Analysis

  • max time kernel
    510s
  • max time network
    513s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/11/2024, 18:30

General

  • Target

    http://nodejs.org

Malware Config

Extracted

Family

xworm

C2

completed-rally.gl.at.ply.gg:28996

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    Windows Data Compiler.exe

Extracted

Family

xworm

Version

5.0

C2

shoes-since.gl.at.ply.gg:49960

george-liechtenstein.gl.at.ply.gg:2030

Mutex

XnVPNFvj6qHEv6EY

Attributes
  • Install_directory

    %AppData%

  • install_file

    WindowsAntivirus.exe

aes.plain
aes.plain

Signatures

  • Detect Xworm Payload 6 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Hide Artifacts: Hidden Window 1 TTPs 1 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 15 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 31 IoCs
  • NTFS ADS 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://nodejs.org
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b43a46f8,0x7ff9b43a4708,0x7ff9b43a4718
      2⤵
        PID:1848
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:2
        2⤵
          PID:376
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3552
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:8
          2⤵
            PID:1604
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
            2⤵
              PID:4064
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1
              2⤵
                PID:3044
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                2⤵
                  PID:3280
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3512 /prefetch:8
                  2⤵
                    PID:3804
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3512 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4068
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:1
                    2⤵
                      PID:3276
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:1
                      2⤵
                        PID:220
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:1
                        2⤵
                          PID:508
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:1
                          2⤵
                            PID:2556
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5368 /prefetch:8
                            2⤵
                              PID:1436
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:1
                              2⤵
                                PID:3812
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2184
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,13644864033866581922,6697584139664608026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3280
                              • C:\Windows\System32\msiexec.exe
                                "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\node-v22.11.0-x64.msi"
                                2⤵
                                • Enumerates connected drives
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                PID:2712
                              • C:\Windows\System32\msiexec.exe
                                "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\node-v22.11.0-x64.msi"
                                2⤵
                                • Enumerates connected drives
                                • Suspicious use of FindShellTrayWindow
                                PID:3708
                              • C:\Windows\System32\msiexec.exe
                                "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\node-v22.11.0-x64.msi"
                                2⤵
                                • Enumerates connected drives
                                PID:1608
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4776
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3368
                                • C:\Windows\system32\msiexec.exe
                                  C:\Windows\system32\msiexec.exe /V
                                  1⤵
                                  • Enumerates connected drives
                                  • Drops file in Program Files directory
                                  • Drops file in Windows directory
                                  • Modifies data under HKEY_USERS
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1436
                                  • C:\Windows\System32\MsiExec.exe
                                    C:\Windows\System32\MsiExec.exe -Embedding 336F0AA69B294AEA7FC54B480114E836 C
                                    2⤵
                                    • Loads dropped DLL
                                    PID:3412
                                  • C:\Windows\system32\srtasks.exe
                                    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                                    2⤵
                                      PID:4608
                                    • C:\Windows\System32\MsiExec.exe
                                      C:\Windows\System32\MsiExec.exe -Embedding A03DA263C0C405601A3462C2BD987808
                                      2⤵
                                      • Loads dropped DLL
                                      PID:3816
                                    • C:\Windows\System32\MsiExec.exe
                                      C:\Windows\System32\MsiExec.exe -Embedding 96089B665F3EEE8571132B184AB05491 E Global\MSI0000
                                      2⤵
                                      • Loads dropped DLL
                                      PID:816
                                    • C:\Windows\syswow64\MsiExec.exe
                                      C:\Windows\syswow64\MsiExec.exe -Embedding 97C71D79F70763761E7D3F6529ADEFE3
                                      2⤵
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      PID:4100
                                    • C:\Windows\System32\MsiExec.exe
                                      C:\Windows\System32\MsiExec.exe -Embedding B02C52A3D10100837294C18D0CC4340E C
                                      2⤵
                                      • Loads dropped DLL
                                      PID:4348
                                    • C:\Windows\System32\MsiExec.exe
                                      C:\Windows\System32\MsiExec.exe -Embedding 2851EC54A57EEBF52E0BF3048DF5C82A C
                                      2⤵
                                      • Loads dropped DLL
                                      PID:4364
                                  • C:\Windows\system32\vssvc.exe
                                    C:\Windows\system32\vssvc.exe
                                    1⤵
                                    • Checks SCSI registry key(s)
                                    PID:4312
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe"
                                    1⤵
                                      PID:2608
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c CALL "C:\Program Files\nodejs\\node.exe" "C:\Program Files\nodejs\\node_modules\npm\bin\npm-prefix.js"
                                        2⤵
                                          PID:3296
                                          • C:\Program Files\nodejs\node.exe
                                            "C:\Program Files\nodejs\\node.exe" "C:\Program Files\nodejs\\node_modules\npm\bin\npm-prefix.js"
                                            3⤵
                                            • Executes dropped EXE
                                            PID:1828
                                        • C:\Program Files\nodejs\node.exe
                                          "C:\Program Files\nodejs\\node.exe" "C:\Program Files\nodejs\\node_modules\npm\bin\npm-cli.js" i solarafix
                                          2⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:4432
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /d /s /c node index.js
                                            3⤵
                                              PID:1652
                                              • C:\Program Files\nodejs\node.exe
                                                node index.js
                                                4⤵
                                                • Executes dropped EXE
                                                PID:3168
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Start-Process -FilePath "'C:\Users\Admin\AppData\Local\Temp\d25ea5d0c52af0903ad0ab845eb91b41\execute.bat'" -WindowStyle hidden -Verb runAs"
                                                  5⤵
                                                  • Hide Artifacts: Hidden Window
                                                  PID:4040
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell.exe Start-Process -FilePath "'C:\Users\Admin\AppData\Local\Temp\d25ea5d0c52af0903ad0ab845eb91b41\execute.bat'" -WindowStyle hidden -Verb runAs
                                                    6⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Modifies registry class
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3736
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\d25ea5d0c52af0903ad0ab845eb91b41\execute.bat"
                                                      7⤵
                                                        PID:2128
                                                        • C:\Windows\system32\chcp.com
                                                          chcp 65001
                                                          8⤵
                                                            PID:1640
                                                          • C:\Users\Admin\AppData\Local\Temp\cmd.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\cmd.exe"
                                                            8⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Adds Run key to start application
                                                            • Drops file in System32 directory
                                                            PID:1044
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\XClient.exe'
                                                              9⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:1660
                                                            • C:\Windows\System32\schtasks.exe
                                                              "C:\Windows\System32\schtasks.exe" /Create /F /TN "XClient" /SC ONLOGON /TR "C:\Windows\System32\XClient.exe" /RL HIGHEST
                                                              9⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:4496
                                                            • C:\Windows\System32\XClient.exe
                                                              "C:\Windows\System32\XClient.exe"
                                                              9⤵
                                                              • Checks computer location settings
                                                              • Drops startup file
                                                              • Executes dropped EXE
                                                              • Adds Run key to start application
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:3340
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\XClient.exe'
                                                                10⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:2524
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                                                                10⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:1232
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Windows Data Compiler.exe'
                                                                10⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:760
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Data Compiler.exe'
                                                                10⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:3368
                                                              • C:\Windows\System32\schtasks.exe
                                                                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Data Compiler" /tr "C:\Users\Admin\AppData\Local\Windows Data Compiler.exe"
                                                                10⤵
                                                                • Scheduled Task/Job: Scheduled Task
                                                                PID:4912
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Bootstrapper (1).exe'
                                                              9⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:4912
                                                            • C:\Windows\System32\schtasks.exe
                                                              "C:\Windows\System32\schtasks.exe" /Create /F /TN "Bootstrapper (1)" /SC ONLOGON /TR "C:\Windows\System32\Bootstrapper (1).exe" /RL HIGHEST
                                                              9⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2712
                                                            • C:\Windows\System32\Bootstrapper (1).exe
                                                              "C:\Windows\System32\Bootstrapper (1).exe"
                                                              9⤵
                                                              • Checks computer location settings
                                                              • Drops startup file
                                                              • Executes dropped EXE
                                                              • Adds Run key to start application
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1200
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Bootstrapper (1).exe'
                                                                10⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:4456
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Bootstrapper (1).exe'
                                                                10⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:5060
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\WindowsAntivirus.exe'
                                                                10⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:4804
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsAntivirus.exe'
                                                                10⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:396
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Windows Defender.exe'
                                                              9⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:2432
                                                            • C:\Windows\System32\schtasks.exe
                                                              "C:\Windows\System32\schtasks.exe" /Create /F /TN "Windows Defender" /SC ONLOGON /TR "C:\Windows\System32\Windows Defender.exe" /RL HIGHEST
                                                              9⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:688
                                                            • C:\Windows\System32\Windows Defender.exe
                                                              "C:\Windows\System32\Windows Defender.exe"
                                                              9⤵
                                                              • Checks computer location settings
                                                              • Drops startup file
                                                              • Executes dropped EXE
                                                              • Adds Run key to start application
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:3868
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\Windows Defender.exe'
                                                                10⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:5040
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Defender.exe'
                                                                10⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:912
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Windows Defender.exe'
                                                                10⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:2000
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Defender.exe'
                                                                10⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:1816
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /d /s /c "rmdir /s /q "C:\Users\Admin\AppData\Local\Temp\d25ea5d0c52af0903ad0ab845eb91b41""
                                                      5⤵
                                                        PID:2712
                                              • C:\Users\Admin\AppData\Local\Windows Data Compiler.exe
                                                "C:\Users\Admin\AppData\Local\Windows Data Compiler.exe"
                                                1⤵
                                                • Executes dropped EXE
                                                PID:4820
                                              • C:\Users\Admin\AppData\Local\Windows Data Compiler.exe
                                                "C:\Users\Admin\AppData\Local\Windows Data Compiler.exe"
                                                1⤵
                                                • Executes dropped EXE
                                                PID:2124

