Analysis

  • max time kernel
    382s
  • max time network
    342s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23-05-2024 14:38

General

  • Target

    lol.exe

  • Size

    9.2MB

  • MD5

    93296816398ac7ff5fc9d91f8d2765b2

  • SHA1

    f5817b3d34c22d0f847028797db143d75f592536

  • SHA256

    1d84ff128228995c275b3e6c05cd19e4e46fcb7574cbd7fb3934abb3df3d1129

  • SHA512

    fef4af08ce771ffad5eb500813052b93ff3c4c71711c03e9c9314fd16212b89fa14f77ca9f648c57617600c4fb932ebb7dd5bf97685e480106f79c98ac15885c

  • SSDEEP

    196608:tbVYKe7PFQhn5EQ9hNQAYzA5k6cTWDn7JKObS09BBI3:pzu25EWheYkv8LlB23

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Windows security bypass 2 TTPs 5 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Disables RegEdit via registry modification 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Manipulates Digital Signatures 1 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • .NET Reactor proctector 35 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 10 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 13 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 14 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 53 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 44 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lol.exe
    "C:\Users\Admin\AppData\Local\Temp\lol.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4768
    • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\loader.exe
      "C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\loader.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4948
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\temp.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /K main.cmd
          4⤵
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1920
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im WindowsDefender.exe
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2356
          • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\Rover.exe
            Rover.exe
            5⤵
            • Modifies WinLogon for persistence
            • UAC bypass
            • Drops file in Drivers directory
            • Manipulates Digital Signatures
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Writes to the Master Boot Record (MBR)
            • Drops file in System32 directory
            • Drops file in Program Files directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • System policy modification
            PID:2804
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\web.htm
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2300
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffffbc93cb8,0x7ffffbc93cc8,0x7ffffbc93cd8
              6⤵
                PID:484
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,2742325578556428053,8087412356854388037,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1848 /prefetch:2
                6⤵
                  PID:4580
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,2742325578556428053,8087412356854388037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:3
                  6⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4116
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,2742325578556428053,8087412356854388037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:8
                  6⤵
                    PID:1304
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,2742325578556428053,8087412356854388037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1
                    6⤵
                      PID:3208
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,2742325578556428053,8087412356854388037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1
                      6⤵
                        PID:2600
                      • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,2742325578556428053,8087412356854388037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:8
                        6⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3572
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\helper.vbs"
                      5⤵
                        PID:764
                      • C:\Program Files\Internet Explorer\iexplore.exe
                        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\spinner.gif
                        5⤵
                        • Modifies Internet Explorer settings
                        PID:4236
                      • C:\Windows\system32\timeout.exe
                        timeout /t 15
                        5⤵
                        • Delays execution with timeout.exe
                        PID:2496
                      • C:\Windows\system32\taskkill.exe
                        taskkill /f /im taskmgr
                        5⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3568
                      • C:\Windows\system32\taskkill.exe
                        taskkill /f /im explorer
                        5⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2060
                      • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\ac3.exe
                        ac3.exe
                        5⤵
                        • Executes dropped EXE
                        PID:2872
                      • C:\Windows\system32\taskkill.exe
                        taskkill /f /im fontdrvhost
                        5⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1452
                      • C:\Windows\system32\icacls.exe
                        icacls c:\Windows\explorer.exe /grant Admin:(F,M)
                        5⤵
                        • Modifies file permissions
                        PID:2344
                      • C:\Windows\system32\timeout.exe
                        timeout /t 15
                        5⤵
                        • Delays execution with timeout.exe
                        PID:3436
                      • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\jaffa.exe
                        jaffa.exe
                        5⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Drops file in Windows directory
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:1440
                        • C:\Windows\SysWOW64\tofwnzhfwt.exe
                          tofwnzhfwt.exe
                          6⤵
                          • Modifies visibility of file extensions in Explorer
                          • Modifies visiblity of hidden/system files in Explorer
                          • Windows security bypass
                          • Disables RegEdit via registry modification
                          • Executes dropped EXE
                          • Windows security modification
                          • Enumerates connected drives
                          • Modifies WinLogon
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:984
                          • C:\Windows\SysWOW64\jvwasywo.exe
                            C:\Windows\system32\jvwasywo.exe
                            7⤵
                            • Executes dropped EXE
                            • Enumerates connected drives
                            • Drops file in Program Files directory
                            • Drops file in Windows directory
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:4840
                        • C:\Windows\SysWOW64\cuvuuvfxipeuhdw.exe
                          cuvuuvfxipeuhdw.exe
                          6⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:4872
                        • C:\Windows\SysWOW64\jvwasywo.exe
                          jvwasywo.exe
                          6⤵
                          • Executes dropped EXE
                          • Enumerates connected drives
                          • Drops file in Windows directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:4600
                        • C:\Windows\SysWOW64\gcqokazkddhvo.exe
                          gcqokazkddhvo.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:2196
                        • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                          "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
                          6⤵
                          • Drops file in Windows directory
                          • Checks processor information in registry
                          • Enumerates system info in registry
                          • Suspicious behavior: AddClipboardFormatListener
                          • Suspicious use of SetWindowsHookEx
                          PID:2840
                      • C:\Windows\system32\timeout.exe
                        timeout /t 15
                        5⤵
                        • Delays execution with timeout.exe
                        PID:1576
                • C:\Users\Admin\AppData\Local\Temp\4bfa581b-5ecf-4069-ba2b-5413c8a864ae\packer.exe
                  "C:\Users\Admin\AppData\Local\Temp\4bfa581b-5ecf-4069-ba2b-5413c8a864ae\packer.exe" "C:\Users\Admin\AppData\Local\Temp\4bfa581b-5ecf-4069-ba2b-5413c8a864ae\unpacker.exe" "C:\Users\Admin\AppData\Local\Temp\lol.exe" "loader.exe" "C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1" "" True True False 1 -repack
                  2⤵
                  • Executes dropped EXE
                  PID:4116
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 1296
                    3⤵
                    • Program crash
                    PID:3752
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:3840
                • C:\Windows\System32\CompPkgSrv.exe
                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                  1⤵
                    PID:1448
                  • C:\Windows\system32\AUDIODG.EXE
                    C:\Windows\system32\AUDIODG.EXE 0x00000000000004FC 0x0000000000000500
                    1⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1676
                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                    1⤵
                    • Modifies registry class
                    • Suspicious use of SetWindowsHookEx
                    PID:1800
                  • C:\Windows\System32\rundll32.exe
                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                    1⤵
                      PID:4364
                    • C:\Windows\system32\NOTEPAD.EXE
                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Music\CompressSearch.txt
                      1⤵
                      • Opens file in notepad (likely ransom note)
                      PID:2340
                    • C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
                      "C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE"
                      1⤵
                      • Checks processor information in registry
                      • Enumerates system info in registry
                      • Suspicious behavior: AddClipboardFormatListener
                      • Suspicious use of SetWindowsHookEx
                      PID:4024
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4116 -ip 4116
                      1⤵
                        PID:3608
                      • C:\Windows\SysWOW64\werfault.exe
                        werfault.exe /h /shared Global\99ab45664fdf443f8dfb5e36e59cce94 /t 2392 /p 2804
                        1⤵
                          PID:2900
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Users\Admin\Desktop\ConvertOpen.m4a
                          1⤵
                          • Enumerates system info in registry
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:760
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xd0,0x10c,0x7ff80f5bab58,0x7ff80f5bab68,0x7ff80f5bab78
                            2⤵
                              PID:1164
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1576 --field-trial-handle=2024,i,7791285717938577614,7107665032064327439,131072 /prefetch:2
                              2⤵
                                PID:4916
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1780 --field-trial-handle=2024,i,7791285717938577614,7107665032064327439,131072 /prefetch:8
                                2⤵
                                  PID:4936
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2084 --field-trial-handle=2024,i,7791285717938577614,7107665032064327439,131072 /prefetch:8
                                  2⤵
                                    PID:1452
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2848 --field-trial-handle=2024,i,7791285717938577614,7107665032064327439,131072 /prefetch:1
                                    2⤵
                                      PID:3760
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2856 --field-trial-handle=2024,i,7791285717938577614,7107665032064327439,131072 /prefetch:1
                                      2⤵
                                        PID:864
                                    • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                      1⤵
                                        PID:248
                                      • C:\Windows\system32\control.exe
                                        "C:\Windows\system32\control.exe" /name Microsoft.AdministrativeTools
                                        1⤵
                                        • Modifies registry class
                                        PID:3772
                                      • C:\Windows\SysWOW64\DllHost.exe
                                        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                        1⤵
                                          PID:1828
                                        • C:\Windows\explorer.exe
                                          C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
                                          1⤵
                                          • Modifies Internet Explorer settings
                                          • Modifies registry class
                                          • Suspicious behavior: AddClipboardFormatListener
                                          • Suspicious behavior: GetForegroundWindowSpam
                                          PID:3100
                                          • C:\Windows\system32\mmc.exe
                                            "C:\Windows\system32\mmc.exe" "C:\Windows\system32\services.msc"
                                            2⤵
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1000
                                        • C:\Windows\system32\NOTEPAD.EXE
                                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\SearchConfirm.txt
                                          1⤵
                                          • Opens file in notepad (likely ransom note)
                                          PID:4908

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Program Files (x86)\rover\Come\Come.001.png
                                          Filesize

                                          2KB

                                          MD5

                                          8d0dfb878717f45062204acbf1a1f54c

                                          SHA1

                                          1175501fc0448ad267b31a10792b2469574e6c4a

                                          SHA256

                                          8cf6a20422a0f72bcb0556b3669207798d8f50ceec6b301b8f0f1278b8f481f9

                                          SHA512

                                          e4f661ba8948471ffc9e14c18c6779dba3bd9dcc527d646d503c7d4bdff448b506a7746154380870262902f878275a8925bf6aa12a0b8c6eb8517f3a72405558

                                        • C:\Program Files (x86)\rover\Come\Come.002.png
                                          Filesize

                                          2KB

                                          MD5

                                          da104c1bbf61b5a31d566011f85ab03e

                                          SHA1

                                          a05583d0f814685c4bb8bf16fd02449848efddc4

                                          SHA256

                                          6b47ad7fe648620ea15b9c07e62880af48a504b83e8031b2521c25e508aa0ef1

                                          SHA512

                                          a8e27abefb0f5bfffe15a19fd882b2e112687abe6ac4bbd5187036cb6058b0124d6ce76fc9227970c8fe2f5768aa0d1faa3319d33b1f42413e8bdfe2ce15296d

                                        • C:\Program Files (x86)\rover\Come\Come.004.png
                                          Filesize

                                          2KB

                                          MD5

                                          f57ff98d974bc6b6d0df56263af5ca0d

                                          SHA1

                                          2786eb87cbe958495a0113f16f8c699935c74ef9

                                          SHA256

                                          9508d82995364556a882c54306210e885868a8df2f2ad93485c14f88c9f9e1b7

                                          SHA512

                                          1d4ca268d1c98ac545008b079076609e18bfdf22cd31b7b75b9218d03c6edb37b245298ff717e48309ca862f973a4383b101e43732a162b4d7f78573612c64ea

                                        • C:\Program Files (x86)\rover\Come\Come.005.png
                                          Filesize

                                          2KB

                                          MD5

                                          7fb2e99c5a3f7a30ba91cb156ccc19b7

                                          SHA1

                                          4b70de8bb59dca60fc006d90ae6d8c839eff7e6e

                                          SHA256

                                          40436d5ab3589d33dae09b470ccacd369422d2569804cf1532e5946fc7e45535

                                          SHA512

                                          c0d83325928d629abba648360c8687091d18d52991297d69625ccd4617d4d5add4aa16c288cc408b26c79cd37decf5ee2198e8b87b67ef5b88802afae93fb51a

                                        • C:\Program Files (x86)\rover\Come\Come.006.png
                                          Filesize

                                          3KB

                                          MD5

                                          a49c8996d20dfb273d03d2d37babd574

                                          SHA1

                                          96a93fd5aa1d5438217f17bffbc26e668d28feaf

                                          SHA256

                                          f4c568336894b3140f0ca7005a5751ad5a860422290b2b6e23d72656160862b1

                                          SHA512

                                          9abb666891fa00ae77801fe9b3aab62bca37402197d22983e98d8442e6d890b1091a47dc1eca1ac68caa52a633bb60c8c3248de65056a6435f4affb98f401a30

                                        • C:\Program Files (x86)\rover\Come\Come.007.png
                                          Filesize

                                          3KB

                                          MD5

                                          e65884abe6126db5839d7677be462aba

                                          SHA1

                                          4f7057385928422dc8ec90c2fc3488201a0287a8

                                          SHA256

                                          8956643da83aa74bc89b4d71db7b470200863de230be647a6881d8f3f60df3ac

                                          SHA512

                                          7285b8acca0210a85dd4317a7beab161708544c4c25a742ce7284b545fa4953be89eb685e62f30fba56d6cb2fc806062ccdf4a0e62516eea047097c6856900c2

                                        • C:\Program Files (x86)\rover\Come\Come.008.png
                                          Filesize

