Malware Analysis Report

2024-12-07 15:20

Sample ID 241113-y86yxaxra1
Target https://gofile.io/d/xXLSGv
Tags
discovery evasion execution persistence upx
score
9/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
9/10

Threat Level: Likely malicious

The file https://gofile.io/d/xXLSGv was found to be: Likely malicious.

Malicious Activity Summary

discovery evasion execution persistence upx

Enumerates VirtualBox DLL files

Command and Scripting Interpreter: PowerShell

Sets file to hidden

Downloads MZ/PE file

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Legitimate hosting services abused for malware hosting/C2

Adds Run key to start application

UPX packed file

Browser Information Discovery

Enumerates physical storage devices

Modifies registry class

Modifies data under HKEY_USERS

Suspicious behavior: EnumeratesProcesses

Enumerates system info in registry

Suspicious behavior: GetForegroundWindowSpam

Kills process with taskkill

Checks SCSI registry key(s)

Suspicious use of SendNotifyMessage

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Views/modifies file attributes

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-13 20:28

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-13 20:28

Reported

2024-11-13 20:34

Platform

win10v2004-20241007-en

Max time kernel

325s

Max time network

332s

Command Line

"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/xXLSGv

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\System\System.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\System\System.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\System\System.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\System\System.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Downloads MZ/PE file

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C:\Users\Admin\Downloads\Desktop.scr N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemS = "C:\\Users\\Admin\\System\\System.exe" C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Browser Information Discovery

discovery

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 C:\Windows\system32\taskmgr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A C:\Windows\system32\taskmgr.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName C:\Windows\system32\taskmgr.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133760033144161864" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\System\System.exe N/A
N/A N/A C:\Users\Admin\System\System.exe N/A
N/A N/A C:\Users\Admin\System\System.exe N/A
N/A N/A C:\Users\Admin\System\System.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\System\System.exe N/A
N/A N/A C:\Users\Admin\System\System.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\System\System.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\System\System.exe N/A
N/A N/A C:\Users\Admin\System\System.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2112 wrote to memory of 1088 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1088 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 4548 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 2696 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 2696 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2112 wrote to memory of 1248 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/xXLSGv

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9e6eecc40,0x7ff9e6eecc4c,0x7ff9e6eecc58

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1724,i,10151629699169118008,1501628357260728260,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1944 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1892,i,10151629699169118008,1501628357260728260,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2072 /prefetch:3

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,10151629699169118008,1501628357260728260,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2584 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,10151629699169118008,1501628357260728260,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,10151629699169118008,1501628357260728260,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3392 /prefetch:1

C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3700,i,10151629699169118008,1501628357260728260,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3668 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4040,i,10151629699169118008,1501628357260728260,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4448 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4856,i,10151629699169118008,1501628357260728260,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4860 /prefetch:8

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3868,i,10151629699169118008,1501628357260728260,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5032 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4924,i,10151629699169118008,1501628357260728260,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5116 /prefetch:8

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Users\Admin\Downloads\Desktop.scr

"C:\Users\Admin\Downloads\Desktop.scr" /S

C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\FreeNitro2024.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x510 0x2f8

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\System\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\System\activate.bat

C:\Windows\system32\attrib.exe

attrib +s +h .

C:\Users\Admin\System\System.exe

"System.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "FreeNitro2024.exe"

C:\Users\Admin\System\System.exe

"System.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\System\""

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell (Get-CimInstance Win32_ComputerSystemProduct).UUID

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "del C:\Users\Admin\System\ss.png"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4672,i,10151629699169118008,1501628357260728260,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5432 /prefetch:8

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k SDRSVC

C:\Windows\system32\taskmgr.exe

"C:\Windows\system32\taskmgr.exe" /4

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "del C:\Users\Admin\System\ss.png"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "start "" "C:/Users/Admin/System/System.exe""

C:\Users\Admin\System\System.exe

"C:/Users/Admin/System/System.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "del ss.png"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\System\""

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell (Get-CimInstance Win32_ComputerSystemProduct).UUID

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "del C:\Users\Admin\System\ss.png"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 gofile.io udp
FR 45.112.123.126:443 gofile.io tcp
FR 45.112.123.126:443 gofile.io tcp
US 8.8.8.8:53 api.gofile.io udp
US 8.8.8.8:53 126.123.112.45.in-addr.arpa udp
US 8.8.8.8:53 10.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
FR 45.112.123.126:443 api.gofile.io tcp
US 8.8.8.8:53 s.gofile.io udp
FR 51.75.242.210:443 s.gofile.io tcp
US 8.8.8.8:53 content-autofill.googleapis.com udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
FR 51.75.242.210:443 s.gofile.io tcp
US 8.8.8.8:53 ad.a-ads.com udp
DE 188.40.69.138:443 ad.a-ads.com tcp
US 8.8.8.8:53 static.a-ads.com udp
DE 148.251.155.232:443 static.a-ads.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 210.242.75.51.in-addr.arpa udp
US 8.8.8.8:53 138.69.40.188.in-addr.arpa udp
US 8.8.8.8:53 99.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 232.155.251.148.in-addr.arpa udp
US 8.8.8.8:53 store4.gofile.io udp
FR 31.14.70.245:443 store4.gofile.io tcp
FR 31.14.70.245:443 store4.gofile.io tcp
US 8.8.8.8:53 245.70.14.31.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 discord.com udp
US 162.159.136.232:443 discord.com tcp
N/A 127.0.0.1:57280 tcp
US 8.8.8.8:53 gateway.discord.gg udp
US 162.159.133.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 232.136.159.162.in-addr.arpa udp
US 8.8.8.8:53 234.133.159.162.in-addr.arpa udp
US 162.159.136.232:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp
US 8.8.8.8:53 232.135.159.162.in-addr.arpa udp
US 8.8.8.8:53 102.144.22.2.in-addr.arpa udp
US 162.159.136.232:443 discord.com tcp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 ad.a-ads.com udp
DE 78.46.32.91:443 ad.a-ads.com tcp
US 8.8.8.8:53 static.a-ads.com udp
DE 148.251.233.147:443 static.a-ads.com tcp
US 8.8.8.8:53 91.32.46.78.in-addr.arpa udp
US 8.8.8.8:53 147.233.251.148.in-addr.arpa udp
US 162.159.136.232:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp
US 162.159.136.232:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp
US 162.159.136.232:443 discord.com tcp
US 8.8.8.8:53 frankfurt10117.discord.media udp
US 162.159.130.235:443 frankfurt10117.discord.media tcp
DE 35.207.167.122:50001 udp
US 8.8.8.8:53 122.167.207.35.in-addr.arpa udp
US 8.8.8.8:53 235.130.159.162.in-addr.arpa udp
US 8.8.8.8:53 131.72.42.20.in-addr.arpa udp
US 162.159.136.232:443 discord.com tcp
US 162.159.136.232:443 discord.com tcp
N/A 127.0.0.1:58732 tcp
US 162.159.133.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 frankfurt10033.discord.media udp
US 162.159.137.234:443 frankfurt10033.discord.media tcp
DE 35.207.143.121:50007 udp
US 8.8.8.8:53 121.143.207.35.in-addr.arpa udp
US 8.8.8.8:53 234.137.159.162.in-addr.arpa udp
US 162.159.136.232:443 discord.com tcp
US 162.159.136.232:443 discord.com tcp

