Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 00:28

General

  • Target

    xampp-windows-x64-8.0.30-0-VS16-installer.exe

  • Size

    144.8MB

  • MD5

    80f8baaa4ce2ce5777593704e3738ec7

  • SHA1

    1dc1cf4a86c6f078f1365c56f1a250819ab8ef48

  • SHA256

    90dc4546df0dc0cad38daaf62ef2c21b4ae47e6f7a2b2dd7b1c64b41edfb669c

  • SHA512

    129412c6ed7e1df2d182abc34ea38211cb62a88d9dcfd106742900868101a22421d74e65594099a2c2270850685f249635f18d5370995cb0e418a7ab355e78b1

  • SSDEEP

    3145728:4JoqJsYspxadvayBmSEukFWJHi0M5aOnHfjbbR8fD9QND8uQ:71Y0PyLEuLHi0zcHTKBQNY/

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Loads dropped DLL 15 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\xampp-windows-x64-8.0.30-0-VS16-installer.exe
    "C:\Users\Admin\AppData\Local\Temp\xampp-windows-x64-8.0.30-0-VS16-installer.exe"
    1⤵
    • Checks whether UAC is enabled
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    PID:2860
  • C:\Windows\system32\notepad.exe
    "C:\Windows\system32\notepad.exe"
    1⤵
      PID:3544
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1188
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding
        1⤵
          PID:3936
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe"
          1⤵
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4600
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xfc,0x128,0x7ffcbb73ab58,0x7ffcbb73ab68,0x7ffcbb73ab78
            2⤵
              PID:2524
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1916,i,15832674541217074553,5827540977836666331,131072 /prefetch:2
              2⤵
                PID:3704
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1916,i,15832674541217074553,5827540977836666331,131072 /prefetch:8
                2⤵
                  PID:1332
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2288 --field-trial-handle=1916,i,15832674541217074553,5827540977836666331,131072 /prefetch:8
                  2⤵
                    PID:916
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1916,i,15832674541217074553,5827540977836666331,131072 /prefetch:1
                    2⤵
                      PID:1708
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1916,i,15832674541217074553,5827540977836666331,131072 /prefetch:1
                      2⤵
                        PID:408
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4328 --field-trial-handle=1916,i,15832674541217074553,5827540977836666331,131072 /prefetch:1
                        2⤵
                          PID:4572
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4340 --field-trial-handle=1916,i,15832674541217074553,5827540977836666331,131072 /prefetch:8
                          2⤵
                            PID:2924
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4624 --field-trial-handle=1916,i,15832674541217074553,5827540977836666331,131072 /prefetch:8
                            2⤵
                              PID:1564
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4744 --field-trial-handle=1916,i,15832674541217074553,5827540977836666331,131072 /prefetch:8
                              2⤵
                                PID:2528
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4652 --field-trial-handle=1916,i,15832674541217074553,5827540977836666331,131072 /prefetch:8
                                2⤵
                                  PID:3144
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4556 --field-trial-handle=1916,i,15832674541217074553,5827540977836666331,131072 /prefetch:8
                                  2⤵
                                    PID:4224
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4984 --field-trial-handle=1916,i,15832674541217074553,5827540977836666331,131072 /prefetch:8
                                    2⤵
                                      PID:1224
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1916,i,15832674541217074553,5827540977836666331,131072 /prefetch:8
                                      2⤵
                                        PID:2160
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4148 --field-trial-handle=1916,i,15832674541217074553,5827540977836666331,131072 /prefetch:1
                                        2⤵
                                          PID:1224
                                      • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                        "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                        1⤵
                                          PID:3876
                                        • C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe
                                          "C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe" -Embedding
                                          1⤵
                                            PID:2472

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\78bc1631-f24f-470a-a8cf-dcd406ee75a7.tmp

