Analysis

  • max time kernel
    118s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 18:14

General

  • Target

    34c469424d3c8323ac786db9c7517de75a0d0f18b7b146f0c910b17160deefb5N.exe

  • Size

    5.5MB

  • MD5

    619f41c236d8b49f63ee568048255b40

  • SHA1

    e26d2366e076128015ba62879808c61d19235319

  • SHA256

    34c469424d3c8323ac786db9c7517de75a0d0f18b7b146f0c910b17160deefb5

  • SHA512

    b3abe74c3283635cca480a24ad4a74594ebb17992745ef593a3d45b14edc603e5f9aae5cb5863ecdf75d0a0abc9f5848cdc8b80f858a6fa96ce63fb66acf687e

  • SSDEEP

    98304:5/3W2ksaPXfeAzDo6848MmARriEv802dcmmCIjJQn5/iu0s5xH3IlA9qu4i1HG:klh3eeh85kr4P8MvxHlmiU

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://navygenerayk.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 12 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 11 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34c469424d3c8323ac786db9c7517de75a0d0f18b7b146f0c910b17160deefb5N.exe
    "C:\Users\Admin\AppData\Local\Temp\34c469424d3c8323ac786db9c7517de75a0d0f18b7b146f0c910b17160deefb5N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3184
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J1t19.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J1t19.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2T3545.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2T3545.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3d71Z.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3d71Z.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5048
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3d71Z.exe" & del "C:\ProgramData\*.dll"" & exit
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1476
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 5
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:2388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4a857m.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4a857m.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3176
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4140
        • C:\Users\Admin\AppData\Local\Temp\1005343001\14043ebd02.exe
          "C:\Users\Admin\AppData\Local\Temp\1005343001\14043ebd02.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:2108
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
            5⤵
            • Uses browser remote debugging
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:4384
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x140,0x16c,0x7ffa9793cc40,0x7ffa9793cc4c,0x7ffa9793cc58
              6⤵
                PID:1672
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2076,i,13578555164267172289,2647204865327487182,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2072 /prefetch:2
                6⤵
                  PID:1728
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1936,i,13578555164267172289,2647204865327487182,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2116 /prefetch:3
                  6⤵
                    PID:2036
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2280,i,13578555164267172289,2647204865327487182,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2356 /prefetch:8
                    6⤵
                      PID:4288
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3236,i,13578555164267172289,2647204865327487182,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:5360
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3264,i,13578555164267172289,2647204865327487182,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3416 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:5548
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4448,i,13578555164267172289,2647204865327487182,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4644 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:5308
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4732,i,13578555164267172289,2647204865327487182,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4628 /prefetch:8
                      6⤵
                        PID:1100
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4848,i,13578555164267172289,2647204865327487182,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4716 /prefetch:8
                        6⤵
                          PID:5840
                      • C:\Users\Admin\AppData\Local\Temp\service123.exe
                        "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:5472
                      • C:\Windows\SysWOW64\schtasks.exe
                        "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                        5⤵
                        • System Location Discovery: System Language Discovery
                        • Scheduled Task/Job: Scheduled Task
                        PID:5448
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 1916
                        5⤵
                        • Program crash
                        PID:5396
                    • C:\Users\Admin\AppData\Local\Temp\1005352001\a587eda9c6.exe
                      "C:\Users\Admin\AppData\Local\Temp\1005352001\a587eda9c6.exe"
                      4⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3868
                    • C:\Users\Admin\AppData\Local\Temp\1005353001\eec76b6838.exe
                      "C:\Users\Admin\AppData\Local\Temp\1005353001\eec76b6838.exe"
                      4⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Checks processor information in registry
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:2632
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
                        5⤵
                        • Uses browser remote debugging
                        • Enumerates system info in registry
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of WriteProcessMemory
                        PID:3516
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffa87f3cc40,0x7ffa87f3cc4c,0x7ffa87f3cc58
                          6⤵
                            PID:1188
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1920 /prefetch:2
                            6⤵
                              PID:3176
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2224,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2256 /prefetch:3
                              6⤵
                                PID:3680
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2324,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2500 /prefetch:8
                                6⤵
                                  PID:4648
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3236,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:1
                                  6⤵
                                  • Uses browser remote debugging
                                  PID:888
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3404,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3352 /prefetch:1
                                  6⤵
                                  • Uses browser remote debugging
                                  PID:4840
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3912,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4628 /prefetch:1
                                  6⤵
                                  • Uses browser remote debugging
                                  PID:2408
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4772,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4444 /prefetch:8
                                  6⤵
                                    PID:4756
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4844,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4852 /prefetch:8
                                    6⤵
                                      PID:532
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4888,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4768 /prefetch:8
                                      6⤵
                                        PID:4816
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4984,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4820 /prefetch:8
                                        6⤵
                                          PID:4576
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4976,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5000 /prefetch:8
                                          6⤵
                                            PID:2636
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5224,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4892 /prefetch:8