                                          3KB

                                          MD5

                                          f355305ada3929ac1294e6c38048b133

                                          SHA1

                                          a488065c32b92d9899b3125fb504d8a00d054e0e

                                          SHA256

                                          37de9b0126ffa3967455083dd72ba70501b1e4c92ae25eb0667f840911585775

                                          SHA512

                                          6082003d98022597007623ff7cdece9d9a14ad19bf55ac35afb2277fe22378c865899a5b28b4b5828d0d48fb7859fea82886d98d8d3a3813413f1e864e3849b2

                                        • C:\Program Files (x86)\rover\Come\Come.009.png
                                          Filesize

                                          3KB

                                          MD5

                                          1d812d808b4fd7ca678ea93e2b059e17

                                          SHA1

                                          c02b194f69cead015d47c0bad243a4441ec6d2cd

                                          SHA256

                                          e4e2fe6652557dec0e703da7325808cab4722961398dc9bf9fdae36c1de8841d

                                          SHA512

                                          a8781c78d7d23f70f7450e749732d2909447cfa194d8e49a899c77f808e735878da8d838eecb4e8db7470d040800ae45f977d5f208bfad6c15d62d6456611e84

                                        • C:\Program Files (x86)\rover\Come\Come.010.png
                                          Filesize

                                          3KB

                                          MD5

                                          e0436699f1df69af9e24efb9092d60a9

                                          SHA1

                                          d2c6eed1355a8428c5447fa2ecdd6a3067d6743e

                                          SHA256

                                          eeae94fa4ddca88b0fefec2e449064ea1c6d4c8772762bb900dc7752b68706e4

                                          SHA512

                                          d6b4adf98c9deb784be1f775a138a7252b558b9d9443a8a3d1435043196738b1ea32439cd09c507d0e2a074a5ba2973e7ffce6c41b26e17460b7695428666cbf

                                        • C:\Program Files (x86)\rover\Come\Come.011.png
                                          Filesize

                                          3KB

                                          MD5

                                          f45528dfb8759e78c4e933367c2e4ea8

                                          SHA1

                                          836962ef96ed4597dbc6daa38042c2438305693a

                                          SHA256

                                          31d92998e8e9de48700039027a935b5de3242afd4938e6b10509dc87d84eb758

                                          SHA512

                                          16561ca527e2081519decbc0fb04b9955b398eb97db7a3d442500b6aefcb4e620bebd87d7c8ddad2cf940035710fc5a000b59d7ed5d0aa06f3af87e9eebcb523

                                        • C:\Program Files (x86)\rover\Come\Come.012.png
                                          Filesize

                                          3KB

                                          MD5

                                          195bb4fe6012b2d9e5f695269970fce5

                                          SHA1

                                          a62ef137a9bc770e22de60a8f68b6cc9f36e343b

                                          SHA256

                                          afa59cb80b91e29360a95746979be494bdee659d9b8bfad65782b474273d5e62

                                          SHA512

                                          8fbe3ca2950261d976b80efd6a8d36d4a47b445a3e4669e100ce8c5d2a1f692e7b40ab324494a6de7847861d99194e13344a84aa135e458924b95fadf3905fd4

                                        • C:\Program Files (x86)\rover\Come\Come.013.png
                                          Filesize

                                          3KB

                                          MD5

                                          3c0ef957c7c8d205fca5dae28b9c7b10

                                          SHA1

                                          4b5927bf1cf8887956152665143f4589d0875d58

                                          SHA256

                                          3e6a44a4e993d70a2f8409b4194fa15551d5f7a3651a5d1e74d3c6b640da08c7

                                          SHA512

                                          bf2a5dd182c7cce4f6d00a4a1738f3a777b61c612c2449716b0fa62c62570ca1c21ac0063c221923e5db3b4101a4e7e32e711c9bfa075a2949ea9fa2e51ca704

                                        • C:\Program Files (x86)\rover\Come\Come.014.png
                                          Filesize

                                          3KB

                                          MD5

                                          2445d5c72c6344c48065349fa4e1218c

                                          SHA1

                                          89df27d1b534eb47fae941773d8fce0e0ee1d036

                                          SHA256

                                          694d6774638b36148f7a1b14809a025a16895ad4ec8645a6db2fe9cd5f784dbb

                                          SHA512

                                          d8134a66845c71d633f56e5fd656d545f09dad82d18ec21a7415f825cb6c0634ed775008c6fdea83dfec95ce659144e6de806edac620f389fcc3064683c3a7b3

                                        • C:\Program Files (x86)\rover\Come\Come.015.png
                                          Filesize

                                          3KB

                                          MD5

                                          678d78316b7862a9102b9245b3f4a492

                                          SHA1

                                          b272d1d005e06192de047a652d16efa845c7668c

                                          SHA256

                                          26fab597e882c877562abea6b13557c60d3ed07fd359314cdc3a558f8224266b

                                          SHA512

                                          cb6154e67ea75612dddd426e448f78c87946b123ff7b81f3fc83444adac4692bb5f3a04038291d9df7e102a301e41541a10e709e8adfde376016d86de15087db

                                        • C:\Program Files (x86)\rover\Come\Come.016.png
                                          Filesize

                                          3KB

                                          MD5

                                          aa4c8764a4b2a5c051e0d7009c1e7de3

                                          SHA1

                                          5e67091400cba112ac13e3689e871e5ce7a134fe

                                          SHA256

                                          1da7b39ec5f3cad19dc66f46fee90c22a5a023a541eca76325074bee5c5a7260

                                          SHA512

                                          eea254f7327639999f68f4f67308f4251d900adb725f62c71c198d83b62aa3215f2ce23bd679fddde6ac0c40a5c7b6b04800bc069f2940e21e173b830d5762e2

                                        • C:\Program Files (x86)\rover\Come\Come.017.png
                                          Filesize

                                          4KB

                                          MD5

                                          7c216e06c4cb8d9e499b21b1a05c3e4a

                                          SHA1

                                          d42dde78eb9548de2171978c525194f4fa2c413c

                                          SHA256

                                          0083bb52df2830f2fc0e03ffa861728916e3f1a6db3560e66adbca9716318ee3

                                          SHA512

                                          6ffbcc1c6ad1a0c01a35fdbf14918dfc9e2026a3021e3b6d761d56f4006b4218ffc2278eb2f820ae54722cd0c35fde40ca715154f6e2ae6c24aef0724d0ed004

                                        • C:\Program Files (x86)\rover\Come\Come.018.png
                                          Filesize

                                          4KB

                                          MD5

                                          e17061f9a7cb1006a02537a04178464d

                                          SHA1

                                          810b350f495f82587134cdf16f2bd5caebc36cf5

                                          SHA256

                                          9049038f58e048cc509bcc51434119465c376700ec45bedfd1d8f45440bdc32a

                                          SHA512

                                          d5b899109a16195d3fdb8f23382b48bab70dfcd0c823a03a0cdc4e50501812fc644b938839c3346e8aabc2925ce3bdebffad07ef2f90d291663275ba3d225ab3

                                        • C:\Program Files (x86)\rover\Come\Come.019.png
                                          Filesize

                                          3KB

                                          MD5

                                          63dbf53411402e2a121c3822194a1347

                                          SHA1

                                          86a2e77e667267791054021c459c1607c9b8dbb6

                                          SHA256

                                          47b80b828244964005bd947b80958f3aa6372b843dc088e33fbbd35ab3f785c5

                                          SHA512

                                          4b4603d88bddcb86e4282dafd55d8f00b852464daab588a554db829af566d5aa6baa3d575c58b133276be22203c014de73c0c3e35bfbe53570c356ef47bb5a50

                                        • C:\Program Files (x86)\rover\Speak\Speak.001.png
                                          Filesize

                                          3KB

                                          MD5

                                          0197012f782ed1195790f9bf0884ca0d

                                          SHA1

                                          fc0115826fbaf8cefa478e506b46b7b66a804f13

                                          SHA256

                                          c999fa6fd26a4a2af2155bd05522b44b54d6df90d1a9703a288bdf18b623c2cc

                                          SHA512

                                          614bce1f761871ba1113de49217725b7b6661c703b03864cef736f44e2d1e0c5fbe133966d24afb15900f0e4da16b24000a2a638b6d7839848874f386b3b81c1

                                        • C:\Program Files (x86)\rover\Speak\Speak.002.png
                                          Filesize

                                          3KB

                                          MD5

                                          b45ff2750a41e0d8ca6a597fbcd41b57

                                          SHA1

                                          cf162e0371a1a394803a1f3145d5e9b7cddd5088

                                          SHA256

                                          727a2aac0697bcfecdc56dc4507516f9f64c5faa426f0ce69f7e607b74c4e1f4

                                          SHA512

                                          82a9a3fc7dfae0ed6bf665c4f369f053af372551c1871d6b3dc775f447ba727e921ab831f8acd712cc31b66156eac643859404f05386e2592a15954fb78d87a3

                                        • C:\Program Files (x86)\rover\Speak\Speak.003.png
                                          Filesize

                                          3KB

                                          MD5

                                          95113a3147eeeb845523bdb4f6b211b8

                                          SHA1

                                          f817f20af3b5168a61982554bf683f3be0648da1

                                          SHA256

                                          800f0c501905bc4257415ee8bed738f897273600c721e80a15bcfbb2e2b3b847

                                          SHA512

                                          4e55d9ced90f255b20890595f8e07ccaeedcbe08aed6303336eae7f66df1e50429259b62c556d5d8b179f7f9be22216c1592ba772e2cebd257b3401109f45cc4

                                        • C:\Program Files (x86)\rover\Speak\Speak.004.png
                                          Filesize

                                          3KB

                                          MD5

                                          8ce29c28d4d6bda14b90afb17a29a7f9

                                          SHA1

                                          94a28ce125f63fcd5c7598f7cb9e183732ebdc16

                                          SHA256

                                          eb9abbeddd27ce6fa82f1f7437309209450f9f8412eb395923a45d946d9c50b1

                                          SHA512

                                          037babd109af1a2c05d7db87536bec41e3075d1120a37384d66f9460d8790be5732f8bbe6a2a13db3d017806fed88945f2a98697b586284b62760252276a8077

                                        • C:\Program Files (x86)\rover\Speak\Speak.005.png
                                          Filesize

                                          3KB

                                          MD5

                                          83ddcf0464fd3f42c5093c58beb8f941

                                          SHA1

                                          e8516b6468a42a450235bcc7d895f80f4f1ca189

                                          SHA256

                                          ebb3efda95b2d2588983742f96f51bdbcb9d87a6949f2c37ea11f509d236a536

                                          SHA512

                                          51a6925bc9558f9ba232b85623d78f975d1c18c1990ce62153aa57a742e0897c72fc0665213024f8d5af96e56cc47eb384ee8d231910fdef876a0889b52a59d8

                                        • C:\Program Files (x86)\rover\Speak\Speak.006.png
                                          Filesize

                                          3KB

                                          MD5

                                          6f530b0a64361ef7e2ce6c28cb44b869

                                          SHA1

                                          ca087fc6ed5440180c7240c74988c99e4603ce35

                                          SHA256

                                          457626948266abd4f0dcda6a09c448bb20cce3596b52076b8d90e1c626037dc9

                                          SHA512

                                          dc3d809eab3bfa7c65c35a36d55097e09fbefa2f6de962ae02c58540f6c88b3ca9be3361f3ec37b8ce7927e020463055c455f2e93baa3a3c12096b55abcab6d3

                                        • C:\Program Files (x86)\rover\Speak\Speak.007.png
                                          Filesize

                                          4KB

                                          MD5

                                          aac6fc45cfb83a6279e7184bcd4105d6

                                          SHA1

                                          b51ab2470a1eedad86cc3d93152360d72cb87549

                                          SHA256

                                          a59bb83276f003dd149c2143a5a70f012212c709e72af283209adfb85a0835b1

                                          SHA512

                                          7020ba8d918398bc2d5e6ea4aaea007d576d4c3577adab80259336505b06e8163d0afde5a7b4d802ba2dab9ec9c757e88eb37780246c35d38e5fed8648bbf3a1

                                        • C:\Program Files (x86)\rover\Speak\Speak.008.png
                                          Filesize

                                          4KB

                                          MD5

                                          fa73c710edc1f91ecacba2d8016c780c

                                          SHA1

                                          19fafe993ee8db2e90e81dbb92e00eb395f232b9

                                          SHA256

                                          cca9c6b8e0df9e09523ab59021ffff62b29273cae487335c87b569e8483aaae2

                                          SHA512

                                          f73b2ee270348247db1d7fea937cd69125afa6aef926dc5c1cef14b955630711fe106d56270172448d739014ae4fd7d221007aaa422b3625aa524b812baa10a2

                                        • C:\Program Files (x86)\rover\Speak\Speak.009.png
                                          Filesize