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Config.Msi\e5c3726.rbs

                                                Filesize

                                                935KB

                                                MD5

                                                6a6671d0f4dd6a327066ea15039b111b

                                                SHA1

                                                ececae9710f46d78ef7a4d845b993da735f2a9aa

                                                SHA256

                                                42f41901d0421b5010f6d5cb701f3d8fef3eb43933bc87a30c581a4eed48a264

                                                SHA512

                                                59830f29a1378119dae5fb9c3fd8fc72ff413bd147e6c482980ee647169cf05fa882a4526161f2ba3fc41f245bb8a5391296e7afeb997960aec416113bd8ecb4

                                              • C:\Program Files\nodejs\node_modules\npm\bin\npm-prefix.js

                                                Filesize

                                                864B

                                                MD5

                                                92dd1b5a463374142271ff420cb473a5

                                                SHA1

                                                a9f946c6a8c6f273f837703acc74c367b7781a99

                                                SHA256

                                                673f620e40137c295f2cf057364468bf3a71653dfc0973be895ebf7a8c368c2e

                                                SHA512

                                                5e0a6e4a9cff4b37acbece070a592a65ed044a78e1b104517eb5bb233d4398f67140b44e986e7a2de16bfb65b0ab7609e831341efea2a6f583258b6a85f70e01

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\config\lib\index.js

                                                Filesize

                                                29KB

                                                MD5

                                                a2819bc319ade96e220b81c11ba1fd62

                                                SHA1

                                                f711920489d12ac7704e323de4cea98009299e7d

                                                SHA256

                                                9976a7f202a683370a170f8ab053d89cf6450c9d0596d8bed92bb762f0dca92e

                                                SHA512

                                                64b409c59d3e7df84ddd87163fb03f38d1bbed259323392685e01103ff9d2a43b456a5df5812e2bd3de61e0ae61520ccad444a92ea908a15bd871146630edd32

