Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    96s
  • max time network
    98s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13/03/2025, 15:08

General

  • Target

    Xeno[1].exe

  • Size

    1.3MB

  • MD5

    0435617ec5199d7968cfe3aa59b00dd9

  • SHA1

    6391174a55a9f12ce962f62fad945fcc13456526

  • SHA256

    4919eb2ba14a5320af7060ec482746ad471d43e649a80965b3fdecc768dd2511

  • SHA512

    c1bc509ac05a6f0fa6440eca3ae78b302163a4b788d3d7b1f8ba1a74e11e784b365ca7c4ca09ccdfc2744d4903deffc08f7d38d4d26b3fcc8cbb061c2e7f08ff

  • SSDEEP

    24576:D3uitxLGgKbQO5adoRsKBL5sTAPCCkMnoMtq61jBa+g2e1J6s0vCm9K/1D2tIs+W:jrxXKbJadaJ5D3J/DxU+gr1Juam09mIC

Malware Config

Signatures

  • Detects Rhadamanthys payload 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2860
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4604
    • C:\Users\Admin\AppData\Local\Temp\Xeno[1].exe
      "C:\Users\Admin\AppData\Local\Temp\Xeno[1].exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4184
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c expand Candles.cda Candles.cda.bat & Candles.cda.bat
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:488
        • C:\Windows\SysWOW64\expand.exe
          expand Candles.cda Candles.cda.bat
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3204
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4176
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "opssvc wrsa"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3672
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:432
        • C:\Windows\SysWOW64\findstr.exe
          findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:744
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 214130
          3⤵
          • System Location Discovery: System Language Discovery
          PID:648
        • C:\Windows\SysWOW64\extrac32.exe
          extrac32 /Y /E Quality.cda
          3⤵
          • System Location Discovery: System Language Discovery
          PID:340
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V "VSNET" Cw
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4024
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b 214130\Nightmare.com + Purchased + Emails + Devices + Drivers + Congratulations + Avenue + They + Moments + Chi + Independently + Levy 214130\Nightmare.com
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4372
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Ad.cda + ..\Learning.cda + ..\Click.cda + ..\Garlic.cda + ..\Drunk.cda + ..\Cargo.cda + ..\Milk.cda + ..\Tourist.cda + ..\Zum.cda O
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3000
        • C:\Users\Admin\AppData\Local\Temp\214130\Nightmare.com
          Nightmare.com O
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4760
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 932
            4⤵
            • Program crash
            PID:3436
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2328
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4760 -ip 4760
      1⤵
        PID:3460
      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1016
      • C:\Windows\system32\BackgroundTransferHost.exe
        "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
        1⤵
        • Modifies registry class
        PID:2356
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:740
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Music\ConvertToPush.m3u"
          1⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2280

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\13ca9a7a-56fb-4256-a449-0a65d86f534e.down_data

          Filesize

          555KB

          MD5

          5683c0028832cae4ef93ca39c8ac5029

          SHA1

          248755e4e1db552e0b6f8651b04ca6d1b31a86fb

          SHA256

          855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

          SHA512

          aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

          Filesize

          23KB

          MD5

          e52072c0483110c5aa1b304cb0304187

          SHA1

          2a51ef083fee7aa7c78ed6881c064c0e55203b11

          SHA256

          2038d0f02d255770ac5216a86f709bd5e7d2dc1b0a6942a86427cc76eee2c685

          SHA512

          8dee1c67873e338f64de674f4179ca6fd90475510ed2183e3bbff2becc3a625c8b1bb3118122cb6bf767804938cd8f9d41ac2c32101ba64579858d3309ad7959

        • C:\Users\Admin\AppData\Local\Temp\214130\Nightmare.com

          Filesize

          925KB

          MD5

          62d09f076e6e0240548c2f837536a46a

          SHA1

          26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

          SHA256

          1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

          SHA512

          32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

        • C:\Users\Admin\AppData\Local\Temp\214130\O

          Filesize

          663KB

          MD5

          29da1cb69af24bf91a77f0a5c9e1ac56

          SHA1

          63cd695b8b0359bf0498fa31ff4a0e8e61a25127

          SHA256

          738dcb250a9ca55ea0f8b3f9a98ac556c96bb9833f31629b185f635870cb3015

          SHA512

          72c55a3c8601b86004bf91b90ed12f1519897a78759876fd60ce8ee4e259ca4f0a1a1ffdfd88ee73d0d39759643789648f1e5c6c0aae4fec2c9ecc8198169e9c

