Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08/08/2024, 02:37

General

  • Target

    https://github.com/ic3w0lf22/Roblox-Account-Manager/releases/download/3.7.2/Roblox.Account.Manager.3.7.2.zip

Malware Config

Signatures

  • Uses browser remote debugging 2 TTPs 5 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Executes dropped EXE 18 IoCs
  • Loads dropped DLL 37 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 49 IoCs
  • Drops file in Windows directory 24 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 11 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/ic3w0lf22/Roblox-Account-Manager/releases/download/3.7.2/Roblox.Account.Manager.3.7.2.zip
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffda48f3cb8,0x7ffda48f3cc8,0x7ffda48f3cd8
      2⤵
        PID:4036
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,4126449737282222614,18064787669031310962,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:2
        2⤵
          PID:5868
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,4126449737282222614,18064787669031310962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:5556
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,4126449737282222614,18064787669031310962,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:8
          2⤵
            PID:5236
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,4126449737282222614,18064787669031310962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
            2⤵
              PID:1452
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,4126449737282222614,18064787669031310962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
              2⤵
                PID:2232
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,4126449737282222614,18064787669031310962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1
                2⤵
                  PID:3216
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1908,4126449737282222614,18064787669031310962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:8
                  2⤵
                  • NTFS ADS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3608
                • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,4126449737282222614,18064787669031310962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1928
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,4126449737282222614,18064787669031310962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2620
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,4126449737282222614,18064787669031310962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2480 /prefetch:1
                  2⤵
                    PID:3132
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,4126449737282222614,18064787669031310962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:1
                    2⤵
                      PID:4980
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,4126449737282222614,18064787669031310962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:1
                      2⤵
                        PID:2872
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,4126449737282222614,18064787669031310962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:1
                        2⤵
                          PID:3192
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,4126449737282222614,18064787669031310962,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4836 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2320
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:2856
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:1056
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:2580
                            • C:\Users\Admin\Downloads\Roblox.Account.Manager.3.7.2\Roblox Account Manager.exe
                              "C:\Users\Admin\Downloads\Roblox.Account.Manager.3.7.2\Roblox Account Manager.exe"
                              1⤵
                              • System Location Discovery: System Language Discovery
                              PID:704
                              • C:\Users\Admin\Downloads\Roblox.Account.Manager.3.7.2\Roblox Account Manager.exe
                                "C:\Users\Admin\Downloads\Roblox.Account.Manager.3.7.2\Roblox Account Manager.exe" -restart
                                2⤵
                                • Loads dropped DLL
                                • Adds Run key to start application
                                • System Location Discovery: System Language Discovery
                                • Modifies Internet Explorer settings
                                • Suspicious behavior: GetForegroundWindowSpam
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2508
                                • C:\Users\Admin\AppData\Local\Temp\vcredist.tmp
                                  "C:\Users\Admin\AppData\Local\Temp\vcredist.tmp" /q /norestart
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:5828
                                  • C:\Windows\Temp\{8F782935-E3BA-4DCB-89B0-5F43AC5AC755}\.cr\vcredist.tmp
                                    "C:\Windows\Temp\{8F782935-E3BA-4DCB-89B0-5F43AC5AC755}\.cr\vcredist.tmp" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vcredist.tmp" -burn.filehandle.attached=588 -burn.filehandle.self=596 /q /norestart
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:5216
                                    • C:\Windows\Temp\{D2985693-4543-4E58-A046-701ACDFD14B2}\.be\VC_redist.x86.exe
                                      "C:\Windows\Temp\{D2985693-4543-4E58-A046-701ACDFD14B2}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{126EBCD9-6650-45BD-A5AA-F02CD0AB160F} {A88B2C27-34B5-457C-9A9F-5FD7256033D6} 5216
                                      5⤵
                                      • Executes dropped EXE
                                      • Adds Run key to start application
                                      • System Location Discovery: System Language Discovery
                                      • Modifies registry class
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2312
                                      • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe
                                        "C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={47109d57-d746-4f8b-9618-ed6a17cc922b} -burn.filehandle.self=1152 -burn.embedded BurnPipe.{41255076-082D-4E74-B320-7CDC38BDC0E5} {919FA4D5-4A0E-4EB6-8EC5-CEFB69FA5FC0} 2312
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4704
                                        • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe
                                          "C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -burn.clean.room="C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -burn.filehandle.attached=572 -burn.filehandle.self=588 -uninstall -quiet -burn.related.upgrade -burn.ancestors={47109d57-d746-4f8b-9618-ed6a17cc922b} -burn.filehandle.self=1152 -burn.embedded BurnPipe.{41255076-082D-4E74-B320-7CDC38BDC0E5} {919FA4D5-4A0E-4EB6-8EC5-CEFB69FA5FC0} 2312
                                          7⤵
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          PID:5508
                                          • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe
                                            "C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{EBF2017D-BFF8-4500-936D-8ED7DE5A85D7} {86A33EED-1EA6-4B63-9174-3FBEC45363E9} 5508
                                            8⤵
                                            • System Location Discovery: System Language Discovery
                                            • Modifies registry class
                                            PID:2336
                                • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                  "C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe" --allow-pre-commit-input --disable-background-networking --disable-background-timer-throttling --disable-backgrounding-occluded-windows --disable-breakpad --disable-client-side-phishing-detection --disable-component-extensions-with-background-pages --disable-component-update --disable-default-apps --disable-dev-shm-usage --disable-extensions --disable-field-trial-config --disable-hang-monitor --disable-infobars --disable-ipc-flooding-protection --disable-popup-blocking --disable-prompt-on-repost --disable-renderer-backgrounding --disable-search-engine-choice-screen --disable-sync --enable-automation --enable-blink-features=IdleDetection --export-tagged-pdf --generate-pdf-document-outline --force-color-profile=srgb --metrics-recording-only --no-first-run --password-store=basic --use-mock-keychain --disable-features=Translate,AcceptCHFrame,MediaRouter,OptimizationHints,ProcessPerSiteUpToMainFrameThreshold --enable-features= about:blank --disable-web-security --window-size="880,740" --window-position="200,-34" --remote-debugging-port=0 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn"
                                  3⤵
                                  • Uses browser remote debugging
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Checks system information in the registry
                                  • Drops file in Windows directory
                                  • Enumerates system info in registry
                                  • Modifies data under HKEY_USERS
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                  • Suspicious use of FindShellTrayWindow
                                  PID:2264