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\config\package.json

                                                Filesize

                                                1KB

                                                MD5

                                                901e577d669d97e811a11f172dfb6655

                                                SHA1

                                                25d518b50deb389e311821d64d4b0b106618d7c7

                                                SHA256

                                                245d5f0e2a7508229e1cd3ee5f518d93c99eb8280fb35f7df149fe5222bb8af5

                                                SHA512

                                                ead727e7e751b897e060abbfdbc97ffe8d2c3efb9baffaf922ff97d8d6366bd7cc0727e4355cc4679d065bd2892d2550ab3349b235d9b0e6e0475cb6bc59f397

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\sign\node_modules\@npmcli\fs\LICENSE.md

                                                Filesize

                                                818B

                                                MD5

                                                2916d8b51a5cc0a350d64389bc07aef6

                                                SHA1

                                                c9d5ac416c1dd7945651bee712dbed4d158d09e1

                                                SHA256

                                                733dcbf5b1c95dc765b76db969b998ce0cbb26f01be2e55e7bccd6c7af29cb04

                                                SHA512

                                                508c5d1842968c478e6b42b94e04e0b53a342dfaf52d55882fdcfe02c98186e9701983ab5e9726259fba8336282e20126c70d04fc57964027586a40e96c56b74

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\tuf\LICENSE

                                                Filesize

                                                11KB

                                                MD5

                                                dfc1b916d4555a69859202f8bd8ad40c

                                                SHA1

                                                fc22b6ee39814d22e77fe6386c883a58ecac6465

                                                SHA256

                                                7b0ce3425a26fdba501cb13508af096ade77e4036dd2bd8849031ddecf64f7c9

                                                SHA512

                                                1fbe6bb1f60c8932e4dcb927fc8c8131b9c73afd824ecbabc2045e7af07b35a4155a0f8ad3103bf25f192b6d59282bfc927aead3cb7aaeb954e1b6dbd68369fa

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\verify\dist\shared.types.js

                                                Filesize

                                                79B

                                                MD5

                                                24563705cc4bb54fccd88e52bc96c711

                                                SHA1

                                                871fa42907b821246de04785a532297500372fc7

                                                SHA256

                                                ef1f170ad28f2d870a474d2f96ae353d770fff5f20e642cd8f9b6f1d7742df13

                                                SHA512

                                                2ce8d2cf580623358fef5f4f8925d0c9943a657c2503c80048ca789bf16eacdb980bfc8aaaa50101a738e939926fcf2545500484dcad782c700ee206d8c6f9b9

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\bin-links\LICENSE

                                                Filesize

                                                754B

                                                MD5

                                                d2cf52aa43e18fdc87562d4c1303f46a

                                                SHA1

                                                58fb4a65fffb438630351e7cafd322579817e5e1

                                                SHA256

                                                45e433413760dc3ae8169be5ed9c2c77adc31ad4d1bc5a28939576df240f29a0

                                                SHA512

                                                54e33d7998b5e9ba76b2c852b4d0493ebb1b1ee3db777c97e6606655325ff66124a0c0857ca4d62de96350dbaee8d20604ec22b0edc17b472086da4babbbcb16

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\cacache\node_modules\p-map\license

                                                Filesize

                                                1KB

                                                MD5

                                                b862aeb7e1d01452e0f07403591e5a55

                                                SHA1

                                                b8765be74fea9525d978661759be8c11bab5e60e

                                                SHA256

                                                fcf1a18be2e25ba82acf2c59821b030d8ee764e4e201db6ef3c51900d385515f

                                                SHA512

                                                885369fe9b8cb0af1107ee92b52c6a353da7cf75bc86abb622e2b637c81e9c5ffe36b0ac74e11cfb66a7a126b606fe7a27e91f3f4338954c847ed2280af76a5f

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\cacache\node_modules\tar\dist\esm\package.json

                                                Filesize

                                                26B

                                                MD5

                                                2324363c71f28a5b7e946a38dc2d9293

                                                SHA1

                                                7eda542849fb3a4a7b4ba8a7745887adcade1673

                                                SHA256

                                                1bf0e53fc74b05f1aade7451fbac72f1944b067d4229d96bae7a225519a250e4

                                                SHA512

                                                7437cf8f337d2562a4046246fbfcc5e9949f475a1435e94efbc4b6a55880050077d72692cbc3413e0ccd8f36adf9956a6cc633a2adc85fbff6c4aa2b8edac677

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\cacache\node_modules\yallist\dist\commonjs\package.json

                                                Filesize

                                                28B

                                                MD5

                                                56368b3e2b84dac2c9ed38b5c4329ec2

                                                SHA1

                                                f67c4acef5973c256c47998b20b5165ab7629ed4

                                                SHA256

                                                58b55392b5778941e1e96892a70edc12e2d7bb8541289b237fbddc9926ed51bd

                                                SHA512

                                                d662bff3885118e607079fcbeedb27368589bc0ee89f90b9281723fa08bda65e5a08d9640da188773193c0076ec0a5c92624673a6a961490be163e2553d6f482