Files

\??\pipe\crashpad_2112_AGKADINCSNKSCBTT

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

MD5 c510b0bdc9dced617026eeb13fb09721
SHA1 542829b7180ffe491404dcf3ecea2bfe0c741662
SHA256 c9db2cd76a52920110d801005608c6322aba58fe71d3e9e4cfb123cd74a66303
SHA512 9c982ea52c2f6ba7ad7bb8b5b2bbf32c515bc5680cdb71f2ba11c2fc0dce9404dfd47e01c1dd6e728f3b690b1e0a809052cc35bd6262b96a9f144411b191e746

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 c067d29f30e65727506501cad160db6f
SHA1 51e4067f0deeebab3f41ea28f50af68f571d86cc
SHA256 429be6081d9e2da5e334e10b78340264f41cc43651f2d03a62a3bb0e5e11a121
SHA512 90d91aba3307fd99a633e7e29484fbd7b938cbf4bc8cfd3550eb758ffd437e3aa20216fd8085f367e449e6bb725a30b57dd33e944dacad01dfc492436816f33f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\8ff7725e-a8bb-4012-8673-29967c05d9f2.tmp

MD5 7353cafa4c8c05d70563e9b27224a232
SHA1 eb3649b58ca6a5b15fdbbdb5e420889ae11cea73
SHA256 4cb26d59b3c2e14831b0e592ba7a6ca386147a65b9547297fb1da1b39e0ac1e9
SHA512 748f039b296a26b9be20c60980acdee8c27cb8ff024d004592731649bc28913498b72edd90d99de75c10804bca252c99f47901e53bd2853927d3e81f481bca0b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 7c39a9fcfdbb95cb2e3eaf993f7fbd15
SHA1 e250a369bf68fc2f378a7d328a0045e1783c94f5
SHA256 94dd8475c22bcb45472f58dd80da7e7c14445b96862881a044fbbacfc1132091
SHA512 93e77191e54ae57203f0ff7988f7b7b96bed705ea088e7839286d843f0618f2bbc07da190f255c377863ad14419dafa506f104ea7fe36510fd1c428347404a56

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 b1876a4367221f24835092f926be3249
SHA1 03de97721b8576bb036f174caa35bc75008a06a8
SHA256 59224436319136b0248e5d30f43ff09e917ee3a0b3bde30c7bb9b36e026fabf1
SHA512 1b24d9d5901ebedf42e4f19374584e3635e9f9bfe332b0b70c85819a7dae451582db1746b8ab1a83add6391b1fda56ec48a46fe17410bbcc5b6fb1b62cbeee99

C:\Users\Admin\AppData\Local\Temp\_MEI39882\ucrtbase.dll

MD5 0e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA1 4189f4459c54e69c6d3155a82524bda7549a75a6
SHA256 8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512 a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

C:\Users\Admin\AppData\Local\Temp\_MEI39882\python311.dll

MD5 87b5d21226d74f069b5ae8fb74743236
SHA1 153651a542db095d0f9088a97351b90d02b307ac
SHA256 3cac88119657daef7f79844aeb9da79b45c1f3bb2ea3468b0d4ed26067852194
SHA512 788bb26b3f4ce99a2b49eef2742972fe843bdd97d361a6e67237f29376648ea6f874f1f6ba6dd53c74ef51a29e650a02fb99dfc30b5badfa9d2e05491f81d7d6

C:\Users\Admin\AppData\Local\Temp\_MEI39882\VCRUNTIME140.dll

MD5 f12681a472b9dd04a812e16096514974
SHA1 6fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256 d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA512 7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

memory/1208-1417-0x00007FF9D7570000-0x00007FF9D7B58000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI39882\base_library.zip

MD5 2a138e2ee499d3ba2fc4afaef93b7caa
SHA1 508c733341845e94fce7c24b901fc683108df2a8
SHA256 130e506ead01b91b60d6d56072c468aeb5457dd0f2ecd6ce17dfcbb7d51a1f8c
SHA512 1f61a0fda5676e8ed8d10dfee78267f6d785f9c131f5caf2dd984e18ca9e5866b7658ab7edb2ffd74920a40ffea5cd55c0419f5e9ee57a043105e729e10d820b

C:\Users\Admin\AppData\Local\Temp\_MEI39882\_ctypes.pyd

MD5 e7ec734581f37a065e54b55515222897
SHA1 9205e3030ea43027cba202b4c968447927d3dc0d
SHA256 9e619adf436228c1c87e7909ca58575a02ef069d71045785b102e2a0f833b6a3
SHA512 281a16075a10ab4465ff1ab49c5639e982961b5029dc36f4b9657f32b9c29ff1bd39c2d6a3f793d7f93fd10802f5d1356bee9e54fa6eb67780a6275094e4fef3

C:\Users\Admin\AppData\Local\Temp\_MEI39882\python3.DLL

MD5 34e49bb1dfddf6037f0001d9aefe7d61
SHA1 a25a39dca11cdc195c9ecd49e95657a3e4fe3215
SHA256 4055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281
SHA512 edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856

C:\Users\Admin\AppData\Local\Temp\_MEI39882\libffi-8.dll

MD5 77199701fe2d585080e44c70ea5aed4c
SHA1 34c8b0ce03a945351e30fb704a00d5257e2a6132
SHA256 4eb41bcf5e54017c4d8c6a7184f4633d9e6c10ca8f52ad21e3b752edd745d4ee
SHA512 d325f517a3eb831f3f5853c5471295244716a666507aa4e4b262e0842f1bfad0c9648a6711fbce514193e411cfcdbb9afe86764e740355cd06895dfcc623fe34

memory/1208-1426-0x00007FF9D8410000-0x00007FF9D8434000-memory.dmp

memory/1208-1427-0x00007FF9F1890000-0x00007FF9F189F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI39882\_bz2.pyd

MD5 c33370fc6631725aec3102b955b5e4bf
SHA1 0fce43642e54cd9db1eb48bbfd7661b8a4613e0d
SHA256 6c41a618b4dec812f5cd434375f33052daada9f49c6d472e82bdec27c407cfc5
SHA512 1de939ccb2b6349eaefcf12f37fb00b2b5dafff07930d52bfededcdfe6a234c0da75030596f544adfea09c786dc576fc5a88056ec614d2059a1a9e182925a021

C:\Users\Admin\AppData\Local\Temp\_MEI39882\_lzma.pyd

MD5 49a6a6127ad0a70a2d60f193254ba710
SHA1 eb9f1f5a0b264d6c2c477562b9331a798b9a1909
SHA256 4ad51dac78f9192831ee9c6959ad3d67e0f66869bded3a91688b08c4ff2103f7
SHA512 e5064d0536361fd193b1855fcb4173cace51094d8c8827dfca893d49734200156847987124ded14d75aa0c61f1204cc00eaf4ee81d84406e17ad216bf17003ca

memory/1208-1433-0x00007FF9D83E0000-0x00007FF9D840D000-memory.dmp

memory/1208-1431-0x00007FF9D9760000-0x00007FF9D9779000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-datetime-l1-1-0.dll

