Resubmissions

20/02/2025, 14:15

250220-rkw1gawran 10

Analysis

  • max time kernel
    900s
  • max time network
    902s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/02/2025, 14:15

General

  • Target

    net8.0-windows10.0.26100.0/Velocity.exe

  • Size

    140KB

  • MD5

    9792add6ee65934b6a03cc1605ea098b

  • SHA1

    966c698fe9cf94f27876a87192ec7f9ba487dfef

  • SHA256

    575a5ee1eb56e433e4402beef8e4c2ae66a84cb181d22ed4f35fe6d65eec5a1e

  • SHA512

    a25c8eb359a7ab52151547fcdbac1ffa41aa25ca854a2d77e70683be8e324905b05f5193cfe11fefe8b19c434e7be8bf72ab7e160a7beb827a2f60b04df8c816

  • SSDEEP

    3072:3jK4UGDHXrQ8hy7qgpHulWD9ZvZ5Pf3Ca10xuZ04ntfOrhBu5:3jK4TDUqgpqWDLZ5H+xuZ048hA

Malware Config

Signatures

  • Meduza

    Meduza is a crypto wallet and info stealer written in C++.

  • Meduza Stealer payload 2 IoCs
  • Meduza family
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Network Service Discovery 1 TTPs 24 IoCs

    Attempt to gather information on host's network.

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Connections Discovery 1 TTPs 2 IoCs

    Attempt to get a listing of network connections.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\Velocity.exe
    "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\Velocity.exe"
    1⤵
    • Checks system information in the registry
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
      "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=gpu-process --no-sandbox --string-annotations=is-enterprise-managed=no --start-stack-profiler --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2340,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=2088 --mojo-platform-channel-handle=2336 /prefetch:2 --host-process-id=1652
      2⤵
      • Network Service Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:5020
    • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
      "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations=is-enterprise-managed=no --start-stack-profiler --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=2364,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=2460 --mojo-platform-channel-handle=2456 /prefetch:3 --host-process-id=1652
      2⤵
      • Network Service Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1112
    • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
      "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=2572,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=2588 --mojo-platform-channel-handle=2584 /prefetch:8 --host-process-id=1652
      2⤵
      • Network Service Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4656
    • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
      "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=renderer --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --no-sandbox --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=4848,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=4900 --mojo-platform-channel-handle=4896 --host-process-id=1652 /prefetch:1
      2⤵
      • Network Service Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:972
    • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
      "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=renderer --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --no-sandbox --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=4856,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=4912 --mojo-platform-channel-handle=4904 --host-process-id=1652 /prefetch:1
      2⤵
      • Network Service Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1408
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /c netstat -ano | findstr :30000
      2⤵
      • System Network Connections Discovery
      • Suspicious use of WriteProcessMemory
      PID:3704
      • C:\Windows\system32\NETSTAT.EXE
        netstat -ano
        3⤵
        • System Network Connections Discovery
        • Gathers network information
        • Suspicious use of AdjustPrivilegeToken
        PID:1448
      • C:\Windows\system32\findstr.exe
        findstr :30000
        3⤵
          PID:4572
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=5560,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=5704 --mojo-platform-channel-handle=5700 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2536
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=6676,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=6808 --mojo-platform-channel-handle=6812 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:3972
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=6300,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=6320 --mojo-platform-channel-handle=6156 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:3688
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-sandbox --string-annotations=is-enterprise-managed=no --start-stack-profiler --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=6500,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=6420 --mojo-platform-channel-handle=6044 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:1956
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=on_device_model.mojom.OnDeviceModelService --lang=en-US --service-sandbox-type=on_device_model_execution --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=6296,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=6368 --mojo-platform-channel-handle=6332 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:1540
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=5700,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=5740 --mojo-platform-channel-handle=5716 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:3896
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=6872,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=6588 --mojo-platform-channel-handle=6584 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:4616
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=6984,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=6960 --mojo-platform-channel-handle=6964 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:2912
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=7136,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=7112 --mojo-platform-channel-handle=7116 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:3180
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=7060,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=7072 --mojo-platform-channel-handle=7068 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:4360
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=1512,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=6656 --mojo-platform-channel-handle=1860 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:4340
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=1152,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=6248 --mojo-platform-channel-handle=6224 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:3332
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=6560,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=572 --mojo-platform-channel-handle=7124 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:3460
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=6716,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=6440 --mojo-platform-channel-handle=6436 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:2068
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=6592,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=2084 --mojo-platform-channel-handle=6692 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:4192
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=6424,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=6480 --mojo-platform-channel-handle=6488 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:3700
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=4832,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=5740 --mojo-platform-channel-handle=5280 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:4548
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=6344,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=6324 --mojo-platform-channel-handle=6692 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:3500
      • C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe
        "C:\Users\Admin\AppData\Local\Temp\net8.0-windows10.0.26100.0\runtimes\win-x64\native\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --field-trial-handle=5448,i,12921950746211537776,6146463437983889015,262144 --disable-features=EnableHangWatcher --variations-seed-version --enable-logging=handle --log-file=5276 --mojo-platform-channel-handle=4308 /prefetch:8 --host-process-id=1652
        2⤵
        • Network Service Discovery
        PID:4592
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
      1⤵
        PID:4080