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\fs-minipass\LICENSE

                                                Filesize

                                                780B

                                                MD5

                                                b020de8f88eacc104c21d6e6cacc636d

                                                SHA1

                                                20b35e641e3a5ea25f012e13d69fab37e3d68d6b

                                                SHA256

                                                3f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706

                                                SHA512

                                                4220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\indent-string\license

                                                Filesize

                                                1KB

                                                MD5

                                                5ad87d95c13094fa67f25442ff521efd

                                                SHA1

                                                01f1438a98e1b796e05a74131e6bb9d66c9e8542

                                                SHA256

                                                67292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec

                                                SHA512

                                                7187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\ini\lib\ini.js

                                                Filesize

                                                7KB

                                                MD5

                                                84b82e208b562cc8c5a48cf65e6ab0f0

                                                SHA1

                                                0adca343dd729beb86ebbb103f9d84e7ebbd17af

                                                SHA256

                                                481b00a4ebbfc83b28b97d32dccd32d7585b29b209930d4db457d91967f172ad

                                                SHA512

                                                377034e60d9d2ef3da96f23cb32f679754a67d3cd5991b1ad899f9f7c1910dcd0d9b0a1b0530046b6016896bd869a1607ef29c99949407959dcece6f9da790f5

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\ini\package.json

                                                Filesize

                                                1KB

                                                MD5

                                                5b29ab3cad80b08ec094c8201333ebe8

                                                SHA1

                                                dee99f05b24963959159f1f061926e9075679be8

                                                SHA256

                                                94ebf2db52f15b5da55a809977e04f02b052abf418cb160a8d0719362295d867

                                                SHA512

                                                a6e66ade3de2cd308b1081548d2e58a87aad15baaa236c4dea73d36a946b6de352c3765d188f350c9311ebea0efc8b0068a8a7e0025e3dfdff84b737be4e475a

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmsearch\LICENSE

                                                Filesize

                                                730B

                                                MD5

                                                072ac9ab0c4667f8f876becedfe10ee0

                                                SHA1

                                                0227492dcdc7fb8de1d14f9d3421c333230cf8fe

                                                SHA256

                                                2ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013

                                                SHA512

                                                f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\nopt\lib\nopt-lib.js

                                                Filesize

                                                12KB

                                                MD5

                                                94443c174d88f844a9ccc4b910f630cc

                                                SHA1

                                                fcb80696d47cad01738194971bc75c5e249044ce

                                                SHA256

                                                ff669467a8d425130753c6169ce0ce909d45a110d36b1c37949608fa4395fe56

                                                SHA512

                                                1a8eefb98b810cc183fbbac805c51f3b0714a195376f81eb90d12173a26165970e06d1192f089691adc21f2076056409f1a0557cdf8edfa9d389450e6c727daa

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\nopt\lib\nopt.js

                                                Filesize

                                                985B

                                                MD5

                                                f1f7369cd4f213cf2ae9469f4d1ef1f5

                                                SHA1

                                                cd7f1eb598f3ed855eb9033010dafc0198bf70c1

                                                SHA256

                                                10623659120996267168230ef2ffa9cfb7ce00422175d21476074c48d5262c18

                                                SHA512

                                                54b8adf2466118da90b84ecc2faa1c70a043679e542dd8631a50fdda883faef169d14a85cc64e2db33b492ac87c2a781bb9f454326b472cd5c61fe82434d115e

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\nopt\node_modules\abbrev\package.json

                                                Filesize

                                                1KB

                                                MD5

                                                aa721fce40b4331d0ded9cb9c29ea599

                                                SHA1

                                                aeda7805291dca4b7fac211a623fd103e51f10ed

                                                SHA256

                                                ddeeecbb529261a5754f8e367601c66ace7822603315b776c330fea3524dd7ca

                                                SHA512

                                                0e245447309ad24a24338909f65f8fe39a949c72c536f5a0ebbebe9cba28cfdfff414caece80cc866e874678019131fcba93f569341d9346bd04676b669f318e

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\nopt\package.json

                                                Filesize

                                                1KB

                                                MD5

                                                80bdf8901061eac24047d6b001499e89

                                                SHA1

                                                a99d447473406d5e862ae9337b7aee363a8d2f13

                                                SHA256

                                                8d349e100fdd613174f8b3c58149545e3d69a959b7fa3f466d457825575f5b3c

                                                SHA512

                                                b81099e82c23e809a558b8fb164338f3faa784e044d558daa4a09ab26179fc4594e170419f9e3d7b26baafb93d6981f001d2e8d3bab023767d219984b4769f03

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\npm-audit-report\LICENSE

                                                Filesize

                                                771B

                                                MD5

                                                e9dc66f98e5f7ff720bf603fff36ebc5

                                                SHA1

                                                f2b428eead844c4bf39ca0d0cf61f6b10aeeb93b

                                                SHA256

                                                b49c8d25a8b57fa92b2902d09c4b8a809157ee32fc10d17b7dbb43c4a8038f79

                                                SHA512

                                                8027d65e1556511c884cb80d3c1b846fc9d321f3f83002664ad3805c4dee8e6b0eaf1db81c459153977bdbde9e760b0184ba6572f68d78c37bff617646bcfc3b

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\promise-call-limit\LICENSE

                                                Filesize

                                                763B

                                                MD5

                                                7428aa9f83c500c4a434f8848ee23851

                                                SHA1

                                                166b3e1c1b7d7cb7b070108876492529f546219f

                                                SHA256

                                                1fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7

                                                SHA512

                                                c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\tar\node_modules\fs-minipass\node_modules\minipass\LICENSE

                                                Filesize

                                                802B

                                                MD5

                                                d7c8fab641cd22d2cd30d2999cc77040

                                                SHA1

                                                d293601583b1454ad5415260e4378217d569538e

                                                SHA256

                                                04400db77d925de5b0264f6db5b44fe6f8b94f9419ad3473caaa8065c525c0be

                                                SHA512

                                                278ff929904be0c19ee5fb836f205e3e5b3e7cec3d26dd42bbf1e7e0ca891bf9c42d2b28fce3741ae92e4a924baf7490c7c6c59284127081015a82e2653e0764

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\tar\node_modules\fs-minipass\node_modules\minipass\index.js