                                          4KB

                                          MD5

                                          3faefb490e3745520c08e7aa5cc0a693

                                          SHA1

                                          357ffa8b2d4797d8d6cf67c0c84818ebc746ce0a

                                          SHA256

                                          6ba5254c0b10b6939d5cd80f3ab87757143896d20fd8e014c3fcca35657e076b

                                          SHA512

                                          714d9d32ab070a992d84dc597a086afb7fe040300c33c25f9acdd27f5f8894145a5f9f8654b522c04a9cb1babeb25000fac25b01b1c820d4cfe8d67e40cd72a7

                                        • C:\Program Files (x86)\rover\Speak\Speak.010.png
                                          Filesize

                                          3KB

                                          MD5

                                          1bed8b0629ce72b595017371336ac688

                                          SHA1

                                          9180c6c3d0bdd3470fa38854de8af238bcc31d42

                                          SHA256

                                          a8cc3da0e5b87f10e6acd766bbd096dbe40ca60507867ec8ea66c56436fa6cd7

                                          SHA512

                                          4483b0ac1e83ef94f982aa7cf92767a24165060e1d492a87290a2301bcd2654e1c2e5d5cd637151408cac576d74d529b7d05e7e12b27e02afd17e24029a92ceb

                                        • C:\Program Files (x86)\rover\Speak\Speak.011.png
                                          Filesize

                                          3KB

                                          MD5

                                          c9eccb5ce7e65fd1eff7aba4a6fd43e8

                                          SHA1

                                          cd71011e1172a157627e1595cc7ce4888370a765

                                          SHA256

                                          a4045f846f5b3bb0856dbfdca78b5871433beefccb1416a2824e8dccce9f5975

                                          SHA512

                                          3b07f14cbc06f2a4a75067e09c04c760af324ebe2de5c51c88648b184337aad48d319c2753bc9987ebb2094719d92a0f87d7c0fd84c4d893dd8351e7dc6de3f8

                                        • C:\Program Files (x86)\rover\Speak\Speak.012.png
                                          Filesize

                                          3KB

                                          MD5

                                          a3bcbf505d81879716178ea1afd3a241

                                          SHA1

                                          47125ba19ff6f074ec8af4b6a21d4ce5067a2909

                                          SHA256

                                          f8677c74b7aa84bb8cf9857d8714ed24cbc171874e507bc93674e4cd2bbcca22

                                          SHA512

                                          2280a522ad0dc4122b55f1ffba90c1a410b225e987512eddfd1aae70012cfef896fa0804048b3147a043a4569aaeea74f658f0f16c2f45c4297644de90710e29

                                        • C:\Program Files (x86)\rover\Speak\Speak.013.png
                                          Filesize

                                          4KB

                                          MD5

                                          02b9523345fc843b1ce756bcd0290aaf

                                          SHA1

                                          3c39dbe3409d4eed12bfaeea4785ebd2e2bce22b

                                          SHA256

                                          20e7c6c4dc2b2f751b2df24784ce1d37c193ff0e6dded55855630bb26df23130

                                          SHA512

                                          5691fc2ecd00660d36e53aa17fa6a72285ba97f9ce1d4bfa00ae6b9ab66c5e35c084a9236c02fd4fae51e7fa064e34bd259c3fbb581ed768f110cb122dc3becb

                                        • C:\Program Files (x86)\rover\Speak\Speak.014.png
                                          Filesize

                                          3KB

                                          MD5

                                          28a55f46abaaf5be52125dbd818a316e

                                          SHA1

                                          3991669f716d5b662c867f47d0e25e45df935801

                                          SHA256

                                          d143345b20fe079f75797ce712374c25ff02157de38a21bad164d8be1858347b

                                          SHA512

                                          0865d49fba58f2abac0edf3abf23d13d2f2cf645edc8198505f089a336e17256ca14fe73e3f561e125d166b091298517f5ff46b865fa001455ab7414a43dc3f1

                                        • C:\Program Files (x86)\rover\Speak\Speak.015.png
                                          Filesize

                                          4KB

                                          MD5

                                          cda2513580858b22a8b32fb074941bb6

                                          SHA1

                                          437e54479fa0dceabbaf53b13a82347da70024f0

                                          SHA256

                                          9ced59a0ae08603ab736e0d327e7be804baa78325525fb32d60702228d85b166

                                          SHA512

                                          f182ac7787ea39e67f55f512ff37ceaddf28e494875be6a17db07e8d1f6d4de12357462d22c589d76bca485d4ea0bfe6441b031cdce82fbd3495aaa5abd20561

                                        • C:\Program Files (x86)\rover\Tired\Tired.001.png
                                          Filesize

                                          4KB

                                          MD5

                                          136be0b759f73a00e2d324a3073f63b7

                                          SHA1

                                          b3f03f663c8757ba7152f95549495e4914dc75db

                                          SHA256

                                          c9b925e1f1409ddaa3aadf1ae7c2fb3310b69fb931190b7dc2f274f517fe38fc

                                          SHA512

                                          263911753deffbce295dda3f311225edeb375555b1db2771477167600573bea78719f6294960dc5c5d95885194412dd0f133bae75a30e16556377263165b3723

                                        • C:\Program Files (x86)\rover\Tired\Tired.002.png
                                          Filesize

                                          4KB

                                          MD5

                                          f8f8ea9dd52781d7fa6610484aff1950

                                          SHA1

                                          973f8c25b7b5e382820ce479668eac30ed2f5707

                                          SHA256

                                          209e9d1fb6a814edfa4f8128d4a2168b274ea0eeb965a57f3c8b9695417a1bf1

                                          SHA512

                                          4f4e379afff8850eec6e4f3d165eba60f6916569ee7561b8bbf5a6bfeda27dbbcc0687ce02bece412616204f89861d23a92055a226cea14a29c53c653919c094

                                        • C:\Program Files (x86)\rover\Tired\Tired.003.png
                                          Filesize

                                          4KB

                                          MD5

                                          fb73acc1924324ca53e815a46765be0b

                                          SHA1

                                          62c0a21b74e7b72a064e4faf1f8799ed37466a19

                                          SHA256

                                          5488954fe5b4d87dee40dd68cc1d940d2395a52dc52d1c77f40cd2342b97efd8

                                          SHA512

                                          ea3ba299ca07850af45a29e2f88aece9163c13f4921a1fc05d930c008bc017b698c9fb987120147465a53fe0c0848926f543081716d5f877efa5a34b10822895

                                        • C:\Program Files (x86)\rover\Tired\Tired.004.png
                                          Filesize

                                          4KB

                                          MD5

                                          6da7cf42c4bc126f50027c312ef9109a

                                          SHA1

                                          8b31ab8b7b01074257ec50eb4bc0b89259e63a31

                                          SHA256

                                          2ebdf7d755b442de775819b0bcfe7bdd06fda92f6ad36dcfdeaab107f58f23df

                                          SHA512

                                          5c9783a8c14c6654db2a9a7818d4376fc3b2aeab9820539d20353018d90f734652ebba8052184b62f0e17f8f094da28c2bdfc73a0c707036fb5f923ed25625d9

                                        • C:\Program Files (x86)\rover\Tired\Tired.005.png
                                          Filesize

                                          4KB

                                          MD5

                                          d9d3c74ac593d5598c3b3bceb2f25b1d

                                          SHA1

                                          df14dee30599d5d6d67a34d397b993494e66700e

                                          SHA256

                                          2cba290a8c42f664a0e1a8e571e27bc846024fa7da9f7adc773a471ef74046bc

                                          SHA512

                                          de70858da11efb89e7db55762827f8c1d4b55aff14faea8ffd8a5f15d32d6956f6ca4a3fdd9ffd75906a818af81ba9c7ef056df7c8cec4076308df94ff3207ac

                                        • C:\Program Files (x86)\rover\Tired\Tired.006.png
                                          Filesize

                                          4KB

                                          MD5

                                          3071c94f1209b190ec26913a36f30659

                                          SHA1

                                          d76fbfbc4ddd17383b6a716f24d137a8dc7ff610

                                          SHA256

                                          89868008f5e5c55e5dd5982c15f105d11b9d3603ab45395dde0ec1c5ce61e683

                                          SHA512

                                          bd21f269dd92ab826caa6085bf79f17b6c9b6c4b660d03913295611bae590f277a9a0a0e39fa281737fcd9cfbbb6a5c8f02287d316954badca394e730bad72f4

                                        • C:\Program Files (x86)\rover\_1Idle\_1Idle.003.png
                                          Filesize

                                          3KB

                                          MD5

                                          533bc8e9ad951ba6d05c35a829e89156

                                          SHA1

                                          2709a1e51dcfa820a064ee3f0f34dea9cbc4fdee

                                          SHA256

                                          0827a66c31995a144229ca6b9bee27de94fd5bba937d25efde961dfa544d5c91

                                          SHA512

                                          d1d31f38686caacbe9453cc92c0bb88c4b085903b7b8eb455241839bec6b5ec4de0a0747cdfbcccb7468bb3bc6ca654e34a748762bb1a71e8e4b90285d397201

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\MismatchPinRuleCerts\WINWORD.EXE_self.events.data.microsoft.com.p7b
                                          Filesize

                                          6KB

                                          MD5

                                          066d878703a4a382ebbfb611735c9718

                                          SHA1

                                          4bdd751d419bf6bab1bef82ca3fd38426a61388b

                                          SHA256

                                          39b3b7e241c1764d7522671ac0951f35717c3f9290fb917ddee19cb505fa6ff3

                                          SHA512

                                          4fe613d2f1451581d4155a0cde1881dfcaa6c9b1978f3b6cb5ba8924d2dae01aa498c49019227abf03b52a4fa7f83f30460999b566fa1fcc95366e0e7380c925

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1
                                          Filesize

                                          264KB

                                          MD5

                                          f50f89a0a91564d0b8a211f8921aa7de

                                          SHA1

                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                          SHA256

                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                          SHA512

                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports
                                          Filesize

                                          2B

                                          MD5

                                          d751713988987e9331980363e24189ce

                                          SHA1

                                          97d170e1550eee4afc0af065b78cda302a97674c

                                          SHA256

                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                          SHA512

                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                          Filesize

                                          6KB

                                          MD5

                                          523a0de12ad25e88a16744e66b831f6d

                                          SHA1

                                          2902348cc610f963834df2cbe39889a68f4985cb

                                          SHA256

                                          cc086f666a5663768ca1af94a2dc09609ef48216dd0aca755483dfd93ce3c1c6

                                          SHA512

                                          18713351697136a044a8574f619d304ea1730e8e811fb3fa3702b8788ef616e45763d10f4bb38ce564096682f0df623c815b1e42fd5b6751d38dcca0cdf8c934

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                          Filesize

                                          129KB

                                          MD5

                                          330964600e770ee356ccb6af2a2eec43

                                          SHA1

                                          cc762f29becc017e24a1e3cbc1038229efa56fca

                                          SHA256

                                          f3cbe8c85acbee3c538d0923ce8b2b55bbd5d291ceae285cfd3766c64addf6dc

                                          SHA512

                                          b7ac6e9af8c0747c0801f5d801b1be066190408573bbca9d6cef6569a10aab081d40a70065c592afd7e4b3fd9ce483fa274fe3dab9f7a53cb76506b3892af392

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                          Filesize

                                          152B

                                          MD5

                                          0d84d1490aa9f725b68407eab8f0030e

                                          SHA1

                                          83964574467b7422e160af34ef024d1821d6d1c3

                                          SHA256

                                          40c09bb0248add089873d1117aadefb46c1b4e23241ba4621f707312de9c829e

                                          SHA512

                                          f84552335ff96b5b4841ec26e222c24af79b6d0271d27ad05a9dfcee254a7b9e9019e7fac0def1245a74754fae81f7126499bf1001615073284052aaa949fa00

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                          Filesize

                                          152B

                                          MD5

                                          0c705388d79c00418e5c1751159353e3

                                          SHA1

                                          aaeafebce5483626ef82813d286511c1f353f861

                                          SHA256

                                          697bd270be634688c48210bee7c5111d7897fd71a6af0bbb2141cefd2f8e4a4d

                                          SHA512

                                          c1614e79650ab9822c4e175ba528ea4efadc7a6313204e4e69b4a9bd06327fb92f56fba95f2595885b1604ca8d8f6b282ab542988995c674d89901da2bc4186f

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                          Filesize

                                          5KB

                                          MD5

                                          99e8c21e44028ad50aded3e608655e40

                                          SHA1

                                          781f2b37bcd4aa493f3d0b290900f0a3446715d1

                                          SHA256

                                          f515502d5b0294994e8690baadd00defbd4bbf2982bc52852b04eca8f173159c

                                          SHA512

                                          d383e71f08133df2bc824978ec8b2749917245f0a843e2cd502ef954df196859da3d5565da95cba253d365583151c8789b24ea7ec59f36dfb52bfe9d7ab9fd09

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                          Filesize

                                          5KB

                                          MD5

                                          3b6d4525973f4e86943841d42fdfb9e8

                                          SHA1

                                          c90d6b222557c2ba96b3d31cf5712f311b3705e4

                                          SHA256

                                          655ea9c0e667634530a3d625d4ac1de0ab025cabfd776c99c8aff9f7fe5d23aa

                                          SHA512

                                          c8e714ff96db742013c5e333b5acb70121fe224b604740c45bc395e9fc4365e605d835dc6ce29e9f750e78823c73a7c92c7abf917ea8753604c5ba52ca07bfcb