                                            6⤵
                                              PID:4576
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5228,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5372 /prefetch:8
                                              6⤵
                                                PID:2472
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4800,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4668 /prefetch:8
                                                6⤵
                                                  PID:864
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5356,i,18391118535498758527,1858028584514748682,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5556 /prefetch:2
                                                  6⤵
                                                  • Uses browser remote debugging
                                                  PID:5792
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                                5⤵
                                                • Uses browser remote debugging
                                                • Enumerates system info in registry
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                • Suspicious use of FindShellTrayWindow
                                                PID:5196
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffa877e46f8,0x7ffa877e4708,0x7ffa877e4718
                                                  6⤵
                                                  • Checks processor information in registry
                                                  • Enumerates system info in registry
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5300
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,2792462797495091333,7109078607729699777,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:2
                                                  6⤵
                                                    PID:5344
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,2792462797495091333,7109078607729699777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:3
                                                    6⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5532
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,2792462797495091333,7109078607729699777,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2480 /prefetch:2
                                                    6⤵
                                                      PID:5560
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,2792462797495091333,7109078607729699777,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2616 /prefetch:2
                                                      6⤵
                                                        PID:5632
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,2792462797495091333,7109078607729699777,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2384 /prefetch:2
                                                        6⤵
                                                          PID:5676
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,2792462797495091333,7109078607729699777,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:8
                                                          6⤵
                                                            PID:5692
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,2792462797495091333,7109078607729699777,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2832 /prefetch:2
                                                            6⤵
                                                              PID:5752
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,2792462797495091333,7109078607729699777,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3240 /prefetch:2
                                                              6⤵
                                                                PID:5768
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,2792462797495091333,7109078607729699777,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3164 /prefetch:2
                                                                6⤵
                                                                  PID:5144
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1980,2792462797495091333,7109078607729699777,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:1
                                                                  6⤵
                                                                  • Uses browser remote debugging
                                                                  PID:6136
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1980,2792462797495091333,7109078607729699777,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:1
                                                                  6⤵
                                                                  • Uses browser remote debugging
                                                                  PID:6124
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,2792462797495091333,7109078607729699777,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2828 /prefetch:2
                                                                  6⤵
                                                                    PID:6056
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,2792462797495091333,7109078607729699777,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3828 /prefetch:2
                                                                    6⤵
                                                                      PID:6020
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 2128
                                                                    5⤵
                                                                    • Program crash
                                                                    PID:4360
                                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                                                  4⤵
                                                                    PID:4796
                                                                  • C:\Users\Admin\AppData\Local\Temp\1005355001\51ce113fe4.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\1005355001\51ce113fe4.exe"
                                                                    4⤵
                                                                    • Modifies Windows Defender Real-time Protection settings
                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                    • Checks BIOS information in registry
                                                                    • Executes dropped EXE
                                                                    • Identifies Wine through registry keys
                                                                    • Windows security modification
                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:4652
                                                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                              1⤵
                                                                PID:1996
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                1⤵
                                                                  PID:5100
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2632 -ip 2632
                                                                  1⤵
                                                                    PID:512
                                                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                    1⤵
                                                                      PID:5132
                                                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                      1⤵
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Executes dropped EXE
                                                                      • Identifies Wine through registry keys
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:1108
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2108 -ip 2108
                                                                      1⤵
                                                                        PID:5452