MD5 cfe0c1dfde224ea5fed9bd5ff778a6e0
SHA1 5150e7edd1293e29d2e4d6bb68067374b8a07ce6
SHA256 0d0f80cbf476af5b1c9fd3775e086ed0dfdb510cd0cc208ec1ccb04572396e3e
SHA512 b0e02e1f19cfa7de3693d4d63e404bdb9d15527ac85a6d492db1128bb695bffd11bec33d32f317a7615cb9a820cd14f9f8b182469d65af2430ffcdbad4bd7000

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-console-l1-1-0.dll

MD5 e8b9d74bfd1f6d1cc1d99b24f44da796
SHA1 a312cfc6a7ed7bf1b786e5b3fd842a7eeb683452
SHA256 b1b3fd40ab437a43c8db4994ccffc7f88000cc8bb6e34a2bcbff8e2464930c59
SHA512 b74d9b12b69db81a96fc5a001fd88c1e62ee8299ba435e242c5cb2ce446740ed3d8a623e1924c2bc07bfd9aef7b2577c9ec8264e53e5be625f4379119bafcc27

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-debug-l1-1-0.dll

MD5 33bbece432f8da57f17bf2e396ebaa58
SHA1 890df2dddfdf3eeccc698312d32407f3e2ec7eb1
SHA256 7cf0944901f7f7e0d0b9ad62753fc2fe380461b1cce8cdc7e9c9867c980e3b0e
SHA512 619b684e83546d97fc1d1bc7181ad09c083e880629726ee3af138a9e4791a6dcf675a8df65dc20edbe6465b5f4eac92a64265df37e53a5f34f6be93a5c2a7ae5

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-crt-heap-l1-1-0.dll

MD5 d5d77669bd8d382ec474be0608afd03f
SHA1 1558f5a0f5facc79d3957ff1e72a608766e11a64
SHA256 8dd9218998b4c4c9e8d8b0f8b9611d49419b3c80daa2f437cbf15bcfd4c0b3b8
SHA512 8defa71772105fd9128a669f6ff19b6fe47745a0305beb9a8cadb672ed087077f7538cd56e39329f7daa37797a96469eae7cd5e4cca57c9a183b35bdc44182f3

memory/1208-1466-0x00007FF9D83C0000-0x00007FF9D83D4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-crt-math-l1-1-0.dll

MD5 b8f0210c47847fc6ec9fbe2a1ad4debb
SHA1 e99d833ae730be1fedc826bf1569c26f30da0d17
SHA256 1c4a70a73096b64b536be8132ed402bcfb182c01b8a451bff452efe36ddf76e7
SHA512 992d790e18ac7ae33958f53d458d15bff522a3c11a6bd7ee2f784ac16399de8b9f0a7ee896d9f2c96d1e2c8829b2f35ff11fc5d8d1b14c77e22d859a1387797c

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-crt-locale-l1-1-0.dll

MD5 650435e39d38160abc3973514d6c6640
SHA1 9a5591c29e4d91eaa0f12ad603af05bb49708a2d
SHA256 551a34c400522957063a2d71fa5aba1cd78cc4f61f0ace1cd42cc72118c500c0
SHA512 7b4a8f86d583562956593d27b7ecb695cb24ab7192a94361f994fadba7a488375217755e7ed5071de1d0960f60f255aa305e9dd477c38b7bb70ac545082c9d5e

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 5107487b726bdcc7b9f7e4c2ff7f907c
SHA1 ebc46221d3c81a409fab9815c4215ad5da62449c
SHA256 94a86e28e829276974e01f8a15787fde6ed699c8b9dc26f16a51765c86c3eade
SHA512 a0009b80ad6a928580f2b476c1bdf4352b0611bb3a180418f2a42cfa7a03b9f0575ed75ec855d30b26e0cca96a6da8affb54862b6b9aff33710d2f3129283faa

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-crt-environment-l1-1-0.dll

MD5 f9235935dd3ba2aa66d3aa3412accfbf
SHA1 281e548b526411bcb3813eb98462f48ffaf4b3eb
SHA256 2f6bd6c235e044755d5707bd560a6afc0ba712437530f76d11079d67c0cf3200
SHA512 ad0c0a7891fb8328f6f0cf1ddc97523a317d727c15d15498afa53c07610210d2610db4bc9bd25958d47adc1af829ad4d7cf8aabcab3625c783177ccdb7714246

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-crt-convert-l1-1-0.dll

MD5 edf71c5c232f5f6ef3849450f2100b54
SHA1 ed46da7d59811b566dd438fa1d09c20f5dc493ce
SHA256 b987ab40cdd950ebe7a9a9176b80b8fffc005ccd370bb1cbbcad078c1a506bdc
SHA512 481a3c8dc5bef793ee78ce85ec0f193e3e9f6cd57868b813965b312bd0fadeb5f4419707cd3004fbdb407652101d52e061ef84317e8bd458979443e9f8e4079a

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-crt-conio-l1-1-0.dll

MD5 d4fba5a92d68916ec17104e09d1d9d12
SHA1 247dbc625b72ffb0bf546b17fb4de10cad38d495
SHA256 93619259328a264287aee7c5b88f7f0ee32425d7323ce5dc5a2ef4fe3bed90d5
SHA512 d5a535f881c09f37e0adf3b58d41e123f527d081a1ebecd9a927664582ae268341771728dc967c30908e502b49f6f853eeaebb56580b947a629edc6bce2340d8

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-util-l1-1-0.dll

MD5 0f129611a4f1e7752f3671c9aa6ea736
SHA1 40c07a94045b17dae8a02c1d2b49301fad231152
SHA256 2e1f090aba941b9d2d503e4cd735c958df7bb68f1e9bdc3f47692e1571aaac2f
SHA512 6abc0f4878bb302713755a188f662c6fe162ea6267e5e1c497c9ba9fddbdaea4db050e322cb1c77d6638ecf1dad940b9ebc92c43acaa594040ee58d313cbcfae

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-timezone-l1-1-0.dll

MD5 d12403ee11359259ba2b0706e5e5111c
SHA1 03cc7827a30fd1dee38665c0cc993b4b533ac138
SHA256 f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781
SHA512 9004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-synch-l1-2-0.dll

MD5 1281e9d1750431d2fe3b480a8175d45c
SHA1 bc982d1c750b88dcb4410739e057a86ff02d07ef
SHA256 433bd8ddc4f79aee65ca94a54286d75e7d92b019853a883e51c2b938d2469baa
SHA512 a954e6ce76f1375a8beac51d751b575bbc0b0b8ba6aa793402b26404e45718165199c2c00ccbcba3783c16bdd96f0b2c17addcc619c39c8031becebef428ce77

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-synch-l1-1-0.dll

MD5 225d9f80f669ce452ca35e47af94893f
SHA1 37bd0ffc8e820247bd4db1c36c3b9f9f686bbd50
SHA256 61c0ebe60ce6ebabcb927ddff837a9bf17e14cd4b4c762ab709e630576ec7232
SHA512 2f71a3471a9868f4d026c01e4258aff7192872590f5e5c66aabd3c088644d28629ba8835f3a4a23825631004b1afd440efe7161bb9fc7d7c69e0ee204813ca7b