                                            Filesize

                                            260KB

                                            MD5

                                            d9e1bbaf9287a58e1b55a377f432daf3

                                            SHA1

                                            dfcb5e1b29cfafc2eecf0629749b67f57c8c3a61

                                            SHA256

                                            a2c4f4ab02fbf50f30a8b568c680bc0069d3f714b326848534bd274bee0a174c

                                            SHA512

                                            db5251b2f6a8c0c8a9e2316557a7486e16630673c5337180fa1f3c4e2525eb473690af2b196bc347ba40b2d70e07f69ebb5b68c9e736ec36a87adf95fcc22b67

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                            Filesize

                                            1KB

                                            MD5

                                            31247bf0d07f7aadbb2d9d6ba66c7248

                                            SHA1

                                            26155d4ea01d6797e688adc77603afb279c71629

                                            SHA256

                                            611197ffdb053d1bf32267dd0a3668b471c09111a4ecf6859198bcde1799325b

                                            SHA512

                                            e1bf8449649a153feb1af45cfb0f569f60d351642835be2d737346032c13a949fa4ca2788cf8da35dcaa973ae8bee49303c79ac2788b182119e9ec0d5cdddf56

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                            Filesize

                                            2B

                                            MD5

                                            d751713988987e9331980363e24189ce

                                            SHA1

                                            97d170e1550eee4afc0af065b78cda302a97674c

                                            SHA256

                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                            SHA512

                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                            Filesize

                                            356B

                                            MD5

                                            3a9896c4a982d41f704e88714df74fce

                                            SHA1

                                            a9bb2a6cde6071026ed1affccc9f1432bca50294

                                            SHA256

                                            b8181e97368188227d4c39f0b8936fd3cf7e6758991b254bda27ada29b86d1dc

                                            SHA512

                                            3cd5e5c88741a823b4b3eff4fc95dc41d44d0917598ce3509c66a2b399352eab7fd0ea690ccf798f155d4400e5bc2b41d5a67e9a7bf179cf9f77e6e629e7eef3

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            9d31f14aab63ef491e36db2236920608

                                            SHA1

                                            16ec965b397e82acf4e0960bb8f4e09d4fb64ede

                                            SHA256

                                            d4ebd29432936cf62f40ff8aa8b2782c4ae730ad9ba90adf82c57fb97001b24b

                                            SHA512

                                            c6fd5c485142e079e8753fb6732196e4f1906866d86b1ccb320fd21cdaa63ee833f91aa7b4d3df808603f9f926f20f58b9f9fcba2700bf75af87eb196da0a0e0

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                            Filesize

                                            16KB

                                            MD5

                                            a2386d091d4c9619f1cbe6fe97e710e9

                                            SHA1

                                            f181278ce28126e4f469f54531a6764b54728ed7

                                            SHA256

                                            d2e0d9d02e37240ac4dd55bca09bb8e5bf27f60a97f81680274f3bc4b371af41

                                            SHA512

                                            e30d1768aed4263b1990b2845f95d02d720f5d6a6ed5254def0f368176f0e43b9c797791fb114ecc63a7095c724ddaee9eb46344dc57807c9c62b5f31015a6af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            260KB

                                            MD5

                                            9b1de3038b413763ed31a21deead827d

                                            SHA1

                                            856966f3c18aa2041eba34eea5c1cf9862c6456f

                                            SHA256

                                            3db7204f6b8ffaff6ad6769a3d11ceb8dd23511c38814019fee783c8a797216d

                                            SHA512

                                            a2b5c4005f49b241ceb458652ea7269bedde9614cb60a179e0fb09f433a0e5cac9a94b0b943f8401f8678a2f36248ea29de065634a5dc2ae1ef79c87f4ee9881

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            c11ae32cc74a333e74b81234c350a834

