Analysis

  • max time kernel
    149s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2025, 06:38

General

  • Target

    PO_0908-0989989_Royal International Construction, L.L.C.cmd

  • Size

    4.4MB

  • MD5

    4ccd9114110e590192b6ac291a44aa04

  • SHA1

    82a21588f918e98c1624a80cc45a75984a1cdebc

  • SHA256

    4d0f4d4b0c4be9677d69985483ef77988e997c47457b26a16609fcc89bad5242

  • SHA512

    e0727284c96501044d1d881a03d6e58f0e020656e444a630e9edeef6e68934c243564d48394578a7ff89354771078245d5f3a22f4bdfa1b9e941fe27fad9ab36

  • SSDEEP

    49152:JOZm8FVOULlD5339WohAl04mmVC5zVdcwn/eBoKzBHNsARFiB:E

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 61 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Uses browser remote debugging 2 TTPs 14 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PO_0908-0989989_Royal International Construction, L.L.C.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5372
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      PowerShell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4300
    • C:\Windows\system32\extrac32.exe
      extrac32 /C /Y "C:\\Windows\\System32\\extrac32.exe" "C:\\Users\\Public\\Libraries\\expha.pif"
      2⤵
        PID:1272
      • C:\Users\Public\Libraries\expha.pif
        C:\\Users\\Public\\Libraries\\expha.pif /C /Y "C:\\Windows\\System32\\cmd.exe" "C:\\Users\\Public\\Libraries\\alpha.pif"
        2⤵
        • Executes dropped EXE
        PID:1452
      • C:\Users\Public\Libraries\expha.pif
        C:\\Users\\Public\\Libraries\\expha.pif /C /Y "C:\\Windows\\System32\\rundll32.exe" "C:\\Users\\Public\\Libraries\\rdha.pif"
        2⤵
        • Executes dropped EXE
        PID:5504
      • C:\Users\Public\Libraries\expha.pif
        C:\\Users\\Public\\Libraries\\expha.pif /C /Y "C:\Windows\System32\certutil.exe" "C:\\Users\\Public\\Libraries\\ghf.pif"
        2⤵
        • Executes dropped EXE
        PID:5452
      • C:\Users\Public\Libraries\alpha.pif
        C:\\Users\\Public\\Libraries\\alpha.pif /C C:\\Users\\Public\\Libraries\\ghf.pif -decodehex -f "C:\Users\Admin\AppData\Local\Temp\PO_0908-0989989_Royal International Construction, L.L.C.cmd" "C:\Users\Public\\Libraries\donex.avi" 9
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4552
        • C:\Users\Public\Libraries\ghf.pif
          C:\\Users\\Public\\Libraries\\ghf.pif -decodehex -f "C:\Users\Admin\AppData\Local\Temp\PO_0908-0989989_Royal International Construction, L.L.C.cmd" "C:\Users\Public\\Libraries\donex.avi" 9
          3⤵
          • Executes dropped EXE
          PID:3752
      • C:\Users\Public\Libraries\alpha.pif
        C:\\Users\\Public\\Libraries\\alpha.pif /C C:\\Users\\Public\\Libraries\\ghf.pif -decodehex -f "C:\Users\Public\\Libraries\donex.avi" "C:\Users\Public\\Libraries\chrome.PIF" 12
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4412
        • C:\Users\Public\Libraries\ghf.pif
          C:\\Users\\Public\\Libraries\\ghf.pif -decodehex -f "C:\Users\Public\\Libraries\donex.avi" "C:\Users\Public\\Libraries\chrome.PIF" 12
          3⤵
          • Executes dropped EXE
          PID:448
      • C:\Users\Public\Libraries\alpha.pif
        C:\\Users\\Public\\Libraries\\alpha.pif /c PING -n 4 127.0.0.1
        2⤵
        • Executes dropped EXE
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:4720
        • C:\Windows\system32\PING.EXE
          PING -n 4 127.0.0.1
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4840
      • C:\Users\Public\Libraries\rdha.pif
        C:\\Users\\Public\\Libraries\\rdha.pif zipfldr.dll,RouteTheCall C:\Users\Public\\Libraries\chrome.PIF
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3840
        • C:\Users\Public\Libraries\chrome.PIF
          "C:\Users\Public\Libraries\chrome.PIF"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:432
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\\ProgramData\\4882.cmd
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5256
            • C:\Windows\SysWOW64\esentutl.exe
              C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
              5⤵
                PID:4588
              • C:\Users\Public\alpha.pif
                C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1968
              • C:\Users\Public\alpha.pif
                C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:5196
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\\ProgramData\\4823.cmd
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5140
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1 -n 10
                5⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:3320
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\\ProgramData\\551.cmd
              4⤵
              • System Location Discovery: System Language Discovery
              PID:468
            • C:\Windows\SysWOW64\colorcpl.exe
              C:\Windows\System32\colorcpl.exe
              4⤵
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              PID:2716
              • C:\Program Files\Google\Chrome\Application\Chrome.exe
                --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --headless --remote-debugging-port=9222 --profile-directory="Default"
                5⤵
                • Uses browser remote debugging
                • Checks processor information in registry
                • Enumerates system info in registry
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:5152
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff8243fdcf8,0x7ff8243fdd04,0x7ff8243fdd10
                  6⤵
                    PID:552
                  • C:\Program Files\Google\Chrome\Application\Chrome.exe
                    "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1856,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=1844 /prefetch:2
                    6⤵
                      PID:3060
                    • C:\Program Files\Google\Chrome\Application\Chrome.exe