                                                Filesize

                                                16KB

                                                MD5

                                                bc0c0eeede037aa152345ab1f9774e92

                                                SHA1

                                                56e0f71900f0ef8294e46757ec14c0c11ed31d4e

                                                SHA256

                                                7a395802fbe01bb3dc8d09586e0864f255874bf897378e546444fbaec29f54c5

                                                SHA512

                                                5f31251825554bf9ed99eda282fa1973fcec4a078796a10757f4fb5592f2783c4ebdd00bdf0d7ed30f82f54a7668446a372039e9d4589db52a75060ca82186b3

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\tar\node_modules\fs-minipass\node_modules\minipass\package.json

                                                Filesize

                                                1KB

                                                MD5

                                                d116a360376e31950428ed26eae9ffd4

                                                SHA1

                                                192b8e06fb4e1f97e5c5c7bf62a9bff7704c198b

                                                SHA256

                                                c3052bd85910be313e38ad355528d527b565e70ef15a784db3279649eee2ded5

                                                SHA512

                                                5221c7648f4299234a4637c47d3f1eb5e147014704913bc6fdad91b9b6a6ccc109bced63376b82b046bb5cad708464c76fb452365b76dbf53161914acf8fb11a

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\tuf-js\node_modules\proc-log\LICENSE

                                                Filesize

                                                757B

                                                MD5

                                                8bb6f78000746d4fa0baf4bdbf9e814e

                                                SHA1

                                                4b7049331119a63009aec376677b97c688266613

                                                SHA256

                                                a5103404e4615fa1ed46aef13082dd287bf4b95964e71ffdf198984b3d5882b8

                                                SHA512

                                                ee6874e77e33e0e0fe271ae706b344696201c1c204356e271705d9b0687bb597991c3b589d0fa6b6b38dd2933026c0996b37bc13062a5acb2fdc7f3359cdb262

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\walk-up-path\dist\cjs\index.js

                                                Filesize

                                                474B

                                                MD5

                                                54bd6e9d21ed6021e374d34cfaa3290c

                                                SHA1

                                                e71ef5c7bf958f1599fce51cc98a73f849659380

                                                SHA256

                                                4e86e409d7506477caee910cb50f5bff1dda477878da923bd3888501e1a04036

                                                SHA512

                                                7424455a64824b7ffe72c3ed521684d7ab279b4cabb0fc018e9db04662a92af9187efe30f5a442c3418705895262de6e057858c3cda00c634df3cbc6eebb2407

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\walk-up-path\package.json

                                                Filesize

                                                1KB

                                                MD5

                                                e6b2ad09f00a37da8012022f4b9e0461

                                                SHA1

                                                9af557e76ab4036536d792ca9b3c37d4720c0587

                                                SHA256

                                                2d43790293eb562918790e7fe2a786d86ed8e5a95b45d5e36587be0dbc8ddcd4

                                                SHA512

                                                9ea06c09a0837495bbae225d2913f55f53d5f81b4949bc1640d2cb460e3f61d4d39fbb88a959adc56ca7557870a069e1ec2a92b0c759b457731e93ecad8f9eb7

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\wrap-ansi\node_modules\emoji-regex\es2015\index.js

                                                Filesize

                                                17KB

                                                MD5

                                                cf8f16c1aa805000c832f879529c070c

                                                SHA1

                                                54cc4d6c9b462ad2de246e28cd80ed030504353d

                                                SHA256

                                                77f404d608e2a98f2a038a8aa91b83f0a6e3b4937e5de35a8dae0c23aa9ee573

                                                SHA512

                                                a786e51af862470ae46ad085d33281e45795c24897e64b2c4b265302fa9cbfa47b262ec188adbc80d51cfc6ba395b500c0d7f5d343ca4fc2b828eaedba4bd29a

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\wrap-ansi\node_modules\emoji-regex\index.js

                                                Filesize

                                                15KB

                                                MD5

                                                9841536310d4e186a474dfa2acf558cd

                                                SHA1

                                                33fabbcc5e1adbe0528243eafd36e5d876aaecaa

                                                SHA256

                                                5b3c0ac6483d83e6c079f9ffd1c7a18e883a9aaeaedb2d65dd9d5f78153476b9

                                                SHA512

                                                b67680a81bb4b62f959ba66476723eb681614925f556689e4d7240af8216a49f0d994c31381bf6a9489151d14ed8e0d0d4d28b66f02f31188059c9b24aaa3783

                                              • C:\Program Files\nodejs\node_modules\npm\package.json

                                                Filesize

                                                6KB

                                                MD5

                                                a635c09a3ba36d76e04158ba070c32e2

                                                SHA1

                                                6bdda03a1e34946e25fced365eb9da0df97e9e29

                                                SHA256

                                                6f1feb793d2cfd5ba2c5c9aebe4cd7dbb2d44a401b99d48b14ea3b54cdef2446

                                                SHA512

                                                cac45d9a50fe2b7b786613b3de9dea31921bce05e2bdf5edf07cc3cb6e4a947486435b5ba7b23a34b8f674b04df5d69628c6954e159e7beb6e59b00893eae818

                                              • C:\Program Files\nodejs\npm.cmd

                                                Filesize

                                                538B

                                                MD5

                                                6895fc6423c97fbf721a71333137d1ca

                                                SHA1

                                                e0a531a3a869f2c3bb1ea91801a8a386d6aaf73e

                                                SHA256

                                                21b46c69ad6e2f231f02a9e120f4ba6c8e75fef5a45637103002eab99f888ab8

                                                SHA512

                                                0cdaa6bbeefeabf676839d88e96a096b13b9176bd936e11665ebf01e57540e131981a7bee4f113d2b5bd6858656f7cb689d29ee81d9f9e8d7f87d2d91e041ac0

                                              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Node.js\Node.js documentation.url