        • C:\Users\Admin\AppData\Local\Temp\Ad.cda

          Filesize

          97KB

          MD5

          9d76009030cebd2b61637a2ff632633b

          SHA1

          2594cd1ffd229cdfbbba6af8c3794d909c4a75c5

          SHA256

          2f3da93ec99eda38f4e0c0e9b4f43d4d11f230a5a415879e80ae5025e52ec752

          SHA512

          6ba7e6fa500b5c99a8c3c8b8bbf94b91b4f4222b715616e32bcb89d5217cef3ba783df3ec5c1fc7617661123d7ec67d2ebac079e2a9a526ea308587731c37e5f

        • C:\Users\Admin\AppData\Local\Temp\Avenue

          Filesize

          95KB

          MD5

          ffc7bc4c479d6ed4afedc7a0bfc498fe

          SHA1

          ea4ac12ea36bef6bf48b92f06a024828e747c93d

          SHA256

          9a6e8c7c4c77db65411fbf0544488f442fc134a1e9674bb95ea4f22f7f8e23f7

          SHA512

          128f66d832c96b1f47859bf284e226e868ab03fb9abebb979329a25b1a20b4d677623d418d5a56573900a6fbcdfdd6a750e62cf9dfee267a3359bf33a7af0150

        • C:\Users\Admin\AppData\Local\Temp\Cargo.cda

          Filesize

          78KB

          MD5

          deead8c5c5156c81b433581e467d790d

          SHA1

          46f905214114233c659390ca79a26bc7ea867b22

          SHA256

          59b3a1f07a81ececccf8e74dec98b3c6bb3d53819a7f2379d7ebe8df95770ce8

          SHA512

          9a8feb225a56b911dc3288a82730df28af6901c3860b3bcc95685b2456672b12afdbd45a14eadb493b70e472eceeb04ef4225f0ac059de330c72909a7b6eddab

        • C:\Users\Admin\AppData\Local\Temp\Chi

          Filesize

          53KB

          MD5

          900676974b1eafd1a8646a935d14b22e

          SHA1

          3897d81c81f68f1e873d266fd237021250d76491

          SHA256

          5da863d069502feb391748ff78eda59812ad75dd02b47e05d2ef7d874bc5293d

          SHA512

          cc45f6bf0743c908967e89be3823773b77bbf9c3515291e6a544b73a9bc9d2158f0af89bc6cdb84580a580ff5e9ff02a1e2e68fca81bc15a78992fb414cc62dc

        • C:\Users\Admin\AppData\Local\Temp\Click.cda

          Filesize

          77KB

          MD5

          2cc4d93a13a0947770bf71809db7a6ea

          SHA1

          d460140e3acc6207655c7585001bd5b88cc748e6

          SHA256

          55a7561c01b246e6a769bb64b3e306bbb3b12e190afbe1fd020dc91f0bbf58c6

          SHA512

          b67155b3f4f1171ceb9dca650d5f01576cc2418ebc697182fe16f1580a9f964ed27f5b1c4902a53854956add2a52a02ec27ebdf000d174a6a555ecb070b7e847

        • C:\Users\Admin\AppData\Local\Temp\Congratulations

          Filesize

          80KB

          MD5

          ee2fe2bf5afc597a25cfa2dc4585fe69

          SHA1

          6ba68ff319432c1c3b0ff98e720d48c67d217eb0

          SHA256

          91dabddbda26df9609f32bf6093a6a91099fc8e7e9c6727885ff7dc189ac5284

          SHA512

          1540ad7c9c70c455b868274e63e8c9648c8669c77f6ec480182f00116cb6f45c0677022e169dfa6e53737de40c1373f3b3c20a9f7be283b0e02c0dd58a6cf52e

        • C:\Users\Admin\AppData\Local\Temp\Cw

          Filesize

          1KB

          MD5

          b3be8be6102401e7b8346c31aeb2bd2e

          SHA1

          f9120f6113facfdf486afd7b38541139491eb01b

          SHA256

          47662b07301483120fe76c90bbf86cb7b3d3ab41ff891b3aae5b6f5877377ccc

          SHA512

          006f64ad1747ac4ea730f4a382ef5951bf27b658324b06df0f49587893e47d7dbfbfb2d61da0cf267c16bea602d5cef76e342787fb9ce0cc111dbbef0d1af92b