                                            SHA1

                                            78d5e77ab02342c0a56d8e40f43df8a3bd5766d3

                                            SHA256

                                            8bd8dcd30e00f79227ad6d81cc566b0cb30837200f15b928405bfa54c662cedc

                                            SHA512

                                            7f6649b42e4e06714a3a6a7c6b618e48aac19c8248a0288602471ceb3d5bef7263e4089be3780ef0976fb01291ed3f2df6c2556cd4e1bb1584ec8dc5db999b8b

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR63AB.tmp

                                            Filesize

                                            128KB

                                            MD5

                                            321b5fced717d340dc98a26d1db4dde6

                                            SHA1

                                            eb1d50c6d37062c700415f4c4da3f74569515337

                                            SHA256

                                            f13de53e3f9c6f2102551196527a8ed4c352bc0e5593337d3dda43ce90b4c1ab

                                            SHA512

                                            4f753838f16755a19b8308091ba519a9c5402afc7b822d8d7bc6084cfc6876b35f2021399543e04af5f3778ccf5ebdfd419fa2a66dfbc7f6c2eb1ff23c761a56

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR63EB.tmp

                                            Filesize

                                            356KB

                                            MD5

                                            c3c4f3fe90e3b3b02bea0e8da3447ed2

                                            SHA1

                                            7ac0f54119d2273a2cd261f1fe6c5667e9c486df

                                            SHA256

                                            3524ec77985e390acf9d07d81b1b44305165d711bbca770f7458ea0a78751f82

                                            SHA512

                                            0e24c9394c635a3f1671a297f97b613e6936cd8f862a214125d3456324a18668ae138d5c4fde036f55e2b13b158e4cebc53f78153862a008b1ae747eab228a60

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR643A.tmp

                                            Filesize

                                            59KB

                                            MD5

                                            f62dd6ce51e19349ec1d1f2e88c4ef4d

                                            SHA1

                                            60bd29538b4fecaf527ba8b7d92b7f32d2e72ddb

                                            SHA256

                                            be88244da9faaa6636a9d2f4c4249c08066a0b48359690b9b27a2b9ed47e093d

                                            SHA512

                                            ba68a59427ec252b895e1c3d6879e0c7a010893d23b5a8687ce86d738faaec1367f73abbcf63fb8ce8b95d32afa3049cd59f22f0bc5a2ff2a3b123a54fe02012

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR645A.tmp

                                            Filesize

                                            198KB

                                            MD5

                                            f62b88099fd066459790b1cd7fd77d5b

                                            SHA1

                                            8c29ac198aae5dca85be8ca78f1f7469531e24ff

                                            SHA256

                                            64e783f0f28d5e0b781f0c5ceab0c7b8f6522640dded4df0b5a4886b22482d90

                                            SHA512

                                            1472df35270268490a47fe09b9d2cb6b60d0725164955d586aedb1383ad3b8d34ffdd3fdf7cd8ffe43aa104c2c58f3902b811704fa8403a367e1a3f72641a8d3

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR646B.tmp

                                            Filesize

                                            513KB

                                            MD5

                                            5fbc6bd806a8a6c460faceeea73bd7f7

                                            SHA1

                                            4d1586a9631a72c3e1d75fb3c385dbd278804665

                                            SHA256

                                            8033d1b3af84d47d275e022608da35baac16cf40d9607ca026a47b6cd65e6a97

                                            SHA512

                                            4c51f9f331ac15206942e13504334b4c3549888519388607c44b617a68a9095114b0e6127e82b84170445df06260cc62308bc197b90cfb95af18d7cb6d413195

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR64AA.tmp

                                            Filesize

                                            235KB

                                            MD5

                                            51c675fc1ef0a62322052d3e86567c06

                                            SHA1

                                            e295d0b668105d81f9180ef1056d0528e4b2116a

                                            SHA256

                                            aaa3d7e589e9be1911eee5974afa68c64af1bbd5e039ff6a82a15c2b54c0f9f0

                                            SHA512

                                            a352e82db5c930c73165a48337ae51acda7ebd393b8b0b57d03d2e1b5057c41c26b1f321759b7bc521166890853ecdad7b37531212243ad86e181e2252a3b78d