                      "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --field-trial-handle=2204,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2200 /prefetch:3
                      6⤵
                        PID:1028
                      • C:\Program Files\Google\Chrome\Application\Chrome.exe
                        "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --field-trial-handle=2324,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2320 /prefetch:8
                        6⤵
                          PID:3092
                        • C:\Program Files\Google\Chrome\Application\Chrome.exe
                          "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3208,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3204 /prefetch:1
                          6⤵
                          • Uses browser remote debugging
                          PID:4744
                        • C:\Program Files\Google\Chrome\Application\Chrome.exe
                          "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3348,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3344 /prefetch:1
                          6⤵
                          • Uses browser remote debugging
                          PID:4376
                        • C:\Program Files\Google\Chrome\Application\Chrome.exe
                          "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --field-trial-handle=4408,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4420 /prefetch:8
                          6⤵
                            PID:4064
                          • C:\Program Files\Google\Chrome\Application\Chrome.exe
                            "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --field-trial-handle=4792,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4788 /prefetch:8
                            6⤵
                              PID:4768
                            • C:\Program Files\Google\Chrome\Application\Chrome.exe
                              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4968,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4964 /prefetch:1
                              6⤵
                              • Uses browser remote debugging
                              PID:3768
                            • C:\Program Files\Google\Chrome\Application\Chrome.exe
                              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5000,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4996 /prefetch:1
                              6⤵
                              • Uses browser remote debugging
                              PID:404
                            • C:\Program Files\Google\Chrome\Application\Chrome.exe
                              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4956,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4876 /prefetch:1
                              6⤵
                              • Uses browser remote debugging
                              PID:3632
                            • C:\Program Files\Google\Chrome\Application\Chrome.exe
                              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5384,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5460 /prefetch:1
                              6⤵
                              • Uses browser remote debugging
                              PID:4036
                            • C:\Program Files\Google\Chrome\Application\Chrome.exe
                              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5536,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5552 /prefetch:1
                              6⤵
                              • Uses browser remote debugging
                              PID:5024
                            • C:\Program Files\Google\Chrome\Application\Chrome.exe
                              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3288,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3192 /prefetch:1
                              6⤵
                              • Uses browser remote debugging
                              PID:5008
                            • C:\Program Files\Google\Chrome\Application\Chrome.exe
                              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5580,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3260 /prefetch:1
                              6⤵
                              • Uses browser remote debugging
                              PID:2024
                            • C:\Program Files\Google\Chrome\Application\Chrome.exe
                              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5140,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5064 /prefetch:1
                              6⤵
                              • Uses browser remote debugging
                              PID:2580
                            • C:\Program Files\Google\Chrome\Application\Chrome.exe
                              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --field-trial-handle=5564,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5204 /prefetch:8
                              6⤵
                                PID:5868
                              • C:\Program Files\Google\Chrome\Application\Chrome.exe
                                "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --field-trial-handle=5604,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5628 /prefetch:8
                                6⤵
                                  PID:1064
                                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --field-trial-handle=5660,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3212 /prefetch:8
                                  6⤵
                                    PID:556
                                • C:\Windows\SysWOW64\recover.exe
                                  C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\nkzvgricuyjtktqtemlysbwyfc"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5016
