Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    115s
  • max time network
    103s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14/10/2024, 17:07

General

  • Target

    JJSploit_8.10.7_x64-setup.exe

  • Size

    5.7MB

  • MD5

    87bece829aec9cd170070742f5cc2db7

  • SHA1

    0a5d48a24e730dec327f08dfe86f79cc7991563e

  • SHA256

    88a19d3e027158e8c66d5068303532a0d56a700f718db80aa97e5e44f39bf4a4

  • SHA512

    198c80d4b430a38ac597ff9023128cdbc9d2891097beef239721c330c75a412c0bdb87a4bfb0609db94f320655f3df1fab7d885843c0af40687e46ddcc88c9d1

  • SSDEEP

    98304:hrPwHVCta3WJ3eKrvOsbroYIknJ0a/eFuwsqQkHOkb5DSnum1YmDhnu5NHxHDb4I:hyMAzKrv5raUJ32kbTlSD16ACG7x

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3312
      • C:\Users\Admin\AppData\Local\Temp\JJSploit_8.10.7_x64-setup.exe
        "C:\Users\Admin\AppData\Local\Temp\JJSploit_8.10.7_x64-setup.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3588
      • C:\Users\Admin\AppData\Local\JJSploit\JJSploit.exe
        C:\Users\Admin\AppData\Local\JJSploit\JJSploit.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4752
        • C:\Windows\system32\cmd.exe
          "cmd" /C start https://www.youtube.com/@Omnidev_
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4216
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/@Omnidev_
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2548
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffaca5f3cb8,0x7ffaca5f3cc8,0x7ffaca5f3cd8
              5⤵
                PID:4400
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,7334937910702741288,14630151145269332976,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2036 /prefetch:2
                5⤵
                  PID:808
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,7334937910702741288,14630151145269332976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:3
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3892
            • C:\Windows\system32\cmd.exe
              "cmd" /C start https://www.youtube.com/@WeAreDevsExploits
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2256
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/@WeAreDevsExploits
                4⤵
                • Enumerates system info in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:4520
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaca5f3cb8,0x7ffaca5f3cc8,0x7ffaca5f3cd8
                  5⤵
                    PID:1348
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1804,11251457451634536523,10823034515761174253,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:2
                    5⤵
                      PID:4840
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1804,11251457451634536523,10823034515761174253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:3
                      5⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2336
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1804,11251457451634536523,10823034515761174253,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:8
                      5⤵
                        PID:1492
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,11251457451634536523,10823034515761174253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:1
                        5⤵
                          PID:3208
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,11251457451634536523,10823034515761174253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
                          5⤵
                            PID:1052
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,11251457451634536523,10823034515761174253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:1
                            5⤵
                              PID:3760
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,11251457451634536523,10823034515761174253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:1
                              5⤵
                                PID:1364
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,11251457451634536523,10823034515761174253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:1
                                5⤵
                                  PID:2140
                                • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1804,11251457451634536523,10823034515761174253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:8
                                  5⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4696
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1804,11251457451634536523,10823034515761174253,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:8
                                  5⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4172
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,11251457451634536523,10823034515761174253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
                                  5⤵
                                    PID:2960
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1804,11251457451634536523,10823034515761174253,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:1
                                    5⤵
                                      PID:4168
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1804,11251457451634536523,10823034515761174253,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6036 /prefetch:8
                                      5⤵
                                        PID:4060
                                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=en-US --mojo-named-platform-channel-pipe=4752.4880.11969787165078916151
                                    3⤵
                                    • Enumerates system info in registry
                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of WriteProcessMemory
                                    PID:1588
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xe0,0x1b4,0x7ffaca5f3cb8,0x7ffaca5f3cc8,0x7ffaca5f3cd8
                                      4⤵
                                        PID:1636
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1844,10689117672843054256,9402421320602391143,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1872 /prefetch:2
                                        4⤵
                                          PID:4644
                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1844,10689117672843054256,9402421320602391143,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=1960 /prefetch:3
                                          4⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1104
                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1844,10689117672843054256,9402421320602391143,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2356 /prefetch:8
                                          4⤵
                                            PID:3060
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1844,10689117672843054256,9402421320602391143,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2980 /prefetch:1
                                            4⤵
                                              PID:4916
                                        • C:\Users\Admin\AppData\Local\JJSploit\JJSploit.exe
                                          "C:\Users\Admin\AppData\Local\JJSploit\JJSploit.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • Suspicious use of FindShellTrayWindow
                                          PID:4924
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=en-US --mojo-named-platform-channel-pipe=4924.4456.18278050500792517437
                                            3⤵
                                            • Enumerates system info in registry
                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                            • Suspicious use of FindShellTrayWindow
                                            PID:2784
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0x100,0x1d0,0x7ffaca5f3cb8,0x7ffaca5f3cc8,0x7ffaca5f3cd8
                                              4⤵
                                                PID:3876
                                              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1776,11195648414028964270,17580293133297259739,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1852 /prefetch:2
                                                4⤵
                                                  PID:1596
                                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1776,11195648414028964270,17580293133297259739,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2020 /prefetch:3
                                                  4⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:2208
                                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1776,11195648414028964270,17580293133297259739,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2520 /prefetch:8
                                                  4⤵
                                                    PID:708
                                                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1776,11195648414028964270,17580293133297259739,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2904 /prefetch:1
                                                    4⤵
                                                      PID:4808
                                                • C:\Users\Admin\AppData\Local\JJSploit\JJSploit.exe
                                                  "C:\Users\Admin\AppData\Local\JJSploit\JJSploit.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of FindShellTrayWindow
                                                  PID:1796
                                                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=en-US --mojo-named-platform-channel-pipe=1796.488.3852749728883007963
                                                    3⤵
                                                    • Enumerates system info in registry
                                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                    • Suspicious use of FindShellTrayWindow
                                                    PID:692
                                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x10c,0x110,0x114,0xe8,0xa8,0x7ffaca5f3cb8,0x7ffaca5f3cc8,0x7ffaca5f3cd8
                                                      4⤵
                                                        PID:5044
                                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1728,1231137922590575162,15233968559218176907,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1812 /prefetch:2
                                                        4⤵
                                                          PID:4148
                                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1728,1231137922590575162,15233968559218176907,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=1884 /prefetch:3
                                                          4⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:4140
                                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1728,1231137922590575162,15233968559218176907,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2532 /prefetch:8
                                                          4⤵
                                                            PID:2736
                                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1728,1231137922590575162,15233968559218176907,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2916 /prefetch:1
                                                            4⤵
                                                              PID:3760
                                                        • C:\Users\Admin\AppData\Local\JJSploit\JJSploit.exe
                                                          "C:\Users\Admin\AppData\Local\JJSploit\JJSploit.exe"
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of FindShellTrayWindow
                                                          PID:1560
                                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=en-US --mojo-named-platform-channel-pipe=1560.492.9325130954639724518
                                                            3⤵
                                                            • Enumerates system info in registry
                                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                            • Suspicious use of FindShellTrayWindow
                                                            PID:4760
                                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xe4,0x118,0x7ffaca5f3cb8,0x7ffaca5f3cc8,0x7ffaca5f3cd8
                                                              4⤵
                                                                PID:3568
                                                              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1728,9871113081620316224,17836302684119907957,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1748 /prefetch:2
                                                                4⤵
                                                                  PID:2348
                                                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1728,9871113081620316224,17836302684119907957,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2028 /prefetch:3
                                                                  4⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:2164
                                                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1728,9871113081620316224,17836302684119907957,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2640 /prefetch:8
                                                                  4⤵
                                                                    PID:4816
                                                                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1728,9871113081620316224,17836302684119907957,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2960 /prefetch:1
                                                                    4⤵
                                                                      PID:4840
                                                                • C:\Users\Admin\AppData\Local\JJSploit\JJSploit.exe
                                                                  "C:\Users\Admin\AppData\Local\JJSploit\JJSploit.exe"
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  PID:4148
                                                                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=en-US --mojo-named-platform-channel-pipe=4148.3572.4818779400056559330
                                                                    3⤵
                                                                    • Enumerates system info in registry
                                                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    PID:3768
                                                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xe4,0x1ac,0x7ffaca5f3cb8,0x7ffaca5f3cc8,0x7ffaca5f3cd8
                                                                      4⤵
                                                                        PID:648
                                                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1760,7069652600542680656,12310582051120389011,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1780 /prefetch:2
                                                                        4⤵
                                                                          PID:4584
                                                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1760,7069652600542680656,12310582051120389011,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2092 /prefetch:3
                                                                          4⤵
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:1620
                                                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1760,7069652600542680656,12310582051120389011,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2544 /prefetch:8
                                                                          4⤵
                                                                            PID:1528
                                                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1760,7069652600542680656,12310582051120389011,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2872 /prefetch:1
                                                                            4⤵
                                                                              PID:3588
                                                                        • C:\Windows\system32\taskmgr.exe
                                                                          "C:\Windows\system32\taskmgr.exe" /0
                                                                          2⤵
                                                                          • Checks SCSI registry key(s)
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:3004
                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                        1⤵
                                                                          PID:648
                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                          1⤵
                                                                            PID:3588
                                                                          • C:\Windows\system32\AUDIODG.EXE
                                                                            C:\Windows\system32\AUDIODG.EXE 0x00000000000004AC 0x00000000000004B8
                                                                            1⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:596
                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                            1⤵
                                                                              PID:2472
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                                                              1⤵
                                                                                PID:996
                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                1⤵
                                                                                  PID:4728
                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                  1⤵
                                                                                    PID:924