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\ProgramData\chrome.dll

                                                                        Filesize

                                                                        676KB

                                                                        MD5

                                                                        eda18948a989176f4eebb175ce806255

                                                                        SHA1

                                                                        ff22a3d5f5fb705137f233c36622c79eab995897

                                                                        SHA256

                                                                        81a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4

                                                                        SHA512

                                                                        160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                        Filesize

                                                                        40B

                                                                        MD5

                                                                        db9149f34c6cfa44d2668a52f26b5b7f

                                                                        SHA1

                                                                        f8cd86ce3eed8a75ff72c1e96e815a9031856ae7

                                                                        SHA256

                                                                        632789cdfa972eec9efe17d8e2981c0298cf6bd5a7e5dad3cbdcf7bb30f2e47f

                                                                        SHA512

                                                                        169b56304747417e0afe6263dd16415d3a64fff1b5318cd4a919005abe49ca213537e85a2f2d2291ea9dc9a48ea31c001e8e09e24f25304ae3c2cfefad715ce9

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                        Filesize

                                                                        649B

                                                                        MD5

                                                                        cdfa7ba5de01f1921aa22ba9d1a8eab3

                                                                        SHA1

                                                                        8b48cb79680d29de8831f12cfa0376bd9691ee4b

                                                                        SHA256

                                                                        12e3ba35e4b4027b044e1c5313ec02594241dc2129fdbea1d7196537f575401b

                                                                        SHA512

                                                                        a885bf2aeda6ebe626ca931ac6a5c75faa191abf81e4fb28a2c139fb00e34b8edf72c13fb29d74669237f35f77249f1d2a1b4e7fb97cd7499fef5c763ccedd78

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0

                                                                        Filesize

                                                                        44KB

                                                                        MD5

                                                                        c3204ada4becfbdd36bc5720f86aa7d7

                                                                        SHA1

                                                                        d6332090e890b49bdb12a7d2d6b56442354a0646

                                                                        SHA256

                                                                        bf1a13abdc41387ad50a9f25d517ff7b58e1f233ade7248fe9cc81866a9648b6

                                                                        SHA512

                                                                        4870fc97367196acecb37a80e915082c214d08651a6871fb8e1b62290082b840cc29b4e94da68695f3a4f9fd11847a6b9581edfc0c72dfb707ad0a2d2f176b0e

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1

                                                                        Filesize

                                                                        264KB

                                                                        MD5

                                                                        aacb6f9585f8cc297d04167fb4f958d2

                                                                        SHA1

                                                                        3521d7d03158615ae2fa18b3ea79b5f76cb1da23

                                                                        SHA256

                                                                        ce552d7ad87ec8b254aa24329aa878ce96c175c1d99fcda98858431014f53861

                                                                        SHA512

                                                                        36f45eece0cd1a5cb2ba485f0fd9d3a1b0c47559cbbda7a8a7b59e9d01e748144351daf798ff9be9439f2d466fa126c9b2d3c08c047df4f77651a5af329f9046

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_2

                                                                        Filesize

                                                                        1.0MB

                                                                        MD5

                                                                        cf217d712c4bf0982f5b4cbae6ddde5a

                                                                        SHA1

                                                                        ea362dc171ac45038fb7771d2182c72d368d93fb

                                                                        SHA256

                                                                        47bae565499a3df35910a66663b3a138ccf93dd55a23f65def59614c3e425467

                                                                        SHA512

                                                                        961f9a710a18919decae3530b1b53b0ca7816712cb9ad4277b00ef49de0066d49003a2696754519fbd577f82f7b05d1c0859e8a5215793c909a9abac4b362442

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_3

                                                                        Filesize

                                                                        4.0MB

                                                                        MD5

                                                                        f11f90187ea45383b6b275eaaa1e3b4c

                                                                        SHA1

                                                                        13cec4313d8e0630b7d5d89a1da02cc4d0cddd80

                                                                        SHA256

                                                                        86b067992eb330edf90a2289099238ee56164afa50dc44de8c0ca48c19ebd676

                                                                        SHA512

                                                                        baff7cf52cfff47238c23afc851d31bb52ea3da110c11aae10da06d1fb0bfe9fe9e7fd17eda01331c37f3672402a437685f1dbdb36846e6c6d2630cc6046d4ff

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000005

                                                                        Filesize

                                                                        36KB

                                                                        MD5

                                                                        475afd0afc96b1c1c42eaeb98bbdac24

                                                                        SHA1

                                                                        4607f54d6ac5b592bf29eedd46dbcaa56dbf60a6

                                                                        SHA256

                                                                        32f8df743bdd61c93e1a3a4743a2cd54b5efef455133ea924eb7a5e35d7ea4a8

                                                                        SHA512

                                                                        ab11f92c09d09775d3b2086ba54f75d3002b9eac130dc847b739cb1a7cee11fa34ca0f2d5d022379f1bed60b254dc1189cd58139e02e91073be624b4d310864c

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000006

                                                                        Filesize

                                                                        62KB

                                                                        MD5

                                                                        24393e2ccc4e7a164f062df993d27335

                                                                        SHA1

                                                                        c8f960244677439e72295d499440f295ae5be7c5

                                                                        SHA256

                                                                        3ecbdf289749ebf07b749a91eb3db3d1f8fc338e5cae2dae22730fb893736130

                                                                        SHA512

                                                                        a675af57b19197f17a1be1351c3cee6a291f23dc2614081bd7bd71adbe5eb0d191c4d50b295d43b3a002d48454a24ef9e4dc52510f2db54dcfe0c8e71948d10c