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-string-l1-1-0.dll

MD5 2666581584ba60d48716420a6080abda
SHA1 c103f0ea32ebbc50f4c494bce7595f2b721cb5ad
SHA256 27e9d3e7c8756e4512932d674a738bf4c2969f834d65b2b79c342a22f662f328
SHA512 befed15f11a0550d2859094cc15526b791dadea12c2e7ceb35916983fb7a100d89d638fb1704975464302fae1e1a37f36e01e4bef5bc4924ab8f3fd41e60bd0c

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 fd46c3f6361e79b8616f56b22d935a53
SHA1 107f488ad966633579d8ec5eb1919541f07532ce
SHA256 0dc92e8830bc84337dcae19ef03a84ef5279cf7d4fdc2442c1bc25320369f9df
SHA512 3360b2e2a25d545ccd969f305c4668c6cda443bbdbd8a8356ffe9fbc2f70d90cf4540f2f28c9ed3eea6c9074f94e69746e7705e6254827e6a4f158a75d81065b

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 a0c2dbe0f5e18d1add0d1ba22580893b
SHA1 29624df37151905467a223486500ed75617a1dfd
SHA256 3c29730df2b28985a30d9c82092a1faa0ceb7ffc1bd857d1ef6324cf5524802f
SHA512 3e627f111196009380d1687e024e6ffb1c0dcf4dcb27f8940f17fec7efdd8152ff365b43cb7fdb31de300955d6c15e40a2c8fb6650a91706d7ea1c5d89319b12

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-profile-l1-1-0.dll

MD5 f3ff2d544f5cd9e66bfb8d170b661673
SHA1 9e18107cfcd89f1bbb7fdaf65234c1dc8e614add
SHA256 e1c5d8984a674925fa4afbfe58228be5323fe5123abcd17ec4160295875a625f
SHA512 184b09c77d079127580ef80eb34bded0f5e874cefbe1c5f851d86861e38967b995d859e8491fcc87508930dc06c6bbf02b649b3b489a1b138c51a7d4b4e7aaad

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-processthreads-l1-1-1.dll

MD5 517eb9e2cb671ae49f99173d7f7ce43f
SHA1 4ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab
SHA256 57cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54
SHA512 492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-processthreads-l1-1-0.dll

MD5 c3632083b312c184cbdd96551fed5519
SHA1 a93e8e0af42a144009727d2decb337f963a9312e
SHA256 be8d78978d81555554786e08ce474f6af1de96fcb7fa2f1ce4052bc80c6b2125
SHA512 8807c2444a044a3c02ef98cf56013285f07c4a1f7014200a21e20fcb995178ba835c30ac3889311e66bc61641d6226b1ff96331b019c83b6fcc7c87870cce8c4

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 0462e22f779295446cd0b63e61142ca5
SHA1 616a325cd5b0971821571b880907ce1b181126ae
SHA256 0b6b598ec28a9e3d646f2bb37e1a57a3dda069a55fba86333727719585b1886e
SHA512 07b34dca6b3078f7d1e8ede5c639f697c71210dcf9f05212fd16eb181ab4ac62286bc4a7ce0d84832c17f5916d0224d1e8aab210ceeff811fc6724c8845a74fe

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 321a3ca50e80795018d55a19bf799197
SHA1 df2d3c95fb4cbb298d255d342f204121d9d7ef7f
SHA256 5476db3a4fecf532f96d48f9802c966fdef98ec8d89978a79540cb4db352c15f
SHA512 3ec20e1ac39a98cb5f726d8390c2ee3cd4cd0bf118fdda7271f7604a4946d78778713b675d19dd3e1ec1d6d4d097abe9cd6d0f76b3a7dff53ce8d6dbc146870a

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-memory-l1-1-0.dll

MD5 3c38aac78b7ce7f94f4916372800e242
SHA1 c793186bcf8fdb55a1b74568102b4e073f6971d6
SHA256 3f81a149ba3862776af307d5c7feef978f258196f0a1bf909da2d3f440ff954d
SHA512 c2746aa4342c6afffbd174819440e1bbf4371a7fed29738801c75b49e2f4f94fd6d013e002bad2aadafbc477171b8332c8c5579d624684ef1afbfde9384b8588

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-localization-l1-2-0.dll

MD5 724223109e49cb01d61d63a8be926b8f
SHA1 072a4d01e01dbbab7281d9bd3add76f9a3c8b23b
SHA256 4e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210
SHA512 19b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 1f2a00e72bc8fa2bd887bdb651ed6de5
SHA1 04d92e41ce002251cc09c297cf2b38c4263709ea
SHA256 9c8a08a7d40b6f697a21054770f1afa9ffb197f90ef1eee77c67751df28b7142
SHA512 8cf72df019f9fc9cd22ff77c37a563652becee0708ff5c6f1da87317f41037909e64dcbdcc43e890c5777e6bcfa4035a27afc1aeeb0f5deba878e3e9aef7b02a

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-interlocked-l1-1-0.dll

MD5 c6024cc04201312f7688a021d25b056d
SHA1 48a1d01ae8bc90f889fb5f09c0d2a0602ee4b0fd
SHA256 8751d30df554af08ef42d2faa0a71abcf8c7d17ce9e9ff2ea68a4662603ec500
SHA512 d86c773416b332945acbb95cbe90e16730ef8e16b7f3ccd459d7131485760c2f07e95951aeb47c1cf29de76affeb1c21bdf6d8260845e32205fe8411ed5efa47

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-heap-l1-1-0.dll

MD5 accc640d1b06fb8552fe02f823126ff5
SHA1 82ccc763d62660bfa8b8a09e566120d469f6ab67
SHA256 332ba469ae84aa72ec8cce2b33781db1ab81a42ece5863f7a3cb5a990059594f
SHA512 6382302fb7158fc9f2be790811e5c459c5c441f8caee63df1e09b203b8077a27e023c4c01957b252ac8ac288f8310bcee5b4dcc1f7fc691458b90cdfaa36dcbe

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-handle-l1-1-0.dll

MD5 e89cdcd4d95cda04e4abba8193a5b492
SHA1 5c0aee81f32d7f9ec9f0650239ee58880c9b0337
SHA256 1a489e0606484bd71a0d9cb37a1dc6ca8437777b3d67bfc8c0075d0cc59e6238
SHA512 55d01e68c8c899e99a3c62c2c36d6bcb1a66ff6ecd2636d2d0157409a1f53a84ce5d6f0c703d5ed47f8e9e2d1c9d2d87cc52585ee624a23d92183062c999b97e

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-file-l2-1-0.dll

MD5 bfffa7117fd9b1622c66d949bac3f1d7
SHA1 402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA256 1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512 b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-file-l1-2-0.dll

MD5 1c58526d681efe507deb8f1935c75487
SHA1 0e6d328faf3563f2aae029bc5f2272fb7a742672
SHA256 ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2
SHA512 8edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-file-l1-1-0.dll