                                                                                  Network

                                                                                  MITRE ATT&CK Enterprise v15

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads

                                                                                  • C:\Users\Admin\AppData\Local\JJSploit\JJSploit.exe

                                                                                    Filesize

                                                                                    10.5MB

                                                                                    MD5

                                                                                    e59012474c711e0db071950d859bac42

                                                                                    SHA1

                                                                                    2a1839c61829b70874aaecd41d76a03b8c6cb5dc

                                                                                    SHA256

                                                                                    5bd65131cad50c58ae916818d54abe44c014854db770aa71a9933293939ad576

                                                                                    SHA512

                                                                                    61e94c2949d9f08d2ce37dbe5687cc8ff68b274e2ee56d530870a977773a1e04ac58bca4f550887790f0d31534d862cdc869a90621c03ebf030cf73b41fd5774

                                                                                  • C:\Users\Admin\AppData\Local\JJSploit\db.json

                                                                                    Filesize

                                                                                    311B

                                                                                    MD5

                                                                                    84095feb496d351b9c80e926938f9ca8

                                                                                    SHA1

                                                                                    d8ac99f45d8420698809521a4c1a30e954f118da

                                                                                    SHA256

                                                                                    1ee333036765e94b9f6975a2cfb6a799c42b3357078b424753f6aa61b225e54b

                                                                                    SHA512

                                                                                    347ef12c4f1849a5455014413097ea6d7a6406b36027da4734afad736a5581c6068dd4878aeab02843abbc1e1cfdb37f34c167b4886c8644ad8778e592393e10

                                                                                  • C:\Users\Admin\AppData\Local\JJSploit\libcrypto-3-x64.dll

                                                                                    Filesize

                                                                                    4.5MB

                                                                                    MD5

                                                                                    a9c1f7ca15c65c139bc9d4bf57df2e1e

                                                                                    SHA1

                                                                                    1b1377139a6b289d43a6b1161cd1089ffc817cf9

                                                                                    SHA256

                                                                                    03ec9292dcdfda520638490e11baeefff5ab1b6eb22feb90a22fc771272ce116

                                                                                    SHA512

                                                                                    97f8745dba6330c196de9b822638bfe7f74a86bdcb6726f4bd1d3d917de54f9abcb05163c42255173eac3bde995f0d611af718dbcc0de432b67666bed0c0b073

                                                                                  • C:\Users\Admin\AppData\Local\JJSploit\libssl-3-x64.dll

                                                                                    Filesize

                                                                                    802KB

                                                                                    MD5

                                                                                    51b0d5f42a82f6fa8739b403e9b8b81c

                                                                                    SHA1

                                                                                    75968c157628bb7aca9b5f2331f7a0c9a1d28865

                                                                                    SHA256

                                                                                    0bda7daeb4040c722b8c287dfd2307c9b8228576db1dbbbaac901c35cc8dc62b

                                                                                    SHA512

                                                                                    94fba90ad7bcf190079089dcc3af97c598c016eb359fe4d2ea439b5fbcd4a5489ab4422652223926aae64002beef1368d5b95874f68a2e5bc4971b4f9604d814