                                  • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                    C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn /prefetch:4 --monitor-self --monitor-self-argument=--type=crashpad-handler --monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn --monitor-self-argument=/prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\Crashpad --annotation=plat=Win64 "--annotation=prod=Google Chrome for Testing" --annotation=ver=124.0.6367.201 --initial-client-data=0x120,0x124,0x128,0xf8,0x12c,0x7ffd8f2fcc70,0x7ffd8f2fcc7c,0x7ffd8f2fcc88
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:3596
                                    • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                      C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn /prefetch:4 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\Crashpad --annotation=plat=Win64 "--annotation=prod=Google Chrome for Testing" --annotation=ver=124.0.6367.201 --initial-client-data=0x150,0x154,0x158,0x11c,0x15c,0x7ff69d8d9900,0x7ff69d8d990c,0x7ff69d8d9918
                                      5⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:1064
                                  • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                    "C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe" --type=gpu-process --disable-breakpad --user-data-dir="C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn" --no-appcompat-clear --start-stack-profiler --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1848,i,4295696522405316579,15705147678423203855,262144 --disable-features=AcceptCHFrame,MediaRouter,OptimizationHints,ProcessPerSiteUpToMainFrameThreshold,Translate --variations-seed-version --mojo-platform-channel-handle=1844 /prefetch:2
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:4856
                                  • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                    "C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn" --no-appcompat-clear --start-stack-profiler --field-trial-handle=1948,i,4295696522405316579,15705147678423203855,262144 --disable-features=AcceptCHFrame,MediaRouter,OptimizationHints,ProcessPerSiteUpToMainFrameThreshold,Translate --variations-seed-version --mojo-platform-channel-handle=1908 /prefetch:3
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:2628
                                  • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                    "C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn" --no-appcompat-clear --field-trial-handle=2132,i,4295696522405316579,15705147678423203855,262144 --disable-features=AcceptCHFrame,MediaRouter,OptimizationHints,ProcessPerSiteUpToMainFrameThreshold,Translate --variations-seed-version --mojo-platform-channel-handle=2436 /prefetch:8
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:5672
                                  • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                    "C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn" --no-appcompat-clear --disable-background-timer-throttling --disable-breakpad --enable-automation --force-color-profile=srgb --remote-debugging-port=0 --allow-pre-commit-input --enable-blink-features=IdleDetection --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2916,i,4295696522405316579,15705147678423203855,262144 --disable-features=AcceptCHFrame,MediaRouter,OptimizationHints,ProcessPerSiteUpToMainFrameThreshold,Translate --variations-seed-version --mojo-platform-channel-handle=2956 /prefetch:1
                                    4⤵
                                    • Uses browser remote debugging
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:3124
                                  • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                    "C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn" --no-appcompat-clear --disable-background-timer-throttling --disable-breakpad --enable-automation --force-color-profile=srgb --remote-debugging-port=0 --allow-pre-commit-input --enable-blink-features=IdleDetection --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2920,i,4295696522405316579,15705147678423203855,262144 --disable-features=AcceptCHFrame,MediaRouter,OptimizationHints,ProcessPerSiteUpToMainFrameThreshold,Translate --variations-seed-version --mojo-platform-channel-handle=3060 /prefetch:1
                                    4⤵
                                    • Uses browser remote debugging
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:5712
                                  • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                    "C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn" --no-appcompat-clear --start-stack-profiler --disable-background-timer-throttling --disable-breakpad --enable-automation --force-color-profile=srgb --remote-debugging-port=0 --allow-pre-commit-input --enable-blink-features=IdleDetection --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3896,i,4295696522405316579,15705147678423203855,262144 --disable-features=AcceptCHFrame,MediaRouter,OptimizationHints,ProcessPerSiteUpToMainFrameThreshold,Translate --variations-seed-version --mojo-platform-channel-handle=4488 /prefetch:1
                                    4⤵
                                    • Uses browser remote debugging
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:5268
                                  • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                    "C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn" --no-appcompat-clear --field-trial-handle=4840,i,4295696522405316579,15705147678423203855,262144 --disable-features=AcceptCHFrame,MediaRouter,OptimizationHints,ProcessPerSiteUpToMainFrameThreshold,Translate --variations-seed-version --mojo-platform-channel-handle=4848 /prefetch:8
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:5720
                                  • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                    "C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn" --no-appcompat-clear --disable-background-timer-throttling --disable-breakpad --enable-automation --force-color-profile=srgb --remote-debugging-port=0 --allow-pre-commit-input --enable-blink-features=IdleDetection --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3948,i,4295696522405316579,15705147678423203855,262144 --disable-features=AcceptCHFrame,MediaRouter,OptimizationHints,ProcessPerSiteUpToMainFrameThreshold,Translate --variations-seed-version --mojo-platform-channel-handle=4988 /prefetch:1
                                    4⤵
                                    • Uses browser remote debugging
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:2012
                                  • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                    "C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn" --no-appcompat-clear --field-trial-handle=5220,i,4295696522405316579,15705147678423203855,262144 --disable-features=AcceptCHFrame,MediaRouter,OptimizationHints,ProcessPerSiteUpToMainFrameThreshold,Translate --variations-seed-version --mojo-platform-channel-handle=5204 /prefetch:8
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:4204
                                  • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                    "C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn" --no-appcompat-clear --field-trial-handle=5228,i,4295696522405316579,15705147678423203855,262144 --disable-features=AcceptCHFrame,MediaRouter,OptimizationHints,ProcessPerSiteUpToMainFrameThreshold,Translate --variations-seed-version --mojo-platform-channel-handle=5156 /prefetch:8
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Modifies registry class
                                    PID:1340
                                  • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                    "C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn" --no-appcompat-clear --field-trial-handle=244,i,4295696522405316579,15705147678423203855,262144 --disable-features=AcceptCHFrame,MediaRouter,OptimizationHints,ProcessPerSiteUpToMainFrameThreshold,Translate --variations-seed-version --mojo-platform-channel-handle=5168 /prefetch:8
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:3108
                                  • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe
                                    "C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn" --no-appcompat-clear --field-trial-handle=3244,i,4295696522405316579,15705147678423203855,262144 --disable-features=AcceptCHFrame,MediaRouter,OptimizationHints,ProcessPerSiteUpToMainFrameThreshold,Translate --variations-seed-version --mojo-platform-channel-handle=5556 /prefetch:8
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:2096
                            • C:\Windows\system32\vssvc.exe
                              C:\Windows\system32\vssvc.exe
                              1⤵
                              • Checks SCSI registry key(s)
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1476
                            • C:\Windows\system32\srtasks.exe
                              C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                              1⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5576
                            • C:\Windows\system32\msiexec.exe
                              C:\Windows\system32\msiexec.exe /V
                              1⤵
                              • Enumerates connected drives
                              • Drops file in System32 directory
                              • Drops file in Windows directory
                              • Modifies data under HKEY_USERS
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:656
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                              1⤵
                                PID:3176