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
                                          Filesize

                                          16B

                                          MD5

                                          46295cac801e5d4857d09837238a6394

                                          SHA1

                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                          SHA256

                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                          SHA512

                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
                                          Filesize

                                          16B

                                          MD5

                                          206702161f94c5cd39fadd03f4014d98

                                          SHA1

                                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                          SHA256

                                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                          SHA512

                                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                          Filesize

                                          11KB

                                          MD5

                                          fa6830e8c6a11725df3737365fb32a5b

                                          SHA1

                                          fb0241b326bd80561e6eaa1fa90dab7cb74c7877

                                          SHA256

                                          91613323c1c2e33459ef604c5e9dcbda2f33baa7a4a3cd2d2327b0a404a5f904

                                          SHA512

                                          fe905d5032e900a90c347006833ae66567f16dc0d08b64b41ff6f69c118c7f8e519c3f7506f731224323e4513c70100151baafd2da4dfe166c2721e2509f56f2

                                        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.CampaignStates.json
                                          Filesize

                                          21B

                                          MD5

                                          f1b59332b953b3c99b3c95a44249c0d2

                                          SHA1

                                          1b16a2ca32bf8481e18ff8b7365229b598908991

                                          SHA256

                                          138e49660d259061d8152137abd8829acdfb78b69179890beb489fe3ffe23e0c

                                          SHA512

                                          3c1f99ecc394df3741be875fbe8d95e249d1d9ac220805794a22caf81620d5fdd3cce19260d94c0829b3160b28a2b4042e46b56398e60f72134e49254e9679a4

                                        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.GovernedChannelStates.json
                                          Filesize

                                          417B

                                          MD5

                                          c56ff60fbd601e84edd5a0ff1010d584

                                          SHA1

                                          342abb130dabeacde1d8ced806d67a3aef00a749

                                          SHA256

                                          200e8cc8dd12e22c9720be73092eafb620435d4569dbdcdba9404ace2aa4343c

                                          SHA512

                                          acd2054fddb33b55b58b870edd4eb6a3cdd3131dfe6139cb3d27054ac2b2a460694c9be9c2a1da0f85606e95e7f393cf16868b6c654e78a664799bc3418da86e

                                        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.Settings.json
                                          Filesize

                                          87B

                                          MD5

                                          e4e83f8123e9740b8aa3c3dfa77c1c04

                                          SHA1

                                          5281eae96efde7b0e16a1d977f005f0d3bd7aad0

                                          SHA256

                                          6034f27b0823b2a6a76fe296e851939fd05324d0af9d55f249c79af118b0eb31

                                          SHA512

                                          bd6b33fd2bbce4a46991bc0d877695d16f7e60b1959a0defc79b627e569e5c6cac7b4ad4e3e1d8389a08584602a51cf84d44cf247f03beb95f7d307fbba12bb9

                                        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.SurveyHistoryStats.json
                                          Filesize

                                          14B

                                          MD5

                                          6ca4960355e4951c72aa5f6364e459d5

                                          SHA1

                                          2fd90b4ec32804dff7a41b6e63c8b0a40b592113

                                          SHA256

                                          88301f0b7e96132a2699a8bce47d120855c7f0a37054540019e3204d6bcbaba3

                                          SHA512

                                          8544cd778717788b7484faf2001f463320a357db63cb72715c1395ef19d32eec4278bab07f15de3f4fed6af7e4f96c41908a0c45be94d5cdd8121877eccf310d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Office\DLP\mip\logs\mip_sdk.miplog
                                          Filesize

                                          21KB

                                          MD5

                                          e87daa20d3a07ceae1f96787909ff62a

                                          SHA1

                                          9faf1ff26e42780aa6374de4eb094c09336ca332

                                          SHA256

                                          7860145fb41420bcdf1636e179eafdc1b5dfb79e90178c659c91b5f112c11cf5

                                          SHA512

                                          f26827fe43930f403c97dff232f22b931c4126bf4d470a9236ca738bfd6ee52a1fb396bc21667cb28e58606dd5954469918f33f6122aea72e90b310b876b34ae

                                        • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\winword.exe.db
                                          Filesize

                                          24KB

                                          MD5

                                          b00f3f56c104c94e03cd2ad8452c14e7

                                          SHA1

                                          51b78e45015e0d9d62fbdf31b75a22535a107204

                                          SHA256

                                          ba2b669020334ff01a85bfc900ea4371ea557bd315f154875d9bdfdc16ae8b50

                                          SHA512

                                          93e1609be5bbb414c285f37432ce93294c3d1583ef46c7c6c570c122f0b166c34b0ad87de708005c8af97dee27923ba53395a34c2563cdadf3c0a708848b3525

                                        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
                                          Filesize

                                          10KB

                                          MD5

                                          1e2585dbf210bfe1efc14fef4ea99422

                                          SHA1

                                          fe03245c6eb12a12d259b0d1475bf239fdff789f

                                          SHA256

                                          a270d059f750ec63acb7551420de98f050e47da02dc52cc95a7b2f03a49b2ab4

                                          SHA512

                                          9567e8445639a28e94b8d2cd36091cf26b0fecbf795da0690f5865eacc3c89ea827081dcf7aca5e7da54ebd7b46c770ff2b3dc132837bf517b156e75ae694fa0

                                        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
                                          Filesize

                                          10KB

                                          MD5

                                          58ba2db4ec4e52fc7b0beaaa34b331b5

                                          SHA1

                                          c26b82e4025f954a727830b35479af40436656a0

                                          SHA256

                                          937c02aad83f52a074d3bae9d40529d916ca2436615c91bc432b11cd2eb868b1

                                          SHA512

                                          37c754f60698d9f40f71165a661433fff39dee41e6a10ce18381bebc22fc60233dfab182ca88a425eeb64d2eab491f084ed11df0d2aedbb8e5a13ad3b00275fb

                                        • C:\Users\Admin\AppData\Local\Temp\4bfa581b-5ecf-4069-ba2b-5413c8a864ae\ProgressBarSplash.exe
                                          Filesize

                                          87KB

                                          MD5

                                          ed001288c24f331c9733acf3ca3520b0

                                          SHA1

                                          1e935afba79825470c54afaec238402d068ddefa

                                          SHA256

                                          6c20ba0c24e2cf169fd9b0623e4a1abe3718824ff48085250dae8c019cc6cb06

                                          SHA512

                                          e6ba29aa9a8c61e8fd2823cf96343fa7c3c41e8f698a6be428b13923ed3f103ea7a7d613b8808a6447f37e54516b49f61976391a551ec4fa184cc7abe38b2444

                                        • C:\Users\Admin\AppData\Local\Temp\4bfa581b-5ecf-4069-ba2b-5413c8a864ae\packer.exe
                                          Filesize

                                          50KB

                                          MD5

                                          dfda8e40e4c0b4830b211530d5c4fefd

                                          SHA1

                                          994aca829c6adbb4ca567e06119f0320c15d5dba

                                          SHA256

                                          131fc2c07992321f9ba4045aba20339e122bab73609d41dd7114f105f77f572e

                                          SHA512

                                          104e64d6dd2fd549c22cd36a4be83ccb2e0c85f5cc6d88ba2729b3c7e5d5f50cd244053c8cb3bdd5e294d1a4a1964825f3a7b7df83ee855615019dfc2b49f43f

                                        • C:\Users\Admin\AppData\Local\Temp\4bfa581b-5ecf-4069-ba2b-5413c8a864ae\unpacker.exe
                                          Filesize

                                          531KB

                                          MD5

                                          54c72f781ac4c2780371c5cc877754a7

                                          SHA1

                                          bb17dedf8eb82bd6a467e6d642aac20081e59779

                                          SHA256

                                          eb48c90f5cde797fbd475d80d3e08c857b3497a17996d9584b921faa54f6bb4b

                                          SHA512

                                          a9f014b54254aa666fa031e6475c1923f9410efc60f04fdd5297e82c9dc361201649d7c079d88be08234b261dda6beed70df22b57e255c420bdb2d8efb59d1db

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                          Filesize

                                          237B

                                          MD5

                                          700ecd5e5187552d2b0bee7d04afc616

                                          SHA1

                                          2716006a1366189eec96279b52ee628c1efc401c

                                          SHA256

                                          7e95c6814a28bdd71df28eee32b9eb74f2096d359556967666cd2c0ae1366f62

                                          SHA512

                                          2ef247a7ecfbff49478fdb6cac31a387b79c0342fa224c93d4f23c83614d3bf2e0586ddcca860a16803b1a3c5c4ca698e3ee3ad937bb269336d229b7da7a94f7

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_620FEC5E8F534AA987D7BFF18FD8A49C.dat
                                          Filesize

                                          940B

                                          MD5

                                          de0b16a18cc71e2ef8b3e89d43b4141a

                                          SHA1

                                          aef1e5501bda775ad4dbd5a43700e5fe38c76eea

                                          SHA256

                                          5d3e58fdfad7180c24cbb55cb1e1dfd25b309114a866477f1fc8c52237ab83ff

                                          SHA512

                                          6a61794e3543fb7d75c8a28063efd9c16ba7099dfe8b31ac7727fa75c8fb7800be171776c36bb3cb0ed346829bb5d97d481f5d685349efc4ec87d0934eeca21e

                                        • C:\Users\Admin\AppData\Roaming\RepairRead.doc.exe
                                          Filesize

                                          512KB

                                          MD5

                                          2a57ca4d150ea16bbac5f018999e7098

                                          SHA1

                                          4131f7df79c016abb7ff14d91b1356f7717a4f3f

                                          SHA256

                                          3a03b19c462c9b3cf83e89bf0ab0eb6087fbfa251dc0c554d539334ee5ae22fe

                                          SHA512

                                          fc81dd4f9b2ccb9351f330bb102c6ef2a25717d241e9275be015448434e82cfe94630484ca127928a9d00010275694c68fc48080f2941bae3321a923e1d21536

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\ACLib\playback.ico
                                          Filesize

                                          4KB

                                          MD5

                                          a20254ea7f9ef810c1681fa314edaa28

                                          SHA1

                                          fdd3040411043fa1d93efd4298db8668458b6fb8

                                          SHA256

                                          5375290e66a20bff81fb4d80346756f2d442184789681297cd1b84446a3fe80d

                                          SHA512

                                          4c52a7f77930e6f1bfaa1fee7e39133f74675a8666902c71be752758a29d8d167157e34f89f729ab29855990bc41757a11031adc7560c4d6b9cd77000bbcf87c

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\ACLib\record.ico
                                          Filesize

                                          4KB

                                          MD5

                                          1111e06679f96ff28c1e229b06ce7b41

                                          SHA1

                                          9fe5a6c6014b561060a640d0db02a303a35b8832

                                          SHA256

                                          59d5e9106e907fa61a560294a51c14abcde024fdd690e41a7f4d6c88db7287a6

                                          SHA512

                                          077aff77bbf827b9920cf53dff38427475e590c07ab8901fc34ce7b7fb9e9409207e53aff06fa7d1e3984bcf127507d0fc19284d8e7203c76d67c9b98c1c8f37

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\ACLib\stop.ico
                                          Filesize

                                          4KB

                                          MD5

                                          7824cefad2522be614ae5b7bdbf88339

                                          SHA1

                                          a0de5c71ac3cd42ca19ee2e4658d95b3f9082c60

                                          SHA256

                                          9e869f60ea0a0de06c7d562ff56d1ac53c534849c919e4b12344e73513649483

                                          SHA512

                                          6d377731bbda34f1875cd14e8ee896c9b8cb0aeb4133a5bc5ff460138b8b3a1b6647d3869b14a9f6949601fa37694bc38c764bf660fd877033296d9ccb0b6342

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\MEMZ.exe
                                          Filesize

                                          16KB

                                          MD5

                                          1d5ad9c8d3fee874d0feb8bfac220a11

                                          SHA1

                                          ca6d3f7e6c784155f664a9179ca64e4034df9595

                                          SHA256

                                          3872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff

                                          SHA512

                                          c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\Rover.exe
                                          Filesize

                                          5.1MB

                                          MD5

                                          63d052b547c66ac7678685d9f3308884

                                          SHA1

                                          a6e42e6a86e3ff9fec137c52b1086ee140a7b242

                                          SHA256

                                          8634e9241729f16a8c2c23d5c184384815b97026e3d1a2d6dd0ddc825b142aba

                                          SHA512

                                          565b9243ec14dc1cf6f6ddf4a7158e208937f553367e55cd59f62f1834fcfb7d9fb387b0636dc07520f590dcd55eb5f60f34ea2279dc736f134db7b19e3aa642

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\SolaraBootstraper.exe
                                          Filesize