                                                                                  • C:\Users\Admin\AppData\Local\JJSploit\uninstall.exe

                                                                                    Filesize

                                                                                    74KB

                                                                                    MD5

                                                                                    fcbc4b016ca7164b57d332d4012f3b85

                                                                                    SHA1

                                                                                    b1f8ca1824216100edba1bf52c4a953335e277fd

                                                                                    SHA256

                                                                                    11a861694c2a3cce1e14020ffd46aef7dbcee861763203c5aebe8f4fa1cfba3b

                                                                                    SHA512

                                                                                    5b5569ab94108f535345d6b71c105222daebbe34d2132ff1f03df84151c3b7488f0f6cda7bb054694bbc58234e709a6069bfdd9239076395b4a823f2d8848b3a

                                                                                  • C:\Users\Admin\AppData\Local\JJSploit\xxhash.dll

                                                                                    Filesize

                                                                                    46KB

                                                                                    MD5

                                                                                    249a5f6ca047df2a2f802782696c7f80

                                                                                    SHA1

                                                                                    6a1d96be0f497d689fb55de70284af83cac61f52

                                                                                    SHA256

                                                                                    2828e3014c3283caeb1b00d14145a42f4e347e7f547b40634540394892265671

                                                                                    SHA512

                                                                                    d2d0b6ba2ec95c33609d98788e5a4cce382d93721ea5dea61cde3f4c065b06530a0b01ae4909f7883a81d55529a36cb6a5820aa2afc320b5761f6f59a3a45f1f

                                                                                  • C:\Users\Admin\AppData\Local\JJSploit\zstd.dll

                                                                                    Filesize

                                                                                    638KB

                                                                                    MD5

                                                                                    21dfe873f6ed38f2f713ecd43ad1ba41

                                                                                    SHA1

                                                                                    7648cb043587da0e85743f9da8dca8be621ccdf0

                                                                                    SHA256

                                                                                    2a2d63c48b6b3ac7768231ade30122c94a0a33e62e5d2725e11c95b3194aa997

                                                                                    SHA512

                                                                                    67b4f976f3511387ce2a4743e2281ac88533bd204d4e07a5c6751f0ec30a3463dfabcda18103a632541ec2a8b7b937806121e21e44959411c39106e22b739919

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                    Filesize

                                                                                    152B

                                                                                    MD5

                                                                                    c03d23a8155753f5a936bd7195e475bc

                                                                                    SHA1

                                                                                    cdf47f410a3ec000e84be83a3216b54331679d63

                                                                                    SHA256

                                                                                    6f5f7996d9b0e131dc2fec84859b7a8597c11a67dd41bdb5a5ef21a46e1ae0ca

                                                                                    SHA512

                                                                                    6ea9a631b454d7e795ec6161e08dbe388699012dbbc9c8cfdf73175a0ecd51204d45cf28a6f1706c8d5f1780666d95e46e4bc27752da9a9d289304f1d97c2f41

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                    Filesize

                                                                                    152B

                                                                                    MD5

                                                                                    3d68c7edc2a288ee58e6629398bb9f7c

                                                                                    SHA1

                                                                                    6c1909dea9321c55cae38b8f16bd9d67822e2e51

                                                                                    SHA256

                                                                                    dfd733ed3cf4fb59f2041f82fdf676973783ffa75b9acca095609c7d4f73587b

                                                                                    SHA512

                                                                                    0eda66a07ec4cdb46b0f27d6c8cc157415d803af610b7430adac19547e121f380b9c6a2840f90fe49eaea9b48fa16079d93833c2bcf4b85e3c401d90d464ad2f

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                    Filesize

                                                                                    744B

                                                                                    MD5

                                                                                    4ebcd05f0aef0d8b0045ecba7adf4745

                                                                                    SHA1

                                                                                    c9cb53b0db610e4aa15e767e2f0782bf02100ff6

                                                                                    SHA256

                                                                                    8d194cd0b94dceb0123d1e3433e067d9131e9f379b79567cc9e9b5bcce120937

                                                                                    SHA512

                                                                                    30f8d5461bb376099f98e698a457b1f444fcd3e5ac9e86f17fbd6563cb8dcc64cfe5b8e8ca29969fb9d77c64efc87c32dbcbae4b23ad699f7034ab0a828e9de7

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                    Filesize

                                                                                    3KB

                                                                                    MD5

                                                                                    085f777fd9ffa58a6cb6bcaf20a31981

                                                                                    SHA1

                                                                                    e56c3856c0ceaa8776842f5a41d5c66c3439b3f9

                                                                                    SHA256

                                                                                    8b73675c5766971f78b03b6624eafaed2d17bc186c6c6292dd75055e70143ff6

                                                                                    SHA512

                                                                                    41ea61cca9c51aa3cf3d3f24d08aface28da17be4027c51fe7380f4387a156c029ae8c9a37ba367f3fa104de054611c541dafa7c393b932a3a1f06c6eeb16642

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                    Filesize

                                                                                    6KB

                                                                                    MD5

                                                                                    c4d55fd985cf93b859eb2270a681b180

                                                                                    SHA1

                                                                                    660e8d4ab1f3e7b46c1f9a48e07869dbe755d14b

                                                                                    SHA256

                                                                                    60a6c56ddfecaa1bc28ea704eaad6fd93c7b96c6258c69d7a472417092a21e2e

                                                                                    SHA512

                                                                                    37e2a4f10617ac773a2521d9c9cae92f7b6503f47390253204c576124a37508362fbd50aefdafeb0df4c8838d9892b0eb69e21e8390cdc96b8f5123b720f867d

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                    Filesize

                                                                                    6KB

                                                                                    MD5

                                                                                    292fc1905ad56e43f1de2494ac358652

                                                                                    SHA1

                                                                                    74e58bb6d1fd5fcd633a94e77325f7a5124a4f83

                                                                                    SHA256

                                                                                    837509248b3846b6ed05a3a917bbab24c8458f0513979871726ab4672ac7d79f

                                                                                    SHA512

                                                                                    b6cde35adc6c3c091a95a75b79dd4ec07204600e14b45a71b646609d568ed9eca4aaa04346768f5976a2492cee278be7aa8b2c1ea29aac2441a3746be3d45622

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    46ea3ee64ffb2d93338b55fe4a9ae7c1

                                                                                    SHA1

                                                                                    4525080fa5d12873b59772aa384795cd57fb6e80

                                                                                    SHA256

                                                                                    660a7ff992d0baa7e85ae3c2d2ea4e8db4244fd9afdac698f00774d74d7f5c1c

                                                                                    SHA512

                                                                                    81920cb45db899491f0dd6bc82e1caf05f47a7fd2b56ea2d66303602729bc48518524ea67de292f673efc289796c79095400c5813df01a1311b6074caaee0b9b