        • C:\Users\Admin\AppData\Local\Temp\Devices

          Filesize

          137KB

          MD5

          24904b6392768beff8e080011531124d

          SHA1

          a403635bcec18f8409c190e947b5989cc39e3817

          SHA256

          fd70de521583bc3868ff2712617eac86d2f0dc18f7b3d871f8189b8c12deed23

          SHA512

          6a1f88cbe53f371af6a2533781d409aac823872764b5996592dda3776fed555f3338a9248d135a2088cbf43725226970785aed9c93e82fe48c421d10196ea699

        • C:\Users\Admin\AppData\Local\Temp\Drivers

          Filesize

          51KB

          MD5

          f790605f546d2e687345badea26862cb

          SHA1

          2c7a3eedfe402944f1b147cee0cb9151ed26307f

          SHA256

          4474264672b3aa7cd73e1c98c1a88e4debcafb34b106070332b751ca7d1ecc55

          SHA512

          0a994e8682b17300ad2bdd72a7202294c56fb59397ec18179706025fdebd971d478006915b4a06502d6f523854ca2fb0c16a855dd27f53d1db957fb6b4709ff6

        • C:\Users\Admin\AppData\Local\Temp\Drunk.cda

          Filesize

          81KB

          MD5

          b53b44452048d1f79aab4187bd7741dd

          SHA1

          b6033b3915594c07fd48bdac2054b266e9ff9ae4

          SHA256

          496f9fd798ca8aa06c9304fd5d73ca371ee7497908bd74d839b37d95b07d81c1

          SHA512

          cf69597c03d01c8a6811fe98cc683d8f962ecc9972cf7251108779d32254258774509d0ff57231fba9b78f428456a0f55e0fe4280469c9a63ee75b1f1799e0eb

        • C:\Users\Admin\AppData\Local\Temp\Emails

          Filesize

          94KB

          MD5

          708a8b180364bae1dad0f35c22a49276

          SHA1

          c21ec42fba3bac16a946466d70fefa36ca0ecc39

          SHA256

          deb72b719c04181290f95ac6fcf2ffa26c06e2b15f270a67bea4f4d81ded1bba

          SHA512

          44c3e8896b7d40617338172886a1450793bf886c2c3ca9a294fbdc77dd8ee7781a5c9143aabc9dd7ad041ac6a6b3ecbf8647f55f7439577993d5498159d83fe9

        • C:\Users\Admin\AppData\Local\Temp\Garlic.cda

          Filesize

          53KB

          MD5

          6da52d95e6fec14420174ee774eff497

          SHA1

          960d55684db66614560ed129be297ea99669300c

          SHA256

          122875092db6fb3b79bcf8d5b5cf7cb0651ed96291a0aa7670ba674330dc59d8

          SHA512

          e89d8634921d369f2d996f007a198358e21503449a14337e82406425e26447c38b666b745e9ab1657d50cf8c961dc0c048ad769a7796fcdd0fcbb01b86154409

        • C:\Users\Admin\AppData\Local\Temp\Independently

          Filesize

          92KB

          MD5

          6b0059f6ab4dad979a5bbdd008ae9ea5

          SHA1

          07199d632b794a54df8a026d8131e188c4e1be0c

          SHA256

          e044504ad0f0c1a5d9743613a0f2598422c67b8bb33be9efdf1b32929ec60c28

          SHA512

          684849bfbe38102fffb66243292013e7c0e851bdb5cb72d6f925e857db84f85f9359f14512128edaada304d24e59a28157a10ae86ebdada0f602ecce8e49527f

        • C:\Users\Admin\AppData\Local\Temp\Learning.cda

          Filesize

          79KB

          MD5

          2447add9ef7fbc3db9f1f533514a2490

          SHA1

          ef0886005c946cec8f450c644ddf219f3e292715

          SHA256

          82f980ac40c070691fa4264277fb089ec87dedff40d889c7ae6cfc5f21ffe051

          SHA512

          dd84ded149e80fec88f24d7daeb911b4a2e842779ec21405b100d7c1859fa1f3151d4f9413783359a367c990a732a7090070380735022806f27d4d610d6b06cd