                                • C:\Windows\SysWOW64\recover.exe
                                  C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\yeeohjtvigbfuzexvxgsvorporgif"
                                  5⤵
                                  • Accesses Microsoft Outlook accounts
                                  • System Location Discovery: System Language Discovery
                                  PID:1016
                                • C:\Windows\SysWOW64\recover.exe
                                  C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\ihkyicexeotkxnabehttgtdyxxqryyee"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5592
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --headless --remote-debugging-port=9222 --profile-directory="Default"
                                  5⤵
                                  • Uses browser remote debugging
                                  • Drops file in Program Files directory
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  • Modifies data under HKEY_USERS
                                  • Modifies registry class
                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                  • Suspicious use of FindShellTrayWindow
                                  PID:1620
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ff823ccf208,0x7ff823ccf214,0x7ff823ccf220
                                    6⤵
                                      PID:4536
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=2280,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:3
                                      6⤵
                                        PID:4796
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2248,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2240 /prefetch:2
                                        6⤵
                                          PID:3476
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=2648,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2644 /prefetch:8
                                          6⤵
                                            PID:4880
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --instant-process --pdf-upsell-enabled --remote-debugging-port=9222 --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3540,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:1
                                            6⤵
                                            • Uses browser remote debugging
                                            PID:4636
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --pdf-upsell-enabled --remote-debugging-port=9222 --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4244,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:1
                                            6⤵
                                            • Uses browser remote debugging
                                            PID:4548
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=4744,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3496 /prefetch:8
                                            6⤵
                                              PID:4580
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=4908,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4904 /prefetch:8
                                              6⤵
                                                PID:2484
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=4408,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4452 /prefetch:8
                                                6⤵
                                                  PID:540
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=5536,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5540 /prefetch:8
                                                  6⤵
                                                    PID:5840
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=5536,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5540 /prefetch:8
                                                    6⤵
                                                      PID:2956
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=5664,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5660 /prefetch:8
                                                      6⤵
                                                        PID:5756
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=5636,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4716 /prefetch:8
                                                        6⤵
                                                          PID:4712
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=5808,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5804 /prefetch:8
                                                          6⤵
                                                            PID:3572
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=5696,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:8
                                                            6⤵
                                                              PID:3408
                                                    • C:\Windows\system32\cmd.exe
                                                      cmd /c exit /b 0
                                                      2⤵
                                                        PID:2188
                                                    • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                      "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                      1⤵
                                                        PID:2408
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                        1⤵
                                                          PID:1944
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                          1⤵
                                                            PID:1852