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\CEF\User Data\2c2b4eef-c54b-4ed3-8b43-042e532a23fb.tmp

        Filesize

        2KB

        MD5

        214e8d1cb4db8e78325851d34067189a

        SHA1

        2ea4f0098f4084dbc9589d7743e37bae1a960d14

        SHA256

        fe815bca8b834a15449d86fa2263de6f11aada50d89f9250db6c5ea6a0e8f017

        SHA512

        5fd974bb9f6e283b9286ea2148abc4c19870bacf8c30e77aea3b956829887d6b8f89911133521936bea41ec1eb3b8f4de6cba672bb093c3109d7f27f2f1ac964

      • C:\Users\Admin\AppData\Local\CEF\User Data\CertificateRevocation\9565\crl-set

        Filesize

        634KB

        MD5

        7f49950747fbb5d088c929f27b7048c1

        SHA1

        e482594bff59b99aaf6848421fd74d0556e9e561

        SHA256

        080f9ce8f6055f6aea7eced8b7dd3e12b14b7da55605318bf097e45dda48037f

        SHA512

        f9081c13fe6a672ae7b10f4922b96347bb9143367696be89eeacae5bccaef42e0f287471816a2515866f1309afdc70f564ea287892bbc15af3a1edc69a00d6fd

      • C:\Users\Admin\AppData\Local\CEF\User Data\Crowd Deny\2024.12.19.1218\Preload Data

        Filesize

        16KB

        MD5

        3c97222c910c2aa1fab0c39a1c8d2b11

        SHA1

        c794a8758b4fa74c7aa9536effe9bfa774822e7a

        SHA256

        c7b91efdd09d75b47036e241eb55a238065ace2c26cd8f31328e8a9f4b4102b4

        SHA512

        3220065c655bf174c466d9ac03d3040e419f30d081983c23a757d2c0c5e4720aed2c71e88befc0d8b6987d6abd6a25289731d7f4fc9ed6348a1d762f67032153

      • C:\Users\Admin\AppData\Local\CEF\User Data\Default\GPUCache\data_0

        Filesize

        8KB

        MD5

        cf89d16bb9107c631daabf0c0ee58efb

        SHA1

        3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

        SHA256

        d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

        SHA512

        8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

      • C:\Users\Admin\AppData\Local\CEF\User Data\Default\GPUCache\data_1

        Filesize

        264KB

        MD5

        d0d388f3865d0523e451d6ba0be34cc4

        SHA1

        8571c6a52aacc2747c048e3419e5657b74612995

        SHA256

        902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

        SHA512

        376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

      • C:\Users\Admin\AppData\Local\CEF\User Data\Default\GPUCache\data_2

        Filesize

        8KB

        MD5

        0962291d6d367570bee5454721c17e11

        SHA1

        59d10a893ef321a706a9255176761366115bedcb

        SHA256

        ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

        SHA512

        f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

      • C:\Users\Admin\AppData\Local\CEF\User Data\Default\GPUCache\data_3

        Filesize

        8KB

        MD5

        41876349cb12d6db992f1309f22df3f0

        SHA1

        5cf26b3420fc0302cd0a71e8d029739b8765be27

        SHA256

        e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

        SHA512

        e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

      • C:\Users\Admin\AppData\Local\CEF\User Data\Default\Network\Network Persistent State

        Filesize

        550B

        MD5

        5d24a1b6d250119f10fc7d1547bf2829

        SHA1

        55f3fd3cd3ffcc01d58b764ff9fe0360f1a0b33d

        SHA256

        7e291582d2f3834ed8f670d27826933e79314e34c0286a6778829d03514ae5c7

        SHA512

        b2c4d28c376b13bb2a428d978010f0426eaa0b087c2c41820b52bbe390459295b18a6cb2c3ca4efdf99afa9b8593e872c7f0e71191a822adb5b97a90712ed4cc

      • C:\Users\Admin\AppData\Local\CEF\User Data\Default\Network\Network Persistent State

        Filesize

        550B

        MD5

        877ec9428552e610eba0b42e3dd65812

        SHA1

        46c2eac71d883c4dbda7806c8fb2434c60953b03

        SHA256

        312e0c100d43f271c2478a9c83ee715eb76e2bcd68dcfe0ea5190db75f89b72b

        SHA512

        34f2c0b336760d65a40007e71706209e3a3d2c78871c86c956c654651487cc41147aa688df3e21ee2b8623bfc6440b99ebc576d5370d4650e1b994a1aa79a516