        • C:\Users\Admin\AppData\Local\Temp\Levy

          Filesize

          49KB

          MD5

          e39196aeef5d2e2d043d0743036453c4

          SHA1

          00c5f9c28add71a8f28ef19569bb93724b2f2c3e

          SHA256

          b57aa26c8df214c42d76839e9761229d3de4326375bec31cc71968ab6d0e93b5

          SHA512

          41b86ab1825f6c4c6b0cfca461dccc890d301eed03009cf736b5ad53271275ea30b00a03067ef9f4b5d22b5a623e1299a4b001d77da2164261e8d37eec742cb9

        • C:\Users\Admin\AppData\Local\Temp\Milk.cda

          Filesize

          63KB

          MD5

          74db0d44d20d089c9b96910981c63e98

          SHA1

          5cb0bf4fd429e3e51786764b4bccc77a4b2e9a50

          SHA256

          1fcd4b87f9a417e42ee71ef092f73c80fbe6c0e91dc4fe1b86615610de3d5061

          SHA512

          4abb60f53205b5a7ed5c2fe02b70bd42bbc16213e71457be32c9da76f495351772662d7f8b3db527289198c759e6b7067d4e07e70a3494849793987e06659353

        • C:\Users\Admin\AppData\Local\Temp\Moments

          Filesize

          86KB

          MD5

          c91c1ac87208df1f4bc9ad5cc020b571

          SHA1

          242ce7b15f04d255cd324b57baee5b092a1aad6c

          SHA256

          c388fd3a8006f6002bf5f0606f28c3b1aec52cc5adead7e7113cf968a685748d

          SHA512

          a0e730f7de889b6d987807b8ad34fcced94048e873687b3a52a74ea9f613ce227e05cb7392dc766a1984afb6d77f05da5c27e95c2c4bbe630a197252a7e33d60

        • C:\Users\Admin\AppData\Local\Temp\Purchased

          Filesize

          109KB

          MD5

          c8b72511514176b98f88cb9b810e8734

          SHA1

          ef74755915229e17ef8be063ae79eb248abf95b1

          SHA256

          cb0706339f95cfbee2206e09e9a387a128c4e1385130a36ae6ecce1b1a05e48f

          SHA512

          e52e7ce121aa6bd92f77d20c3d9fc2a7de4a8601582770212f70b98b657aabd2007323dc2034a8121a71b14a8f4968ba735d0f8fe0fdddef332e34eecd818b79

        • C:\Users\Admin\AppData\Local\Temp\Quality.cda

          Filesize

          477KB

          MD5

          479683196e67c0a98d79201de707b1a2

          SHA1

          2ec214394469fac9398c74c885384a1fcea91487

          SHA256

          6b301dddc4fbc8a032299e2ee008ad0ac277e3d3de2821265c3765abc3dc52f1

          SHA512

          44ee95c7cfdfe7bdbdaa5da9ce645e6b028868194e9cfd26017002f5c59b3f4786d7455c69bcdeda21890360626cda0d9457b9f97437a28c4c55913f158c1131

        • C:\Users\Admin\AppData\Local\Temp\They

          Filesize

          77KB

          MD5

          0787048effd905eac0720fcff54f4e39

          SHA1

          f50d87da025e6a7dc3c1521f3142455a45372b63

          SHA256

          36ca66c6b0a8d60a9dc9cad9ada4577da1d52963982f2a3c4f39fba1a3c8a06f

          SHA512

          88e215ce3502b3d4d46a3099bce6c723a2092ce7774e11c754223ec1f4e7c9bec5eb914b62fe6e5073d9a8dc0521b4d48a9df643733f34be353e3778d4d74ce4

        • C:\Users\Admin\AppData\Local\Temp\Tourist.cda

          Filesize

          94KB

          MD5

          8d4baa550a8e4b3943d7990961be56df

          SHA1

          a19e5ea61e8c63fc5673787bb00cd2bf17490f84

          SHA256

          e4a4d8a6051597941bab63ac4a2d83501978436d9826496760d9841d46e031b0

          SHA512

          6a354adff672dad0c64135d896068ee2406d3721b72e5b935ce9f4ca7b8e089ed5737cad24d76c5a1804fd41a561e5cb5276c13faab48f602e32eb2fad03f56b