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\ProgramData\4823.cmd

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            9a020804eba1ffac2928d7c795144bbf

                                                            SHA1

                                                            61fdc4135afdc99e106912aeafeac9c8a967becc

                                                            SHA256

                                                            a86c6c7a2bf9e12c45275a5e7ebebd5e6d2ba302fe0a12600b7c9fdf283d9e63

                                                            SHA512

                                                            42f6d754f1bdbeb6e4cc7aeb57ff4c4d126944f950d260a0839911e576ad16002c16122f81c1d39fa529432dca0a48c9acfbb18804ca9044425c8e424a5518be

                                                          • C:\ProgramData\4882.cmd

                                                            Filesize

                                                            19KB

                                                            MD5

                                                            1df650cca01129127d30063634ab5c03

                                                            SHA1

                                                            bc7172dec0b12b05f2247bd5e17751eb33474d4e

                                                            SHA256

                                                            edd4094e7a82a6ff8be65d6b075e9513bd15a6b74f8032b5c10ce18f7191fa60

                                                            SHA512

                                                            0bddf9ecaaedb0c30103a1fbfb644d6d4f7608bd596403307ed89b2390568c3a29e2cf55d10e2eadbfc407ede52eaf9a4f2321ba5f37e358a1039f73c7688fbd

                                                          • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            e7b63aa3f322d59f64325bc39fab88c8

                                                            SHA1

                                                            678b5174d1287ea781115a26088e056c0dad2857

                                                            SHA256

                                                            4dde4b88b93bd549b5893cb73595e6688d3de186f7728da40580797eb1329dd4

                                                            SHA512

                                                            ae78d8f976b09ff815e766576563d3f7907c0838058364bf9a65059dcedf1528bc8a6e3acbaedab2b172b34d27a4ca3e99320ebab5a04dc9b36581138dec55a0

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\21cea5c1-e44e-46e0-b173-1f3200afcf6c.tmp

                                                            Filesize

                                                            37KB

                                                            MD5

                                                            27f08413721fc0c8b29044c70537a1ed

                                                            SHA1

                                                            da22d64f50b982d97908cd8f49b83a92ae15d5c6

                                                            SHA256

                                                            62885bfb756d6e590f6bb7c03d53210e8713448e0890c96b7595233ca8e149de

                                                            SHA512

                                                            409058a70196b35a1785332c6619b9f616c92ac5bd47320e8207a61469974f2ae6135674256b525819d460143828040fa7e651ca0d3743d11b0f686381b4a161

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\CrashpadMetrics-active.pma

                                                            Filesize

                                                            1024KB

                                                            MD5

                                                            b0366599d64b0fc1adb2a712dcd02ee1

                                                            SHA1

                                                            b7a1c09ccd2846664cab5f76bd80b8e9f107acb0

                                                            SHA256

                                                            ae1bddb9e2cc97b0c9cd78ef3cd17553be6e5204677bd67e0b8f7fa27007f189

                                                            SHA512

                                                            d7de6d48285018f8b709c81ca01688126db7893ce9f48829524ee3122aa6f2200c7f78186b5a558d0b1ecf8157ee78a20064b63b45ab89f7aa0835b8409435d0

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                                                            Filesize

                                                            40B

                                                            MD5

                                                            a6af3e490e3b95afca81362f57ff9738

                                                            SHA1

                                                            d1ffb359ed34307d57a650c73de50b9c82febfd1

                                                            SHA256

                                                            6dfa585884a0e3c8dbbda829a158819322f0a0949a85adb90fef99928176689c

                                                            SHA512

                                                            4e8b4ea5fea4ab7e360a6be705bc3b39e6bced92f073daeea5a96306c4e94e438573edad713bad4aebf475a34be5b522f0bb458a1362ed63656566d3ff9e4da1

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                                                            Filesize

                                                            280B

                                                            MD5

                                                            d16fb70f7240a039c339f6c0f746b3c6

                                                            SHA1

                                                            c889cb5ae9cc1b6c750d438f2f21c1b04de86a3c

                                                            SHA256

                                                            5cb9aabf643dbad9852634b7ce2179528c6880e9c9d2cd71cd959701f907d268

                                                            SHA512

                                                            789cf7f4f0fca13fc33b54f88477176ad1d790dc672ea06298ca43c65a7687fb901d64d7f9afb3e981908169efcca1a8164b1e518e1c1dd8022a48901519c6fa

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                                                            Filesize

                                                            280B

                                                            MD5

                                                            e4df0ad192ac75a455897660686175aa

                                                            SHA1

                                                            8a3d33902c0e74c3403ea18ce73784a5d8827fc0

                                                            SHA256

                                                            0c947a3f1cff1b4a802637945ff85a2058e8f244361f85eced2b746b3753709d

                                                            SHA512

                                                            ac89d90c713942945903624dbb4341b31c701ed391a18eec39652951e81c57042c478f2b0d3875748e14860d6a1f21ab1ea0f5dea1b3e1d83961b1e2e2059082