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000007

                                                                        Filesize

                                                                        38KB

                                                                        MD5

                                                                        d4586933fabd5754ef925c6e940472f4

                                                                        SHA1

                                                                        a77f36a596ef86e1ad10444b2679e1531995b553

                                                                        SHA256

                                                                        6e1c3edffec71a01e11e30aa359952213ac2f297c5014f36027f308a18df75d2

                                                                        SHA512

                                                                        6ce33a8da7730035fb6b67ed59f32029c3a94b0a5d7dc5aa58c9583820bb01ef59dd55c1c142f392e02da86c8699b2294aff2d7c0e4c3a59fce5f792c749c5ce

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json

                                                                        Filesize

                                                                        851B

                                                                        MD5

                                                                        07ffbe5f24ca348723ff8c6c488abfb8

                                                                        SHA1

                                                                        6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                        SHA256

                                                                        6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                        SHA512

                                                                        7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json

                                                                        Filesize

                                                                        854B

                                                                        MD5

                                                                        4ec1df2da46182103d2ffc3b92d20ca5

                                                                        SHA1

                                                                        fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                        SHA256

                                                                        6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                        SHA512

                                                                        939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0

                                                                        Filesize

                                                                        44KB

                                                                        MD5

                                                                        7bd8ddf1083e3e93648cd700c2854033

                                                                        SHA1

                                                                        5e1d268836ae6f13a4287cfb9e72135bb64ec4fa

                                                                        SHA256

                                                                        14c365507eab36f055dba205de264f6002e04ce0bcfb105672ce11a116717691

                                                                        SHA512

                                                                        ad97175522e61495c219c8c65f80dac4af4b8a959ce98fc823b76a676144bad5f42533c58d1396f962e57a5a356b6f204850c43f6202a785bbb5b7bedd84a24d

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                                        Filesize

                                                                        264KB

                                                                        MD5

                                                                        659cd8f09e533c2d5aba3729c50c1a18

                                                                        SHA1

                                                                        3641d58d8ef29bf6d2ce049695d97045fe0be793

                                                                        SHA256

                                                                        5fdce5f8848230cdb15cb387518d627c26bcb89c062cb42e2fbff7e69149e3fd

                                                                        SHA512

                                                                        3852679dd057245773e6518c6064ccc9a6cd7b2cb5df9d7f0109d3f173353476aa450d44d465f94c9ac5ccf684cd51c22c7e6c95b4d4e18629ebf5b9684b3c2f

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_2

                                                                        Filesize

                                                                        1.0MB

                                                                        MD5

                                                                        fe993339a25710ebec86c051941d462c

                                                                        SHA1

                                                                        1a7a578b7a32bbe2102a789c2321090d406838d1

                                                                        SHA256

                                                                        59ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443

                                                                        SHA512

                                                                        b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_3

                                                                        Filesize

                                                                        4.0MB

                                                                        MD5

                                                                        d6b0609c4b6edb45553ff9afbfc95e33

                                                                        SHA1

                                                                        2697657b75906d3653f48080ec1f3993c07bd8bf

                                                                        SHA256

                                                                        eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e

                                                                        SHA512

                                                                        db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                                                        Filesize

                                                                        332B

                                                                        MD5

                                                                        47b7eceb6b1c494e5075eec621a8f98b

                                                                        SHA1

                                                                        351f9491b56e77b2a13836c992a311d681d9fb31

                                                                        SHA256

                                                                        bb642f43450597bd747fcd5ba3672400773ec65351fee7abb0663fe5e9171240

                                                                        SHA512

                                                                        7a90c7d91b801d15192321703c5f4640be7ed6daa7f7f54d91da232c4812539f87e807b50781ba996d0df5df9944dccd4c775bdf69bcec87e8c2a89b80bb422d

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                        Filesize

                                                                        2B

                                                                        MD5

                                                                        d751713988987e9331980363e24189ce

                                                                        SHA1

                                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                                        SHA256

                                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                        SHA512

                                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\000003.log

                                                                        Filesize

                                                                        3KB

                                                                        MD5

                                                                        b368e80451bd02f91eec6847daf55f01

                                                                        SHA1

                                                                        daadfeb0b491011618741b628f1738411cd5a0ee

                                                                        SHA256

                                                                        57fdb3918fc5facde487b7158897c4dd07a459aebfe76b72b943780f1479fb83

                                                                        SHA512

                                                                        8c88f08a2f76e8ae6667a8f618b3f09dc359ccfe80f6d0f98a04cc19b6f89cfe4f457fa693cd9672d9df224ed6223ca40f6987279474359cc7a55cd9b93a2acb