                                          290KB

                                          MD5

                                          288a089f6b8fe4c0983259c6daf093eb

                                          SHA1

                                          8eafbc8e6264167bc73c159bea34b1cfdb30d34f

                                          SHA256

                                          3536c40290b9e7e9c3c47a96ab10fe3b737f334dd6779eaf70e35e91e10a677b

                                          SHA512

                                          c04bf3530cd471d589efb8f7e6bdddb39422fc4284afc7f2d3645a646ebbee170d57dc57eff30cee05ef091c64c6a98586c5a887d25fe53e49531c137d285448

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\ac3.exe
                                          Filesize

                                          844KB

                                          MD5

                                          7ecfc8cd7455dd9998f7dad88f2a8a9d

                                          SHA1

                                          1751d9389adb1e7187afa4938a3559e58739dce6

                                          SHA256

                                          2e67d5e7d96aec62a9dda4c0259167a44908af863c2b3af2a019723205abba9e

                                          SHA512

                                          cb05e82b17c0f7444d1259b661f0c1e6603d8a959da7475f35078a851d528c630366916c17a37db1a2490af66e5346309177c9e31921d09e7e795492868e678d

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\helper.vbs
                                          Filesize

                                          26B

                                          MD5

                                          7a97744bc621cf22890e2aebd10fd5c8

                                          SHA1

                                          1147c8df448fe73da6aa6c396c5c53457df87620

                                          SHA256

                                          153fed1733e81de7f9d221a1584a78999baa93bc8697500d8923550c774ed709

                                          SHA512

                                          89c73b73d4b52cf8e940fa2f1580fdc89f902b1eeb4b2abc17f09229a6130532a08cdb91205b9813a65cb7cd31ca020fe728b03d9a0fabb71131864c2966f967

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\jaffa.exe
                                          Filesize

                                          512KB

                                          MD5

                                          6b1b6c081780047b333e1e9fb8e473b6

                                          SHA1

                                          8c31629bd4a4ee29b7ec1e1487fed087f5e4b1de

                                          SHA256

                                          e649b6e4284404bfa04639b8bf06367777c48201ef27dcdc256fe59167935fac

                                          SHA512

                                          022d40c1801fa495c9298d896221c8eefbad342d41922df8d014f2f49c3fe7fa91d603e0ee0de6be6f2143f9e0c4a6756b19260166ebd62ec3e1c64ad22bc447

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\jkka.exe
                                          Filesize

                                          1002KB

                                          MD5

                                          42e4b26357361615b96afde69a5f0cc3

                                          SHA1

                                          35346fe0787f14236296b469bf2fed5c24a1a53d

                                          SHA256

                                          e58a07965ef711fc60ab82ac805cfc3926e105460356dbbea532ba3d9f2080eb

                                          SHA512

                                          fb8a2f4a9f280c0e3c0bb979016c11ea217bae9cebd06f7f2b5ef7b8973b98128ebc2e5cf76b824d71b889fca4510111a79b177dab592f332131f0d6789673a5

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\loader.bat
                                          Filesize

                                          51B

                                          MD5

                                          e67249c010d7541925320d0e6b94a435

                                          SHA1

                                          66aa61cc4f66d5315e7c988988b319e0ab5f01f2

                                          SHA256

                                          4fc3cb68df5fc781354dcc462bf953b746584b304a84e2d21b340f62e4e330fc

                                          SHA512

                                          681698eb0aab92c2209cc06c7d32a34cbc209cc4e63d653c797d06ebf4d9342e4f882b3ab74c294eb345f62af454f5f3a721fe3dbc094ddbe9694e40c953df96

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\loader.exe
                                          Filesize

                                          5KB

                                          MD5

                                          3a66b8c04d1437b4c4da631053a76bb5

                                          SHA1

                                          bcf8f381932d376f3f8e53c82b2b13ff31ee097b

                                          SHA256

                                          c3aa0c8ff9e3c7e10bcd3829f3e63b4cf9c59eb4964a7576f3ef5fca50c77cdc

                                          SHA512

                                          b24f3fb34aa293293d4f7bef247ca746608cb9ae54d214492276e7ef0fe0032944ea082f2bbf42f200359d38ed2af69f51ef5f3cb969a0ffb7176b27e0279fcf

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\main.cmd
                                          Filesize

                                          822B

                                          MD5

                                          cd647e1e06aed63d20e9e5dd57d427c0

                                          SHA1

                                          2fbdcd4d926ebc02c9c213b5d88d488e239343b2

                                          SHA256

                                          8c18ac36f2c69f69ab961257a33b9f36c768c97e80abd7a0972c2fefcfbc6a07

                                          SHA512

                                          ed666bb9ea175ba853648684b81aab7b2e26c85d7a88d50d39426ba3f95f54cd83f117ebfc807b9683c3186276442a20bc8fab3572dfc2c83a9fa293095e6ad7

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\selfaware.exe
                                          Filesize

                                          797KB

                                          MD5

                                          5cb9ba5071d1e96c85c7f79254e54908

                                          SHA1

                                          3470b95d97fb7f1720be55e033d479d6623aede2

                                          SHA256

                                          53b21dcfad586cdcb2bb08d0cfe62f0302662ebe48d3663d591800cf3e8469a5

                                          SHA512

                                          70d4f6c62492209d497848cf0e0204b463406c5d4edf7d5842a8aa2e7d4edb2090f2d27862841a217786e6813198d35ea29b055e0118b73af516edf0c79dcfad

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\spinner.gif
                                          Filesize

                                          44KB

                                          MD5

                                          324f8384507560259aaa182eb0c7f94a

                                          SHA1

                                          3b86304767e541ddb32fdda2e9996d8dbeca16ed

                                          SHA256

                                          f48c4f9c5fc87e8d7679948439544a97f1539b423860e7c7470bd9b563aceab5

                                          SHA512

                                          cc1b61df496cfb7c51d268139c6853d05bace6f733bc13c757c87cd64a11933c3a673b97fba778e515a9ff5f8c4ea52e7091f3beda1d8452bc3f6b59382f300d

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\temp.bat
                                          Filesize

                                          16B

                                          MD5

                                          683678b879bd775b775240fcb1cd495e

                                          SHA1

                                          10bc596b3d03e1ba328068305c8acee2745c731c

                                          SHA256

                                          64f28aef02c7fafbc9d80735a8b1d607c3996a2ddf9ba260d4c433c002efeaba

                                          SHA512

                                          3b2b9d231643a826183732a79489c6d2f4749ce25314c444364062c781627af59b572c082d811ae57a839cae94de77cf03eb81d99e1063e2191e884ccbaa0963

                                        • C:\Users\Admin\Desktop\lol_be852fa0-5a2e-4d2a-af6a-3c1f430d53d1\web.htm
                                          Filesize

                                          176B

                                          MD5

                                          1fab717c517da1c27e82a93edddf9390

                                          SHA1

                                          24b6cfda27c15c1d01ba5718106c18687ed77397

                                          SHA256

                                          bd035700f060a35c394600cabf0cf04c031927786c97cf41c55d78dddeffa11c

                                          SHA512

                                          5452938fa310396ecacae8eab64bdae624f617e19c0d742e10e088befb686c205b8db9ccec7d9de1c9360f341db8a701d5b8c6c4eb20aaa1c2deb831ab09fab5

                                        • C:\Users\Admin\Documents\CompleteCompress.doc.exe
                                          Filesize

                                          512KB

                                          MD5

                                          9842ab1605e14d9fb20c1d7d0ccc02c5

                                          SHA1

                                          d1d28f615e9aad5518187d90364948ff4861e9e0

                                          SHA256

                                          b0190ddb8687b6a2a9c53885b459a18ce65ebe61cffc7a0613b2968ebff26b8a

                                          SHA512

                                          29a93a901f0b1fbd0c99f384f2ca2014f8ecc05de5e3409526bfc4110fe5990e6f414b058474d2d1a704d2918c9d6e8aa6cd780aba0d5ae0f988e50a302852c0

                                        • C:\Users\Admin\Documents\EditWatch.doc.exe
                                          Filesize

                                          512KB

                                          MD5

                                          f4af7db834cdf2eeae98dbce48757be5

                                          SHA1

                                          f06e0cabc756dbd49be1cc49e4ae6b19bb76b352

                                          SHA256

                                          897d260bf0c857f4d490b94b4abd35ecf1073efae9f3c6c9c948a45bba069a3b

                                          SHA512

                                          ab139525e3654c81a96e9afd7edc99733c9acc6bcafa2b6ebd70c2ba9246fa4f928a47faac3b606930a893bd1c0a92dc6b65f2d3ac14fd3ba61245e4ac209968

                                        • C:\Users\Admin\Downloads\UndoResize.doc.exe
                                          Filesize

                                          512KB

                                          MD5

                                          2b4f51a8cd8f0b84e5fb887f097adb09

                                          SHA1

                                          6d2fd11c00571190a1ccdc5aae33a25b7eacf9ed

                                          SHA256

                                          3da836e207ea31492b13635cf45275fdb74fd1c47afb7b8cf53d0b7a312a0f05

                                          SHA512

                                          b97faa702c31b596de50cd6dc19d50d3f2095a9b6bb7673fb084702adb4e5ddbf677a645c505a54f275d4839019414011911b1ad21731d83daecfb87d475685b

                                        • C:\Windows\SysWOW64\Dism\AssocProvider.dll
                                          Filesize

                                          491B

                                          MD5

                                          d881aebe972b6e1d1dae0987ab702d75

                                          SHA1

                                          0c3bfcb61aa8619e8a77c6b98c4b249cb9a675ee

                                          SHA256

                                          89caa977988def71d74f5c7559b957d1e1599455c115571e5d66a76cc932e81b

                                          SHA512

                                          fe6eab9319a5913847f6e1166a34e17350d6a5a8fda5e868fae00d3cd058d9e80c4aafbee836a53f028930991a6f88b93817cd384250ad6e9e21a0bd63545632

                                        • C:\Windows\SysWOW64\Dism\DmiProvider.dll
                                          Filesize

                                          189B

                                          MD5

                                          3c13b512655fcb1e53d189c9857baeed

                                          SHA1

                                          8ed8b949c6cfa495db6716d98f9a8f8d305b3b9d

                                          SHA256

                                          7eba58885437ff09f16d31a9d7e3054a5abf7d0b498a60b2a819136900c4b4a8

                                          SHA512

                                          8ac538dc889b2282931a519fd70cf2b5448a8a5e478fef60acc8e306ecc312bb7f27b956032722ef0188e9614649ec52f80b707f468f80388a2eaacbf1c84213

                                        • C:\Windows\SysWOW64\F12\F12App.dll
                                          Filesize

                                          632B

                                          MD5

                                          09bed36fadbc81485cbc7457962cecd9

                                          SHA1

                                          537fa9271f4ffdf411d928adf92deda344d9a26a

                                          SHA256

                                          1cf6231b332b3aca62280ae3965931da2cd3ca96bf0477329fbd5cbe592a7a8c

                                          SHA512

                                          bb505afc22e60fea1aa0ec7202bf9e76de96ce93ede9fff458943726e3efae732f8eee4a90d7152334f3e422dbaec3c045632d28feec186ca9a9abc6f73e4074

                                        • C:\Windows\SysWOW64\IME\IMEKR\imkrudt.dll
                                          Filesize

                                          363B

                                          MD5

                                          275a2ec74a3dce63ea8add7b243a132b

                                          SHA1

                                          0aecb5d76a8d9563f7b0973f769f59500d83dcef

                                          SHA256

                                          7aa98e17ae920baedebd3486abe7921b503f243390e66b6f8fe6ff1824081c28

                                          SHA512

                                          3483a8afff91d01b50b50e9ee9a2de6c4cb1547fe62c5893c6c2e69b0f29b57c7738b49debe79cc031d8e48be32d83dca4b799d6a0cff13fc6b72947983a7541

                                        • C:\Windows\SysWOW64\IME\SHARED\imecfmui.exe
                                          Filesize

                                          677B

                                          MD5

                                          6dfafbda5acfa1fb9aa9650a415b2fe5

                                          SHA1

                                          b0a48ca68809aeca07bb098cba5a67980523e689

                                          SHA256

                                          ce64d6ed679ab46807ecfcf3ac698111645e62c8eeea0265b2a4796e64e9e46c

                                          SHA512

                                          ff962be7369c0e548f10f6fca6016f6c3830e0216ab2b25270612480dfe536e107f18d1fd1244205fdfc13270de74d9a1700bcc4cb77aba5274acebd0520dc1e

                                        • C:\Windows\SysWOW64\InstallShield\_setup.dll
                                          Filesize

                                          625B

                                          MD5

                                          984c9be6e7ac09cee88ec8c3254f4093

                                          SHA1

                                          2eabb44d1ce3031debcf04aad8d5a5284f20f922

                                          SHA256

                                          071dc841524acdba623ee6ce1fcf73af9d306e57efe4631b98ef8ae1e7f78560

                                          SHA512

                                          960765c19123f7e9c2ed2ade05bac491ae5e06e453a454085c6bc4e4bd6a89477f8a91de5e00e4cadbaa6b510d7807b13ff5c7f22d4e3b7c17b109161e354b55

                                        • C:\Windows\SysWOW64\InstallShield\setupdir\001a\_setup.dll
                                          Filesize