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                                                            Filesize

                                                            280B

                                                            MD5

                                                            a10ec0cb6d7bb6777a9725c309328a74

                                                            SHA1

                                                            28b817c93a1a64edefe2ddabec2c75673562734d

                                                            SHA256

                                                            5e5fb797d03dcdebf7c2848900004a305f32b18bd969e27057ea4b60a4e16b91

                                                            SHA512

                                                            a46e4032ae38ef7bf3b78fb25b1da59aa71fe741a4c8d2316ba5121fd9696e6dd8900244ff735a6696c1568dee902778355caaec6235b8dd39d49d5d0fb2a95b

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                                                            Filesize

                                                            280B

                                                            MD5

                                                            60cf6e7acaa721fff5a23e196df4a2e1

                                                            SHA1

                                                            2883a8faca487a4d70f2ebf70a2b41bf0f3e86e3

                                                            SHA256

                                                            bcd46f728208a1ce7a62b4ef248a975edface200787264a085caae82c2be4e1b

                                                            SHA512

                                                            546fc9d3b1eee27e6cb5543f0ed50ca16a1ff72aad255f42fc01664ff0b491b073ae2a032c678576db0652fb9533474dae5398017959f199980de65418ea072e

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\throttle_store.dat

                                                            Filesize

                                                            20B

                                                            MD5

                                                            9e4e94633b73f4a7680240a0ffd6cd2c

                                                            SHA1

                                                            e68e02453ce22736169a56fdb59043d33668368f

                                                            SHA256

                                                            41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                                                            SHA512

                                                            193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\3cd3c731-7e1e-4af7-8013-2a13e428ae68.tmp

                                                            Filesize

                                                            1B

                                                            MD5

                                                            5058f1af8388633f609cadb75a75dc9d

                                                            SHA1

                                                            3a52ce780950d4d969792a2559cd519d7ee8c727

                                                            SHA256

                                                            cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                            SHA512

                                                            0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\5de5ee60-135e-4589-a666-264faddc803e.tmp

                                                            Filesize

                                                            32KB

                                                            MD5

                                                            17f6136f6b98006c90f9a15f2abd484c

                                                            SHA1

                                                            fbbde93b368d47c631eec354ee8422c0246f8b3e

                                                            SHA256

                                                            3716c58ec8ccb4f6a9addef57d063a59c28b1989a510d63adf1da7394cee83a6

                                                            SHA512

                                                            8841680ce6e6f7f2b3ec17799c9253854e76bafdc60c980c59eb561fdcd251d0a0a35fd2e02fdf3d25485239efaa243b2a59d51c6b87ed9f48c841dcc902c08b

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\DawnWebGPUCache\data_1

                                                            Filesize

                                                            264KB

                                                            MD5

                                                            d0d388f3865d0523e451d6ba0be34cc4

                                                            SHA1

                                                            8571c6a52aacc2747c048e3419e5657b74612995

                                                            SHA256

                                                            902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                                            SHA512

                                                            376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.90.1_0\dasherSettingSchema.json

                                                            Filesize

                                                            854B

                                                            MD5

                                                            4ec1df2da46182103d2ffc3b92d20ca5

                                                            SHA1

                                                            fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                            SHA256

                                                            6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                            SHA512

                                                            939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_1\_metadata\verified_contents.json

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            738e757b92939b24cdbbd0efc2601315

                                                            SHA1

                                                            77058cbafa625aafbea867052136c11ad3332143

                                                            SHA256

                                                            d23b2ba94ba22bbb681e6362ae5870acd8a3280fa9e7241b86a9e12982968947

                                                            SHA512

                                                            dca3e12dd5a9f1802db6d11b009fce2b787e79b9f730094367c9f26d1d87af1ea072ff5b10888648fb1231dd83475cf45594bb0c9915b655ee363a3127a5ffc2

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_1\content.js

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            3d20584f7f6c8eac79e17cca4207fb79