                                                Filesize

                                                168B

                                                MD5

                                                72b8c907a5d50eb4917010e78ef8a23b

                                                SHA1

                                                a3e7ebff0927ae76cecdedb6e81422be78786bd3

                                                SHA256

                                                f6424b15af9a46f0ebef4cc2ca73a2b534ed22b2acec189ee9233fd815187e20

                                                SHA512

                                                9def64b5fedadfe38456c608be144706fea63847b5fd4f636af048b2886d88779f8b1268eac2c33e1edf9cc07deaa64de3ab5504b8a16d19e2b03b22b3a08dcc

                                              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Node.js\Node.js website.url

                                                Filesize

                                                133B

                                                MD5

                                                35b86e177ab52108bd9fed7425a9e34a

                                                SHA1

                                                76a1f47a10e3ab829f676838147875d75022c70c

                                                SHA256

                                                afaa6c6335bd3db79e46fb9d4d54d893cee9288e6bb4738294806a9751657319

                                                SHA512

                                                3c8047c94b789c8496af3c2502896cef2d348ee31618893b9b71244af667ec291dcb9b840f869eb984624660086db0c848d1846aa601893e6f9955e56da19f62

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

                                                Filesize

                                                471B

                                                MD5

                                                eef4d122f8bf1654f2fa39587b4bc772

                                                SHA1

                                                44a154a863d3284a00dd52881534b35d0eedd6d0

                                                SHA256

                                                90dfae0c893bcfeca726e1c5ee01121213f1bf56f365ebcd24f8a2173b6b06d6

                                                SHA512

                                                27402871d4e035000ac1b9259d9631cc30815fe1982f6b2d2c1d6db082e2496f8d55547f65bb2dbfd77b3521fd66fc438bed7ddc5efe90e9914cdee5e2eeb4d5

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_0D7BFF9D231ADDC3439B70E4C5E809D4

                                                Filesize

                                                727B

                                                MD5

                                                21fa5777ea4ab164dae993a4b0bf6d72

                                                SHA1

                                                7208c8c8b18869ee177a2ccf891f1cb55fe2ea27

                                                SHA256

                                                a1bd67880fae968a874e4d7598edccde074fb3e75a1f44c3583cf19e379bf467

                                                SHA512

                                                7f1f193e41d23821272697a181c5c253c0de628150ba324e964f90ae23f1ead09b77344f9de3cec096019347bce2fd5b4f15bf1d580aef8a3c0f2998d8dff0f0

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                                                Filesize

                                                727B

                                                MD5

                                                397ff398089ad38f837ed86c42e78205

                                                SHA1

                                                8aeb6f8664552b8486b41cbf7546219c5fc5e7d7

                                                SHA256

                                                712f75d7057e41be9228c2c7267c39993f3bd618b468d1e44c233bbe76cfed1d

                                                SHA512

                                                3ac2414e49638504a079a4e2b6ea08441fed868d1c3a3c0ae3ee99e64c6c61f03118483609751dab9da3ff5d7fa08c887661205017afd6e011d433bcbd26d0be

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

                                                Filesize

                                                400B

                                                MD5

                                                808d3bb921b6ff11cdb884be648e66f1

                                                SHA1

                                                299b850a0d3d116fa018658bdf88159c122d32a1

                                                SHA256

                                                023307e995f6cc13462b7588142a21c75bbde09aa50498a4e0f18e562aee902f

                                                SHA512

                                                4fd7c6ff40f97e92b37ab6725c08914420347173a99d388158c7c4c552ca5189d020f4736b5e5b355db17888a92d67a8edde84380f0156a42685b8e5235652cf

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_0D7BFF9D231ADDC3439B70E4C5E809D4

                                                Filesize

                                                404B

                                                MD5

                                                ace0c15a0419da96d03a0e0ae5320fa7

                                                SHA1

                                                3501f9ca59be33a4a146ae5ebf17fb888b4f6c62

                                                SHA256

                                                dc67432d2135fb41d843193ca1c5f8f5672f4814ee492129842b2af282161310

                                                SHA512

                                                de0575e951fa5fb4dcff453b8b27c85e500ad45418dbdf71406e4aff1de590ed25d9f08b922baccb4d5cef2395ffa545bbde865de69067d1e60c417d4ad8a4bf

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                                                Filesize

                                                412B

                                                MD5

                                                7376f25d96029bc1101cd0113e03a9fb

                                                SHA1

                                                dc223481778c467e85439102a31db88a6ea16573

                                                SHA256

                                                3a0141180317f13cb5a6ae5ff38b726691ab6932c32200aec56d8a9f05fd4c46

                                                SHA512

                                                6ffb0e9ef9030bed4c9cf4c1621a9b2733a1830c0bafab52c6de0f6303632a06642a9fe32f4b31ab837bf8af9b15c5e64bd943d271622d54150987d8ebab8347

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                e55832d7cd7e868a2c087c4c73678018

                                                SHA1

                                                ed7a2f6d6437e907218ffba9128802eaf414a0eb

                                                SHA256

                                                a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574

                                                SHA512

                                                897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                c2d9eeb3fdd75834f0ac3f9767de8d6f

                                                SHA1

                                                4d16a7e82190f8490a00008bd53d85fb92e379b0

                                                SHA256

                                                1e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66

                                                SHA512

                                                d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                528B

                                                MD5

                                                8b8e8f4d4a3e2376897a47f89bf29a7c

                                                SHA1

                                                78957c1b2d717a9c036aee8f5572081a0fdfa762

                                                SHA256

                                                72a625f97d86c9ea0c7f2fa9cfb7f57f2dd235283fa01a9ae89f759a75fa9dbe

                                                SHA512

                                                5be8b1a275d1cf75ab63a3aaa2a77ca6b25a3cacfa4b526daf87b1f4d2e6b865474038f3dcf82473314553126293be813554f910086bf2b059322c59c78ef2e9