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\5ecdc45f-22a7-4d46-b600-a86bd68092f1\index-dir\the-real-index

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    880245a247470c66804807cb52e56354

                                                                                    SHA1

                                                                                    189ed83dd49ae9e753789b34224d903f7fb4c884

                                                                                    SHA256

                                                                                    efd65545ea51ce0f285a3287b05f5548cac97081fdfd5e9df23a09e90f8535d1

                                                                                    SHA512

                                                                                    e6c47fc6842af690d298c5527aab7489a29f8e97e9076492a5792d2dc029c603e8a06e42381d379b3493aa9d94ead8d0242a059091df16ce3c13f87b3d2cdc66

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\5ecdc45f-22a7-4d46-b600-a86bd68092f1\index-dir\the-real-index~RFe5839d8.TMP

                                                                                    Filesize

                                                                                    48B

                                                                                    MD5

                                                                                    6f41a82a70958f505b39e9bdd35f0463

                                                                                    SHA1

                                                                                    05934cf3d5a6c52bd9caf581f8d891ad722cf582

                                                                                    SHA256

                                                                                    332a78d0ef9b86299a5cdfd35349ed014fbf0ae3c6ea3fb4929f9ae0d50e4c32

                                                                                    SHA512

                                                                                    d06abd88be145278cda3bbcb419f7ae7def3aa800ef9469c12ae02bc4b85b104aa12f1245ac61afd771d6caeb70aec861367c9ba0fdad4ef5eea007abb3d434c

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                    Filesize

                                                                                    84B

                                                                                    MD5

                                                                                    015abfca4e95ef011da059533d1c6877

                                                                                    SHA1

                                                                                    128e2bd7b8e339c5affc51d5713352ec75ba3a6f

                                                                                    SHA256

                                                                                    3b1b1ccbd65048630446fea3906e1001921013c838cc718dc30f82bfc096a666

                                                                                    SHA512

                                                                                    1771c71881f045f0238260a38bcfaeccd5d3592b5c1055e52240eeb6d83e51fc4deec83cadb802c1da57b9365010bae725295e4ce99cf381a7d7f0af81873354

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                    Filesize

                                                                                    82B

                                                                                    MD5

                                                                                    524f27236e26994de6ca05b62d1c6d6a

                                                                                    SHA1

                                                                                    339a8c703205023cebfe67d950de8e9d249984e0

                                                                                    SHA256

                                                                                    73bcb1148880c12c8948b3c637bd53f60c14e2553b59549b40bf4754dbf6b7ff

                                                                                    SHA512

                                                                                    803c83d2dbccc7b6f5cfd31f66ad88399a87fc941d199fcd201dc367c316c7c6b9a50d8aa5c15fbd753f6e56191483eff1de0b310c3ee1f6c877356f81b98860

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                    Filesize

                                                                                    89B

                                                                                    MD5

                                                                                    724286cd544f3208215ecc68826d7882

                                                                                    SHA1

                                                                                    03f83f53a8e75506732a8da8935af8bde5683b29

                                                                                    SHA256

                                                                                    4381af5180250f41063fc1799a9e9a652a1af561a82046497af852dd59ac42a5

                                                                                    SHA512

                                                                                    afae69dc04dabc1f4e4a07e2bed5dd288c851bbba5d132783549ea359dba8961d2bdca19742180bede9a0711922fe108910e70651da776c95816f178894f521e

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                    Filesize

                                                                                    146B

                                                                                    MD5

                                                                                    ba14e70fc12f0fbdd354a753426e503c

                                                                                    SHA1

                                                                                    fb3cd984736847e275d9a46afa2cc5f244d2f12f

                                                                                    SHA256

                                                                                    8bb786bbbdd7f9590df162684465692e86961f3a9283797042fcdb82f56b4a4b

                                                                                    SHA512

                                                                                    355bd47a7e6bc4dbbeb78b8a1df655a0d0c836ef25577054967b5957ee35cc0600105a7db91a0cff242e1d390b61de35e06394f10778aee2019c4475dbb8675c

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index

                                                                                    Filesize

                                                                                    24B

                                                                                    MD5

                                                                                    54cb446f628b2ea4a5bce5769910512e

                                                                                    SHA1

                                                                                    c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                                                                                    SHA256

                                                                                    fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                                                                                    SHA512

                                                                                    8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                    Filesize

                                                                                    72B

                                                                                    MD5

                                                                                    601d1377adaef8f7f41de55772d96cf0

                                                                                    SHA1

                                                                                    63adfdc5a14beb5278c661c262def649836af7ca

                                                                                    SHA256

                                                                                    74c6f17c085ca027e7921c4b7639ff3555c91d43e193a089bbdd2a6895bb4439

                                                                                    SHA512

                                                                                    eb491ff3ce94c846b17e5d934083b200f78c9031fd76867f85ae40b6c74f0ff9867c2ae5a545db854d29cc6821a7724e46adc9134e61903406df9c5ee79ce6fa

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5839c8.TMP

                                                                                    Filesize

                                                                                    48B

                                                                                    MD5

                                                                                    5b94e18efad32a742ee5be8717fe3d7b

                                                                                    SHA1

                                                                                    85b30f87e9d5ccc6d68dc3ba06a50da62adbca30

                                                                                    SHA256

                                                                                    4b0a7ad5483af6dcd9ddc6a667fa886e3a9c836db0f3d164eb85247289dd6d59

                                                                                    SHA512

                                                                                    91cab20683680263bd3128a95b07f2ce49dbf77a86bd2e4354e2cd98fd570476a50a903aa8f1fa308117e4dc9e9a4d7c7325220a4390199aa66b1308b03564cd

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                    Filesize

                                                                                    706B

                                                                                    MD5

                                                                                    524d5bac80e26748b0a6240ed4c83fa7

                                                                                    SHA1

                                                                                    4cce9a25525184b2f661df49d0899db24af484c3

                                                                                    SHA256

                                                                                    14dcecfd196d0b81037e7105f09848e74280e1cc5b9e13a0a78cd8c4dec60827

                                                                                    SHA512

                                                                                    40c4ef3090021776feb5b3254667136e89c66a4baf1abb0c534f91997205f89bba9c77aa7b74c22ff174b94320fcbd1aca35bebf0f5636fb6ebcdbe66b4d96ff