      • C:\Users\Admin\AppData\Local\CEF\User Data\Default\Network\Network Persistent State~RFe59013e.TMP

        Filesize

        59B

        MD5

        2800881c775077e1c4b6e06bf4676de4

        SHA1

        2873631068c8b3b9495638c865915be822442c8b

        SHA256

        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

        SHA512

        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

      • C:\Users\Admin\AppData\Local\CEF\User Data\Default\Network\SCT Auditing Pending Reports

        Filesize

        2B

        MD5

        d751713988987e9331980363e24189ce

        SHA1

        97d170e1550eee4afc0af065b78cda302a97674c

        SHA256

        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

        SHA512

        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

      • C:\Users\Admin\AppData\Local\CEF\User Data\Default\Network\TransportSecurity

        Filesize

        355B

        MD5

        77e0d36edeb961658cb26eaf6fea5651

        SHA1

        923ae059868ecb06b03024df41b46d9aee59c009

        SHA256

        b9ebc657a07e8d4057e1f8610099dbfe1ba7e07e5054da281e3f6d995df9f049

        SHA512

        3eecc6585fbd4d0839bf8821a9b95766efa780bc9c653dac2fcb430e2625c5e637ce52bf85e55eef28242440937b2b544c6ba924326c439c9cec666a5cec2c16

      • C:\Users\Admin\AppData\Local\CEF\User Data\Default\Network\TransportSecurity~RFe5912b3.TMP

        Filesize

        355B

        MD5

        8c45f9323b776a94c78db5fdf68d180e

        SHA1

        baac935d5f0f57dc67030b6eb2e28f3cc0d8a3c3

        SHA256

        4735d4db9304b338e40c10c12df535485ee9b793f6c349009345397da9a66eba

        SHA512

        e462b0740bdec1d2206928bd4f81cf2c0ec4a602d189fd7a2a2859423ac0fdcc550fa972c174d868a4b7ec4a15f50f96aec2217c51b55e3ba5a45d50daba7786

      • C:\Users\Admin\AppData\Local\CEF\User Data\Default\Sync Data\LevelDB\CURRENT

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • C:\Users\Admin\AppData\Local\CEF\User Data\Default\b904dde1-83f2-4ebe-b212-14990877c528.tmp

        Filesize

        7KB

        MD5

        7b8116ddde70a808cac5448aa5ca5b46

        SHA1

        a05753e1612c738447957562c56baf57f18dbfb7

        SHA256

        5aa73c4b51c846b9fded61cabeb6064aa8dfaebe8b269305801e970949f9e55b

        SHA512

        17f9608383721581436f25f80c7436c2178ea6bf5fb6aee4ee6af868a577009c0bb9633756aa0ec92484c704ea651fdbdc449298b6381e7e7a00478ceb643de2

      • C:\Users\Admin\AppData\Local\CEF\User Data\Default\shared_proto_db\metadata\MANIFEST-000001

        Filesize

        41B

        MD5

        5af87dfd673ba2115e2fcf5cfdb727ab

        SHA1

        d5b5bbf396dc291274584ef71f444f420b6056f1

        SHA256

        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

        SHA512

        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

      • C:\Users\Admin\AppData\Local\CEF\User Data\FileTypePolicies\67\download_file_types.pb

        Filesize

        7KB

        MD5

        d28b6246cba1d78930d98b7b943d4fc0

        SHA1

        4936ebc7dbe0c2875046cac3a4dcaa35a7434740

        SHA256

        239557f40c6f3a18673d220534b1a34289021142dc9ba0d438a3a678333a0ec6

        SHA512

        b8dbebe85e6d720c36dbdae9395fb633fb7028fecc5292498ac89276ae87bd6de36288fbf858f3476e18033a430f503acf6280596449dd0478b6ab7139f3cea6

      • C:\Users\Admin\AppData\Local\CEF\User Data\Local State

        Filesize

        6KB

        MD5

        aa5a7e49fad36d36ab1efba26b7dfb8a

        SHA1

        02d2f54f6dbc9553547a4f06b9ab1f6bc92226ce

        SHA256

        078576f0bf73ec96164490791ccd83a652d6d8c1b6c65817e2ad65b2da905232

        SHA512

        b3465c98ab4b3f240a1cf2cb395b378e78d9b3a9008471acc1c6572711da9a26433102a749ed92acfc3d7c2b169569c24e2444807800a3a64eba4fbad2e208c8

      • C:\Users\Admin\AppData\Local\CEF\User Data\Local State

        Filesize

        5KB

        MD5

        f2230cd2e18fd8e5dccd6deaf6df5c62

        SHA1

        a9abd56e6b31231adcd87c68fa6db3618a1a1e19

        SHA256

        95c71a79926afa120b64d6199425d0205f75e78f8220e64a17f594170b95c78c

        SHA512

        588ae441cf14c92e1c6e55edc35fd4de893a9312cc1d5562429bb8c935f7628f6f0f71077bc0c166b1dfa0b18faf6f4c7b0bc2896de42c2cfbb37c47682ee0c0