                              Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Config.Msi\e5850b0.rbs

                                      Filesize

                                      16KB

                                      MD5

                                      91f1b0c3bdc535e0aec8fca7e53b9729

                                      SHA1

                                      3a4237723b215b407b9a341e6cb1748ba018f041

                                      SHA256

                                      d757fb8180d7948a554960064f503b5c747ea6e38ee70c8a9b36178dcf4e16c0

                                      SHA512

                                      de45f3a888aa4217921dff3b45bdddadd5d97170f55ceab994f8646b58dd7fd5310f08ebae8b14e0ca3445434c83bb31e59ee8675c14b386aa946fa49b8678df

                                    • C:\Config.Msi\e5850b5.rbs

                                      Filesize

                                      18KB

                                      MD5

                                      6b93da775ac21710fe3422eb1bfdeee6

                                      SHA1

                                      96b1f961885ff9c289b5dd074dd5f5ca9a5f8c0f

                                      SHA256

                                      09d9d73a174f51c8bfd1b30fd3c847414490864dbb5b21c23d3b5929727d03b8

                                      SHA512

                                      945f4d5b4ad8bf480a0fa99c64699d13fb4413e59ac30d0d5e8c736532905828e555b5db4eb3505d2502f8fcda8d556f1f78cdba4cd95e420726733e2c10a1d5

                                    • C:\Config.Msi\e5850c2.rbs

                                      Filesize

                                      20KB

                                      MD5

                                      c0b7301eaaa7ab76bb2353b91ccd057a

                                      SHA1

                                      697eadf1ecfc534e761d8655e9371437d1287802

                                      SHA256

                                      3317a37d16bd0e360a2c7b578d2ac11e82c122710f66b5c7d913eff81c3ce642

                                      SHA512

                                      d9bfff457937f020f058319c32374e9a3f531b02781a599ef1f693e8607223d03b4180b5adad0ceee8302cbc30bbf96b0e13e7f123577fbab83b91f9a3e6bfd2

                                    • C:\Config.Msi\e5850d1.rbs

                                      Filesize

                                      19KB

                                      MD5

                                      31d78f440244c789396223c53617c349

                                      SHA1

                                      b76f60694e5fcae0b172f14a7757ad5fbbad18cb

                                      SHA256

                                      f0e7620e1b1bcfacd225b4895ca15395799326ca68f66f589fbb9e27065fa327

                                      SHA512

                                      95b9d3a19afc8f66b24fb529db77be53a0cfaf283240451c3fdca2ab255e7a9d5306eeab443938d964ff02a9829dc407620176c567ed4cf64d8c649ebe0b7c25

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Roblox Account Manager.exe.log

                                      Filesize

                                      1KB

                                      MD5

                                      72c442c0ee7dde7b3455bb315289bcf2

                                      SHA1

                                      d33367411ce01348f531e098495885b9d2ea110b

                                      SHA256

                                      180f825c19263ae06fc891efcde51f993b720a27bd6e563742a110b40cb3fe41

                                      SHA512

                                      b66e975424f17e3b4dce2d2746d78b8a05001ee17a7208c1f5f81ed8530aa2e3d4b10f4c64b33ba7c05a5e9e2afc548abf6bdfaffd6015c2cb7d624a688dc018

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      d30a5618854b9da7bcfc03aeb0a594c4

                                      SHA1

                                      7f37105d7e5b1ecb270726915956c2271116eab7

                                      SHA256

                                      3494c446aa3cb038f1d920b26910b7fe1f4286db78cb3f203ad02cb93889c1a8

                                      SHA512

                                      efd488fcd1729017a596ddd2950bff07d5a11140cba56ff8e0c62ef62827b35c22857bc4f5f5ea11ccc2e1394c0b3ee8651df62a25e66710f320e7a2cf4d1a77

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      03a56f81ee69dd9727832df26709a1c9

                                      SHA1

                                      ab6754cc9ebd922ef3c37b7e84ff20e250cfde3b

                                      SHA256

                                      65d97e83b315d9140f3922b278d08352809f955e2a714fedfaea6283a5300e53

                                      SHA512

                                      e9915f11e74c1bcf7f80d1bcdc8175df820af30f223a17c0fe11b6808e5a400550dcbe59b64346b7741c7c77735abefaf2c988753e11d086000522a05a0f7781

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      265B

                                      MD5

                                      f5cd008cf465804d0e6f39a8d81f9a2d

                                      SHA1

                                      6b2907356472ed4a719e5675cc08969f30adc855

                                      SHA256

                                      fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d

                                      SHA512

                                      dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      b19fdc48ae569ab5141e605c4e82fe2f

                                      SHA1

                                      27c6be0af06c0eafcea3d3a5b80d912b666351bf

                                      SHA256

                                      fc58a74c6ef44e658cab97cf980b79afc709c8820bfdd4b767821cc6a23caf64

                                      SHA512

                                      057fc6e3bf1f4200dfb396f85aedbdb87d4bb9a127992359716c48ea60ac911677914b76b3b0381c233c7dc3d5239182763014d55f01a23a637ff46000293059