        • C:\Users\Admin\AppData\Local\Temp\Zum.cda

          Filesize

          41KB

          MD5

          99ce6bbc27c6d10d30dfe38c9cfc9baf

          SHA1

          5f2198f49eefcbc78056e03cfe3ff7c1fd0f5f99

          SHA256

          a1cb3293acf7dd2f9f47644c7b51d1caef34c328ab9debb86b8e22b4f361afe2

          SHA512

          ccb080846dda9130a44319e7872d92db4a4a80dcc0a110947602047fb49b6ac54d53627bc6756c4db025ecde6f73ded16733f970022dae4678d79028570e9455

        • C:\Users\Admin\AppData\Local\Temp\candles.cda

          Filesize

          17KB

          MD5

          67d288ddfbd64288ee836f85c79bbe3e

          SHA1

          a4ea361ddefa78271ace60f696a7e7bc06701d73

          SHA256

          13e15a5cdcc7f7d1d14ff5cd16301affa73806bbc853328944fa5d8cacfd12d9

          SHA512

          294c8c87ed3ee4b07e98a94e9499333a223c635533d6a9db652bbc9460faf2d6471a80f17ff284eecd59390752f988ff81509739d80b9259e23f95a1f77b8b4f

        • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

          Filesize

          77B

          MD5

          3590a3f00c4c04d7ec287ea449fb071e

          SHA1

          656f27e58bc9fe763763d8aa660246986a9aa929

          SHA256

          a11dcf6ef1163250afc9378c0c55110b69fac1256bd17372eacc78d9ab4d2f7b

          SHA512

          a52b8943890bd0d7e6081a51a4e51a6901c6eda7d4a3fae95c16f383894b0ff65f81d476b12e06174a0ef394559cb66d33dd0634f206b1ab5120015374976bc5

        • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

          Filesize

          14KB

          MD5

          02a9e49fe14f152e7b49b1eb7ab69a26

          SHA1

          151ce569dadb11c11d309674110994cddd946b3c

          SHA256

          9f1685cef251ae92c966037807096723385f015460daa16789249ab7daaef436

          SHA512

          f2dee48db3783c5ffe7883bf511a43ff8ce553bd98ef42928f114f7c9709c117d12f479d7d5db9cc925a312f7e2497d0c7c970d66cd4a30ae2e355afadea3f57

        • C:\Users\Admin\AppData\Roaming\vlc\vlcrc.2280

          Filesize

          94KB

          MD5

          7b37c4f352a44c8246bf685258f75045

          SHA1

          817dacb245334f10de0297e69c98b4c9470f083e

          SHA256

          ec45f6e952b43eddc214dba703cf7f31398f3c9f535aad37f42237c56b9b778e

          SHA512

          1e8d675b3c6c9ba257b616da268cac7f1c7a9db12ffb831ed5f8d43c0887d711c197ebc9daf735e3da9a0355bf21c2b29a2fb38a46482a2c5c8cd5628fea4c02