                                          300B

                                          MD5

                                          29ebf57a44ea9949e30b30382f563c40

                                          SHA1

                                          8ce4aea7ed7830a1d8a0ccd4cbb5221197e3954e

                                          SHA256

                                          804b328f00c58ee13df948acaad924c94d4fd234d9f0e831953e5d9726a2fd4b

                                          SHA512

                                          660755570e27e399bf111b13c9e039ae2455a7de066725df4bdbc810c58921520561c6505c38406031af1f8402280f42c5736b5f5baa2a6cbaa155817fbd648b

                                        • C:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe
                                          Filesize

                                          353B

                                          MD5

                                          166600bedbe053aa301b5a52d6b8e7e7

                                          SHA1

                                          d86a645120863c653d5747d1dec8ebb76a0bc4f4

                                          SHA256

                                          57a24f3ad513553de8a9460eb1bf38a6b27f314ee125ead1df7218bc85bc54af

                                          SHA512

                                          659eec87b18f8f15d94f74988e371d40d1ff067f2faf0aa01a31c169eb249319f124b7dbdaf435d9ff32c0721fa16b43a46b11e7cfbaedb883ede4f25941710f

                                        • C:\Windows\SysWOW64\Speech\Engines\TTS\MSTTSLoc.dll
                                          Filesize

                                          167B

                                          MD5

                                          4e5338c42de2c0c0ad05138b03112589

                                          SHA1

                                          f41e2c9f5395c00c3a9081a0580fce48c8b84513

                                          SHA256

                                          8bc194cd5b12c16d82effe7bec4c0ee8df175d4f3c4f37ce7cf526853bcc2894

                                          SHA512

                                          885e1ac5f9d8aaa9acf4ef166c76360d7af672817d175173ffc97a249d87202396aab379d1eed6d301a480158d7f9a6e500ea59b5d7e1ded99d11e8737fb957f

                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll
                                          Filesize

                                          343B

                                          MD5

                                          56e1ac0e74dd98ce39d462522fe1ee98

                                          SHA1

                                          978140623cf42d9564b89bb5aec846115fe46d4b

                                          SHA256

                                          2a3571aa33a20137e81f9b0eaf1fcbc94fdcf43df279afef5158280589f1632c

                                          SHA512

                                          4cfbfd9b8622e864618638a9d4d63fd4e57fb0ce132ff7889985d84a32350c5344155c0cd1c165a4b1761780c2cfcaf91fc54018889798c56d03f034a7b4a731

                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Provisioning\provpackageapi.dll
                                          Filesize

                                          706B

                                          MD5

                                          03ac50cf34901d3cb08b4a46214e026b

                                          SHA1

                                          dcf9c1c455fbc95c4e7f5459febeb14cce22230a

                                          SHA256

                                          d88c3c7658a7b178c06d8be6b41610ea5e9dd06f512b8f27101fb181016f0c02

                                          SHA512

                                          93673c6ed4a170f9a202133aeb03e0f2ecafbf472e58fdfea44165b909f382dc1f676acb7256269e3d57ac41bb6cfd99e30b105710a91fb157b439b26082525d

                                        • C:\Windows\SysWOW64\cuvuuvfxipeuhdw.exe
                                          Filesize

                                          512KB

                                          MD5

                                          0f38e44fa612b9973b44e42dd9208d09

                                          SHA1

                                          f747578c91bc9673c9fe83328417869c59ddd0cd

                                          SHA256

                                          d1c92201a5287f3b70668edaf8815cd5925cc2a85a342c3f903f65229dbe16cf

                                          SHA512

                                          c94b869bfa3be944d1a80eed1a519058dcf04c1cb7f13af9360a6d6738eac916e3e284506e35bf2f930ffe3c42920ddec2015c73c16fe641134c0b2b68388aa8

                                        • C:\Windows\SysWOW64\downlevel\API-MS-Win-Eventing-Controller-L1-1-0.dll
                                          Filesize

                                          700B

                                          MD5

                                          7c1e649c7f2589ae8a220838dfcd35fe

                                          SHA1

                                          1b658abef08c557d61b0ddb5a803dd3b9e7d5ee2

                                          SHA256

                                          17ce304523d9ca54d697cc239615b95e2854af1d30abeb63f865ea14e14e41e6

                                          SHA512

                                          b7f970df2c0e9802f373c9422e299829fd8cf55e4daf5fc0ce36fa31f7871edec834dfb761188cd16a00dabeb04e22c3d19cc18bf341750d957e2fd63ca51535

                                        • C:\Windows\SysWOW64\downlevel\API-MS-Win-core-localization-obsolete-l1-2-0.dll
                                          Filesize

                                          587B

                                          MD5

                                          c79f8fdb7e532bbe8503b2bef0e0e0c7

                                          SHA1

                                          399987901c436d2338af349431fa738d5867200a

                                          SHA256

                                          a6589cba9d2a4bcbeae0e3ee01ab57f4abb58aeefce9a45c10c064eefe036c0e

                                          SHA512

                                          ab4fbb3a0c4ffd4398b32ca99dc515a8694eb8fc076f5d6d9454e0838136bbf9892f6b8ccc5cfde5df0ee87cf11a30ba96455e0c65246a3853ac7e9350bc8f65

                                        • C:\Windows\SysWOW64\downlevel\api-ms-win-core-file-l1-2-0.dll
                                          Filesize

                                          435B

                                          MD5

                                          848fec0d54721b874b956d9d6afee5c1

                                          SHA1

                                          43797d0ec4597bda8964b12c83b9003e547fb185

                                          SHA256

                                          20b81eabb92b722e7897b196af1dca7b7bd5f282c443d1be18a0ecff04a8fae6

                                          SHA512

                                          d8e17d832654dcb8cbae885884e32fbb7ffcd0ca108617781a3a76e138f39f715b5273d5a371f971d1715bdefc37d536db6fc3bb21631db9ed6640654e0276f5

                                        • C:\Windows\SysWOW64\downlevel\api-ms-win-core-realtime-l1-1-0.dll
                                          Filesize

                                          890B

                                          MD5

                                          718d85d6fc048fe2ada0d1f266490850

                                          SHA1

                                          7c6f1ae52540aac31808273d01569e628c0b3604

                                          SHA256

                                          5938ff46a1db7fd10e573418839aca88af25723e929161c5b6809e46c0f76ac2

                                          SHA512

                                          465147d4cdf6d2914b27b8576ead3778e83080d2c7df50bdceb0782da6284209ea671901ef333b11f87cb19dc3cb2918ae866a804746e84c643f61d147a95148

                                        • C:\Windows\SysWOW64\downlevel\api-ms-win-core-stringloader-l1-1-1.dll
                                          Filesize

                                          265B

                                          MD5

                                          5c15cb7c09f5bb568bc84757f11d39ea

                                          SHA1

                                          af550c5c9e99681417acc6b27ed2c40c417f0b9f

                                          SHA256

                                          8597f762b821953b7610652c5b99652ee456aff381512be73f419228044641f0

                                          SHA512

                                          109860f145eb9a7e58b6b24d6ef72e4dedf395ca30ef3e92baa9c8bb14960d08480e4c180b266782eaf1077b758959c09c7c8201c9e6a836ed01b6a2ee5f540c

                                        • C:\Windows\SysWOW64\downlevel\api-ms-win-crt-environment-l1-1-0.dll
                                          Filesize

                                          666B

                                          MD5

                                          e508a0cc1d9bbbd36e19efdb531c5a65

                                          SHA1

                                          3999cdce2174b86ef9456110eb26e632b18eee55

                                          SHA256

                                          a1661fbac92e33745cf8511d380d6a637d282b2a409709748226cb55699090a5

                                          SHA512

                                          b0fae8d2022c456d11a12aebc637a9a65b684642700ddbd347b2a54fceeb8fde8eb83d57a399e68be92ef42c2f88f7975a745b8589f0f56029c4fad2ce604951

                                        • C:\Windows\SysWOW64\downlevel\api-ms-win-crt-stdio-l1-1-0.dll
                                          Filesize

                                          1KB

                                          MD5

                                          a445446804e319b5c298022f93c3ee7f

                                          SHA1

                                          526c76618ff40c30be3d740867d5781b0db40d06

                                          SHA256

                                          0647b99373fdb1e66075e52bd19154ac2af7a61c2c94bf2cc391f28446a82c8b

                                          SHA512

                                          621a7785fc9564ae7bdd421f4dff659655d9deb982bb3f96dbc4f66fea59eee7535afbf11a5da581bdab02ec3cf3b7c1d6dd65988aacfabcbc05539248f26c50

                                        • C:\Windows\SysWOW64\downlevel\api-ms-win-service-management-l2-1-0.dll
                                          Filesize

                                          265B

                                          MD5

                                          87edb1688a6525e769e9732112b8b033

                                          SHA1

                                          ce694074cce26f758f2aaa87a650f2712ddd3c4d

                                          SHA256

                                          b74db10e5f92abd18029c1f789c137dac8306e2179e3b2d5b309ee55b6455017

                                          SHA512

                                          378c7df024d7c0f73714fedc82e0f290d6319e82f6b7e24f078ef09881c50723ad146540b71da4845cc6daeaaad3bfcc8439a168daaab96f78236db7c32dc429

                                        • C:\Windows\SysWOW64\gcqokazkddhvo.exe
                                          Filesize

                                          512KB

                                          MD5

                                          4fec192b83d5aa988ecac6ed4cda98df

                                          SHA1

                                          0e2fb0386856fd9be7869122619f4bbd1ee22f22

                                          SHA256

                                          c67f9d3a6d44dc8974004545fd2e475b4d3d2f67299fd2bcc60096bc75c64ff3

                                          SHA512

                                          06e1862ea765ed6cdfdb1912f12d328b359735e518af8306f638555e8d314bee1f5c849d457246da80c47c2066967d971cdb50a2821946672513edf0ea308427

                                        • C:\Windows\SysWOW64\jvwasywo.exe
                                          Filesize

                                          512KB

                                          MD5

                                          dfd1c3c40a188ce2e128e518e4b72e31

                                          SHA1

                                          ed44bbe46bf3b9680db524c266c9eabbb3d2c94b

                                          SHA256

                                          bb8c8e3647303fc5bd4187c9e7125cfa2479ffd4f039ed5b9e810e4fbbdad3fe

                                          SHA512

                                          208ebead1815453ea3f83579c19585f287b5732f21c59c0c3daa63f7cc3e94e81647c1bfe3770eaad2a3d08e6aeec8dc9b16b00f047461222c506324f241baa3

                                        • C:\Windows\SysWOW64\migration\MapsMigPlugin.dll
                                          Filesize

                                          434B

                                          MD5

                                          f904fcaa6c010b1fb22df635879a1382

                                          SHA1

                                          9f046b90018958e158cac07232db33773ee2fd7c

                                          SHA256

                                          66a0ac31f801c333a46415080d96de02fa404d366f45fcb0a3cbf3849bef2a29

                                          SHA512

                                          6c472b1bb1ceb27f586db2d40787b298bd75bf0e5a951fede5db573037dd7b7d7b499d785aad524ba290bd8440c0b171328d5673ef54e774da3d34375b5c4efc

                                        • C:\Windows\SysWOW64\migwiz\unbcl.dll
                                          Filesize

                                          697B

                                          MD5

                                          c0f4496c68458bf353a59fa94a513f00

                                          SHA1

                                          8a222c94b7821b74159ba26ecb3f442e4150e8b2

                                          SHA256

                                          24359275161efb50d22175c792f180f4b3d98de9cafbfd126ef161e950750fd4

                                          SHA512

                                          f582c275d596291190469ef3a3c0840e8583f8979b17254d4748d4fdb0f67180df7fc5fcd816e0f6b8ebcd2687bf2722e814c3512e7d62d60f1d524e1395f673

                                        • C:\Windows\SysWOW64\tofwnzhfwt.exe
                                          Filesize

                                          512KB

                                          MD5

                                          b1704df94858924e70c095183eff9a93

                                          SHA1

                                          6be90e098293f9b750918365018563b392e982f0

                                          SHA256

                                          eb890a01a1d1a6f4eec4cc057973493cb6e51eba18a383d49c37e0206365db9f

                                          SHA512

                                          f64f8c9ad4125ac44fa10ef8aa46f1220758d028dd141df39b0a6ef485b6ece90fc9c7beb71110a5cbe7d72b89e40fc4645d792f43bd8c7d795b350c6130e805

                                        • C:\Windows\SysWOW64\wbem\PolicMan.dll
                                          Filesize

                                          372B

                                          MD5

                                          7b2f2ed82784e67dd855154c1de7a643

                                          SHA1

                                          dc1c27fecf27d148650c08cb8ac8a7ac312f2876

                                          SHA256

                                          221d0071cec0ed0e8607d9281a4e7ca3cb58776f7ed963bc3f0388bf8b6461d9

                                          SHA512

                                          d3eb3001e60998fcc4f6e1cf113fcace64d8ab3f1f8341889f14e100e0525d1586d541896dcf1e1ce1e75f1a2d0d30d6bbbba060d840eba618224d32d0e2ff76