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      05d75492950275d52032c44d672bc979

                                      SHA1

                                      25c6bc74decf4ab57b024dc70a500104ee71e0a9

                                      SHA256

                                      600624dc15908d41e8001727b3330d701fa467c1ca80c50881afeef0fd1364c1

                                      SHA512

                                      00cd2b3f3d99ebb47db79be0797fa6a4a5c8efa47a9c60a39d27d1d81793d794ea6b6f3bb8b7d20107f2317d81156fe9e09441a2b5636934478d05fe9c1662da

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      46295cac801e5d4857d09837238a6394

                                      SHA1

                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                      SHA256

                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                      SHA512

                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      206702161f94c5cd39fadd03f4014d98

                                      SHA1

                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                      SHA256

                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                      SHA512

                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      89b390ed54d9965f2bde50fc5b35d77f

                                      SHA1

                                      eee0b92b3d368055ba74a2fe679237dc9d4675ac

                                      SHA256

                                      3b4d557ab2510bd62aa155828a9f125528982aa1014120642cb7afa517331a4f

                                      SHA512

                                      8b1c57380a8c168577a1f7e98679f5f8b061d050fea9b1d18c2bb7ee2f18e6a77267e58c5c9ada65e07ca2d5a214d9fd2ed56d8b713b32994a5adce0b91a03aa

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      97f544025d361d527076b17338e2bbce

                                      SHA1

                                      2792dfcd4b17cfa57c0bbb1e6e5b84cc84f248a8

                                      SHA256

                                      33a2561d6a5908336c43eb337e1879b33d56457ec863196af0eb99d91d88d50e

                                      SHA512

                                      a35cfa2c2dacbab4c151b7d055198d7d8458642c0d63810475ce19b834386ad6e77e882f76c9c553ce1f4bacc4f092e7ff24b3625b2d5aa0375eedec0e70231d

                                    • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome.exe

                                      Filesize

                                      2.5MB

                                      MD5

                                      f26dfce9583f0d7d41b31ee11e56be43

                                      SHA1

                                      5718e9ea9c5ec6888a3d5eae9c090b0880414b0a

                                      SHA256

                                      613536f294de53d1e9bb53a31269300fef4427f5e461ff6c7a1de3fa88c7667c

                                      SHA512

                                      88447cf2767667a2d470b62b2f2be79483343003e40e02deeafc20ea27d63b66cd336ceede04f850edb920009672682e32290050b18daf9c575bd020d7bd4966

                                    • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome_100_percent.pak

                                      Filesize

                                      665KB

                                      MD5

                                      f796340aed680b64c37657912c63b050

                                      SHA1

                                      8fccd026e7e88c733cbd37b495e9e0afff0b24be

                                      SHA256

                                      329113e1ab3c6ac34d8375fd0a66e6ba12c1c49675101d10e231316b5a14c8c2

                                      SHA512

                                      98a8d6858b23bebdee8c7d13d5534aa568bffd2e9c030aec2263778ac2bdd7dea5c7e38b942352089ec4123d789eeaa2376623fba652e119db61cc006d3ace56

                                    • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome_200_percent.pak

                                      Filesize

                                      1.0MB

                                      MD5

                                      e7f0c4a2f06aa4c40206cdc1bfb9166e

                                      SHA1

                                      14679473561d6f3d710a2514620e2f97650e5791

                                      SHA256

                                      3cd793c813d79579e5dafb3b63204e2ccb525f6b27a6dc25525c9fafabce4d29

                                      SHA512

                                      fcca36df17760212654f3d08a0265fbce42b51a3ca13e70012dd723fd6ea084775036744fe32d0439fcf496c2fb2d5a733fbb87bdd3f318a64bb4611c7ff5f58

                                    • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\chrome_elf.dll

                                      Filesize

                                      1.2MB

                                      MD5

                                      561916711c707fe011411fd3d2cf71a8

                                      SHA1

                                      f7780da112a6abb515e7a9883810cf82a634674a

                                      SHA256

                                      0d2ccf801ceabba978a77238e1b79afc9a66983a11c07e011f876c063a71ffdb

                                      SHA512

                                      29b11fa1ffff586df4bae7a141a5e69500e327b54aa19efc32bd5bdd2f9652bbb641bc7bdc3116c95ca27022022894da5f9c94c987ce6c9793fce93f668b9c5a

                                    • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\icudtl.dat

                                      Filesize

                                      10.2MB

                                      MD5

                                      74bded81ce10a426df54da39cfa132ff

                                      SHA1

                                      eb26bcc7d24be42bd8cfbded53bd62d605989bbf

                                      SHA256

                                      7bf96c193befbf23514401f8f6568076450ade52dd1595b85e4dfcf3de5f6fb9

                                      SHA512

                                      bd7b7b52d31803b2d4b1fd8cb76481931ed8abb98d779b893d3965231177bdd33386461e1a820b384712013904da094e3cd15ee24a679ddc766132677a8be54a

                                    • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\locales\en-US.pak

                                      Filesize

                                      394KB

                                      MD5

                                      a8af211968e7d1fbc577fc55e1859f6d

                                      SHA1

                                      1fbf54c0be76318b4c4ede2daea08191221df890

                                      SHA256

                                      92efd174fffe9e958e20edf1acdb9394ce81ae38b9d1a04203cb35585ecbb5b7

                                      SHA512

                                      11c2d88467135e8d39c06dffe27be53c471d0c917b1767050d6c36dd7701ecac22680313203efc312ac6ffe867da658cc38ccb9ba19962e78a5accc6e5df0e21

                                    • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\resources.pak

                                      Filesize

                                      8.0MB

                                      MD5

                                      d092e6572493590a6cb2498e029509dc

                                      SHA1

                                      f3564c4fec2e855486d63a90e34b1abb59e40ecb

                                      SHA256

                                      103ba11595d71025abc07c1f32e9f0fa11d9a191afeba6ee950154c5b358ac0b

                                      SHA512

                                      e8894be07117dd7fa624a8d48dafa9371623bad475bc2523eaa5d0da1aa026deecb03062678a35a79c9798d5215a008ed812548ae2107d22bbe226940499d7ff