        • memory/2280-144-0x00007FF903220000-0x00007FF903238000-memory.dmp

          Filesize

          96KB

        • memory/2280-149-0x00007FF903080000-0x00007FF9030D7000-memory.dmp

          Filesize

          348KB

        • memory/2280-174-0x00007FF903330000-0x00007FF9043E0000-memory.dmp

          Filesize

          16.7MB

        • memory/2280-171-0x00007FF6AB270000-0x00007FF6AB368000-memory.dmp

          Filesize

          992KB

        • memory/2280-173-0x00007FF9048F0000-0x00007FF904BA6000-memory.dmp

          Filesize

          2.7MB

        • memory/2280-172-0x00007FF917D70000-0x00007FF917DA4000-memory.dmp

          Filesize

          208KB

        • memory/2280-125-0x00007FF9048F0000-0x00007FF904BA6000-memory.dmp

          Filesize

          2.7MB

        • memory/2280-126-0x0000025751140000-0x0000025751361000-memory.dmp

          Filesize

          2.1MB

        • memory/2280-127-0x00007FF917F10000-0x00007FF917F28000-memory.dmp

          Filesize

          96KB

        • memory/2280-128-0x00007FF9174C0000-0x00007FF9174D7000-memory.dmp

          Filesize

          92KB

        • memory/2280-129-0x00007FF90BE60000-0x00007FF90BE71000-memory.dmp

          Filesize

          68KB

        • memory/2280-124-0x00007FF917D70000-0x00007FF917DA4000-memory.dmp

          Filesize

          208KB

        • memory/2280-123-0x00007FF6AB270000-0x00007FF6AB368000-memory.dmp

          Filesize

          992KB

        • memory/2280-135-0x00007FF9043E0000-0x00007FF904421000-memory.dmp

          Filesize

          260KB

        • memory/2280-134-0x00007FF904430000-0x00007FF90463B000-memory.dmp

          Filesize

          2.0MB

        • memory/2280-133-0x00007FF904640000-0x00007FF904651000-memory.dmp

          Filesize

          68KB

        • memory/2280-132-0x00007FF904660000-0x00007FF90467D000-memory.dmp

          Filesize

          116KB

        • memory/2280-131-0x00007FF904680000-0x00007FF904691000-memory.dmp

          Filesize

          68KB

        • memory/2280-130-0x00007FF9046A0000-0x00007FF9046B7000-memory.dmp

          Filesize

          92KB

        • memory/2280-139-0x00007FF9032C0000-0x00007FF9032D1000-memory.dmp

          Filesize

          68KB

        • memory/2280-146-0x00007FF903180000-0x00007FF9031E7000-memory.dmp

          Filesize

          412KB

        • memory/2280-150-0x00007FF902810000-0x00007FF902845000-memory.dmp

          Filesize

          212KB

        • memory/2280-136-0x00007FF903330000-0x00007FF9043E0000-memory.dmp

          Filesize

          16.7MB

        • memory/2280-137-0x00007FF903300000-0x00007FF903321000-memory.dmp

          Filesize

          132KB

        • memory/2280-148-0x00007FF9030E0000-0x00007FF9030F1000-memory.dmp

          Filesize

          68KB

        • memory/2280-147-0x00007FF903100000-0x00007FF90317C000-memory.dmp

          Filesize

          496KB

        • memory/2280-145-0x00007FF9031F0000-0x00007FF903220000-memory.dmp

          Filesize

          192KB

        • memory/2280-138-0x00007FF9032E0000-0x00007FF9032F8000-memory.dmp

          Filesize

          96KB

        • memory/2280-143-0x00007FF903240000-0x00007FF903251000-memory.dmp

          Filesize

          68KB

        • memory/2280-142-0x00007FF903260000-0x00007FF90327B000-memory.dmp

          Filesize

          108KB

        • memory/2280-141-0x00007FF903280000-0x00007FF903291000-memory.dmp

          Filesize

          68KB

        • memory/2280-140-0x00007FF9032A0000-0x00007FF9032B1000-memory.dmp

          Filesize

          68KB

        • memory/4604-97-0x0000000075DA0000-0x0000000075FF2000-memory.dmp

          Filesize

          2.3MB

        • memory/4604-92-0x0000000000D10000-0x0000000000D1A000-memory.dmp

          Filesize

          40KB

        • memory/4604-94-0x0000000001600000-0x0000000001A00000-memory.dmp

          Filesize

          4.0MB

        • memory/4604-95-0x00007FF927A60000-0x00007FF927C69000-memory.dmp

          Filesize

          2.0MB

        • memory/4760-86-0x0000000003CA0000-0x0000000003D21000-memory.dmp

          Filesize

          516KB

        • memory/4760-85-0x0000000003CA0000-0x0000000003D21000-memory.dmp

          Filesize

          516KB

        • memory/4760-84-0x0000000003CA0000-0x0000000003D21000-memory.dmp

          Filesize

          516KB

        • memory/4760-80-0x0000000003CA0000-0x0000000003D21000-memory.dmp

          Filesize

          516KB

        • memory/4760-82-0x0000000003CA0000-0x0000000003D21000-memory.dmp

          Filesize

          516KB

        • memory/4760-81-0x0000000003CA0000-0x0000000003D21000-memory.dmp

          Filesize

          516KB

        • memory/4760-87-0x0000000003D30000-0x0000000004130000-memory.dmp

          Filesize

          4.0MB

        • memory/4760-91-0x0000000075DA0000-0x0000000075FF2000-memory.dmp

          Filesize

          2.3MB

        • memory/4760-89-0x00007FF927A60000-0x00007FF927C69000-memory.dmp

          Filesize

          2.0MB

        • memory/4760-88-0x0000000003D30000-0x0000000004130000-memory.dmp

          Filesize

          4.0MB