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                Filesize

                                                251B

                                                MD5

                                                e9290feaa17eb5dab0633153bf11802b

                                                SHA1

                                                1d59f60548c2cd9183aa3361f0b97003812c4942

                                                SHA256

                                                fc1c33415e87f34cd61da02177cacd32ac81ed80182a2922f22ffc63bc39c241

                                                SHA512

                                                3e55911f0600d4cd361252eba21843ee2c3b8b4944c1ad89b19a7cbaa31d3b9c20dd46824a59ea75d902f2d5c0f0bb828767c2d5acc4c029a2e8506ec5e04b37

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                5KB

                                                MD5

                                                780b1f46f8fe962479760cdc98acdb59

                                                SHA1

                                                6dbc3d92b0c820166c3440664fbac631f131dc99

                                                SHA256

                                                2ddfaa6e8870c6658e7d3344179c991a70977a3dbd440da5147dc405eaa6cf40

                                                SHA512

                                                f50c47f691a7f2d2bc5ec3723f7a7a2337008a0e0e097ad1b0c134c45580f7f4fc6b554bcb6295debc9624d5952358296ca2a6a61e9352bdfcfcf389733c00a2

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                70e5a30478f4707ddc28e2d9055fa455

                                                SHA1

                                                09ed73ea54965d1ec4767db3cbed66ca4e6a42fe

                                                SHA256

                                                1670dd4c7c9c39eab77f7aaa4f2df708d85a6887de92c5d8e72ddc9ca7c425b6

                                                SHA512

                                                ace35da538ac0916551693c668f84b4bc1e097f9e28790f5be509661a3d24eb12ea10706fa22fcc275fa0ef7b4a8f4565b3fde9a9bf23be0f9e9845368bad38e

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                423616a0bbf7c1d85c59cedcfbdf7a94

                                                SHA1

                                                488f8b34dc416a7fd4eea4ef74a5b26b3249ef4b

                                                SHA256

                                                787fbce003d23bb459908c65f528adf96749561f32b59cb19f99e624ee6c3a4f

                                                SHA512

                                                6cfc02c02922243dbd2189b63ac128429e1a2767a41af31e2e9fb34895c91d70da03e86035ab5380e219737096baf6016a91c9e4c81cc436b70d85e1aa6f8ed6

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                Filesize

                                                203B

                                                MD5

                                                0d6fd925ff8a3d7f7ccb55e7b1de6845

                                                SHA1

                                                0d73873be21a79ee55ac4bda00ee90d1fb5470dc

                                                SHA256

                                                5406d2af8f170d5ed20dee563c37c72bda8ea00688ae1f1879c5c67df1ed73f9

                                                SHA512

                                                dee6c2395f986f4999bc6516998786b59244e618500477da42f6d4fb644eacfde7c4fb2f99bc012aa93a672a37283c1d1c7eb913f756b6ca7ea6076eef908bb3

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe580b26.TMP

                                                Filesize

                                                203B

                                                MD5

                                                be1d5b4ae5de42654e952e3f7d4fe8e4

                                                SHA1

                                                1996c04619f838e0fff143d5f4050483363df95d

                                                SHA256

                                                e8596e447bd7b06da02cf0536931606ebae5922360191a54f533c691f26aa14f

                                                SHA512

                                                0f146adeae94712fcf2a2d2b935e8e61e78301b62c38b94022e30329ea91310bde15fd4abdec965f93127a8673f73ac7de444a21b269c5b5bdede904beb27d9f

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                6752a1d65b201c13b62ea44016eb221f

                                                SHA1

                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                SHA256

                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                SHA512

                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                3c32ac3622320e770dd68caa982f8db5

                                                SHA1

                                                43936caef4efb6922006f8934386c57d16c138b6

                                                SHA256

                                                30e66265e833547a9e1ca078484fc49d2d815060842a995a401952460097eeac

                                                SHA512

                                                217dfe0dddf2a37749c04e79b1d2ec6331e0bf80b81d7edf2038a261da8bac41974eea1bf70bb1cd9b9b40747d16500b57bd2680a7a5bf66d8d3fc4454e71f1c

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                10KB

                                                MD5

                                                b154eae5ff94b98f14e13deaecf20e2d

                                                SHA1

                                                f37e36d24ea67c2b0751ed19e69856521e72f8ef

                                                SHA256

                                                b028889aee061272723dc0a8c79a59e8b72f35756794fb9e13efa210ede80e32

                                                SHA512

                                                0567a211aaed362bb8726fc0a68d645b00e59ac35ea23ee8592b2fdfbdd0ee46db76ab6e62a52a5bf1351dc88a7013d2ae6bb0f7c42b57e686cbf02c97a05cbf

                                              • C:\Users\Admin\AppData\Local\Temp\MSI6752.tmp

                                                Filesize

                                                144KB

                                                MD5

                                                7fa9d662d634534d7c2240dd126bdeee

                                                SHA1

                                                bd01e22ed2da0d0d485824b372ac67da683863d2

                                                SHA256

                                                c0e8683b697b3c6e55deb4497d3434d6e2cc841eb8c9a1b7d3f8907cff7de206

                                                SHA512

                                                cbc737e3eb94151c9dacaa5ee780cb550176ca2be2e0c66925884b5bc6222b7bcde5ed66e881f2a76f3d26edf5331abf0e74c819ad4f5fd7d0819bc4c138bb81