                                        • C:\Windows\SysWOW64\wbem\en\Microsoft.AppV.AppVClientWmi.resources.dll
                                          Filesize

                                          475B

                                          MD5

                                          9757fe84fbb0832f98b3d61d684c749b

                                          SHA1

                                          06d4172d05162c7ddae1316da19769c44a0f52e2

                                          SHA256

                                          decd3420cf5d6e88f3d906e16b16b44c6c35853d727ced1aa26bb9c07422855a

                                          SHA512

                                          a320e338ab139362b1ae81d1f2f7f35ebd88ef4a3eeaa30ac9c80d0e3b5cd42fa8e893e6e6967d15e9488e5c38c3ca2123c140a085a222ec3ca3f33db69f5343

                                        • C:\Windows\System32\DriverStore\FileRepository\amdgpio2.inf_amd64_808fe94735c4c6b3\amdgpio2.sys
                                          Filesize

                                          112B

                                          MD5

                                          3fefbadb7e2eefed37087704ea0ed049

                                          SHA1

                                          334917b865e73a117f950077af98c26241fca37f

                                          SHA256

                                          5b4ba0af335975c10e89ce6f8d50bacffdce4dccb88f5f8f41e1287ca409d3c2

                                          SHA512

                                          8e4613c072fcc05c98ed9e8b0c708ae4de93176fc4d8d6b1f986230fec674a51effb85691998fed1785b4e5183912a3013c4ca57b6e92e3f17c527f9438087ee

                                        • C:\Windows\System32\DriverStore\FileRepository\cht4vx64.inf_amd64_b03448ba0b72ec47\cht4vx64.sys
                                          Filesize

                                          394B

                                          MD5

                                          92ca08a18aec9d80a142e9e3b9787da2

                                          SHA1

                                          a79eecb1ac07dfadd2ef5c40460d7d4381dfdc6a

                                          SHA256

                                          2d539e3f0ba982727bddcd4b19168b8c35c6d132c5ac25b64493ffd8a7fce451

                                          SHA512

                                          72c14eac48b6eb1416aa19d4303939bfc7f930bd714d8d8eac5ebfe0a54b58a35ec49304ecd9d38823b6b77c3999d84f51c293e2620ed976cb703fc511475199

                                        • C:\Windows\System32\DriverStore\FileRepository\ehstortcgdrv.inf_amd64_7f1875bd3a686318\EhStorTcgDrv.sys
                                          Filesize

                                          340B

                                          MD5

                                          658e3142594ff058effa3fbb5bee38c2

                                          SHA1

                                          9b8e5fd82b3a80c7cccf766940445dc642ff50d0

                                          SHA256

                                          2863c15e6b8f794849e61f33cd2ce814e3f5a57a29cd7945dd8c333220293ded

                                          SHA512

                                          9745bc19ec1bff9872e68c855746f8dc9bd0a5fa0ba59c371910b46c9112369c0f80dac6b8ac2f85c0be3422eb27cd5a7c7ac3350f3c35bda6652df275259956

                                        • C:\Windows\System32\DriverStore\FileRepository\helloface.inf_amd64_740102fec05a8397\FaceRecognitionEngineAdapterResources_v3.dll
                                          Filesize

                                          304B

                                          MD5

                                          3b7d2fa780e937fa3a9c9190227e1eb0

                                          SHA1

                                          66b22e70755b39a46818df5c735ffc72e088d3d2

                                          SHA256

                                          c24944c3da24a4a6eadea160e5778bf4e3dabe6e59ebf21d428ce286b9834b7a

                                          SHA512

                                          87aaa21c6c52c1457654d7b739d31048224f93a39ba037a1edf155f362e07e1ac5eae6b7124446415678724169ced2c741a325672a30c85246988e7414c60963

                                        • C:\Windows\System32\DriverStore\FileRepository\hidspi_km.inf_amd64_328b183daaf42713\hidspi.sys
                                          Filesize

                                          904B

                                          MD5

                                          eadee14c724fb3e03f850fff1211e393

                                          SHA1

                                          1b4e478b237f412ecd51bff2274b97cb9afca38f

                                          SHA256

                                          c7b59e6284e218426c933a33d44f178ddc5ebf5173ad2966870c254d603c2917

                                          SHA512

                                          1bb47a2574e986168eb456c73ac6b09a6ef4fd2e64b6b9aa36c001c3a6609bcf7de237578153460253e96bab7712dcd8c5212af4f674c6483de186a303213dee

                                        • C:\Windows\System32\DriverStore\FileRepository\ialpss2i_gpio2_bxt_p.inf_amd64_8be317e01b44bf5a\iaLPSS2i_GPIO2_BXT_P.sys
                                          Filesize

                                          240B

                                          MD5

                                          a76bcbca55618e67fe469b15fa079886

                                          SHA1

                                          64ac74ce61eb5f83a09e66243da125a33b4b64f1

                                          SHA256

                                          1d9038cb3a9c33efbbe876c4bd13e8c2f580633edca4032d8bcf2a339b901ca1

                                          SHA512

                                          4d1588839997367c55d0fa07c321664209cb3b1f5bc85b74a555e6dc0b3ed96f6f33e79720f583fe5fbaf97ad8fd9837d200eb72850197167e9c02d0c6a4f27b

                                        • C:\Windows\System32\DriverStore\FileRepository\iscsi.inf_amd64_92707498edba0868\msiscsi.sys
                                          Filesize

                                          155B

                                          MD5

                                          ec42abe64d5324bb2d0b091d2d6c8453

                                          SHA1

                                          604b03858e4c11e40c1e577f5e7c21b366b6e154

                                          SHA256

                                          279d9ba85fd5ac3f3fd652f31659cfa99877c285af5f23752aa0424ce180f8a1

                                          SHA512

                                          3c1701436c5271a304bdf1be0661e8158920da544159553931826d313a27cc5ff849ea67e7ceb5e723a85a90526013fdcd4d72aea65f02470f288a710759d2c5

                                        • C:\Windows\System32\DriverStore\FileRepository\mchgr.inf_amd64_ec6b084dd265a1b9\libxprmc.sys
                                          Filesize

                                          130B

                                          MD5

                                          b7c3061560522533caa692873be5dc03

                                          SHA1

                                          61b4e0b0dc47897936811308e017cb25f351556e

                                          SHA256

                                          06d7f3c8f118b273505278a1302ee391ad9418309d2fe386d0ed596538cc000d

                                          SHA512

                                          87b1918b947ef40da36bb84208db69f6100af72fac9ce99b8c69c699b52eb4660712f3ef0bc1496915b2d36951c62e033cfbc72c6f680a478ec60daa1fbf906f

                                        • C:\Windows\System32\DriverStore\FileRepository\mgtdyn.inf_amd64_a93c1610ad05327d\mgtdyn.dll
                                          Filesize

                                          329B

                                          MD5

                                          50a9b5236105a168eea2a6564a2f1bee

                                          SHA1

                                          f5f6ea61a02fc3e2ced972a5bdd201170605d3b7

                                          SHA256

                                          8ed45ceabcd54c792f61f4b40979a3039a132192e182fc9fc77578e38a46adbf

                                          SHA512

                                          6b6d34f27625a5621fe61a83cb5f94139005d079128a74a8ca04bd6e298729bea092b701fec618cccba3cfbc0f3a2b34b4d974c4ea6e8858c4881e1c7f2dc9ea

                                        • C:\Windows\System32\DriverStore\FileRepository\modemcsa.inf_amd64_da1669e192666780\csamsp.dll
                                          Filesize

                                          387B

                                          MD5

                                          230b1a416300a1571388aea346c742bd

                                          SHA1

                                          65222971d6f4356689fd1c9a705faa9b26240254

                                          SHA256

                                          1568a7e0b8554ddebfc486ded298d9a76f1a636b728ed522803ab26f5bea3e15

                                          SHA512

                                          a2f6ecde94a8619090d45783304d07a24700e5d68a0f1639dae00abec40b0fb5dee411147ea4b77a5d5a5354bfd20443a89f01269f1abd9a8d349a5f95282f45

                                        • C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_amd64_84ea762c0a90c362\ataport.sys
                                          Filesize

                                          518B

                                          MD5

                                          2dda11dafdef21a4f3a85443ad13077e

                                          SHA1

                                          aa34a3102f6579203c8f8800936e411a2d7f28b8

                                          SHA256

                                          4a3abe8229996fec593b257c6a7a0ab40b69c57b40eeed7f433f7ace760216d8

                                          SHA512

                                          adfea7b7bcd55b17d2e14adfd68b1d2f5fa2a02b38896888ea9141c2682ce48d4556c5c2863b4eda45d00ea6fc42304429bfc246a615b9b462df7c65247c7904

                                        • C:\Windows\System32\DriverStore\FileRepository\net8187bv64.inf_amd64_bc859d32f3e2f0d5\RTL8187B.sys
                                          Filesize

                                          989B

                                          MD5

                                          d86c4c08ef7583dba52eb61066b4c7dc

                                          SHA1

                                          3e399ed954baa895a8f8de810c9151d0b3cf82c1

                                          SHA256

                                          038583543a16cbb458a76cd9cd4f64a420bb26dfe05de5591bd7343511399b89

                                          SHA512

                                          d28acab4372ee2fa47895628c23052cf72b368c547ef26454baa1ebd49563796860b8efbc9d342fbadd196a49db0d992ed590510e1410a6e07018117c7495023

                                        • C:\Windows\System32\DriverStore\FileRepository\nete1g3e.inf_amd64_af58b4e19562a3f9\E1G6032E.sys
                                          Filesize

                                          456B

                                          MD5

                                          1fc6f783bc015c0a917b43016f74a622

                                          SHA1

                                          6662ceb2ae4a5a6875cbad7474782044349a91c5

                                          SHA256

                                          f8b3d9e2c1ac3d336949ca6f50d5c51765199826a32d5540cd4e490ae9b021db

                                          SHA512

                                          f6b72908bd52514a5ca37f65fe53908cbddc780093a39b1f9381f2f83d7271da3455a8df527267b447062efd509cd482aac8943e1fdb7c8d65b608643d8775d7

                                        • C:\Windows\System32\DriverStore\FileRepository\netr28x.inf_amd64_5d63c7bcbf29107f\netr28x.sys
                                          Filesize

                                          328B

                                          MD5

                                          51d23c91d99ff0e78a3b70a15374a3e3

                                          SHA1

                                          d8190884c4fca2f0e9d72b7ea4f6227a4e293119

                                          SHA256

                                          325b58cc57f6477e8f0a98e0395f62365a4ac6bb3cece8248c291f1ce042f87c

                                          SHA512

                                          f0042c729cf72ea33c3bdc82ee8104ac444f75464de5f96d376ec56d5f64d2cb4de6490be14c1bf9436be3fb3f5e93528718ab173178c7cbba635f09bfb5dd64

                                        • C:\Windows\System32\DriverStore\FileRepository\netwew00.inf_amd64_325c0bd6349ed81c\NETwew00.sys
                                          Filesize

                                          491B

                                          MD5

                                          0b04faa087a0bc78beeb703536510aaf

                                          SHA1

                                          45da38980cc673de5bbedc27964c6838901b85a7

                                          SHA256

                                          d416a1430f7e7f344f5c1cbce2c5ac84280235397934c2dd33958468ef9e406b

                                          SHA512

                                          f8db99c2a89ffb6e4c9c9b8e9be1bb6df0760c20cd5649f2d88ede85b4c53ff9de8ddca7821e2c8da4f8038021a2702b4464b84c205aaf2e0764181c2ea51fee

                                        • C:\Windows\System32\DriverStore\FileRepository\nvmedisk.inf_amd64_70c1ff7c7b3ad950\nvmedisk.sys
                                          Filesize

                                          11B

                                          MD5

                                          a0cbc0f0850aae3f4d4efce925a709b6

                                          SHA1

                                          8a2d42bd9b22659354a829295a5a2f1b9c52782c

                                          SHA256

                                          9a7c92a0f10a3c8dcc9221781352d4f1c7852c2625ab0a4d0ac9c7e9199b101d

                                          SHA512

                                          b8b1b9b0e7344f52ca05fa881db5ebb03e9db5369f559c9e5d7bdb6d8044ae3b817b90983986ab229fe8f745ecd18fb0fb75c81951c575b009a8541e2f4456d7

                                        • C:\Windows\System32\DriverStore\FileRepository\prm.inf_amd64_7fc9bb8ba2b73803\prm.sys
                                          Filesize

                                          381B

                                          MD5

                                          72ee94a777efa155d9b9b20587c044e4

                                          SHA1

                                          1f95ac362ed044222fb38aa7c38632147cbad956

                                          SHA256

                                          f950c12f9f05f30f82c49df79826a27ee1ed5ff72832f0c4b8b29a2ea248db56

                                          SHA512

                                          207d65d67d988d02b2e0df0e38be57d91fc215583f39de9ef4d45c1b3c0f58360ffa1f132f79084434d5359f50463f9052fdb06c529397b5c008fd1d50a5df3f

                                        • C:\Windows\System32\DriverStore\FileRepository\rtcx21x64.inf_amd64_d2a498d51a4f7bec\rtcx21x64.sys
                                          Filesize