                                                            SHA1

                                                            3c16dcc27ae52431c8cdd92fbaab0341524d3092

                                                            SHA256

                                                            0d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643

                                                            SHA512

                                                            315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\GPUCache\data_0

                                                            Filesize

                                                            8KB

                                                            MD5

                                                            cf89d16bb9107c631daabf0c0ee58efb

                                                            SHA1

                                                            3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                            SHA256

                                                            d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                            SHA512

                                                            8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\GPUCache\data_2

                                                            Filesize

                                                            8KB

                                                            MD5

                                                            0962291d6d367570bee5454721c17e11

                                                            SHA1

                                                            59d10a893ef321a706a9255176761366115bedcb

                                                            SHA256

                                                            ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                            SHA512

                                                            f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\GPUCache\data_3

                                                            Filesize

                                                            8KB

                                                            MD5

                                                            41876349cb12d6db992f1309f22df3f0

                                                            SHA1

                                                            5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                            SHA256

                                                            e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                            SHA512

                                                            e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\MANIFEST-000001

                                                            Filesize

                                                            41B

                                                            MD5

                                                            5af87dfd673ba2115e2fcf5cfdb727ab

                                                            SHA1

                                                            d5b5bbf396dc291274584ef71f444f420b6056f1

                                                            SHA256

                                                            f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                            SHA512

                                                            de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\Cookies

                                                            Filesize

                                                            20KB

                                                            MD5

                                                            a156bfab7f06800d5287d4616d6f8733

                                                            SHA1

                                                            8f365ec4db582dc519774dcbbfcc8001dd37b512

                                                            SHA256

                                                            e87b3d155c7582d4c1d889308b58f84e8fe90a1581014b21b785d6694bd156cc

                                                            SHA512

                                                            6c8eeab3ae6fb0d5be7758cca521665b216f31aed1aeeeaf121c99dc9f0192b385de0da36e94f90dd4a9bbbac6be2c5a55d2f284a24ccb7dec2c5302fb9b027c

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\Cookies

                                                            Filesize

                                                            20KB

                                                            MD5

                                                            ef396c4a5ca14bb616987c5a3cc2d83d

                                                            SHA1

                                                            31eaade41a087f0c0fe08a3a8e6e2b183a61181b

                                                            SHA256

                                                            d9cb1819569b93e79aef9c05b533498d6c88563390250cd149e4ed5e813a2ae5

                                                            SHA512

                                                            a017098f8d91f7050e599b37314526d44868ce8638d455088d0143fd1543e8b731058b35a582db05e9a84fae5bea696e4c9d1a6f3f9ac9a85c5d8e6ada1e07cd

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\Network Persistent State

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            ec8399ec6da41a41a9f589030ea82402

                                                            SHA1

                                                            0afc326b5ac74c13b6fc176ae623e515458eb6e6

                                                            SHA256

                                                            963d61a50e9ad13a8761c7ef1dbc7a91ff1f21075bcc0b9247381a34310b1566

                                                            SHA512

                                                            f53af56dfdc04bb1cf523104a6bdc8b1730674cfa3cc0ff5d98d13d1c198c35d38e0c5aa3a65b5c351966d1a6cce3fc8bc31999fb462602af1667d27757273a5

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\SCT Auditing Pending Reports

                                                            Filesize

                                                            2B

                                                            MD5

                                                            d751713988987e9331980363e24189ce

                                                            SHA1

                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                            SHA256

                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                            SHA512

                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            df0e6a78e00e0caaf42c372baab7adc2

                                                            SHA1

                                                            23b57f275c599c9c93ca7fc11808b6039ccd04f4

                                                            SHA256

                                                            5ea9995b84fb24f2f63021b97382a4e710fa5c344f060261de6f947eebd6b4dd

                                                            SHA512

                                                            46fe1dfb0a590f03fcc3e428ff7c534ec335a182f220c0e6669d4b5aef349cff94be67a039d96670191c12631dbd06f99326fa22599cd01218315b3db7f05b70