MD5 efad0ee0136532e8e8402770a64c71f9
SHA1 cda3774fe9781400792d8605869f4e6b08153e55
SHA256 3d2c55902385381869db850b526261ddeb4628b83e690a32b67d2e0936b2c6ed
SHA512 69d25edf0f4c8ac5d77cb5815dfb53eac7f403dc8d11bfe336a545c19a19ffde1031fa59019507d119e4570da0d79b95351eac697f46024b4e558a0ff6349852

C:\Users\Admin\AppData\Local\Temp\_MEI39882\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 eb0978a9213e7f6fdd63b2967f02d999
SHA1 9833f4134f7ac4766991c918aece900acfbf969f
SHA256 ab25a1fe836fc68bcb199f1fe565c27d26af0c390a38da158e0d8815efe1103e
SHA512 6f268148f959693ee213db7d3db136b8e3ad1f80267d8cbd7d5429c021adaccc9c14424c09d527e181b9c9b5ea41765aff568b9630e4eb83bfc532e56dfe5b63

memory/1208-1467-0x00007FF9D8040000-0x00007FF9D83B5000-memory.dmp

memory/1208-1477-0x00007FF9D8020000-0x00007FF9D8039000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 52b47b04a1db2ac11137163893ceb9d5
SHA1 c64b3749450a583657852161a6e6378f0251ea9a
SHA256 da445c126b4b5672d338be787339968c14b2a55987561e81f939706267101bfb
SHA512 84d750955bb1c5daa36b9e6ed8cd24c11db536c01f3b0b41c916295e13dcf9a6a4a7b99f80763ec42b5dd25b984b7be13eeee47aee816b8117c62e0e4031e63c