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe583a55.TMP

                                                                                    Filesize

                                                                                    539B

                                                                                    MD5

                                                                                    bc2ed34c0a89e7eb3caa74fe3759a935

                                                                                    SHA1

                                                                                    99227704d77cf9e037f384a3afec9ea6ca338aa7

                                                                                    SHA256

                                                                                    781092101c885c2369702c6cc98132c42db3c4c650f19738ee98385799a54758

                                                                                    SHA512

                                                                                    e6eaf52034d4f8f5091c6e49d8aaafe61428c8765c117df58e4495502a7ce078dca910bc9f7e95c8b98a0b2d77fab496036c8f292b0eb4483aa0ec9cf882b566

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                    Filesize

                                                                                    16B

                                                                                    MD5

                                                                                    6752a1d65b201c13b62ea44016eb221f

                                                                                    SHA1

                                                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                    SHA256

                                                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                    SHA512

                                                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                    Filesize

                                                                                    8KB

                                                                                    MD5

                                                                                    eafc66fa5854d15a8f2fe403c7093af8

                                                                                    SHA1

                                                                                    b7c63d342cace5886f95c8ad6df45dae21735b43

                                                                                    SHA256

                                                                                    6befcd0abee58c0df7535f81c95fca24b6bcc6083a39799ff2f311e73ec630e5

                                                                                    SHA512

                                                                                    6c2e414d04c903fbeede23c818988b05e60dea6bf6dde5556e73b68df2e2939ac900b1f0021dfa466fd083e9496216a08ea5d26c809952924323191226681d59

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                    Filesize

                                                                                    10KB

                                                                                    MD5

                                                                                    184f1af8ba09b127f9b17d5cb50d1b01

                                                                                    SHA1

                                                                                    f30d861963a64d2ed4171f362fcebb2343b42f8c

                                                                                    SHA256

                                                                                    e00d642af26a3aab4fac6b09bfe327d092bf1a2ab58038aa42a88817ac557a31

                                                                                    SHA512

                                                                                    4657c8a9c721211cacbf0b48bc89e52a74bf3f95e0745cd4e15701a62b640cd7c22964297a5d1f5120c0626422bd99cbc23b37a93a7050a5253c8be285b56ac0

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                    Filesize

                                                                                    10KB

                                                                                    MD5

                                                                                    852764232ff251f68a96ed456af9f9be

                                                                                    SHA1

                                                                                    e9e1cc475de645dce1c0f214633316a32a7f02d2

                                                                                    SHA256

                                                                                    688c3f7eec562170686ad568c60cba527a4db852dd9c7d279e2b40af2f655a31

                                                                                    SHA512

                                                                                    876b3e1ab03135e05a60600f8a29c755ce334b20a5541d6d9e446b3c816f425ef2526d0e3c34a5eb074e4e6b6568b8490183b49a79af1c85f89d4e5d14f4169f

                                                                                  • C:\Users\Admin\AppData\Local\Temp\nst9D4B.tmp\StartMenu.dll

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    d070f3275df715bf3708beff2c6c307d

                                                                                    SHA1

                                                                                    93d3725801e07303e9727c4369e19fd139e69023

                                                                                    SHA256

                                                                                    42dd4dda3249a94e32e20f76eaffae784a5475ed00c60ef0197c8a2c1ccd2fb7

                                                                                    SHA512

                                                                                    fcaf625dac4684dad33d12e3a942b38489ecc90649eee885d823a932e70db63c1edb8614b9fa8904d1710e9b820e82c5a37aeb8403cf21cf1e3692f76438664d

                                                                                  • C:\Users\Admin\AppData\Local\Temp\nst9D4B.tmp\System.dll

                                                                                    Filesize

                                                                                    12KB

                                                                                    MD5

                                                                                    cff85c549d536f651d4fb8387f1976f2

                                                                                    SHA1

                                                                                    d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

                                                                                    SHA256

                                                                                    8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

                                                                                    SHA512

                                                                                    531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

                                                                                  • C:\Users\Admin\AppData\Local\Temp\nst9D4B.tmp\modern-wizard.bmp

                                                                                    Filesize

                                                                                    25KB

                                                                                    MD5

                                                                                    cbe40fd2b1ec96daedc65da172d90022

                                                                                    SHA1

                                                                                    366c216220aa4329dff6c485fd0e9b0f4f0a7944

                                                                                    SHA256

                                                                                    3ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2

                                                                                    SHA512

                                                                                    62990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63

                                                                                  • C:\Users\Admin\AppData\Local\Temp\nst9D4B.tmp\nsDialogs.dll

                                                                                    Filesize

                                                                                    9KB

                                                                                    MD5

                                                                                    6c3f8c94d0727894d706940a8a980543

                                                                                    SHA1

                                                                                    0d1bcad901be377f38d579aafc0c41c0ef8dcefd

                                                                                    SHA256

                                                                                    56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2

                                                                                    SHA512

                                                                                    2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355

                                                                                  • C:\Users\Admin\AppData\Local\Temp\nst9D4B.tmp\nsis_tauri_utils.dll

                                                                                    Filesize

                                                                                    29KB

                                                                                    MD5

                                                                                    8def0196223484f8aed4106148dd3f08

                                                                                    SHA1

                                                                                    e0fc0951deb0e5e741df10328f95c7d6678ad3aa

                                                                                    SHA256

                                                                                    c0f2b928bc4c81cc5ca30a8932a6dc8cd617dd016679c057e23355fe732b2333

                                                                                    SHA512

                                                                                    9ffa66181bce5aa5210da0fe5edc6c80aa9e46e2bd1fafd840f468965f4d06bc03f9a77e04b975ffc9f25c886c274196e3fedae6cfb57f366ef39f1e31e1ada7

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\6679b802-96db-4b8c-b35b-6d37be61b54c.tmp

                                                                                    Filesize

                                                                                    2KB

                                                                                    MD5

                                                                                    d94f052ca16e983dd5ed3807a255f484

                                                                                    SHA1

                                                                                    babfe318bf6b244278e28408ca7e909a1655a628

                                                                                    SHA256

                                                                                    8b8731e9fd8e3839b17c37b6eedb2948a7a816cfdc1cf7925c618d4b9520d872

                                                                                    SHA512

                                                                                    b9d254ac56fc5d7c73adff5f9af5410b3d92c765e6e14f9b1c0b61cc04752397b15e687fd43a65cbb2149c6cbc3f42c4f2a9e4e71ac6235e75867a3b96eb8ade