      • C:\Users\Admin\AppData\Local\CEF\User Data\Local State

        Filesize

        5KB

        MD5

        d84a44994ffb022fdfe144d1553db8d4

        SHA1

        303cfe15eef94eafff7a3b8114f7409a085ab267

        SHA256

        59aa3055e01fc033a6067885efc052d2ef6aa06ddd7ddce9ca2178781567934a

        SHA512

        df82b81171568f662ea3bf68ebdca47a47e4b8d67c950c1f7690f41e190334851049ca9dcf776e9325d1258c0650606ed279d8d332d15f18c3ab32ca6b4aa8eb

      • C:\Users\Admin\AppData\Local\CEF\User Data\Local State

        Filesize

        6KB

        MD5

        b704d595bf0f721ab05292b75254a710

        SHA1

        6d7eef33d57ec9b27e73156633d60a5c23492b9c

        SHA256

        a1f33ed4227c8a7e1347067b6101b79f3a328a44c4fe5ef2f99676ef066682ed

        SHA512

        c9ebd81e64303d0b925708579730982125976fb6c3a591b4f76eebac2551476716f422d1796ef374292785a1a6fe46c96a549b27677b3cd8e58f29486eeeb920

      • C:\Users\Admin\AppData\Local\CEF\User Data\Local State

        Filesize

        1KB

        MD5

        4440c8151979e3f05d9456b94eaa6c26

        SHA1

        6fdc9b5daf3235e60e9ac6514f1746c37c7c0cfa

        SHA256

        d71e4888b882fba9571e0afea954c3ef5710e3afc9f939d936a866eca145cd70

        SHA512

        c8b5d8ac8654dd0c565b914e48bf2c4aa00c9ebccada490a56937ccdc49fe8b90a9fe05f56003ba47fa67bc52923aca441551a113a3b90ab348222c1676a6701

      • C:\Users\Admin\AppData\Local\CEF\User Data\Local State

        Filesize

        6KB

        MD5

        7f5775fdc40abc50245726dc569a3313

        SHA1

        c2acd8b808f7f56ed907beb3a46ea65018c72cb3

        SHA256

        0d83161fc6e06922ef5bcb4c7089c91e690372c20879f2e304088d2c702c9489

        SHA512

        631052f32c5d74f62120c867535ad4a2c5d5125c65b3c723f034d681cb3ef4a6ea2e478d0949747b7d80d9dce9e008924ac5fae3b252d2d0c13c2320d4ae7324

      • C:\Users\Admin\AppData\Local\CEF\User Data\Local State

        Filesize

        6KB

        MD5

        61616d6143f9b098ee6d00947043cfaf

        SHA1

        af51187a93ecab6cbb27e4583f0a949cef942902

        SHA256

        fb1f183deac1a11d06ca4d8f656c241ecdff93416086ebb0c9a9b65c032b78c0

        SHA512

        1b0fcdc846acc1300a93df986100041cfce462a9cfe748dec58f6181b7bb10a44a32d2cd4b44f22325c7c5af6452f66197d0da228d6511ea50086fb00303d6a7

      • C:\Users\Admin\AppData\Local\CEF\User Data\Local State

        Filesize

        7KB

        MD5

        a03817bb73044de5ec82647c0d0f708d

        SHA1

        0f407235e0b97e5c9f11fde7962e13939f0d01f4

        SHA256

        4d7bba14f7ae0819825c073df006318d1bc4f14124d57d9f414cca396a5def51

        SHA512

        f5ff7febf0016d06e3fa92e28f4d1129c21034c1e14ee5455107eda09ef43eb4baf46127d026996aa79aa3ac8a4cee28a6f8e76873fb4797d443641774257dc4

      • C:\Users\Admin\AppData\Local\CEF\User Data\Local State

        Filesize

        7KB

        MD5

        1b11402eb70440cb999a2a08c29f108b

        SHA1

        fc4c5a4d3c0319e083fac88784b54b0af062b576

        SHA256

        23932454d0ae1fc878a4ebef7565b38c19ad2471ae34d0509397a770dc260b0f

        SHA512

        c74ba466ab8ae9716d897de9773e11772a0e01d593d6e737e235ec5a188b75297fc05446b5f38e8f898faa40540a3bc01970c440a4e227cc5c28494c776b092e