                                    • C:\Users\Admin\AppData\Local\PuppeteerSharp\Chrome\Win64-124.0.6367.201\chrome-win64\v8_context_snapshot.bin

                                      Filesize

                                      641KB

                                      MD5

                                      0753b1e35ebc257c8511b6f219fac1ec

                                      SHA1

                                      7acd65cbcc253130b0127a0a189601671e9fc1d1

                                      SHA256

                                      ddd3a5acffc4e8d6b9211c84733debdf394c3cb12d702598e1a5e56b13c89c61

                                      SHA512

                                      b9dfac660d834aacb30e6e1e272c4f0669659514f48aadc8b5542dd42ca1bd5aca4bbd00941c2ccacccc9ca068f133623dedc9994f5ccbbf1ac36bbdef99aee2

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\Default\4314bc71-2b43-4b87-b7c7-f61e63ba2b53.tmp

                                      Filesize

                                      5KB

                                      MD5

                                      682fdea86627f2958eae02b419616264

                                      SHA1

                                      402da80d8a97a13b73db86f68230f56ec55a1b55

                                      SHA256

                                      b73c60a32faad2133951e64685a0651fc93a75dab34f505ce89325f1d18bec2b

                                      SHA512

                                      ffe1f324da87636c820f409b48853b37b400cabef6dc25b35be3ddc94df2055f6713c0bb0795cbc10e6df0662bd8c80f212e17b1fdbae71064bde7d17873e0d6

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      48B

                                      MD5

                                      b34d53956ee59b733d9992beec0addea

                                      SHA1

                                      3b066b9d7bb9bd17d49fb421359779e322ba378d

                                      SHA256

                                      7e07b72a7db447766fefa26cbcd2f8f64035aba96edf1d659987576d6f5801b4

                                      SHA512

                                      95a1320611f568c6bb86520efc6c404715ffa629f257da83f28d0b1d0929ea79f8a65dde2d02598cbf3d60747364b6cdbfa5ba45e15e36ca9f102675873494fe

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      2KB

                                      MD5

                                      d5278fc3bd70cab075b23c776d51de92

                                      SHA1

                                      974b5d2ea315ff41bd9342a1b3fa27084320d4c4

                                      SHA256

                                      039168a5becb68ffb1f154074ee4ca5e651ec268c4f0b947598e4ae8ac44388f

                                      SHA512

                                      540f19dc5720cdf93833d9c03267902b5936e2cba7bc00d699824dc4dcde4311b8d67065611ceb1b39ecd97a66b36bd3a762fb0e33f382bc4bba27a4d63b7705

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\Default\Extension Rules\MANIFEST-000001

                                      Filesize

                                      41B

                                      MD5

                                      5af87dfd673ba2115e2fcf5cfdb727ab

                                      SHA1

                                      d5b5bbf396dc291274584ef71f444f420b6056f1

                                      SHA256

                                      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                      SHA512

                                      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\Default\Network\SCT Auditing Pending Reports

                                      Filesize

                                      2B

                                      MD5

                                      d751713988987e9331980363e24189ce

                                      SHA1

                                      97d170e1550eee4afc0af065b78cda302a97674c

                                      SHA256

                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                      SHA512

                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\Default\Network\TransportSecurity

                                      Filesize

                                      1KB

                                      MD5

                                      734ab5ef789963eaaea40a5b56c940f0

                                      SHA1

                                      33c1de44131c0353a7c1a8f65030a0f12e891b2f

                                      SHA256

                                      27439266468781fda1ed8d15fc38275a6a216573691c76668d35a56438af9b92

                                      SHA512

                                      4d1c0f2860fdde17f8b97117f549f68b0f29d24837715cd6a3358d4b27987ef4b4d374fdaf0d3fc3cf53de14015ce7bb26098b7af5899481370430705bb20d96

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\Default\Network\TransportSecurity

                                      Filesize

                                      1KB

                                      MD5

                                      b121dbc2df7d384d0e2548172146cd17

                                      SHA1

                                      f8b1e915853562b1a68f2d99447aaf24960206a6

                                      SHA256

                                      00cf9925e3195609935695aaa1d6c56ca44a8e5fe97b8297b53042141feea96b

                                      SHA512

                                      e82d51be1ce7cb36123540cfac8aebf63945c359cd4ddab6d1e4633c8c5606a1826f32ce3a8a7cd5bc70faab2ca35ab4f71b370b1a4708c42bcbed8883e6f0a7

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\Default\Network\TransportSecurity~RFe5937ee.TMP

                                      Filesize

                                      1KB

                                      MD5

                                      deceab6a9f9f4bb38836514f743a8b7e

                                      SHA1

                                      c281e8c7858686f6fb8f39e02f41cf0790389db2

                                      SHA256

                                      4b446a0370f9c05b17dcb64ca1c0eaf1a5996b3d7cc690297734258b39fbe9cd

                                      SHA512

                                      6c5715991a62f9f8fb4b08d363a9103fca09766dd8424b5000a63efa8387921c085416f4c8f1149c787043e6ee540fa002cd3524a97a99a534f727b39be19c11

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      8198a8bf1205dcce596872785ebb7d55

                                      SHA1

                                      47e0b42aab265eef29186da64e82f60c9e014b96

                                      SHA256

                                      235353ec1784f81f697d5170efe4a66d7dfafd6706c4ec09d047030918c92139

                                      SHA512

                                      8d32a283c4326326a5d35680c5cd732663412d4ed7f549243630829055f294e798e8198fbc6afd96f9887521f226fd5e5a99f5f100ba24d5082f340942e1c9df

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\Default\Preferences~RFe593723.TMP