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad\settings.dat

                                                                                    Filesize

                                                                                    152B

                                                                                    MD5

                                                                                    6f1af695907decfc6323dbb3cdf85b3b

                                                                                    SHA1

                                                                                    42f355556808d42a47fa5e44811e42e8a0474154

                                                                                    SHA256

                                                                                    5891213c8d32bb2a34ac84ee71e61c433a6fba5f239983e4609b403f0bf17874

                                                                                    SHA512

                                                                                    c7dbb46a77d54fd4f4f47d36f7e70a1672721e367d604be352d3db87d5750639c595c318622d80383d30497c7d9a8da4955227e249a86c8fa4ce7d711f8e73e0

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad\settings.dat

                                                                                    Filesize

                                                                                    152B

                                                                                    MD5

                                                                                    8763638c5456d488341bcc92cdcffa9d

                                                                                    SHA1

                                                                                    8b36bff5a9efe9fcf41d112e5c5491c8178c1852

                                                                                    SHA256

                                                                                    3dfeaf92f7d0df7f5295cb71831a07d543a354e575b43b2c2d5cf2cdb165ce0e

                                                                                    SHA512

                                                                                    350ba9ed3a286087bf846bce2116990212bfa315bba9afce6ba057fee455d7925522449893a253a20bf7166df5000001b252b6040043911239fb1a48fcce9058

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad\settings.dat

                                                                                    Filesize

                                                                                    152B

                                                                                    MD5

                                                                                    1a245a5abeca64a2b84290c88ee3e9e7

                                                                                    SHA1

                                                                                    7862377450c9d1a4224586d3dd2a7965e0147365

                                                                                    SHA256

                                                                                    2b4a06273cb5d75ccc12f72e2d08378b06cbf096575ee24820a6055d688ea878

                                                                                    SHA512

                                                                                    48824e306f7cd65227b2fca91910d0ee34f7f5d60b9b17f75090f54b7f2da828cec28147717e4bb584ddac94b679039cffa5b968586a7db5de2ab0eaf9fb2f1f

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad\throttle_store.dat

                                                                                    Filesize

                                                                                    20B

                                                                                    MD5

                                                                                    9e4e94633b73f4a7680240a0ffd6cd2c

                                                                                    SHA1

                                                                                    e68e02453ce22736169a56fdb59043d33668368f

                                                                                    SHA256

                                                                                    41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                                                                                    SHA512

                                                                                    193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                                                                                    Filesize

                                                                                    48B

                                                                                    MD5

                                                                                    076c564d0eb325ee30b66d4af4139b7b

                                                                                    SHA1

                                                                                    7997200de1e34867dcea22986807a48d5d813275

                                                                                    SHA256

                                                                                    414ac621ad37b036e88f6a08b9a29ffd520d5396eb96cbf78ab6881da5730948

                                                                                    SHA512

                                                                                    5815bf3e21cc8f40ba05e9ab8541ca6b01cd9dfa226db1fc1af630bb86da7d6e0c4b0a02e80287d0ccdd5e1b72ba3928c35d7c992e1988510ea1807264841878

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Favicons

                                                                                    Filesize

                                                                                    20KB

                                                                                    MD5

                                                                                    5688ce73407154729a65e71e4123ab21

                                                                                    SHA1

                                                                                    9a2bb4125d44f996af3ed51a71ee6f8ecd296bd7

                                                                                    SHA256

                                                                                    be1b822e970dfe1a120d248db7000eaf799bd6531929a1308676c70fe1608d60

                                                                                    SHA512

                                                                                    eb6452b23ea36c39d03ead154185616c13583f12f382cb2456beeb1ba6e5febdfd2a6f1064283cf115ad1c517dbf409777cdacb128e00c9d3f401335db355537

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\GPUCache\data_0

                                                                                    Filesize

                                                                                    8KB

                                                                                    MD5

                                                                                    cf89d16bb9107c631daabf0c0ee58efb

                                                                                    SHA1

                                                                                    3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                                                    SHA256

                                                                                    d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                                                    SHA512

                                                                                    8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\GPUCache\data_1

                                                                                    Filesize

                                                                                    264KB

                                                                                    MD5

                                                                                    f50f89a0a91564d0b8a211f8921aa7de

                                                                                    SHA1

                                                                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                    SHA256

                                                                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                    SHA512

                                                                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\GPUCache\data_2

                                                                                    Filesize

                                                                                    8KB

                                                                                    MD5

                                                                                    0962291d6d367570bee5454721c17e11

                                                                                    SHA1

                                                                                    59d10a893ef321a706a9255176761366115bedcb

                                                                                    SHA256

                                                                                    ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                                                    SHA512

                                                                                    f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\GPUCache\data_3

                                                                                    Filesize

                                                                                    8KB

                                                                                    MD5

                                                                                    41876349cb12d6db992f1309f22df3f0

                                                                                    SHA1

                                                                                    5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                                                    SHA256

                                                                                    e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                                                    SHA512

                                                                                    e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\History

                                                                                    Filesize

                                                                                    116KB

                                                                                    MD5

                                                                                    4e2922249bf476fb3067795f2fa5e794

                                                                                    SHA1

                                                                                    d2db6b2759d9e650ae031eb62247d457ccaa57d2

                                                                                    SHA256

                                                                                    c2c17166e7468877d1e80822f8a5f35a7700ac0b68f3b369a1f4154ae4f811e1

                                                                                    SHA512

                                                                                    8e5e12daf11f9f6e73fb30f563c8f2a64bbc7bb9deffe4969e23081ec1c4073cdf6c74e8dbcc65a271142083ad8312ec7d59505c90e718a5228d369f4240e1da

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\History Provider Cache

                                                                                    Filesize

                                                                                    6B

                                                                                    MD5

                                                                                    a9851aa4c3c8af2d1bd8834201b2ba51

                                                                                    SHA1

                                                                                    fa95986f7ebfac4aab3b261d3ed0a21b142e91fc

                                                                                    SHA256

                                                                                    e708be5e34097c8b4b6ecb50ead7705843d0dc4b0779b95ef57073d80f36c191

                                                                                    SHA512

                                                                                    41a1b4d650ff55b164f3db02c8440f044c4ec31d8ddbbbf56195d4e27473c6b1379dfad3581e16429650e2364791f5c19aae723efc11986bb986ef262538b818

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001

                                                                                    Filesize

                                                                                    41B

                                                                                    MD5

                                                                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                    SHA1

                                                                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                    SHA256

                                                                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                    SHA512

                                                                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Media History

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    cf7ac318453f6b64b6dc186489ff4593