      • C:\Users\Admin\AppData\Local\CEF\User Data\Local State~RFe57ed1f.TMP

        Filesize

        951B

        MD5

        23aa06c359876a22fd5e3a0a4357a9a2

        SHA1

        6716d9a9c2831da82e668571909d6b23cdd4ee2a

        SHA256

        64057648a6b5d8b4c3a87da5b68264eb6a3f5590f5b5310bfb442af890fb296f

        SHA512

        6c68fb16ba873152f56ff78ccf533fc2668a65651225c098471366d238452a15b9f262c3e8af356fdf747304d03002c0949a3fd5fbf1b3bacc7ddbd74acf76d3

      • C:\Users\Admin\AppData\Local\CEF\User Data\MEIPreload\1.0.7.1652906823\preloaded_data.pb

        Filesize

        8KB

        MD5

        d5e4c2634eff8a9b3faf432bf406d6d1

        SHA1

        a691f5c9877079193c1f7dfb16dbc30bb0372ec9

        SHA256

        c6070a157b4e28d16fbccbd233e93846ddb070c85e1a1bc64469b7a5f1424fad

        SHA512

        b264e28ac8f111df01c553445aadc7bcdb3f32a38a1a19d3f9d458270dfeaf80efa7144407bd999892022af9dde9dbf8a0e19e7212720e1c6511ea9125afb166

      • C:\Users\Admin\AppData\Local\CEF\User Data\OptimizationHints\488\optimization-hints.pb

        Filesize

        53KB

        MD5

        cc0f62530a5baa22b6bba59590ab28e5

        SHA1

        dff3e95748d5d3ca7767b428738a7e8df69b319d

        SHA256

        5c488338fad689dd2bdf87af1a373f986df9c64d967ba1414824a01cdb688842

        SHA512

        7c0a0fd465d303d64c19fe056c767429f400c04386f7caa93010aeb2f457dda5a4a2c48b338008703326c72d36fa371fac97731aa7dafc6208519b09c4a792b4

      • C:\Users\Admin\AppData\Local\CEF\User Data\PKIMetadata\1229\crs.pb

        Filesize

        141KB

        MD5

        57086b02f74c3fe7b79a5e2e3d852322

        SHA1

        6420387225ddcd5210175de4f3fdb0ab2be8ee9c

        SHA256

        a1b5be8d4aab349aff58ed34e1f3bc6647cf440830da0a12a8bd5a1c976c6407

        SHA512

        b195eb9a9129863e75be603b00b85ecfe46360910529fb38513af6940f9d17efd56f234b47963452329cd85b16bebb5a85ab5d304743e57d33bafd5b59900468

      • C:\Users\Admin\AppData\Local\CEF\User Data\PKIMetadata\1229\kp_pinslist.pb

        Filesize

        11KB

        MD5

        491bc3c975d26ac6eebd0a6f8e6c25db

        SHA1

        2c65313638fa11c0b342a7d8de2bb61e8aa59252

        SHA256

        3923537a2fe333e2ae32fbd95f277503fac1bf71092e528afe41e38949126191

        SHA512

        eb67a2c3a998c3188c2414b1294b61e630c61cc89bbef1d70939beca889f3348a794c0f4d3b5f277480020a01b29f9c2b23689c34d483f708a0a839b5d222434

      • C:\Users\Admin\AppData\Local\CEF\User Data\PrivacySandboxAttestationsPreloaded\2025.2.14.0\privacy-sandbox-attestations.dat

        Filesize

        7KB

        MD5

        7239aef4ebc607ea1d1e5d47a8f85493

        SHA1

        713e8f0ee1866a3ebb7dcad3c33b6d2d2e9b6f6e

        SHA256

        1810fa7574af19c56c30b4262a4f9856b6b1cc16f0ce3dd35d9fcf4d4fb1d1c9

        SHA512

        a8aefad4fe8e095cf73fd01a496daf0d93dc1089044e27e0791fdd0e8a881b349bd661c01e9a40635965cd716280780553363b833f39199a14c8d96ed1f92bd3

      • C:\Users\Admin\AppData\Local\CEF\User Data\SSLErrorAssistant\7\ssl_error_assistant.pb

        Filesize

        2KB

        MD5

        e2f792c9e2dd86f39e8286b2ead2fc70

        SHA1

        8a32867614d2a23e473ed642056ded8e566687f9

        SHA256

        ac354a4723aaa4f06bec385ddde4a4d0983ad51456f52b31a8068ec97d5b5ea7

        SHA512

        6a7af0ca1efa65a89a9ca3b8df0d2e24f21d91673c60cdfeeb02d33647442b01d535497249542f40e66e0d2dd3e9f8ed1f4a201fd97138d07a2b71366737e580

      • C:\Users\Admin\AppData\Local\CEF\User Data\SafetyTips\3061\safety_tips.pb

        Filesize

        165KB

        MD5

        34663a6a205a5a288a40702e51aadd05

        SHA1

        9e3e01ed1f4a9d7e534da583d30a14d8ecdcf18d

        SHA256

        4fdea1323c90fa1d2f820a23f146c3ee23df071d075974bd836d82b0ed00d51c

        SHA512

        667cf0823e71ddedce00cb8ac979baa2c65e4de4d0266dc707e7ff327b3ed68bdf138d83bb34f2e4cd64570063fe9adcc77bd0dca2f14354d839cf584c8a64f6