                                      Filesize

                                      5KB

                                      MD5

                                      c30520f52e48747892996b5212b7f8db

                                      SHA1

                                      e29fbfdab0c6c521713b0742605b32362a07ec80

                                      SHA256

                                      b0dbf4dc6579a57949c98f1af5db9f1610ed5cbff54943648cb69e0c2d27c71e

                                      SHA512

                                      65beff532162f588b9595a1e738c07f6b3377ce98c07fde35959bd6d194790189bbe5f14511cc0de59028047fa97b7e988fe1aef2db748c0a9814f5f5445af25

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\GrShaderCache\data_0

                                      Filesize

                                      8KB

                                      MD5

                                      cf89d16bb9107c631daabf0c0ee58efb

                                      SHA1

                                      3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                      SHA256

                                      d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                      SHA512

                                      8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\GrShaderCache\data_1

                                      Filesize

                                      264KB

                                      MD5

                                      d0d388f3865d0523e451d6ba0be34cc4

                                      SHA1

                                      8571c6a52aacc2747c048e3419e5657b74612995

                                      SHA256

                                      902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                      SHA512

                                      376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\GrShaderCache\data_2

                                      Filesize

                                      8KB

                                      MD5

                                      0962291d6d367570bee5454721c17e11

                                      SHA1

                                      59d10a893ef321a706a9255176761366115bedcb

                                      SHA256

                                      ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                      SHA512

                                      f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\GrShaderCache\data_3

                                      Filesize

                                      8KB

                                      MD5

                                      41876349cb12d6db992f1309f22df3f0

                                      SHA1

                                      5cf26b3420fc0302cd0a71e8d029739b8765be27

                                      SHA256

                                      e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                      SHA512

                                      e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\Local State

                                      Filesize

                                      3KB

                                      MD5

                                      6a01ed3c959e48d56d58693d2dda986f

                                      SHA1

                                      fe2ed1194bff3d57b50b7b1c91854db62d4b9235

                                      SHA256

                                      fbc69304f3df57abc8ad59db690d3309f89df7e419f5aa72a544ab698da7e3b8

                                      SHA512

                                      6ace228e443c91ddc1c3304ee40a7325356487e015afe66c11e4ac346d504347e985fa30901c884cedfc1834379ee09681fb296a41a421e7db77e5e9dcf05de7

                                    • C:\Users\Admin\AppData\Local\Temp\4iezvycc.1tn\Local State~RFe590882.TMP

                                      Filesize

                                      914B

                                      MD5

                                      6383f581befbe6dbb116935767871343

                                      SHA1

                                      8949dd422fb2a73d5a90ba7b375cc49e399a3bc1

                                      SHA256

                                      eeca71baf73867a062709baa1b3d6229bd6abdf7d48c95a7e5926fafc8a9500a

                                      SHA512

                                      cd0cb1cb45984e28b5513e5e3bfb868ca37f62165808a85abf08d1b1a83a27b4791cfa0e74ad2c642d2e546c81de4547148418b989cb59d7198a1bca0853b69e

                                    • C:\Users\Admin\AppData\Local\Temp\dd_vcredist_x86_20240808023839_000_vcRuntimeMinimum_x86.log

                                      Filesize

                                      2KB

                                      MD5

                                      2176ab6816c76385307a3fb980e42ab3

                                      SHA1

                                      49431f7828bb44197016a8bfef32eed34c265138

                                      SHA256

                                      17dc2e7b69fb3275c495278fad3be83b6f41c5e8f64aeac9cf937acb89ceeda4

                                      SHA512

                                      79ccc3d8656fdc88a0408b595c1350eb65b389a05ffd37265848105596e570cdfda5e0d5a04902ecbedf2e4c8714a9ef900f2e31c57f7e8ac863ed92d3d41d55

                                    • C:\Users\Admin\AppData\Local\Temp\dd_vcredist_x86_20240808023839_001_vcRuntimeAdditional_x86.log

                                      Filesize

                                      2KB

                                      MD5

                                      1ebe6fd28cfe5036ae2603398b654ed8

                                      SHA1

                                      c2d6d22c257f1bcd4072d14425dc78d40a8f0d89

                                      SHA256

                                      22cc4f3ace68787c9d18324d77927fb6dff1d8e04301ee8e0ae538dd79e66afe

                                      SHA512

                                      55daf629866807a830ff69d947ff3ac75330386a40cbeb5e44497b93f7d5a8aa87f93b200adfae08aaf5de6600fdc57699c6baa3f8d48f28748010442cd7f78b

                                    • C:\Users\Admin\AppData\Local\Temp\vcredist.tmp

                                      Filesize

                                      13.2MB

                                      MD5

                                      8457542fd4be74cb2c3a92b3386ae8e9

                                      SHA1

                                      198722b4f5fc62721910569d9d926dce22730c22

                                      SHA256

                                      a32dd41eaab0c5e1eaa78be3c0bb73b48593de8d97a7510b97de3fd993538600

                                      SHA512

                                      91a6283f774f9e2338b65aa835156854e9e76aed32f821b13cfd070dd6c87e1542ce2d5845beb5e4af1ddb102314bb6e0ad6214d896bb3e387590a01eae0c182

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                      Filesize

                                      2B

                                      MD5

                                      f3b25701fe362ec84616a93a45ce9998

                                      SHA1

                                      d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                      SHA256

                                      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                      SHA512

                                      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                    • C:\Users\Admin\Downloads\Roblox.Account.Manager.3.7.2.zip

                                      Filesize

                                      4.2MB

                                      MD5

                                      d58b79cb3d3635ba963427362f75d075

                                      SHA1

                                      0e33eeff9b625fceb2d2d0195e6f32523d57db79

                                      SHA256

                                      49b2c015da0851a2ed43820799a7bcda08e1bc5f315e107598f87f4b1bd36dac

                                      SHA512

                                      176de76618d0dc43f17e2971787666b737d7308a67f40bd2bb82ab4f0d3276f877fbeb7cc987f797e6572ec736c29d8568f441194a45cb5ba8d751bf139ab79a