                                                                                    SHA1

                                                                                    b405c8e0737be8e16a08556757dc817bd02af025

                                                                                    SHA256

                                                                                    634434e865f1ba1b90039bd5afd8f01bad6d278377106022ea2a9c2d8778d31a

                                                                                    SHA512

                                                                                    b64e484d16222d8de31f53cd60b719b7d855bbc552a7d052e202382bc3013e0edaceb31e3a287f2ea6b7117ccfdb8a56ea9d7da78535d2c606183072ecd084e4

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Network Persistent State

                                                                                    Filesize

                                                                                    61B

                                                                                    MD5

                                                                                    4df4574bfbb7e0b0bc56c2c9b12b6c47

                                                                                    SHA1

                                                                                    81efcbd3e3da8221444a21f45305af6fa4b71907

                                                                                    SHA256

                                                                                    e1b77550222c2451772c958e44026abe518a2c8766862f331765788ddd196377

                                                                                    SHA512

                                                                                    78b14f60f2d80400fe50360cf303a961685396b7697775d078825a29b717081442d357c2039ad0984d4b622976b0314ede8f478cde320daec118da546cb0682a

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Preferences

                                                                                    Filesize

                                                                                    3KB

                                                                                    MD5

                                                                                    a698433ee8c3802a319d08a4458bec10

                                                                                    SHA1

                                                                                    cad4ae30a3be51d3b1cab73aa56074bf1ef82c10

                                                                                    SHA256

                                                                                    64fb2929905b6a8caa6c51e9a0b89d78bbda7a059b437f788ac8e13b51617629

                                                                                    SHA512

                                                                                    a240d2eb645e9c6e9f36918455a959838a2f77d142e4f0fc41eae0f41f206366d0435876bf35281557e259f5ba3714e1850997297a70cd7c3234c79a0ee78029

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Preferences

                                                                                    Filesize

                                                                                    3KB

                                                                                    MD5

                                                                                    c08e0ef3e5a0561dabce6eac18cb2b33

                                                                                    SHA1

                                                                                    d50ff321d0f3ddcd32a2e24a385a210eb99cadd4

                                                                                    SHA256

                                                                                    290bb0d87bef08e7e6b2425008718dfb6c216a944487bcca82aad14b8918d462

                                                                                    SHA512

                                                                                    21c6ab74156c58972d1206ccb1bf87cb617b0badd07d4b01147473ae0e9da803f445e9272eb92b22dc96d1905e692915d45e4e0d38020fe8c6f9084a7fa8e77b

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Preferences

                                                                                    Filesize

                                                                                    3KB

                                                                                    MD5

                                                                                    814e92c7d04ab81306a9e08e413f4257

                                                                                    SHA1

                                                                                    907e6e63016271ff7a0be45730179fa330a2f975

                                                                                    SHA256

                                                                                    1059426553662b370a388afd13966b1e828b776c9df52ed34a7a60d3ba348abc

                                                                                    SHA512

                                                                                    8a9610e99a76d03075be116e89e71728e04d3ec2b929556438ae6edfddc6853b07e68dec9ffc5acd3c3fa897f9d49bb55537e92258ea14a850ec41c08ee6516a

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Preferences

                                                                                    Filesize

                                                                                    3KB

                                                                                    MD5

                                                                                    9472604d48d3f075ec291fb745c6358a

                                                                                    SHA1

                                                                                    657c3225307f3e512eba13c7968a55314f91dd5a

                                                                                    SHA256

                                                                                    739689a40a9fb55f1483c58206a575c4242c9d68ad41b4891c3340e0b3db021c

                                                                                    SHA512

                                                                                    e93632901315296619a6131210130b149653522270a0a24c3566df1f4b94a4d93c14a717b93d55066dad8bcfb5b3cc2e593b19d17b46f02f3364fe42508eb691

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Preferences

                                                                                    Filesize

                                                                                    3KB

                                                                                    MD5

                                                                                    786a405bc3eaaf3c1f1f438b6892f14c

                                                                                    SHA1

                                                                                    7c53d4c6db59fbf1979546062e55febc9d0982ac

                                                                                    SHA256

                                                                                    bd43d0945da36fd5bb5c3c147a0e63baa1af175262c5bccf3438c851323e1123

                                                                                    SHA512

                                                                                    3afaebd7692e0cc180dbc7a272bae402fd93564d75667089e595fef6b6eefc2200ae79cc5e483d3a15c8639e82100fc993b8ff66e13b116299ae2539876b2501

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Secure Preferences

                                                                                    Filesize

                                                                                    8KB

                                                                                    MD5

                                                                                    b13e42349e8304f03e3185b3adafe946

                                                                                    SHA1

                                                                                    b9ba6fee1166c54cb93d05b0d99ea6058c30b0ad

                                                                                    SHA256

                                                                                    570248d778267fbb9c511d95e20b794df558149174343a6a1283ef42412cf26f

                                                                                    SHA512

                                                                                    f6086704affc2b4ab987d3a65ce1900a509c5842e4bbf7499bb400b1221d25cf45fe0770ea3a0e6873004189db5ee7a7e4e2debfd736439f6ab92f68a8c5defe

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Site Characteristics Database\LOG

                                                                                    Filesize

                                                                                    305B

                                                                                    MD5

                                                                                    bd8394443bdc350aec6ab8db4a3afa08

                                                                                    SHA1

                                                                                    f068b9a9a3e9f7d3c40f203a06dcc63f328a7e41

                                                                                    SHA256

                                                                                    b66b4c7c8359b3a53239a15a0b975c8daabfa5374ef4ec63122d72499bbfe305

                                                                                    SHA512

                                                                                    92300f64fdfb363fe746b7d9b7386e736ef0ef1b8ba3ebda65949b8d1322f0602c58a28bd8c43ca7e56f1cbca5782fd318aeeb0c927037360abcc248dbe11f43

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Sync Data\LevelDB\CURRENT

                                                                                    Filesize

                                                                                    16B

                                                                                    MD5

                                                                                    46295cac801e5d4857d09837238a6394

                                                                                    SHA1

                                                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                    SHA256

                                                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                    SHA512

                                                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Visited Links

                                                                                    Filesize

                                                                                    128KB

                                                                                    MD5

                                                                                    21a2c14902aff48f212616850737756c

                                                                                    SHA1

                                                                                    c45f222cbadb011b1fa008a74fee7e15998c573a

                                                                                    SHA256

                                                                                    b009ae181eae4eb7839dd9da6bee42dfc6aec45b6d0dc87cde4b1e1be39d9c98

                                                                                    SHA512

                                                                                    8beb0acaec76b73181b9f3a0eb9e2c6ca4736c5769aeb42c3bfd701332e42fa3b094717e6322204a591a1767de854c76d92e6b0c2c9ffaa3319349a3951ad657