      • C:\Users\Admin\AppData\Local\CEF\User Data\Subresource Filter\Unindexed Rules\9.54.0\Filtering Rules

        Filesize

        73KB

        MD5

        7c91e14b081c346267e1b1761c029f1c

        SHA1

        40d2665fd0042a5aaa3b8c7c451813d6c7005ead

        SHA256

        fd3ade759bd847f845fe201167de1f53e53a2275631303952f1ac4d7ab5b19dc

        SHA512

        89a269667034fc15e7ecdc3aec70375949c1ae65a944cb3d762909152c8db1c4b163aa2162698a0345889154e248b5a70b7c93182f5a853529eefd889926233d

      • C:\Users\Admin\AppData\Local\CEF\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json

        Filesize

        6KB

        MD5

        bef4f9f856321c6dccb47a61f605e823

        SHA1

        8e60af5b17ed70db0505d7e1647a8bc9f7612939

        SHA256

        fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5

        SHA512

        bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c

      • C:\Users\Admin\AppData\Local\CEF\User Data\ZxcvbnData\3\ranked_dicts

        Filesize

        865KB

        MD5

        959460a18173908111523bbf4c39073e

        SHA1

        c42a9a7042f6d87a6a9de7f9bf378f1fe9485fcc

        SHA256

        5820d0bf9cfc363ff929492b1eb6df430039f4ac0e212a5b5411f7c2614f79d0

        SHA512

        291decc0f58cf71d7929a52d2c21a07590c02bcd202b73fb20391d6d0c7dcbe3aec24e02606f22dbd589ee2546a0eb8414c232f74ec646a1f26496c280705600

      • C:\Users\Admin\AppData\Local\CEF\User Data\chrome_debug.log

        Filesize

        691B

        MD5

        ebae111a3b6d0d0a227660aa85555d4a

        SHA1

        ac1de7c85aabb6a731bcf8f943467aebf01fed6a

        SHA256

        002985e70be176e5ab5704f9263e53d765c62b1da97cfdf237aa7f10bbebe400

        SHA512

        b17e37fdf1264b3fda28f63b85e645804c34b288d2ac2c075114d2c1b784f8c95c18556019b98e270659323bb3ccd6bb3e2a9ce34fe76328e88d24e5e543626f

      • C:\Users\Admin\AppData\Local\CEF\User Data\chrome_debug.log

        Filesize

        875B

        MD5

        6191864d09a7f5b1c096946ead7a1c0d

        SHA1

        ed5537e7b6646608a4dc4c1e35e93b647b93197b

        SHA256

        8ee62c023d0c784d819a30938a302698eb8c1dbc9118afabb93c2a0b0d253d8e

        SHA512

        460ac59d4447f736faf1ed8479c1857dac3c0646f17e4ce3225d27d55e4071a76dc35a898ee463a5a09f24f0d44126a33cba9679ab75dab642ebf24206535883

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_1174272473\manifest.json

        Filesize

        114B

        MD5

        01c878f43569459b9671819276fc381a

        SHA1

        c04140758f7fd681cc55acf2b02d988f13aef25c

        SHA256

        6000afa1b02202ed4821c24bbdd88cea539c2cb4d0ef7033bd5d3e6b4ddee430

        SHA512

        f80b39516cedd3108676e4c41c19fb7a6d05f2a92ffcbb4ea595f111dfd5e4d14dc7de5c3c871e0fe5d90d40c6c45a8c646c324329ad7aa8fd37c1d4d0810e8f

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_1260296926\manifest.json

        Filesize

        108B

        MD5

        7b7fe428222ca9dac615856cc50e34dc

        SHA1

        a3dc188468a9869fe72ed6b88acdc5392670754a

        SHA256

        f1a1af4a13ce69caf1166fdaad51464e9312ad0bdb6fe485fcf599333c899887

        SHA512

        4e72f6f802f6cd7a8702c552e422785edd8368ae73849812d513a9a1e53d16d3dc4506912024cd2514dd69485851e060a61316bf2ca9615160e8e92e26793ad6