                                    • C:\Users\Admin\Downloads\Roblox.Account.Manager.3.7.2.zip:Zone.Identifier

                                      Filesize

                                      603B

                                      MD5

                                      c0ee40c39a6b13cf7deb04905e623f97

                                      SHA1

                                      7696b92d4d5a76158db1083a849762056b7b3f29

                                      SHA256

                                      ace8243d5852261d9dfa78261702793ca0bd54b552c7c762fe51f2adb57a8fe4

                                      SHA512

                                      2775fdd39e873765f21c1dcb84b071bcdcd9b4d2eb5c998a58194ebafcd222781c742cab169a82e475d67b08a8cb67c4e6175101447f0cdc75fd42a607d56866

                                    • C:\Users\Admin\Downloads\Roblox.Account.Manager.3.7.2\RAMSettings.ini

                                      Filesize

                                      1014B

                                      MD5

                                      1d917eaf5dcc8e06dd032c33f3a3d36a

                                      SHA1

                                      1eacb4eced22393fd5140910d30070f2e054e2fe

                                      SHA256

                                      787fa9af1c32b7e198119469c0e2c02c06b34ec7c990b62b9f4fb9bc8cedaa5f

                                      SHA512

                                      3cf5bc6160262ad454477cc0fab401696a7e5dff9e6fae1cdcfa0579ded640ea8c383dfcea6194f55c914927058e2355fd661d1fa83f87c10aeffa6a91cb9fcd

                                    • C:\Users\Admin\Downloads\Roblox.Account.Manager.3.7.2\RAMTheme.ini

                                      Filesize

                                      314B

                                      MD5

                                      f18fa783f4d27e35e54e54417334bfb4

                                      SHA1

                                      94511cdf37213bebdaf42a6140c9fe5be8eb07ba

                                      SHA256

                                      563eb35fd613f4298cd4dceff67652a13ba516a6244d9407c5709323c4ca4bb1

                                      SHA512

                                      602f6a68562bc89a4b3c3a71c2477377f161470bf8ae8e6925bf35691367115abfa9809925bd09c35596c6a3e5a7e9d090e5198e6a885a6658049c8732a05071

                                    • C:\Users\Admin\Downloads\Roblox.Account.Manager.3.7.2\Roblox Account Manager.exe.config

                                      Filesize

                                      6KB

                                      MD5

                                      0a86fa27d09e26491dbbb4fe27f4b410

                                      SHA1

                                      63e4b5afb8bdb67fc1d6f8dddeb40be20939289e

                                      SHA256

                                      2b6d99db8369b0ff6372737d89d1c9e4101815b4168a3852c7b513f2897e7f3d

                                      SHA512

                                      fbebc4dc0925d5d67271cac04c1ed324091442ef4c9f6243d2c1c523c9aa6b338c6a594e4987fc142dd3b2a023338a267c8a3454e47fbf0b3e0dbd7b3b65cc0d

                                    • C:\Users\Admin\Downloads\Roblox.Account.Manager.3.7.2\libsodium.dll

                                      Filesize

                                      477KB

                                      MD5

                                      4f6426e3626d5d46fb19c13043cb84de

                                      SHA1

                                      9dfa32f957c19c843a568b57d555d6d5cbc61579

                                      SHA256

                                      7a960129f6d3f8d44b4c6be27f587c29aa8bafb9c4d3c85bb84a5f5d8fa6e2ba

                                      SHA512

                                      7a83adf2b36973ceb52bfc95591bc91d4ac778a4e11d11723f6d8bf208811b8fa7d072851cfed73407c9413455de717e9a42f8e6bb1a133cb2b1981c66bb5832

                                    • C:\Users\Admin\Downloads\Roblox.Account.Manager.3.7.2\log4.config

                                      Filesize

                                      936B

                                      MD5

                                      e4659ac08af3582a23f38bf6c562f841

                                      SHA1

                                      19cb4f014ba96285fa1798f008deabce632c7e76

                                      SHA256

                                      e4b10630d9ec2af508de31752fbbc6816c7426c40a3e57f0a085ce7f42c77bd5

                                      SHA512

                                      5bfa1e021cc7ee5e7a00da865d68684202b3b92d3d369b85b80c591fffa67725d434398325dc1e37c659eab62c0a4118b3e279ac0096b95790d252ceb6254249

                                    • C:\Windows\Temp\{8F782935-E3BA-4DCB-89B0-5F43AC5AC755}\.cr\vcredist.tmp

                                      Filesize

                                      634KB

                                      MD5

                                      337b547d2771fdad56de13ac94e6b528

                                      SHA1

                                      3aeecc5933e7d8977e7a3623e8e44d4c3d0b4286

                                      SHA256

                                      81873c2f6c8bc4acaad66423a1b4d90e70214e59710ea7f11c8aeb069acd4cd0

                                      SHA512

                                      0d0102fafb7f471a6836708d81952f2c90c2b126ad1b575f2e2e996540c99f7275ebd1f570cafcc945d26700debb1e86b19b090ae5cdec2326dd0a6a918b7a36

                                    • C:\Windows\Temp\{D2985693-4543-4E58-A046-701ACDFD14B2}\.ba\logo.png

                                      Filesize

                                      1KB

                                      MD5

                                      d6bd210f227442b3362493d046cea233

                                      SHA1

                                      ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

                                      SHA256

                                      335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

                                      SHA512

                                      464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

                                    • C:\Windows\Temp\{D2985693-4543-4E58-A046-701ACDFD14B2}\.ba\wixstdba.dll

                                      Filesize

                                      191KB

                                      MD5

                                      eab9caf4277829abdf6223ec1efa0edd

                                      SHA1

                                      74862ecf349a9bedd32699f2a7a4e00b4727543d

                                      SHA256

                                      a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041

                                      SHA512

                                      45b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2

                                    • C:\Windows\Temp\{D2985693-4543-4E58-A046-701ACDFD14B2}\cab54A5CABBE7274D8A22EB58060AAB7623

                                      Filesize

                                      822KB

                                      MD5

                                      25bd21af44d3968a692e9b8a85f5c11d

                                      SHA1

                                      d805d1624553199529a82151f23a1330ac596888

                                      SHA256

                                      f4576ef2e843c282d2a932f7c55d71cc3fcbb35b0a17a0a640eb5f21731cc809

                                      SHA512

                                      ed3660183bf4e0d39e4f43a643007afc143b1d4ec0b45f0fdce28d8e896f646ec24a2a7a5429e8b10f4379cb4ffd1572adba10fc426990d05c0cafefdd87a4fb

