

            SHA1

            7f680e2017c4c52be8f4f545e6cf30053ba4524a

            SHA256

            cb969a6c86027d126ac53b8674e40818566e1ff8ba4f139f5c63afa4b70f9418

            SHA512

            f09472f3f0e53f156da901e1d0d68cef5c688ff375b207817062cd664d0333698bc10783b646b8b5695f1769db25d669396c0c0aa4be17752d6c79946e6e7ff5

          • C:\note.txt

            Filesize

            218B

            MD5

            afa6955439b8d516721231029fb9ca1b

            SHA1

            087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

            SHA256

            8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

            SHA512

            5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf

          • memory/1924-353-0x000002C49B880000-0x000002C49B8A0000-memory.dmp

            Filesize

            128KB

          • memory/1924-91-0x000002C489350000-0x000002C489352000-memory.dmp

            Filesize

            8KB

          • memory/1924-94-0x000002C489380000-0x000002C489382000-memory.dmp

            Filesize

            8KB

          • memory/1924-96-0x000002C4893A0000-0x000002C4893A2000-memory.dmp

            Filesize

            8KB

          • memory/1924-88-0x000002C489250000-0x000002C489350000-memory.dmp

            Filesize

            1024KB

          • memory/1924-180-0x000002C49AA40000-0x000002C49AA42000-memory.dmp

            Filesize

            8KB

          • memory/1924-178-0x000002C49A5E0000-0x000002C49A5E2000-memory.dmp

            Filesize

            8KB

          • memory/1924-176-0x000002C49A5C0000-0x000002C49A5C2000-memory.dmp

            Filesize

            8KB

          • memory/1924-174-0x000002C49A5A0000-0x000002C49A5A2000-memory.dmp

            Filesize

            8KB

          • memory/1924-188-0x000002C49B130000-0x000002C49B132000-memory.dmp

            Filesize

            8KB

          • memory/1924-209-0x000002C499F20000-0x000002C499F40000-memory.dmp

            Filesize

            128KB

          • memory/1924-208-0x000002C49A010000-0x000002C49A110000-memory.dmp

            Filesize

            1024KB

          • memory/1924-253-0x000002C49A110000-0x000002C49A210000-memory.dmp

            Filesize

            1024KB

          • memory/1924-258-0x000002C489010000-0x000002C489012000-memory.dmp

            Filesize

            8KB

          • memory/1924-348-0x000002C49BA80000-0x000002C49BAA0000-memory.dmp

            Filesize

            128KB

          • memory/1924-547-0x000002BC86F80000-0x000002BC86F82000-memory.dmp

            Filesize

            8KB

          • memory/2816-75-0x000002A69EA00000-0x000002A69EB00000-memory.dmp

            Filesize

            1024KB

          • memory/4404-30-0x0000000001030000-0x000000000103C000-memory.dmp

            Filesize

            48KB

          • memory/4404-6-0x00007FFC1AAA0000-0x00007FFC1B48C000-memory.dmp

            Filesize

            9.9MB

          • memory/4404-7-0x00007FFC1AAA3000-0x00007FFC1AAA4000-memory.dmp

            Filesize

            4KB

          • memory/4404-8-0x00007FFC1AAA0000-0x00007FFC1B48C000-memory.dmp

            Filesize

            9.9MB

          • memory/4404-1-0x0000000000970000-0x0000000000986000-memory.dmp

            Filesize

            88KB

          • memory/4404-0-0x00007FFC1AAA3000-0x00007FFC1AAA4000-memory.dmp

            Filesize

            4KB

          • memory/4592-11-0x00007FFC1AAA0000-0x00007FFC1B48C000-memory.dmp

            Filesize

            9.9MB

          • memory/4592-13-0x00007FFC1AAA0000-0x00007FFC1B48C000-memory.dmp

            Filesize

            9.9MB

          • memory/4612-47-0x0000025D64A20000-0x0000025D64A30000-memory.dmp

            Filesize

            64KB

          • memory/4612-66-0x0000025D63CB0000-0x0000025D63CB2000-memory.dmp

            Filesize

            8KB

          • memory/4612-442-0x0000025D6B130000-0x0000025D6B131000-memory.dmp

            Filesize

            4KB

          • memory/4612-441-0x0000025D6B120000-0x0000025D6B121000-memory.dmp

            Filesize

            4KB

          • memory/4612-31-0x0000025D64920000-0x0000025D64930000-memory.dmp

            Filesize

            64KB

          • memory/4612-545-0x0000025D6BB00000-0x0000025D6C9C2000-memory.dmp

            Filesize

            14.8MB

          • memory/4928-560-0x000002C8465D0000-0x000002C8466D0000-memory.dmp

            Filesize

            1024KB