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_1784800000\hyph-as.hyb

        Filesize

        703B

        MD5

        8961fdd3db036dd43002659a4e4a7365

        SHA1

        7b2fa321d50d5417e6c8d48145e86d15b7ff8321

        SHA256

        c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe

        SHA512

        531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_1784800000\hyph-hi.hyb

        Filesize

        687B

        MD5

        0807cf29fc4c5d7d87c1689eb2e0baaa

        SHA1

        d0914fb069469d47a36d339ca70164253fccf022

        SHA256

        f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42

        SHA512

        5324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_1784800000\hyph-nb.hyb

        Filesize

        141KB

        MD5

        677edd1a17d50f0bd11783f58725d0e7

        SHA1

        98fedc5862c78f3b03daed1ff9efbe5e31c205ee

        SHA256

        c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0

        SHA512

        c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_1784800000\manifest.json

        Filesize

        82B

        MD5

        2617c38bed67a4190fc499142b6f2867

        SHA1

        a37f0251cd6be0a6983d9a04193b773f86d31da1

        SHA256

        d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665

        SHA512

        b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_1838054660\manifest.json

        Filesize

        76B

        MD5

        c08a4e8fe2334119d49ca6967c23850f

        SHA1

        13c566b819d8e087246c80919e938ef2828b5dc4

        SHA256

        5b01512276c45ecc43d4bfa9a912bdaf7afc26150881f2a0119972bffdbd8ab0

        SHA512

        506f9f4fa4baaa4096ce10007eb09cfa95c9188082053b9ff7f2dec65164ff57506b6a8fea28d58783700f257c982aef037afc33f62da8da281e67636430dc23

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_1930667803\LICENSE

        Filesize

        1KB

        MD5

        ee002cb9e51bb8dfa89640a406a1090a

        SHA1

        49ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2

        SHA256

        3dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b

        SHA512

        d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_1930667803\manifest.json

        Filesize

        94B

        MD5

        6ab3156e8133e000153b0e84315e4b60

        SHA1

        3a1771f0b3a2f9f3f4cf1c21729764720476649a

        SHA256

        d01229b3579abdc7dbc3714104f59f51ee1cb4dca7ddff8d81a4863ce69d8b3a

        SHA512

        59cd39a8eabe77534628028da2e03fcbedf96ef3f48671e4bae7bb28b924cb8f9208486fac7441e9f7d05cc7e72acd1198708926218cd11ac89781dbc04b74c4

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_1948387593\manifest.json

        Filesize

        232B

        MD5

        ee8bf8833efd1c1cdbe87956dbf751eb

        SHA1

        cbf347cb9754100adf3a4fca18b52bc34341fda8

        SHA256

        1a2dfbb6ca484e2c57753b70d0e6f37b424366123ecb572aecc2498a5e823039

        SHA512

        745b16bbd053e0f598b9e4fc1c4f38a230849980ced8468ca509e0f671798de7035bc4e03b98cab27a748944885ec78a786db725d8e41d9525b29392b2e4a460

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_210892594\manifest.json

        Filesize

        79B

        MD5

        7f4b594a35d631af0e37fea02df71e72

        SHA1

        f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57

        SHA256

        530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1

        SHA512

        bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_214793175\manifest.json

        Filesize

        300B

        MD5

        01f3de10093b3b262105724e85817fa6

        SHA1

        97dee66ece41b53a27cbd4579f44c204e35d19d6

        SHA256

        be1b2d4b5880584961c46ec8ed276b6ee43ea595da56720268e05bd3d5c95340

        SHA512

        9646b13e23c4214bcc45715fbc60eb9afb29f934d5d33b3471ee89a6f399a68d83b5bdff14748f73ce6a7c2c9fdce782a4ce849f855a900514636b529e9b400f

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_399427806\manifest.json

        Filesize

        1001B

        MD5

        2ff237adbc218a4934a8b361bcd3428e

        SHA1

        efad279269d9372dcf9c65b8527792e2e9e6ca7d

        SHA256

        25a702dd5389cc7b077c6b4e06c1fad9bdea74a9c37453388986d093c277d827

        SHA512

        bafd91699019ab756adf13633b825d9d9bae374ca146e8c05abc70c931d491d421268a6e6549a8d284782898bc6eb99e3017fbe3a98e09cd3dfecad19f95e542

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_505558749\manifest.json

        Filesize

        69B

        MD5

        fb195043cfc35ce711b45934e387267b

        SHA1

        6f1aaafee57a3da2687e9fc8defe2dbc7cba0e07

        SHA256

        aeb364b60303212808fac02eb490ee5b054ae843ce084376e5981ef8767e5198

        SHA512

        bd7fee1d6f8e51137c849d76ff53f3b501d60ddce83cce18f3a217703d3d8b1a1cc7696b656c666d4f6de62a17ea2407c857137d12e0b6ac7bcdde4b3c8ff86b

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_579377801\manifest.json

        Filesize

        111B

        MD5

        fecba6c3128a97f09a1173779924be7c

        SHA1

        41645675ff089fc6059bbe1ed4b049502241e7fa

        SHA256

        7ef57c6645a8d144047d276b5d41b153c4dc63cf3627c32db018ae64b4e6d92b

        SHA512

        c1193abe0bb4a9359e8e73332475995bd042149f62a67e67d37549993c7130589db809c53657abb7a0f9c518f975f270debeaf7fa70327a81b8bbee233035aad