                                          140B

                                          MD5

                                          2046920c546ebc043313abb549a3c63f

                                          SHA1

                                          6989440e96cd9a08973d8518f0db4e46974c8f8c

                                          SHA256

                                          054bc9aa88dc09058a919147987388c2c55f95614a4aec29fe83f27b74ce5aaf

                                          SHA512

                                          7f93552fa13d6e09ca68e19f828e3df49b6cdff61fed6a51b6847dab8a82b3fd5e68743d86e1918a7fa13b999603ebbe1a3102eb0a838367f95405ba24075505

                                        • C:\Windows\System32\DriverStore\FileRepository\spaceport.inf_amd64_963e5f90c3cb96e2\spacedump.sys
                                          Filesize

                                          458B

                                          MD5

                                          a9e67c8165bdba3ffd85023cbb506f82

                                          SHA1

                                          a2ed12ed605c7379dc3a39904f5e5c0692659b20

                                          SHA256

                                          53e4bd24a7166b244532b091f512d117179f106f90e3d491c61bd93b15e68177

                                          SHA512

                                          d57400e004dfcc14e7f000d537dec20462d739f5f6b2fc72e46e05109a8001c154e553999ddd99ea8ac9f1453e21d7d68252a8e9a9f9f9eaaaf05a6d601f4999

                                        • C:\Windows\System32\DriverStore\FileRepository\tape.inf_amd64_4380e2aed0a6937a\4mmdat.sys
                                          Filesize

                                          689B

                                          MD5

                                          8e1c61ecda65a8c1ddbb83e3a4d2ed9a

                                          SHA1

                                          094a7025a190b68ee8a0f7ca8a5d6994534d0ad9

                                          SHA256

                                          a9d14b3a7aa20fc8c97f64ca2aa5b87309da0be380fee4b0546372fe6cb893a0

                                          SHA512

                                          b7a826f6a8fdc7a1116d4b5a53cd48ef066a4fb571207a3278deff4fbfc732d88c2fb390a56a2902d67bf64e1d06c09fe98a5a45ad8b8b91c426c24fe743bae5

                                        • C:\Windows\System32\DriverStore\FileRepository\tpm.inf_amd64_2a45230b132b6dcc\tpm.sys
                                          Filesize

                                          580B

                                          MD5

                                          d459e3be80730af488565286a7c1ccd5

                                          SHA1

                                          cc11862020e2e80b90c8256bcae009d8d06d69f9

                                          SHA256

                                          81424034a7c594ee7044184f143d22803c22466dec46b9d0c3c0d918ab3930e8

                                          SHA512

                                          7eef418ed7dc509b92b0f2eed57701b77c7b70bf63b308cdc6d6ada082fc4a2f95d256dffb3108809399b6495e256286af42e9c89215218dddc374f9ef307171

                                        • C:\Windows\System32\DriverStore\FileRepository\ucmucsiacpiclient.inf_amd64_f0308fbfa34e312d\UcmUcsiAcpiClient.sys
                                          Filesize

                                          565B

                                          MD5

                                          82f06870c9779113e5c1e0f1baff41f3

                                          SHA1

                                          5f51d044bf1f1de1e61c2706fcd766bc8c02e2ae

                                          SHA256

                                          cadbf50e7194416eeb1c292781d7c1f7492637601247792639ec9ecb99c418f0

                                          SHA512

                                          8c2e4470a66b883e90e272a982ea7a0954a2c2319f5092ba8d8829326465356674e2560f7bdd8a7cff2b81086919ce767f93523b130c9bf70bf5a710640d273e

                                        • C:\Windows\System32\DriverStore\FileRepository\usbcciddriver.inf_amd64_f810dcaa69379cbf\UsbccidDriver.dll
                                          Filesize

                                          458B

                                          MD5

                                          30178803e9ce7696af7baabbc04a7b2e

                                          SHA1

                                          1fa560182cb0d8712293c1c0c0b4f375f8d071cb

                                          SHA256

                                          cf7a8cd5638602d0886d63964a8d3c0f86213d13e3fe5bfeaa6f29e5c47d0bf0

                                          SHA512

                                          56281efd92c4543bc83f777cfe49d6a66da28cdad01fab607846efa04afa546d3d6ebfb08a34d5d4e18e31808b0a1ce2d7486d9ec3d067b2375e704d49a1650a

                                        • C:\Windows\System32\DriverStore\FileRepository\vdrvroot.inf_amd64_e0a0e444a7ecc8d5\vdrvroot.sys
                                          Filesize

                                          566B

                                          MD5

                                          ea26f8acc2122a0f19abe1c98f5b47c3

                                          SHA1

                                          d1940d2739d2a6fb4e4e3f9691037b7914da52f3

                                          SHA256

                                          b0e854f602f0e2839a189dc3418e6486e427acb59e892e1a566ea37c45423ad3

                                          SHA512

                                          70f6969372e2b61347cfe0a4f06a6af7db9f77e2333c15be4d578a88e1c8cdfc72025db60e7a0f8ef11438e3170d1f2d4084977499320340a5016ddcf0fbeab6

                                        • C:\Windows\System32\DriverStore\FileRepository\wnetvsc.inf_amd64_2518575b045d267b\netvsc.sys
                                          Filesize

                                          668B

                                          MD5

                                          b4272dd298002443edaeb4b9763bd1b2

                                          SHA1

                                          2b2ffd6aefd8e882cd5710830b99151f9d4d256d

                                          SHA256

                                          0cc3146f630b7a8b8e1a2f855f7ab0f94cb8bb1588fccd1682df7451f7246083

                                          SHA512

                                          6ea09e104f94c46ff32e87302455b30a51418da75bde742b0aaaae7e57df767c2b3f4dd4bc6f1916f4fe3888b596a4da89390b5b82c5ba6be0102bdd555cc2e2

                                        • C:\Windows\System32\DriverStore\FileRepository\wsdscdrv.inf_amd64_24f24fc38e3e582d\WSDScDrv.dll
                                          Filesize

                                          743B

                                          MD5

                                          8cd0ca7c45c18b5da522192bc2c18820

                                          SHA1

                                          8b306cc791f404cacbce6f41f1451ee9f14e494f

                                          SHA256

                                          b9543cbe78751020c456ff4aff33b91d3cadda79d7e500f5b9c024b94d303067

                                          SHA512

                                          e98b20ed2f59f71d922cb6c2e8c895398ae28200d0ea33854b56a401ecd1f7837c89f16622e49f719e243bd8d90198643688ba9b685566c8e3edd442e63a53b0

                                        • C:\Windows\System32\DriverStore\FileRepository\xinputhid.inf_amd64_6c32bb61e34a79ed\xinputhid.sys
                                          Filesize

                                          784B

                                          MD5

                                          02a3cebdb297ce96edc6952948112fde

                                          SHA1

                                          6759e7501d93ad362aae69e3d696c825f5309638

                                          SHA256

                                          4f1fd625df4f463e167cc52f90402e0d9a41a29022a68e7e7350fdd56a9ca59a

                                          SHA512

                                          e3726c6eb84bcb82b23ef53a7f8b57aadd2166bcb78974c23b95a3cd047cf8da26e1d724d6c0baac185760b2465327bf2623d76dc0f01212073536f5722ea5c7

                                        • C:\Windows\mydoc.rtf
                                          Filesize

                                          223B

                                          MD5

                                          06604e5941c126e2e7be02c5cd9f62ec

                                          SHA1

                                          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

                                          SHA256

                                          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

                                          SHA512

                                          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

                                        • \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe
                                          Filesize

                                          512KB

                                          MD5

                                          7dd279c61931c05549db6a61d5790bf2

                                          SHA1

                                          71e25859715e609261a74b748d23bf4e5d250be9

                                          SHA256

                                          34559bd7d0d7cc3150e06a69b3f14ab409484987c5e4e50b25c5e04ed1f2ef8a

                                          SHA512

                                          1e9e453ba5418277179d260d3fa118cce137632eb0377c3cc25694ab2de979eb7c6d3fc2704e3ae1c9d31d6b94106b9c11f42a2b4f45a84a22425b1e5f7d61d8

                                        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe
                                          Filesize

                                          512KB

                                          MD5

                                          06da847fcdf3300d43090533a299cd60

                                          SHA1

                                          655b3b7c952020a861799e7f2159b94542e49f72

                                          SHA256

                                          a7c4660bee7c6145a0839ce2a5741eff55c0054890dd8075f57b234c107df512

                                          SHA512

                                          7ce8aac2066bd26b6811197f7008b6e6726effe23c411708315bac06b610e03a3bf7a74c670fc5caa0f2bcaccdb273a7b4283d5ffaf3d65ed4859d4752d09670

                                        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe
                                          Filesize

                                          512KB

                                          MD5

                                          e91f56bd90c63d0074cd7a7ac34807e8

                                          SHA1

                                          d4fa8881fd8e3341ed56b2fb5ec3d3545b19cee2

                                          SHA256

                                          556df272fdc72c9cd562bd69bbc809c8ab76a87ecc241aa2e6f2e8681210865d

                                          SHA512

                                          b715b6b9e4f4cedbe3b9b639dc72098971116b22e6b06560b4c7c30afb3938447b37cee0d987259efde11c86a0f37db6fcf9b1ad99b9d7223e313af574a4da94

                                        • \??\pipe\LOCAL\crashpad_2300_UYSJQTTOVKSKKZEL
                                          MD5

                                          d41d8cd98f00b204e9800998ecf8427e

                                          SHA1

                                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                                          SHA256

                                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                          SHA512

                                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                        • memory/2804-70-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-107-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-76-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-84-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-74-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-72-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-66-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-62-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-44-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-40-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-3079-0x0000000006E30000-0x0000000006EC2000-memory.dmp
                                          Filesize

                                          584KB

                                        • memory/2804-3080-0x0000000006F20000-0x0000000006F2A000-memory.dmp
                                          Filesize

                                          40KB

                                        • memory/2804-3081-0x000000000BCD0000-0x000000000C3B0000-memory.dmp
                                          Filesize

                                          6.9MB

                                        • memory/2804-6744-0x0000000007FB0000-0x0000000007FB8000-memory.dmp
                                          Filesize

                                          32KB

                                        • memory/2804-36-0x0000000006030000-0x0000000006580000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-5808-0x0000000000B10000-0x0000000000B1C000-memory.dmp
                                          Filesize

                                          48KB

                                        • memory/2804-5809-0x0000000000B30000-0x0000000000B38000-memory.dmp
                                          Filesize

                                          32KB

                                        • memory/2804-38-0x0000000005AD0000-0x000000000601E000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-86-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-88-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-90-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-93-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-3084-0x000000000A600000-0x000000000A6AA000-memory.dmp
                                          Filesize

                                          680KB

                                        • memory/2804-96-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-39-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-103-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-101-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-42-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-48-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-105-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-78-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-109-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-98-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-94-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-80-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-82-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-69-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-64-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-46-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-51-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-53-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/2804-55-0x0000000005AD0000-0x0000000006019000-memory.dmp
                                          Filesize

                                          5.3MB

                                        • memory/4116-7575-0x0000000000550000-0x0000000000562000-memory.dmp
                                          Filesize

                                          72KB

                                        • memory/4116-7579-0x00000000055F0000-0x0000000005602000-memory.dmp
                                          Filesize

                                          72KB

                                        • memory/4116-7580-0x0000000005650000-0x000000000568C000-memory.dmp
                                          Filesize

                                          240KB

                                        • memory/4768-4-0x0000000005F20000-0x00000000064C6000-memory.dmp
                                          Filesize

                                          5.6MB

                                        • memory/4768-7576-0x0000000074C10000-0x00000000753C1000-memory.dmp
                                          Filesize

                                          7.7MB

                                        • memory/4768-0-0x0000000074C1E000-0x0000000074C1F000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4768-1-0x0000000000E40000-0x0000000000ECC000-memory.dmp
                                          Filesize

                                          560KB

                                        • memory/4768-2-0x00000000032A0000-0x00000000032C4000-memory.dmp
                                          Filesize

                                          144KB

                                        • memory/4768-3083-0x0000000074C10000-0x00000000753C1000-memory.dmp
                                          Filesize

                                          7.7MB

                                        • memory/4768-3082-0x0000000074C1E000-0x0000000074C1F000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4768-3-0x0000000074C10000-0x00000000753C1000-memory.dmp
                                          Filesize

                                          7.7MB

                                        • memory/4948-7563-0x00007FFFFD7A0000-0x00007FFFFE141000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/4948-24-0x00007FFFFDA55000-0x00007FFFFDA56000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4948-26-0x00007FFFFD7A0000-0x00007FFFFE141000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/4948-28-0x00007FFFFD7A0000-0x00007FFFFE141000-memory.dmp
                                          Filesize

                                          9.6MB

                                        • memory/4948-3897-0x00007FFFFDA55000-0x00007FFFFDA56000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/4948-3898-0x00007FFFFD7A0000-0x00007FFFFE141000-memory.dmp
                                          Filesize

                                          9.6MB