                                    • C:\Windows\Temp\{D2985693-4543-4E58-A046-701ACDFD14B2}\cabB3E1576D1FEFBB979E13B1A5379E0B16

                                      Filesize

                                      4.9MB

                                      MD5

                                      3a7979fbe74502ddc0a9087ee9ca0bdf

                                      SHA1

                                      3c63238363807c2f254163769d0a582528e115af

                                      SHA256

                                      7327d37634cc8e966342f478168b8850bea36a126d002c38c7438a7bd557c4ca

                                      SHA512

                                      6435db0f210ad317f4cd00bb3300eb41fb86649f7a0e3a05e0f64f8d0163ab53dbdb3c98f99a15102ce09fcd437a148347bab7bfd4afe4c90ff2ea05bb4febff

                                    • C:\Windows\Temp\{D2985693-4543-4E58-A046-701ACDFD14B2}\vcRuntimeAdditional_x86

                                      Filesize

                                      180KB

                                      MD5

                                      2ba51e907b5ee6b2aef6dfe5914ae3e3

                                      SHA1

                                      6cc2c49734bf9965fe0f3977705a417ed8548718

                                      SHA256

                                      be137dc2b1ec7e85ae7a003a09537d3706605e34059361404ea3110874895e3a

                                      SHA512

                                      e3ba5aa8f366e3b1a92d8258daa74f327248fb21f168b7472b035f8d38f549f5f556eb9093eb8483ca51b78e9a77ee6e5b6e52378381cce50918d81e8e982d47

                                    • C:\Windows\Temp\{D2985693-4543-4E58-A046-701ACDFD14B2}\vcRuntimeMinimum_x86

                                      Filesize

                                      180KB

                                      MD5

                                      828f217e9513cfff708ffe62d238cfc5

                                      SHA1

                                      9fb65d4edb892bf940399d5fd6ae3a4b15c2e4ba

                                      SHA256

                                      a2ad58d741be5d40af708e15bf0dd5e488187bf28f0b699d391a9ef96f899886

                                      SHA512

                                      ffc72b92f1431bbd07889e28b55d14ea11f8401e2d0b180e43a898914209893941affacc0a4ea34eeefc9b0ca4bc84a3045591cd98aae6bdb11ae831dc6bb121

                                    • memory/656-602-0x000001C3E82B0000-0x000001C3E8D72000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/704-86-0x0000000000D00000-0x000000000126C000-memory.dmp

                                      Filesize

                                      5.4MB

                                    • memory/704-87-0x00000000062A0000-0x0000000006846000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/704-88-0x0000000005C80000-0x0000000005CC6000-memory.dmp

                                      Filesize

                                      280KB

                                    • memory/704-89-0x0000000005E30000-0x0000000005EC2000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/704-90-0x0000000005D90000-0x0000000005DB6000-memory.dmp

                                      Filesize

                                      152KB

                                    • memory/2336-510-0x0000000000A20000-0x0000000000A97000-memory.dmp

                                      Filesize

                                      476KB

                                    • memory/2508-127-0x0000000002AE0000-0x0000000002AF4000-memory.dmp

                                      Filesize

                                      80KB

                                    • memory/2508-112-0x000000000C740000-0x000000000C7F2000-memory.dmp

                                      Filesize

                                      712KB

                                    • memory/2508-663-0x0000000005280000-0x0000000005288000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/2508-661-0x0000000005170000-0x0000000005180000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/2508-191-0x00000000051D0000-0x00000000051E2000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/2508-190-0x00000000051A0000-0x00000000051AA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/2508-187-0x000000000B420000-0x000000000B777000-memory.dmp

                                      Filesize

                                      3.3MB

                                    • memory/2508-132-0x000000000C3F0000-0x000000000C3F8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/2508-131-0x000000000C440000-0x000000000C490000-memory.dmp

                                      Filesize

                                      320KB

                                    • memory/2508-601-0x000000006F590000-0x000000006F5A5000-memory.dmp

                                      Filesize

                                      84KB

                                    • memory/2508-116-0x000000000CB70000-0x000000000CB78000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/2508-732-0x000000000AF00000-0x000000000AF0A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/2508-115-0x000000000CB50000-0x000000000CB6A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/2508-114-0x000000000CA60000-0x000000000CB54000-memory.dmp

                                      Filesize

                                      976KB

                                    • memory/2508-113-0x000000000CA30000-0x000000000CA52000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/2508-662-0x0000000005240000-0x0000000005254000-memory.dmp

                                      Filesize

                                      80KB

                                    • memory/2508-110-0x000000000C6A0000-0x000000000C6F8000-memory.dmp

                                      Filesize

                                      352KB

                                    • memory/2508-105-0x000000000AD50000-0x000000000ADF0000-memory.dmp

                                      Filesize

                                      640KB

                                    • memory/2508-104-0x000000000AD30000-0x000000000AD3A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/2508-103-0x000000000A5D0000-0x000000000A60A000-memory.dmp

                                      Filesize

                                      232KB

                                    • memory/2508-1038-0x0000000000F80000-0x0000000000F96000-memory.dmp

                                      Filesize

                                      88KB

                                    • memory/2508-101-0x0000000006090000-0x000000000609A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/2508-100-0x0000000005EF0000-0x0000000005F64000-memory.dmp

                                      Filesize

                                      464KB

                                    • memory/2508-660-0x0000000005200000-0x000000000523E000-memory.dmp

                                      Filesize

                                      248KB

                                    • memory/2508-659-0x0000000005180000-0x0000000005194000-memory.dmp

                                      Filesize

                                      80KB

                                    • memory/2508-658-0x0000000002B20000-0x0000000002B2A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/2508-657-0x0000000002AF0000-0x0000000002AFA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/4704-548-0x0000000000A20000-0x0000000000A97000-memory.dmp

                                      Filesize

                                      476KB

                                    • memory/5508-547-0x0000000000A20000-0x0000000000A97000-memory.dmp

                                      Filesize

                                      476KB