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_693450338\manifest.json

        Filesize

        76B

        MD5

        4aaa0ed8099ecc1da778a9bc39393808

        SHA1

        0e4a733a5af337f101cfa6bea5ebc153380f7b05

        SHA256

        20b91160e2611d3159ad82857323febc906457756678ab73f305c3a1e399d18d

        SHA512

        dfa942c35e1e5f62dd8840c97693cdbfd6d71a1fd2f42e26cb75b98bb6a1818395ecdf552d46f07dff1e9c74f1493a39e05b14e3409963eff1ada88897152879

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_735447158\manifest.json

        Filesize

        73B

        MD5

        ca3c15c148743ed62bd29407f457fdff

        SHA1

        73e78ef90d0423d8d6299aef151db4c885caa381

        SHA256

        e16aefa5aec9a9d0e086fa60ec84b52081d5b03b88dd68f1ca2a24f4a3ecf504

        SHA512

        b8102c27cffbcb2711fcd55830c4aebbf2cf141759269064f87a2e55591c8bcd17f9bf06a0925979e84a2abbed9151a38dc7e3199071a820231a6ee2aff09d95

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_774521754\manifest.json

        Filesize

        72B

        MD5

        87a8c153ed762eb638041eb212231c90

        SHA1

        124fe02c03821f155150e8d3f21e2d973b5f561a

        SHA256

        686244e0c97ec776b06144ce5b19f6b05cdfc74f3f0b0a4ae4c7b57443134959

        SHA512

        2aa3f3ebea8b943641814b30d66a9b4d67f4ccf9fb9cd8c3a71d48cd7247b4e578205442b8d0ee7da07617fa13f26dd3031936e572491bd69461ef3f03db9880

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_873947417\manifest.json

        Filesize

        108B

        MD5

        3eef9947429906a8e1e485b79f8c07b9

        SHA1

        6cf5129f7c1f87d7b39511b18040a49b4f36b388

        SHA256

        ffeeef51e42ae3980f42daaed6083cc40b6d90be02b7572eda9d2c4aa8c52f91

        SHA512

        9d68ad7b02c0a10c3cdbf29af220dd21da5d159aac6d2ed20ce0fefea370d05ddb7cae0130c27fbaca130c72f172e7c1f9ced4c80adec8f7c89d1d7f482d4766

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_947595123\manifest.fingerprint

        Filesize

        66B

        MD5

        eff744fca6131b7bf87ad38b45f133fb

        SHA1

        7ae9cdcc14b26dacfa7e296702bf49e682d6c290

        SHA256

        350f7caebd0f822b1e9e7b4cdcbdd3bed4c3a6d3a6a063511524416700eb2a27

        SHA512

        23ce7b996204fbc6be75266e18097c73c34d49db4fdf1c662d324ad73fd8d34fe650174b63fad42b9449c7b36cb0ea85a8057bec744a8eca189fd88e30d93e0f

      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping1652_947595123\manifest.json

        Filesize

        97B

        MD5

        d0fa86d8204727de745eedf392521403

        SHA1

        0d4e285475318be85fc957caa133b3665921574d

        SHA256

        205c0a371660577dcefd77bb53f62f110e425839ca16d9056193ed709d4182d8

        SHA512

        4f40074a452daf4e07bb92df244739348b5b6894d806644ab7cc4923b6feaa9a1b72bba11df7d80e18b1575f70741586cdb879b850531e6307f58303c15f698e

      • memory/1956-278-0x000001EAB1EA0000-0x000001EAB1EA1000-memory.dmp

        Filesize

        4KB

      • memory/1956-281-0x000001EAB1EA0000-0x000001EAB1EA1000-memory.dmp

        Filesize

        4KB

      • memory/1956-282-0x000001EAB1EA0000-0x000001EAB1EA1000-memory.dmp

        Filesize

        4KB

      • memory/1956-280-0x000001EAB1EA0000-0x000001EAB1EA1000-memory.dmp

        Filesize

        4KB

      • memory/1956-271-0x000001EAB1EA0000-0x000001EAB1EA1000-memory.dmp

        Filesize

        4KB

      • memory/1956-270-0x000001EAB1EA0000-0x000001EAB1EA1000-memory.dmp

        Filesize

        4KB

      • memory/1956-279-0x000001EAB1EA0000-0x000001EAB1EA1000-memory.dmp

        Filesize

        4KB

      • memory/1956-276-0x000001EAB1EA0000-0x000001EAB1EA1000-memory.dmp

        Filesize

        4KB

      • memory/1956-272-0x000001EAB1EA0000-0x000001EAB1EA1000-memory.dmp

        Filesize

        4KB

      • memory/1956-277-0x000001EAB1EA0000-0x000001EAB1EA1000-memory.dmp

        Filesize

        4KB