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR64BB.tmp

                                            Filesize

                                            18KB

                                            MD5

                                            6d2c718c3059ceaa7b90919e6725a09a

                                            SHA1

                                            489967f8fe2b9021a891112754b840fe7dc71d13

                                            SHA256

                                            2ca70bc6394ee1b299a8cf1fe28e95c7d68b765e1828db1b651a7a62acae5356

                                            SHA512

                                            37547e9c6080d0dcb3ea23d9c856ce689997275b40d72bf9fd7c7c165e8cee4afe2ebe52e052c5f8bfc3e618391425219e9681191ee6f650444ebd643cb5a50d

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR6558.tmp

                                            Filesize

                                            19KB

                                            MD5

                                            a56543b9cd3aa403311b49189d25851e

                                            SHA1

                                            bd2609d35d4a967fe23ef4092b1daa6f74a858ad

                                            SHA256

                                            034756f772399552cd33605a189ee0e45d7947860e0d83ec12aa6da1a5a42054

                                            SHA512

                                            2237f493d70799675ae0e395f551b6cd46ff4789e46e2453c48fede07b7623b4b8111904d6fa139c204eea4405b5fd5812b0a91f27374219b721339149c25edf

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR6C8D.tmp

                                            Filesize

                                            36KB

                                            MD5

                                            a8b2a9bc29f24b733d35a8ef30551edd

                                            SHA1

                                            3faee2d4e1ce3ddcaa4c560c40e045cf147622cc

                                            SHA256

                                            22d4a48d7dd5c51c63e277944a91511e69d514721b5cd60b7da877d38bd8744d

                                            SHA512

                                            aca6c103b737e0142913fd12b6783464c7edba1953a0bd07084e996a070a7118d1f571249882f982dc7bd47656ac23b86b598b434176b3ab9553b63512771d78

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR6C9E.tmp

                                            Filesize

                                            96KB

                                            MD5

                                            9b299884420745d80c70bba6b8a7f05a

                                            SHA1

                                            195423185a7776e072a65fbabae868c15f7b2f56

                                            SHA256

                                            9426e96a97f41645fab524385a852687792f99b505554b6b9809ed99451b2399

                                            SHA512

                                            ed839dc1b6ef53f3663b6055fb2869a522600b2af8d8a800958ddb531154f4e9a3f1733f32dff5511a22fe01525191c8683519cbdcedec138b1bcf3425f2155b

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR6CAE.tmp

                                            Filesize

                                            179KB

                                            MD5

                                            e969c2f659b563a943b8df2d696b7ae3

                                            SHA1

                                            202994ca5bc32127d14e1231849bbc72d3a1d321

                                            SHA256

                                            511b85752b816fdc2fe0da78753b527f422fb88fbdb9ebc8dbe4771fdf15bea1

                                            SHA512

                                            42d18fb61ba280522552394731fceeb6cc6acdb4f1dbbbe37b363cea488284a6ed0dcc45b8ef2caad639f3b17f83cbae695dfafc2b0a1eaca12dfed4626faaee

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR6CEE.tmp

                                            Filesize

                                            53KB

                                            MD5

                                            2c8f6a964ca7761122f7da22042462f4

                                            SHA1

                                            290e48bf0f83b3f3832f69bb1ea0637ed4d8ccca

                                            SHA256

                                            9d6f2629aa5978dd6b87fe9bce77a5cf0135b8da2980a050579eb4e23a92f8fa

                                            SHA512

                                            88c49dbc5a5cce28fc61689b953e091dc5114196a9ce5977de1bc1ea916333d73a13d06abb56b7afd88f6c4f80953a2b9b720cd79e773a1246d44b37eae4cbf8