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG

                                                                        Filesize

                                                                        333B

                                                                        MD5

                                                                        6f3e0e083b7f1098350cdbcda42d0cac

                                                                        SHA1

                                                                        8f55e4553cfb50bc7e8ad9bd2f491ef1b9c3518a

                                                                        SHA256

                                                                        522015fd2082a9b4494899ddc0402e01b6f66950448f684ce8c8f4c03970e474

                                                                        SHA512

                                                                        9aba96457b3d308043a7c41820a3593a4c05115114ef4b51b316b7feacf762da39e59c173301815bcfea9c8b3b43b49d834e4ec48242e98ba5d35cbc889c6774

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG

                                                                        Filesize

                                                                        345B

                                                                        MD5

                                                                        917a7b3dbb52637d3cf899176b4aa4f3

                                                                        SHA1

                                                                        780eb788123ad24fa5538999f72c7af2369d9f9e

                                                                        SHA256

                                                                        519d921dcd0d4067ee0ba44f6deb4f973296ac872c7c4ee4584c9f13c8945378

                                                                        SHA512

                                                                        0fa7a4185c4b771233f099cb3901e930584639f4e2b763b6f1dff9c43ea857665686cea405b9739e75ef489fea4c676a851ecf018f3eca2e3ae33f550d5d9256

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                                                        Filesize

                                                                        321B

                                                                        MD5

                                                                        79971d9adba0f69f2baa3dffae02aa26

                                                                        SHA1

                                                                        561fb3dcbbc482355d28040a18bb5882ee2094c3

                                                                        SHA256

                                                                        71b5bd4354cfeb8015e2132cb71cc657b4a0976f2d8cb8e7ff81551d34a15c3e

                                                                        SHA512

                                                                        61c247e4b98c4317b01850cd07cb7243ccc498bcc681ba69ae7d81515f3ec48922f38ed7e5fdba42c83c94346e9210979703c2c225f08acfa84ac07d2eac3c87

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\QuotaManager-journal

                                                                        Filesize

                                                                        12KB

                                                                        MD5

                                                                        2ce1cde8c494a41ca970a043f342fa2b

                                                                        SHA1

                                                                        abb559db7709510d0b9fc88830fe04960f36c6ee

                                                                        SHA256

                                                                        6bdb4297d122d674948c52c0b05748d8c0289e04f8e21b807044a353e854770c

                                                                        SHA512

                                                                        366eade449990f9557c3910c5f564485b47e013e664e6293bcb0ef8244ff0e9e0fb2aa163331d83c43c2dd3f383207af17575095c7d1e9b8d479ac69d3fd41b2

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log

                                                                        Filesize

                                                                        18KB

                                                                        MD5

                                                                        cb369c5cba6f4a2f523594e68226d8ad

                                                                        SHA1

                                                                        bdfaeb87bc8ee779f5bb8a1756e0e07e9ca9f1c0

                                                                        SHA256

                                                                        ce53200d40ee7b9a2493b229a2fd44f76648df6a4a859b3bd092ff8563cc1968

                                                                        SHA512

                                                                        32263b75c395eceb0beea1c2d0ced1a13b9e39b0153880d84cbedf1fc43761b0edf81cd6a894e402640eca5b313837e7fe2d8dc18839d101a98188035a0d0877

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG

                                                                        Filesize

                                                                        317B

                                                                        MD5

                                                                        9a521094a6a6b10eef77a0188ddf7294

                                                                        SHA1

                                                                        98b9fb45dc90257181653da569959b8a03dcb54d

                                                                        SHA256

                                                                        591f31dee19739c902b99991ebd0d94e3765cc3debc4c3e23e05afbfecc2f8f1

                                                                        SHA512

                                                                        66388aa037f54a9a47e7868cc495f82370f5d652ab62602cdfd3dbc308d6339b5316696415ce685f9adb2dbc1df5700df17cdacfec62151506d30c61917fdc55

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.log

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        28dff999a2420fd76a20d4c07e2ebeed

                                                                        SHA1

                                                                        2005e4d76587f1c6c1b98ac62687a616564532b0

                                                                        SHA256

                                                                        9f998c2de9744ee258b1b34a59ebede01ce742ccdeb1c980576900303062027f

                                                                        SHA512

                                                                        75ebffd7085b883a5e1f0dabc379b6d7ae6d75098826d7002b558785da1e81b0842b505de18918d12d57837f76fbf078875f4b8bcfb8e0ecc962cfb7da28be1c