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\c4bf25ec-66f8-4dec-8be8-709769beb1e8.tmp

                                                                                    Filesize

                                                                                    111B

                                                                                    MD5

                                                                                    285252a2f6327d41eab203dc2f402c67

                                                                                    SHA1

                                                                                    acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                    SHA256

                                                                                    5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                    SHA512

                                                                                    11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\d6f84ab4-0d26-42cb-935e-a49463f7babf.tmp

                                                                                    Filesize

                                                                                    1B

                                                                                    MD5

                                                                                    5058f1af8388633f609cadb75a75dc9d

                                                                                    SHA1

                                                                                    3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                    SHA256

                                                                                    cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                    SHA512

                                                                                    0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Last Version

                                                                                    Filesize

                                                                                    11B

                                                                                    MD5

                                                                                    b29bcf9cd0e55f93000b4bb265a9810b

                                                                                    SHA1

                                                                                    e662b8c98bd5eced29495dbe2a8f1930e3f714b8

                                                                                    SHA256

                                                                                    f53ab2877a33ef4dbde62f23f0cbfb572924a80a3921f47fc080d680107064b4

                                                                                    SHA512

                                                                                    e15f515e4177d38d6bb83a939a0a8f901ce64dffe45e635063161497d527fbddaf2b1261195fde90b72b4c3e64ac0a0500003faceffcc749471733c9e83eb011

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Local State

                                                                                    Filesize

                                                                                    2KB

                                                                                    MD5

                                                                                    f54418432996656526932401a2a7927b

                                                                                    SHA1

                                                                                    86783411e5976cb97d8a4b825f72b63391060973

                                                                                    SHA256

                                                                                    ee160a2f545a6e4d08d596d60d5e9be2ad19f65a976e87643efd7af7fea97585

                                                                                    SHA512

                                                                                    e72402f1540ffc08d1eeb669aadf9784b31423d1739037ba34adf7e9c5e272eb1128d481a57eea3ec0bd1c4501801ea456797b4cdfe54d7c7af91b7e8c910dba

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Local State

                                                                                    Filesize

                                                                                    2KB

                                                                                    MD5

                                                                                    4a52b56e41121cbd1e8bf155a94e0555

                                                                                    SHA1

                                                                                    01dd01df6290bb9be9d49cc7725486f947e5dddf

                                                                                    SHA256

                                                                                    7b3e975bcb0329b1fff58b52453c939a6ed7de11d497f00b21c9b6e2d91a0f7c

                                                                                    SHA512

                                                                                    3bd899169481c21638ab087f6ba083f0be60ca71c6c00eb54d593b23ab94ccba819dda07273a76bb58d796485abe65335990bbc0d61b171104d636ec9efd2699

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Local State

                                                                                    Filesize

                                                                                    2KB

                                                                                    MD5

                                                                                    e3317540794aafd87f55cea395773332

                                                                                    SHA1

                                                                                    3a0c7a34a86e357276c2c9ce928b4b045d1844b2

                                                                                    SHA256

                                                                                    7ce6259ce296ee0f5008a6d7678d93632748d4297ef27e32332a39bc6251075c

                                                                                    SHA512

                                                                                    175b46b056b4ca46d5413862f82a9545b644edc8c92f53fff48335e8600a93bb8a6ec8fcdd3609421824bd603b79ab18b953f37058f4c766f11be32953d8067c

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Local State

                                                                                    Filesize

                                                                                    2KB

                                                                                    MD5

                                                                                    d2ecf6d22c4259d9478b65903c326f8b

                                                                                    SHA1

                                                                                    f11c674f8e17e1a10d5cd5ffa987d397b17a47e6

                                                                                    SHA256

                                                                                    8fa24a740d8d0ce8fbfd7915382c0438dad8eea99e63f8e56a9a6bb2c3024c2b

                                                                                    SHA512

                                                                                    7afab42644d347c822f4c684320df1a177bb51d08b4137119be718434b13941793e40fd7b1433361da005e01a6ab0879d229057e45f30fb4456d0d303499ca60

                                                                                  • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\ShaderCache\GPUCache\index

                                                                                    Filesize

                                                                                    256KB

                                                                                    MD5

                                                                                    2a801caa634bb0fa8c99ceca0c5ec7d5

                                                                                    SHA1

                                                                                    c82a1c7a808450242920bf3d11007a34a6be2684

                                                                                    SHA256

                                                                                    072220a8e1d71fde592aa94ff4fa3512e420cfc8df594625d09fffa277467a6b

                                                                                    SHA512

                                                                                    b7cffd48904b3de121ccab27d1c25cd11dfe4f14cb48cc1874fc36603f078fa2ab3b90c381e109bf166dcc9a857121399ec9ff9c1e6a0db20a870c4970f7773d

                                                                                  • C:\Users\Admin\Documents\jjsploit\db.json

                                                                                    Filesize

                                                                                    54B

                                                                                    MD5

                                                                                    41dea3a16884a8a050f599c1b3d3dbf5

                                                                                    SHA1

                                                                                    0d1893892dd3a5211b8dc4b66efae5d3f2c82689

                                                                                    SHA256

                                                                                    e14fda8dd813d96cdeb51cff4e4a5c8dc636b72b7fb075902d88ab587bf19466

                                                                                    SHA512

                                                                                    2c2a88c7d0fa9f32893449d5d8ae0d148793974c0e9f979be1221dce3b7c86a0bc02f3575bd5d2010e0fad20fb9730f707cdddd99fa922b8de67d9f1e7529cb2

                                                                                  • memory/3004-1038-0x000001286DC40000-0x000001286DC41000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3004-1028-0x000001286DC40000-0x000001286DC41000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3004-1030-0x000001286DC40000-0x000001286DC41000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3004-1029-0x000001286DC40000-0x000001286DC41000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3004-1035-0x000001286DC40000-0x000001286DC41000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3004-1037-0x000001286DC40000-0x000001286DC41000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3004-1040-0x000001286DC40000-0x000001286DC41000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3004-1039-0x000001286DC40000-0x000001286DC41000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3004-1036-0x000001286DC40000-0x000001286DC41000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3004-1034-0x000001286DC40000-0x000001286DC41000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/4644-164-0x00007FFAD8A90000-0x00007FFAD8A91000-memory.dmp

                                                                                    Filesize

                                                                                    4KB