memory/1208-1478-0x00007FF9EC810000-0x00007FF9EC81D000-memory.dmp

memory/1208-1479-0x00007FF9D7FF0000-0x00007FF9D801E000-memory.dmp

memory/1208-1482-0x00007FF9D7E20000-0x00007FF9D7ED8000-memory.dmp

memory/1208-1481-0x00007FF9D8410000-0x00007FF9D8434000-memory.dmp

memory/1208-1480-0x00007FF9D7570000-0x00007FF9D7B58000-memory.dmp

memory/1208-1483-0x00007FF9EC7E0000-0x00007FF9EC7ED000-memory.dmp

memory/1208-1485-0x00007FF9D7DF0000-0x00007FF9D7E17000-memory.dmp

memory/1208-1484-0x00007FF9EC6A0000-0x00007FF9EC6AB000-memory.dmp

memory/1208-1487-0x00007FF9D7CD0000-0x00007FF9D7DEC000-memory.dmp

memory/1208-1486-0x00007FF9D83E0000-0x00007FF9D840D000-memory.dmp

memory/1208-1488-0x00007FF9D83C0000-0x00007FF9D83D4000-memory.dmp

memory/1208-1489-0x00007FF9D7C90000-0x00007FF9D7CC7000-memory.dmp

memory/1208-1496-0x00007FF9EA250000-0x00007FF9EA25C000-memory.dmp

memory/1208-1495-0x00007FF9EC1B0000-0x00007FF9EC1BB000-memory.dmp

memory/1208-1494-0x00007FF9D8020000-0x00007FF9D8039000-memory.dmp

memory/1208-1493-0x00007FF9EB970000-0x00007FF9EB97B000-memory.dmp

memory/1208-1500-0x00007FF9E2EB0000-0x00007FF9E2EBE000-memory.dmp

memory/1208-1502-0x00007FF9DDBB0000-0x00007FF9DDBBC000-memory.dmp

memory/1208-1510-0x00007FF9D7DF0000-0x00007FF9D7E17000-memory.dmp

memory/1208-1509-0x00007FF9D7FD0000-0x00007FF9D7FDD000-memory.dmp

memory/1208-1508-0x00007FF9D7FE0000-0x00007FF9D7FEB000-memory.dmp

memory/1208-1507-0x00007FF9D9AD0000-0x00007FF9D9ADC000-memory.dmp

memory/1208-1506-0x00007FF9DCF90000-0x00007FF9DCF9B000-memory.dmp

memory/1208-1505-0x00007FF9EC7E0000-0x00007FF9EC7ED000-memory.dmp

memory/1208-1514-0x00007FF9D7C40000-0x00007FF9D7C55000-memory.dmp

memory/1208-1513-0x00007FF9D7C90000-0x00007FF9D7CC7000-memory.dmp

memory/1208-1512-0x00007FF9D7C60000-0x00007FF9D7C6C000-memory.dmp

memory/1208-1515-0x00007FF9D7C20000-0x00007FF9D7C32000-memory.dmp

memory/1208-1511-0x00007FF9D7C70000-0x00007FF9D7C82000-memory.dmp

memory/1208-1504-0x00007FF9DD3A0000-0x00007FF9DD3AB000-memory.dmp

memory/1208-1503-0x00007FF9D7E20000-0x00007FF9D7ED8000-memory.dmp

memory/1208-1516-0x00007FF9D7C00000-0x00007FF9D7C14000-memory.dmp

memory/1208-1501-0x00007FF9D7FF0000-0x00007FF9D801E000-memory.dmp

memory/1208-1497-0x00007FF9E8E60000-0x00007FF9E8E6B000-memory.dmp

memory/1208-1499-0x00007FF9E73B0000-0x00007FF9E73BD000-memory.dmp

memory/1208-1498-0x00007FF9E8390000-0x00007FF9E839C000-memory.dmp

memory/1208-1517-0x00007FF9D7BD0000-0x00007FF9D7BF2000-memory.dmp

memory/1208-1518-0x00007FF9D7BB0000-0x00007FF9D7BCB000-memory.dmp

memory/1208-1492-0x00007FF9EBB70000-0x00007FF9EBB7C000-memory.dmp

memory/1208-1491-0x00007FF9EC530000-0x00007FF9EC53B000-memory.dmp

memory/1208-1490-0x00007FF9D8040000-0x00007FF9D83B5000-memory.dmp

memory/1208-1520-0x00007FF9D7B90000-0x00007FF9D7BA6000-memory.dmp

memory/1208-1522-0x00007FF9D7500000-0x00007FF9D754D000-memory.dmp

memory/1208-1521-0x00007FF9D7550000-0x00007FF9D7569000-memory.dmp

memory/1208-1519-0x00007FF9DD3A0000-0x00007FF9DD3AB000-memory.dmp

memory/1208-1523-0x00007FF9D74E0000-0x00007FF9D74F1000-memory.dmp

memory/1208-1524-0x00007FF9D74D0000-0x00007FF9D74DA000-memory.dmp

memory/1208-1525-0x00007FF9D7C40000-0x00007FF9D7C55000-memory.dmp

memory/1208-1526-0x00007FF9D74B0000-0x00007FF9D74CE000-memory.dmp

memory/1208-1528-0x00007FF9D7450000-0x00007FF9D74AD000-memory.dmp

memory/1208-1527-0x00007FF9D7C20000-0x00007FF9D7C32000-memory.dmp

memory/1208-1529-0x00007FF9D7C00000-0x00007FF9D7C14000-memory.dmp

memory/1208-1530-0x00007FF9D7420000-0x00007FF9D7449000-memory.dmp

memory/1208-1532-0x00007FF9D73E0000-0x00007FF9D740E000-memory.dmp

memory/1208-1531-0x00007FF9D7BD0000-0x00007FF9D7BF2000-memory.dmp

memory/1208-1533-0x00007FF9D73B0000-0x00007FF9D73D3000-memory.dmp

memory/1208-1534-0x00007FF9D7B90000-0x00007FF9D7BA6000-memory.dmp

memory/1208-1535-0x00007FF9D7230000-0x00007FF9D73A3000-memory.dmp

memory/1208-1537-0x00007FF9D7210000-0x00007FF9D7228000-memory.dmp

memory/1208-1536-0x00007FF9D7550000-0x00007FF9D7569000-memory.dmp

memory/1208-1539-0x00007FF9D7200000-0x00007FF9D720B000-memory.dmp

memory/1208-1538-0x00007FF9D7500000-0x00007FF9D754D000-memory.dmp

memory/1208-1545-0x00007FF9D71D0000-0x00007FF9D71DB000-memory.dmp

memory/1208-1547-0x00007FF9D71C0000-0x00007FF9D71CC000-memory.dmp

memory/1208-1546-0x00007FF9D7450000-0x00007FF9D74AD000-memory.dmp

memory/1208-1549-0x00007FF9D71B0000-0x00007FF9D71BB000-memory.dmp

memory/1208-1548-0x00007FF9D7420000-0x00007FF9D7449000-memory.dmp

memory/1208-1544-0x00007FF9D74B0000-0x00007FF9D74CE000-memory.dmp

memory/1208-1543-0x00007FF9D74D0000-0x00007FF9D74DA000-memory.dmp

memory/1208-1542-0x00007FF9D71E0000-0x00007FF9D71EC000-memory.dmp

memory/1208-1541-0x00007FF9D71F0000-0x00007FF9D71FB000-memory.dmp

memory/1208-1540-0x00007FF9D74E0000-0x00007FF9D74F1000-memory.dmp

memory/1208-1551-0x00007FF9D71A0000-0x00007FF9D71AC000-memory.dmp

memory/1208-1550-0x00007FF9D73E0000-0x00007FF9D740E000-memory.dmp

memory/1208-1558-0x00007FF9D7210000-0x00007FF9D7228000-memory.dmp

memory/1208-1561-0x00007FF9D7130000-0x00007FF9D713B000-memory.dmp

memory/1208-1560-0x00007FF9D7140000-0x00007FF9D714C000-memory.dmp

memory/1208-1559-0x00007FF9D7150000-0x00007FF9D715B000-memory.dmp

memory/1208-1557-0x00007FF9D7170000-0x00007FF9D717C000-memory.dmp

memory/1208-1556-0x00007FF9D7160000-0x00007FF9D716B000-memory.dmp

memory/1208-1563-0x00007FF9D7100000-0x00007FF9D7112000-memory.dmp

memory/1208-1562-0x00007FF9D7120000-0x00007FF9D712D000-memory.dmp

memory/1208-1555-0x00007FF9D7180000-0x00007FF9D718E000-memory.dmp

memory/1208-1554-0x00007FF9D7230000-0x00007FF9D73A3000-memory.dmp

memory/1208-1553-0x00007FF9D7190000-0x00007FF9D719D000-memory.dmp

memory/1208-1564-0x00007FF9D70F0000-0x00007FF9D70FC000-memory.dmp

memory/1208-1552-0x00007FF9D73B0000-0x00007FF9D73D3000-memory.dmp

memory/1208-1565-0x00007FF9D71A0000-0x00007FF9D71AC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2ca5xrwp.dyv.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1208-1618-0x00007FF9D7570000-0x00007FF9D7B58000-memory.dmp

memory/1208-1636-0x00007FF9D7C00000-0x00007FF9D7C14000-memory.dmp

memory/1208-1643-0x00007FF9D0860000-0x00007FF9D08D5000-memory.dmp

memory/1208-1642-0x00007FF9D74E0000-0x00007FF9D74F1000-memory.dmp

memory/1208-1641-0x00007FF9D7500000-0x00007FF9D754D000-memory.dmp

memory/1208-1640-0x00007FF9D7550000-0x00007FF9D7569000-memory.dmp

memory/1208-1639-0x00007FF9D7B90000-0x00007FF9D7BA6000-memory.dmp

memory/1208-1635-0x00007FF9D7C20000-0x00007FF9D7C32000-memory.dmp

memory/1208-1634-0x00007FF9D7C40000-0x00007FF9D7C55000-memory.dmp

memory/1208-1633-0x00007FF9D7C90000-0x00007FF9D7CC7000-memory.dmp

memory/1208-1632-0x00007FF9D7CD0000-0x00007FF9D7DEC000-memory.dmp

memory/1208-1631-0x00007FF9D7DF0000-0x00007FF9D7E17000-memory.dmp

memory/1208-1630-0x00007FF9EC6A0000-0x00007FF9EC6AB000-memory.dmp

memory/1208-1629-0x00007FF9EC7E0000-0x00007FF9EC7ED000-memory.dmp

memory/1208-1628-0x00007FF9D7E20000-0x00007FF9D7ED8000-memory.dmp

memory/1208-1627-0x00007FF9D7FF0000-0x00007FF9D801E000-memory.dmp

memory/1208-1623-0x00007FF9D83C0000-0x00007FF9D83D4000-memory.dmp

memory/1208-1622-0x00007FF9D83E0000-0x00007FF9D840D000-memory.dmp

memory/1208-1621-0x00007FF9D9760000-0x00007FF9D9779000-memory.dmp

memory/1208-1619-0x00007FF9D8410000-0x00007FF9D8434000-memory.dmp

memory/1208-1638-0x00007FF9D7BB0000-0x00007FF9D7BCB000-memory.dmp

memory/1208-1637-0x00007FF9D7BD0000-0x00007FF9D7BF2000-memory.dmp

memory/1208-1624-0x00007FF9D8040000-0x00007FF9D83B5000-memory.dmp

memory/1208-1626-0x00007FF9EC810000-0x00007FF9EC81D000-memory.dmp

memory/1208-1625-0x00007FF9D8020000-0x00007FF9D8039000-memory.dmp

memory/1208-1620-0x00007FF9F1890000-0x00007FF9F189F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI28162\cryptography-43.0.3.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 9d75e696b83a0e2ff490b84e315cfa4a
SHA1 370776273d86ad4dc05d566221d561888ca28d42
SHA256 a93c8824713eb73dbbf9383edebc72feb2463a54a24c0421e444587217f7cffe
SHA512 3183879c38c0c968f0c25d6fba08551bbbe70982a466d74d4679ec09a24d0621be419e2a701ee5c6b6a2d572d0ffc00e94a7099feae37e3aec4da7a4105fb111