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG

                                                                        Filesize

                                                                        335B

                                                                        MD5

                                                                        349aed97dac95029e047b77eab8837b3

                                                                        SHA1

                                                                        4b3e4e776459d141b5ccb9a24583098d472c7f7f

                                                                        SHA256

                                                                        7bbd443b016f34af333ebfc210d44707bed832e4d693d241cbed3a69a650ca7d

                                                                        SHA512

                                                                        72e3db1db7cd44b85830838423fe7b4c7141c1f28a262ad53ea706e1e4bda268df17d623440e2bb958fffb48a0a054cab3abc60a989288ae00e905c6eb8eaf28

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                                        Filesize

                                                                        14B

                                                                        MD5

                                                                        ef48733031b712ca7027624fff3ab208

                                                                        SHA1

                                                                        da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                                                        SHA256

                                                                        c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                                                        SHA512

                                                                        ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                                        Filesize

                                                                        86B

                                                                        MD5

                                                                        961e3604f228b0d10541ebf921500c86

                                                                        SHA1

                                                                        6e00570d9f78d9cfebe67d4da5efe546543949a7

                                                                        SHA256

                                                                        f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed

                                                                        SHA512

                                                                        535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\1e733720-13bf-43ea-b685-1371ba457b49.dmp

                                                                        Filesize

                                                                        10.4MB

                                                                        MD5

                                                                        5e7c528bce8ae1609691db111113603a

                                                                        SHA1

                                                                        b19168e096be1cc0504bbc4d08b3cf70ade62f2a

                                                                        SHA256

                                                                        e3b42c29887de07cb2dbec92b063b5adb9d2d69b52627bdccbf0514410931e04

                                                                        SHA512

                                                                        445be4b0931e1380da53092e7cb54e34bfb4cbe78fcc68e2dd9b88909a82100d2b389042bed43927486fe658838eb7840fe8e5532dcdfaf710f3cd812ebdd204

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                        Filesize

                                                                        152B

                                                                        MD5

                                                                        a0486d6f8406d852dd805b66ff467692

                                                                        SHA1

                                                                        77ba1f63142e86b21c951b808f4bc5d8ed89b571

                                                                        SHA256

                                                                        c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be

                                                                        SHA512

                                                                        065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                        Filesize

                                                                        152B

                                                                        MD5

                                                                        dc058ebc0f8181946a312f0be99ed79c

                                                                        SHA1

                                                                        0c6f376ed8f2d4c275336048c7c9ef9edf18bff0

                                                                        SHA256

                                                                        378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a

                                                                        SHA512

                                                                        36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\00129bef-1803-4e7b-934e-f1b1b1387bc3.tmp

                                                                        Filesize

                                                                        1B

                                                                        MD5

                                                                        5058f1af8388633f609cadb75a75dc9d

                                                                        SHA1

                                                                        3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                        SHA256

                                                                        cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                        SHA512

                                                                        0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        5KB

                                                                        MD5

                                                                        cb6469dd1a28b24b2973a458570bd919

                                                                        SHA1

                                                                        8e551a15de581a7cbd0ba3935ae04d10c6928326

                                                                        SHA256

                                                                        84d80ec94edf4f1f45175e282d9b4d0fbf722a6b531eb496605d1bce30fc4c95

                                                                        SHA512

                                                                        98bb5fee7a7d28ad59375f414c049fce5823db5bf5bd97d5fb1bbd4ebd1d96a3a409d910be764079495d764be864fe1bc2a2311aee8557c9bc51c980078bc09d

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                        Filesize

                                                                        264KB

                                                                        MD5

                                                                        f50f89a0a91564d0b8a211f8921aa7de

                                                                        SHA1

                                                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                        SHA256

                                                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                        SHA512

                                                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                      • C:\Users\Admin\AppData\Local\Temp\1005343001\14043ebd02.exe

                                                                        Filesize

                                                                        4.1MB

                                                                        MD5

                                                                        86d624fecb21cd16f980aff2ed50776b

                                                                        SHA1

                                                                        8833517a3f467852bff80e3d689bd3d45b773895

                                                                        SHA256

                                                                        3533ba63d5277e31a865e9bff3358af0472ef1008c7f3ba7ba7559496b38f036

                                                                        SHA512

                                                                        6773390ba4438c5e9a83426c2619e3e1b4a8fd740bc04aee991bfa02f50d4c80f78c4d61b4a7559979355d273a6597632788c23c09b059e2e24bb6eb4bac07a9

                                                                      • C:\Users\Admin\AppData\Local\Temp\1005352001\a587eda9c6.exe

                                                                        Filesize

                                                                        3.0MB

                                                                        MD5

                                                                        f735c03dbe942c5bf99f426809e97cd5

                                                                        SHA1

                                                                        88aa4378b6d3e86a5de8f3d0865c333031c27872

                                                                        SHA256

                                                                        1e75e019d87807fe63a3a5f6f9147af7289d2da288e7a5655743379d89fe76fe

                                                                        SHA512

                                                                        fa1d98b3dcdfabc1ff950cf7c84512f4eb91b01b5bc396dd87c6a506ddca12370066080d3b663b9d642cce71ae1e1610223abac9e557b194fa85a645f79485b2