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR6CFE.tmp

                                            Filesize

                                            53KB

                                            MD5

                                            4640fd47f64bb72cb34dbafee65dbdde

                                            SHA1

                                            508c8713e06ba55588d41918c5a99308cb4b37a0

                                            SHA256

                                            f02c4352ea80e1b476eb4754455ae684efb4289d95edf925e38bd3789f6ead49

                                            SHA512

                                            de2d05ea66ab37b7120cde8f4aeb79c6365430bd94f56b07019451e1329f8f3a2674af9ed6677b8ade59fa2185c6a48eaead47091edc8284e686260c69544a4c

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR6CFF.tmp

                                            Filesize

                                            218KB

                                            MD5

                                            7190ecf05ec3b297d6ded3e204399e95

                                            SHA1

                                            5c085cbbbcc8686266acfb318e75a38794625e88

                                            SHA256

                                            49e2c502923de5f89958de86f1cc6f91e7ddafe46d0f81bfb51a669627650e6e

                                            SHA512

                                            4e12adcaaebdc08e06270437dd4ebf33c4aecd5b6cce7245bf12b0303c809465d75d5b319fb262a807cf9a5cb99d808e466fc30b19d88ddcf2b3f0b9c9f74881

                                          • C:\Users\Admin\AppData\Local\Temp\BRL00000b2c\BR6D10.tmp

                                            Filesize

                                            125KB

                                            MD5

                                            053a60f34c75ca0a4a821b46eae86d31

                                            SHA1

                                            ebcf9f84a393969655969c248c2d572d7a05541c

                                            SHA256

                                            683f19a461948f4cca2fbece26949b34d6347dff279efece983b9f64a868422c

                                            SHA512

                                            346c989ef320079b5978678264059ad9e545081dded233d10dca73a72906fa01df30a3c96f6d319efcea64c198ef409748e511dab8a4d43e1fa7af50ed3f0256

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                            Filesize

                                            2B

                                            MD5

                                            f3b25701fe362ec84616a93a45ce9998

                                            SHA1

                                            d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                            SHA256

                                            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                            SHA512

                                            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                          • memory/2860-82-0x000000006CA00000-0x000000006CA0E000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/2860-75-0x0000000000050000-0x000000000032D000-memory.dmp

                                            Filesize

                                            2.9MB

                                          • memory/2860-87-0x0000000000050000-0x000000000032D000-memory.dmp

                                            Filesize

                                            2.9MB

                                          • memory/2860-99-0x0000000000050000-0x000000000032D000-memory.dmp

                                            Filesize

                                            2.9MB

                                          • memory/2860-111-0x0000000000050000-0x000000000032D000-memory.dmp

                                            Filesize

                                            2.9MB

                                          • memory/2860-123-0x0000000000050000-0x000000000032D000-memory.dmp

                                            Filesize

                                            2.9MB

                                          • memory/2860-79-0x0000000067C80000-0x0000000067D09000-memory.dmp

                                            Filesize

                                            548KB

                                          • memory/2860-77-0x0000000066680000-0x0000000066695000-memory.dmp

                                            Filesize

                                            84KB

                                          • memory/2860-78-0x00000000710C0000-0x00000000710F4000-memory.dmp

                                            Filesize

                                            208KB

                                          • memory/2860-80-0x000000006C580000-0x000000006C599000-memory.dmp

                                            Filesize

                                            100KB

                                          • memory/2860-81-0x00000000551F0000-0x00000000551FE000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/2860-83-0x0000000067380000-0x0000000067391000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/2860-84-0x0000000066C00000-0x0000000066C1B000-memory.dmp

                                            Filesize

                                            108KB

                                          • memory/2860-85-0x00000000551B0000-0x00000000551E2000-memory.dmp

                                            Filesize

                                            200KB

                                          • memory/2860-86-0x0000000063980000-0x0000000063994000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/2860-76-0x0000000055200000-0x0000000055226000-memory.dmp

                                            Filesize

                                            152KB