                                              • C:\Users\Admin\AppData\Local\Temp\MSI6947.tmp

                                                Filesize

                                                390KB

                                                MD5

                                                80bebea11fbe87108b08762a1bbff2cd

                                                SHA1

                                                a7ec111a792fd9a870841be430d130a545613782

                                                SHA256

                                                facf518f88cd67afd959c99c3ba233f78a4fbfe7fd3565489da74a585b55e9d1

                                                SHA512

                                                a760debb2084d801b6381a0e1dcef66080df03a768cc577b20b8472be87ad8477d59c331159555de10182d87340aa68fe1f3f5d0212048fd7692d85f4da656f6

                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_t4lutgo1.nxk.ps1

                                                Filesize

                                                60B

                                                MD5

                                                d17fe0a3f47be24a6453e9ef58c94641

                                                SHA1

                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                SHA256

                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                SHA512

                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                              • C:\Users\Admin\Downloads\Unconfirmed 842793.crdownload

                                                Filesize

                                                28.9MB

                                                MD5

                                                fa9e1f3064a66913362e9bff7097cef5

                                                SHA1

                                                b34f1f9a9f6242c54486a4bc453a9336840b4425

                                                SHA256

                                                9eea480bd30c98ae11a97cb89a9278235cbbbd03c171ee5e5198bd86b7965b4b

                                                SHA512

                                                ad3e9469326dccac6b49185b5b2814ba700b5d83b4b3ce17f85a9adc5f90bdebf54d79800b253ed5c371ab82d27304841f86ab1a8a3c7ffade8a2d78e55dc99f

                                              • C:\Windows\Installer\MSI82D9.tmp

                                                Filesize

                                                341KB

                                                MD5

                                                74528af81c94087506cebcf38eeab4bc

                                                SHA1

                                                20c0ddfa620f9778e9053bd721d8f51c330b5202

                                                SHA256

                                                2650b77afbbc1faacc91e20a08a89fc2756b9db702a8689d3cc92aa163919b34

                                                SHA512

                                                9ce76594f64ea5969fff3becf3ca239b41fc6295bb3abf8e95f04f4209bb5ccddd09c76f69e1d3986a9fe16b4f0628e4a5c51e2d2edf3c60205758c40da04dae

                                              • C:\Windows\System32\Bootstrapper (1).exe

                                                Filesize

                                                41KB

                                                MD5

                                                61b9531016242facf3f1f98803b5d612

                                                SHA1

                                                1237539b293ab11e931f748a4e3b7a50e292710c

                                                SHA256

                                                a1a07df1aed70884029f7ec5c8ce2b1842b42fccf1a2ad416d852beb20b1c922

                                                SHA512

                                                3571e34953b00fdb83f2f24834ffcef6cc1b945ca870e7e0a45b4ef0e61c78fa65842d49b6dbb56bf2cab0faca367e1da4fd4440b314352929672d73adde8032

                                              • C:\Windows\System32\Windows Defender.exe

                                                Filesize

                                                45KB

                                                MD5

                                                8afe38f635bb63bdaca034ad4103bdad

                                                SHA1

                                                e5787e022f98b1ead00689ae6533957248026c6b

                                                SHA256

                                                2206793d966a2b0c1aa9aba3b86b80c31647c91332b2ace730190019ec0d430f

                                                SHA512

                                                53eb1fa395f82047301b4cf291b632b64a7f043a5610e821d665374e8ffdcd2bdf86ee8b5e9e7cbd2641fff8504a1930155e89e277b2f9fc595790c3afeb3636

                                              • C:\Windows\System32\XClient.exe

                                                Filesize

                                                70KB

                                                MD5

                                                a3965172cd91f1667562972289516a4d

                                                SHA1

                                                6712bd539b77963e0e4ba544b0a451db9d4fb05f

                                                SHA256

                                                4ca5140c99d8de2368886bba6650779a21fa314ff76050c519f755832c2eed79

                                                SHA512

                                                83e1bf3ee103580333177d8457eba776248a3c2e49f409b63ff114f96131428ff39ea392ac3c1aed48abdb16e319fda75d1a9217172a9bcb46c4d80626084160

                                              • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                                                Filesize

                                                24.1MB

                                                MD5

                                                e3281e8477ef27246d35f2249457509c

                                                SHA1

                                                227ebe178794da59069ff9c65a508461a04b2a83

                                                SHA256

                                                8e014d131a124ff83c2756974840128f79d40959244eae24fb8660120b2584e7

                                                SHA512

                                                e15454c9f4fa774b8ba5783f33607f06d9615e1535922ac90ccc24a43ea3d6ab6f89ec23680f6628d8a85a90e28b4e8bf1f205f416459a2ef02bac05c0c6ef1e

                                              • \??\Volume{625ed6c4-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{ed170002-88d8-4ea0-9b6e-382df5e8468e}_OnDiskSnapshotProp

                                                Filesize

                                                6KB

                                                MD5

                                                5e65a0673f3db49d8d8813ab1dc646f1

                                                SHA1

                                                25112839a23ff85566614d82ab76d40f9edeb63e

                                                SHA256

                                                816d31dce4aa21fd8aba227343fe7d18f9564eaf845cd7d0ea0ffcf43de2d01d

                                                SHA512

                                                932744b23cb647da7bef9b47ceab3bbf5a1c3855ace1cbdc6157ef3a2bae5f2d3df642d9f9706160b7d0b77d4577e43dca14e090abf315f7af8ba344a840d324

                                              • memory/1044-2987-0x0000000000EA0000-0x0000000000EBE000-memory.dmp

                                                Filesize

                                                120KB

                                              • memory/1200-3028-0x0000000000B40000-0x0000000000B50000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/1436-287-0x00000238D0B00000-0x00000238D15C1000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/3340-3008-0x0000000000A80000-0x0000000000A98000-memory.dmp

                                                Filesize

                                                96KB

                                              • memory/3736-2975-0x0000026EFA260000-0x0000026EFA282000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/3868-3051-0x0000000000490000-0x00000000004A2000-memory.dmp

                                                Filesize

                                                72KB