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 cc4d91e7a296daa69692d931c8447497
SHA1 a7b74555914767b840da9c80d0bf69fbe0e2a1fd
SHA256 19d54ea55d45d61e666890f41e61e4c562bdde92ed4f7b1175d86a636ced82bd
SHA512 dfbe36cfecfd384e3f95ae56044e564a99216b5f10dcbf121e0726a686aced3749f44b224c8c696bb292e0b8ef9ab1cb5d575ed34eae96c7cb68ac84dbe69086

memory/6476-4109-0x00007FF9D6E30000-0x00007FF9D71A5000-memory.dmp

memory/6476-4140-0x00007FF9D7BE0000-0x00007FF9D7BFB000-memory.dmp

memory/6476-4139-0x00007FF9D7C00000-0x00007FF9D7C22000-memory.dmp

memory/6476-4138-0x00007FF9D7C30000-0x00007FF9D7C44000-memory.dmp

memory/6476-4137-0x00007FF9D7C50000-0x00007FF9D7C62000-memory.dmp

memory/6476-4136-0x00007FF9D7C70000-0x00007FF9D7C85000-memory.dmp

memory/6476-4135-0x00007FF9D7C90000-0x00007FF9D7C9C000-memory.dmp

memory/6476-4134-0x00007FF9D7CA0000-0x00007FF9D7CB2000-memory.dmp

memory/6476-4133-0x00007FF9D7FD0000-0x00007FF9D7FDD000-memory.dmp

memory/6476-4132-0x00007FF9D85C0000-0x00007FF9D85CB000-memory.dmp

memory/6476-4131-0x00007FF9D9AD0000-0x00007FF9D9ADC000-memory.dmp

memory/6476-4130-0x00007FF9DCF90000-0x00007FF9DCF9B000-memory.dmp

memory/6476-4129-0x00007FF9DD3A0000-0x00007FF9DD3AB000-memory.dmp

memory/6476-4128-0x00007FF9DDBB0000-0x00007FF9DDBBC000-memory.dmp

memory/6476-4127-0x00007FF9E2EB0000-0x00007FF9E2EBE000-memory.dmp

memory/6476-4126-0x00007FF9E73B0000-0x00007FF9E73BD000-memory.dmp

memory/6476-4125-0x00007FF9E8390000-0x00007FF9E839C000-memory.dmp

memory/6476-4124-0x00007FF9E8E60000-0x00007FF9E8E6B000-memory.dmp

memory/6476-4123-0x00007FF9EA250000-0x00007FF9EA25C000-memory.dmp

memory/6476-4122-0x00007FF9EB970000-0x00007FF9EB97B000-memory.dmp

memory/6476-4121-0x00007FF9EBB70000-0x00007FF9EBB7C000-memory.dmp

memory/6476-4120-0x00007FF9EC1B0000-0x00007FF9EC1BB000-memory.dmp

memory/6476-4119-0x00007FF9EC530000-0x00007FF9EC53B000-memory.dmp

memory/6476-4118-0x00007FF9D7CC0000-0x00007FF9D7CF7000-memory.dmp

memory/6476-4117-0x00007FF9D7D00000-0x00007FF9D7E1C000-memory.dmp

memory/6476-4116-0x00007FF9D7FE0000-0x00007FF9D8007000-memory.dmp

memory/6476-4115-0x00007FF9EC6A0000-0x00007FF9EC6AB000-memory.dmp

memory/6476-4114-0x00007FF9EC7E0000-0x00007FF9EC7ED000-memory.dmp

memory/6476-4113-0x00007FF9D7E20000-0x00007FF9D7ED8000-memory.dmp

memory/6476-4112-0x00007FF9D8010000-0x00007FF9D803E000-memory.dmp

memory/6476-4111-0x00007FF9EC810000-0x00007FF9EC81D000-memory.dmp

memory/6476-4110-0x00007FF9D8040000-0x00007FF9D8059000-memory.dmp

memory/6476-4103-0x00007FF9D7570000-0x00007FF9D7B58000-memory.dmp

memory/6476-4108-0x00007FF9D8060000-0x00007FF9D8074000-memory.dmp

memory/6476-4107-0x00007FF9D8080000-0x00007FF9D80AD000-memory.dmp

memory/6476-4106-0x00007FF9D85D0000-0x00007FF9D85E9000-memory.dmp

memory/6476-4105-0x00007FF9F1890000-0x00007FF9F189F000-memory.dmp

memory/6476-4104-0x00007FF9D85F0000-0x00007FF9D8614000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 c4757295ad143c3acc7fdddcbdc00c59
SHA1 83ac89f1cbcb81a08ac96e992b136f6929c10014
SHA256 2e2dbdff4e3c668d7c442cc1c503d14dab68f70a380a05078878318ae2b85ffc
SHA512 ecedd481796cd648e5b2b22e118eb83efd8f58a7d4063641b64ee56984cda54b0a6e5bb9e8c5537d89db38dafb4bd7c1a34289384c6ceaa48e1263cd41060590

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 9b5538aa1a65395ba4f3fec51c0d0798
SHA1 4a35ab32e88575302356f9a3941cd2573dd9dd1a
SHA256 8c162604d2451701b3eb17bdd89cdacf81753c75277af23cbcf6259754b54e91
SHA512 7c4742e2aa9342a5690b319f6694caa9c3341aa6db6f5eb3a3d9a390bfb44602db4a19051e68dd2df42d7c0fe434c5b79666d02e2e49402751729918b0d23c6a

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 b2b3357df87d974d26ecaf5dd24721b4
SHA1 cda3b04f0fc14c938eb02b242a951a7c3b2e1285
SHA256 3a4cd7300328b3cf3b65e96883045949828d42bdfea6cfeb1abadfb8a25e08b9
SHA512 3830198734bb7347bd9c9dc7d12b8840f857c7cf89a5e7f4a59931a87c6338c9172265800666aec3f9caa73b7119bc8d87498ae7ec6c28769e18782f8f624dd3

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 98bcea4bc9a797bfbb4444ef68d13df2
SHA1 6a4d3561c034deb13dfdb4c8db2dcfc52df08acb
SHA256 c1a6f1f243f5089e8d8e3261408f23d76347bab07b63456b8605879dc4a0a2c3
SHA512 51967ad6895b085b63b73eb774318e67cb5484683972ce5d037cbf45c0fe1b8a688dca19ca86d8f73d6f09d7bf4b0968bd9e775a3265b5237c0a2c0a6544bfcc

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 11604f7b8e624ed832e2cd532d010511
SHA1 f19ff55d8ed332ce25ca7bab90dd4c6e04511f6f
SHA256 b63c2aeea272b8c923589f31d66d3f04b097f4433c0eb02cd2311fc0b0294105
SHA512 82878388dd803792d6a2681ae7e07e7ddd7b1285776ecf956df2daddb98bc28fd6d1c9e7a6ab35fe241e1949511f66712250c914d750d457aa08d90a67938cb3

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\3f0992e6-2913-4773-8542-afb25f6daede.tmp

MD5 4297df5699bd17a8410b108c160b0622
SHA1 3b9d82770102dcb25f25cd0c54925147dcb0710a
SHA256 4471ac4d05e51757be8dc779761a3cfbf576c73c03a6e71c719203da4bc80fa7
SHA512 49c2a7399c8096f47b30a0eb451e93cbd94ab3a2242bb9081d937ff1137d6b40f752be56bafeb7e12efd16e51639b8ab29d5c1865789b331fca100830753d9f3