                                                                      • C:\Users\Admin\AppData\Local\Temp\1005353001\eec76b6838.exe

                                                                        Filesize

                                                                        1.7MB

                                                                        MD5

                                                                        58f8d58d2255c5cf53b7d747a8a17883

                                                                        SHA1

                                                                        2311a8a9d4de2c24efc4812852b4a0ea29fefa00

                                                                        SHA256

                                                                        47467f862a2600058265a0fb88aa24affc2617d288403df8e98e1b4fb19e97e3

                                                                        SHA512

                                                                        4f7fa4a4b4242eb650262be0b6bac7fe158c7e74280877aa914cf1d31cee857ea795380dcc83cae31756c54f3df9a1ead1c99d96acefb075911b1785d169ead7

                                                                      • C:\Users\Admin\AppData\Local\Temp\1005355001\51ce113fe4.exe

                                                                        Filesize

                                                                        2.7MB

                                                                        MD5

                                                                        cb894815c137e283292425987e1e87c9

                                                                        SHA1

                                                                        f2e42ba866188cd43c07b34a8a2a8dfc90a67698

                                                                        SHA256

                                                                        d51a8f6a7d078847978e47e5fb47538bb08006ac18661a4887c3f14498ec4ec6

                                                                        SHA512

                                                                        82d6096b98d8d7f64753c352f2797dff01c55f34ff6b6dad575da22b23098f9e282a0258fd0ea0cba1dfec4145d2e27144e54b4e721c5b9467053e5ffbcc2780

                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4a857m.exe

                                                                        Filesize

                                                                        3.1MB

                                                                        MD5

                                                                        08b125992af1a09f39eac6eaf8cd2a4d

                                                                        SHA1

                                                                        c00bbe37e2d44dc7d8cbe7a3800caf7f3f4ef930

                                                                        SHA256

                                                                        23967f7a0e8c5a8a6ba0e297c0fa19422e7b303725b128f97e7e5e1fbd1de183

                                                                        SHA512

                                                                        fbee6ff919d7f467789a671d44a2653287812a577ce134266bad6d2d2216c173acb666732578e331c3e7920fc94f994f7d57fc5399b93442d9c1c3370cdb8081

                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J1t19.exe

                                                                        Filesize

                                                                        3.8MB

                                                                        MD5

                                                                        b41bc176288699047c881e372520b7d7

                                                                        SHA1

                                                                        94f7a36694b86d248e222404927d7b42d3f95246

                                                                        SHA256

                                                                        379385d0a7dddb470505a29c1e992d9969dc4abd2f351927b09ade27ba26faaf

                                                                        SHA512

                                                                        7a25957f0ea7a4ece5257d5aa75ea19a7b1982fd6bf53b1461500025cf4f028e6b1d679f73154d236b19850358c5799eab39521a2303d2e157076e70a2d243d8

                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2T3545.exe

                                                                        Filesize

                                                                        2.8MB

                                                                        MD5

                                                                        efd9cc1ec8af7539712926dbf8e0b607

                                                                        SHA1

                                                                        4b8022e18890b28cf32938ef2ab9dd311094cae3

                                                                        SHA256

                                                                        01b5f0515a589615f4e002b1e5e31e23606e5d93285b6ab9cdcb0e7932d41254

                                                                        SHA512

                                                                        542bb721608dd5ecee3d702670562d3566cae162fa8b4885cb3d0e94ce24bc4040656f37ce8d2d7a040a383b532acfff38732cb104f5d4f00bf269d651f5639f

                                                                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3d71Z.exe

                                                                        Filesize

                                                                        2.0MB

                                                                        MD5

                                                                        87a1e964eb044d44777fd0b24186d5aa

                                                                        SHA1

                                                                        84a457d7bd7d35286074ae804ef42cc7a423d8c5

                                                                        SHA256

                                                                        698aa036276b25c445e979476ba32336494e94424d7e7eae4a17efa9227c75ae

                                                                        SHA512

                                                                        b3923c777d1ee725cc7f4257a2042d96d69041bdcb30a92f8f5db6eba9b4cdc71fd84e4fe056deb77358a1cdb484f57440f4b23cd0e3526da6674dd2f70574d8

                                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir3516_1764961933\259ae74d-db7b-4b87-b3da-5737dea0dd86.tmp