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 3a8dc85774bd1680e67b05a430ef722e
SHA1 160f56a52a17995d1ca4ce1b1a83a7b20aae6276
SHA256 30e76267d61ceea0345c6ea9cc4c42cdb6cf79a8d8a8e48f3660462d5732ad50
SHA512 7a46435141adca9ad15b63d931d45ce19467174d97a71c993fb15f4c39be6722e395583d9480a129307fcb3c36c66f38a6a66d2bd576f6d7e3088d2ab84f0849

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 947fb5292383db560973cb0ec8827c06
SHA1 f023fec71b9f763d2fdca42f42c38b5f367051e5
SHA256 8b6e76bdac752d20dcb60c33743b88c423a1402a7f27ca2443807ed6f0d74a6b
SHA512 ae154bd1dd8c2cffa8db726445f2d240924b508174a5a63d2491c6c5c023652d76b893dad5a80965c82bfe20829c0176bc3ac4b00600dbc075df9f1a7ecac289

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 414ebff3c5695ba637235c7d08916410
SHA1 2c37771e9287440f107164a644063b48cd74edc0
SHA256 2b1bac7a405698425a765d3cba71cf60d431a60ed8565bdef87c9578870a3c95
SHA512 3063fb6f825859e982efc9b71dbedb7fb21bd8e74780a4de6691bc2ebfc11062ee9681c2bd1514baf4c5760e6ee1b9a471028cb39f99bbcf1a73944631bfb8cd

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 2061e027b333691a89fd8fe11404e2ad
SHA1 fc0578b3f3346d65c9d2f53809c08b6b748d80cf
SHA256 4afa4e2f5275f3a4cf2979baa8218d9599e0e97491b309d7d5ec17d1c8ea6253
SHA512 650e359b6156f51ac5d0ca6ef548355fde2cc2ecbea6e7949373d530c8cbb490190b3f652e5583a5b977ad874fc68ab8b7f675d4a72fa8adfbae2cc42ba61152

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 c2d54310d2467a0af4f120475193fa0b
SHA1 b0bc42479a027e3793306d2f367b6e1c1751b529
SHA256 619aeb74a8d038a30b38ecf069fdfe822a14facf025c8eddefe5c9483c4b6069
SHA512 49c88c71a667911499103cdb939ab2f475b01c4e0226e532479ef96882b94a87247f7d199e3a29ba189ea5177ba6be7aef0e96724da8606722fd85f707a01ebf

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 a757b3226df5c08f25955f649e456237
SHA1 7678463c0ea41e37a4e937284217becbbfc6c420
SHA256 3a0e3c7599427b58bbeea3a3df6ac7ad685fb656f3a7218bbc1dcd19500fbbcf
SHA512 6981502844a4b38fd984bce0fd37ed43be31b8694a8fea2ce1d36d6e10cb9ed0704e6cbbfe94e1ce715132b17babf21f3906bb8c290bf95b0e60c724a836f4ff

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 64983d06a635becacae133894fafe91d
SHA1 a28359da2f15c05a26e07059af022c7e19b0805a
SHA256 1caeb714583af2bfede1b7ffc8c08a2789437247c99f232ad9ca6ab57ee4c438
SHA512 6666cd872ee371a8987bcaf7ea2a7c0ec6043a0f9bc0b52002ecd1c40ad0f4c4156525005beb2e8b5cc4a32bed1cc67a8c9b76730d048fdfb6d7155395da990b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 4ac07f37deab2f20826c0d26d307cbfc
SHA1 9022a4e2322756acfcc5e9bd06955b30f74adfed
SHA256 f6188a45a2e4396f0386d32b6379f2c49ecdfdb773988833edd69557b993419b
SHA512 d6f0a133f2dbe7032a6c5b1475fba9fee4bc6fdb46298f20393728661fc1cf07d7314adb7a91b0ddb62aed29165a2b4106a71287ad55a4f8a3dd2d353d391f2c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 379bda692526d57e67d4b1ec02252a41
SHA1 cb38b4dc63c5b5ffad205a96a663b3a71eef338f
SHA256 50da833851f571ca3c7ce76af5cb3e1fee3190fbc1a51b2ac8105496a001717a
SHA512 c3c96ae3c7b1d7c532c6ca628b8956039712da71d81e0eae8babe0f59e71ba2e2e43c47bc25465e82cba4ec8e2d7b5ad0a513b50aa7035a10bf4ec017b775ffa

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 ce6ed0d9ea1418420931e7fe6a8fc8f7
SHA1 5fff80e495543be8285cbcea352a6f1807a84016
SHA256 c8c48c39f9970fd798b0d7287ac35f1af990adac75a5073482afbf446c33f5fa
SHA512 7e8c69427b89082ba1b99b554474d91c343fdc17a148ec8bef4af1fbe3dc88e712fd54892a49a3c42c97aca53d10b8f13a33a8885c5c7c5f993b23f7aec08ba7

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 7daaa932f93bf7ea595067c7b0f07c72
SHA1 990dd7d77f105318b34c18608244ee0c455e3cb0
SHA256 256f04cfeb8e39111f60d159d17d98af3e33897bb3089e01803ba1f1f3b4dfda
SHA512 f15572081d300c58f05077679f3977c5862c1961a7d98b79304209efb9702b6cc7adc6b10deae9350cb6da3f8bb2b24a5b6129799eb04c1a73fd0eaf9530788b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 c74ffb099dc3a3b9abb24d366350db63
SHA1 0037c50277279f4f3c998b290f2b10678f0af38b
SHA256 40454734c9fb99e7e35edc7fb1a32baa21e94efc0eabceb5e69fdb0bc460b8f8
SHA512 209952f01f507d0a3d1cc892ceeb064dcdd1cc9b31b28323fe5aa89a78ed06e2af42d0811a01a955890ba3ec817e26941f88b1050477496c72f2958b1509dd20

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 104fe1a12bc48a852244747996e493d8
SHA1 fb91661530ba0386bb59539d67b9be623c734ad7
SHA256 7db9006a5d086c84f3b65078f46d34527f92ef87b61a4612a5ed78c5699b11fa
SHA512 e104ce60459dec93b0e9c5984e29fa36d4a3315e15bb9369913a4a6ed6a223ab1ac3699ca7e92b1e421804c2b13ff9933a3dee2a8d3518ff1f9fae704e85ee53

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 0a1890688b5cab6ae6cb0dda103eea00
SHA1 63229072a0c0d69aa10301877b373493c4ce80d0
SHA256 54e25ee6305520831f70a1b89b7876f557793779e3b5dc91e98e9e1c299dfa9b
SHA512 6c0da75b6ed95e5414a75db272a39bf39c116ff7dbad20b105bedeec0e52b74cef8c8ddf0590d546ceb12aea8717b1da84e826f74e97503fab815e79a77075b2

C:\Users\Admin\System\ss.png

MD5 835e810ca20593c2cef63c1cf37162f2
SHA1 6298623015e5f616679e4eeb75109ba914a241cc
SHA256 818fd30d03ad01eceee9c747dfe368a3cb15be4f0a9754800e9e5e26138dde12
SHA512 7c9a49a69d2bbbfb8b8778720593d58f8a39234fa46b55792a2fd27936742f9f6d05ce7fe2f75ba7d79974d922057866ea918596695585dacb91de7d7d296653