                                                                        Filesize

                                                                        132KB

                                                                        MD5

                                                                        da75bb05d10acc967eecaac040d3d733

                                                                        SHA1

                                                                        95c08e067df713af8992db113f7e9aec84f17181

                                                                        SHA256

                                                                        33ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2

                                                                        SHA512

                                                                        56533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef

                                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir3516_1764961933\CRX_INSTALL\_locales\en_CA\messages.json

                                                                        Filesize

                                                                        711B

                                                                        MD5

                                                                        558659936250e03cc14b60ebf648aa09

                                                                        SHA1

                                                                        32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                        SHA256

                                                                        2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                        SHA512

                                                                        1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                      • memory/1108-747-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/1108-749-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/2108-100-0x0000000000C70000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.5MB

                                                                      • memory/2108-734-0x0000000000C70000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.5MB

                                                                      • memory/2108-759-0x0000000000C70000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.5MB

                                                                      • memory/2108-64-0x0000000000C70000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.5MB

                                                                      • memory/2108-671-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                                                        Filesize

                                                                        10.4MB

                                                                      • memory/2108-680-0x0000000000C70000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.5MB

                                                                      • memory/2108-750-0x0000000000C70000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.5MB

                                                                      • memory/2108-101-0x0000000000C70000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.5MB

                                                                      • memory/2108-625-0x0000000000C70000-0x00000000017F9000-memory.dmp

                                                                        Filesize

                                                                        11.5MB

                                                                      • memory/2632-564-0x0000000000C80000-0x0000000001311000-memory.dmp

                                                                        Filesize

                                                                        6.6MB

                                                                      • memory/2632-557-0x0000000000C80000-0x0000000001311000-memory.dmp

                                                                        Filesize

                                                                        6.6MB

                                                                      • memory/2632-670-0x0000000000C80000-0x0000000001311000-memory.dmp

                                                                        Filesize

                                                                        6.6MB

                                                                      • memory/2632-99-0x0000000000C80000-0x0000000001311000-memory.dmp

                                                                        Filesize

                                                                        6.6MB

                                                                      • memory/2632-103-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                        Filesize

                                                                        972KB

                                                                      • memory/3176-34-0x0000000000C10000-0x0000000000F21000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/3176-47-0x0000000000C10000-0x0000000000F21000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/3664-14-0x0000000000480000-0x000000000078B000-memory.dmp

                                                                        Filesize

                                                                        3.0MB

                                                                      • memory/3664-18-0x0000000000480000-0x000000000078B000-memory.dmp

                                                                        Filesize

                                                                        3.0MB

                                                                      • memory/3664-17-0x0000000000480000-0x000000000078B000-memory.dmp

                                                                        Filesize

                                                                        3.0MB

                                                                      • memory/3664-16-0x0000000000481000-0x00000000004A9000-memory.dmp

                                                                        Filesize

                                                                        160KB

                                                                      • memory/3664-15-0x0000000077524000-0x0000000077526000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/3868-83-0x0000000000390000-0x000000000069D000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/3868-82-0x0000000000390000-0x000000000069D000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/4140-626-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/4140-752-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/4140-772-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/4140-769-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/4140-766-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/4140-763-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/4140-760-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/4140-65-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/4140-147-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/4140-746-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/4140-66-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/4140-48-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/4140-681-0x0000000000A20000-0x0000000000D31000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/4652-631-0x00000000006E0000-0x000000000099C000-memory.dmp

                                                                        Filesize

                                                                        2.7MB

                                                                      • memory/4652-628-0x00000000006E0000-0x000000000099C000-memory.dmp

                                                                        Filesize

                                                                        2.7MB

                                                                      • memory/4652-166-0x00000000006E0000-0x000000000099C000-memory.dmp

                                                                        Filesize

                                                                        2.7MB

                                                                      • memory/4652-168-0x00000000006E0000-0x000000000099C000-memory.dmp

                                                                        Filesize

                                                                        2.7MB

                                                                      • memory/4652-169-0x00000000006E0000-0x000000000099C000-memory.dmp

                                                                        Filesize

                                                                        2.7MB

                                                                      • memory/5048-22-0x0000000000FA0000-0x00000000016D1000-memory.dmp

                                                                        Filesize

                                                                        7.2MB

                                                                      • memory/5048-30-0x0000000000FA0000-0x00000000016D1000-memory.dmp

                                                                        Filesize

                                                                        7.2MB

                                                                      • memory/5472-761-0x0000000000710000-0x0000000000722000-memory.dmp

                                                                        Filesize

                                                                        72KB

                                                                      • memory/5472-762-0x0000000072E30000-0x0000000072F64000-memory.dmp

                                                                        Filesize

                                                                        1.2MB