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            5c02fab45de97e16f9ed5ec53aa2ccc9

                                                            SHA1

                                                            1a7959bd202d635f8c4454749682052937650970

                                                            SHA256

                                                            f4a11a92cd9fe84cbae8cb2efb42b4caca984b0eee04d6048981feb95561c557

                                                            SHA512

                                                            aea845d19a3cc023c1837c61dfee6a9ddda6ee284ecd6e9ed0f611f8672341def6fa11ae9f9ac230de256db21b82139ce9ac021cf58473e8882686dd1ae4b5c8

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                                                            Filesize

                                                            32KB

                                                            MD5

                                                            718735c89fd2a998619240597aa4d6e8

                                                            SHA1

                                                            eacc94844496bd98007bd9c00d42d538187806c0

                                                            SHA256

                                                            8dc6123f9a84e8f2a46350a76e0dbae82ecc9cb0fc9dc5042baa223c7afa0776

                                                            SHA512

                                                            49ed07b94dbb00b19a485b2a1934a5487113aaf57efb4eec2dde6d39b785563441e82bbf3c7c1c6e4104b5c006c4aaac2a80c6e7ca91fd00b1e3bc1c9f8ce5d5

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                                                            Filesize

                                                            32KB

                                                            MD5

                                                            236bfc5124c5dd8716e8c5f0f5b0957c

                                                            SHA1

                                                            5042d929db01c565995bad00cff1c3095fbaf3eb

                                                            SHA256

                                                            9b9b4f4aab97ee37deeded7cd20b08ec7b7b94e2b324474be67911fb067fd22e

                                                            SHA512

                                                            2a986d23c9579b4bab6320f8afb41da5a9844c2ed537a3ca12413c7c1fec3530e4772bd4dbceb972b5ad06a2d135b64841d6fc697e6ce65bce336303110dacd4

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                                                            Filesize

                                                            15KB

                                                            MD5

                                                            7d353150bf3d334b553bd419ff3dd463

                                                            SHA1

                                                            31061a87c40960221d3fc200d35f18e887fc8e06

                                                            SHA256

                                                            4024640f0c8181adea603a24da533ec161f8ae32b263860787d121736d468117

                                                            SHA512

                                                            e71fce93ced8d79708832d17025442fb9830b897321d4aa0e0cc47bbd517eeb1df9217e53eb90da2d6dc5600863eea7a08ab8d41d5e31f1c25d491f4a117d26a

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                                                            Filesize

                                                            15KB

                                                            MD5

                                                            7347eedb4518da52dfc9f8f99a56f390

                                                            SHA1

                                                            1b7b43f35b62a2a5a855500b7dc55c22a0b323ae

                                                            SHA256

                                                            74ba90e06b3bfb74662d437dcc73ff95c44a589da575716cd0170951551dcfae

                                                            SHA512

                                                            a631adf611f3fd606bb94d3be5083430cd560e05b2695a17499d70d426f16ef20ee78294d23e6bf982fe1287168b5adf0e181fef1b5aeba9fb72a5e442f77400

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\CURRENT

                                                            Filesize

                                                            16B

                                                            MD5

                                                            46295cac801e5d4857d09837238a6394

                                                            SHA1

                                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                            SHA256

                                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                            SHA512

                                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\LOG

                                                            Filesize

                                                            291B

                                                            MD5

                                                            970502e69cb513a5f5d7e1d13e71d505

                                                            SHA1

                                                            6127c6bacc17e183308f073f5c2c3e0093c326a4

                                                            SHA256

                                                            67ea7aff4eb0d718c64c7f4deae20bb0ad4d30c11f2f8f8b9435a53935a946bf

                                                            SHA512

                                                            a5bf8e4f98bf465928c1de1fc5aa1c353b6321764d3fe0851dd1834689542c9f6538dc53f63ad28569d7fd96ccec258caa2f3c4d3ef9fb84a1e57a5c27acd23c

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sync Data\LevelDB\LOG

                                                            Filesize

                                                            267B

                                                            MD5

                                                            d34ea5ddd0a6f8a753befe69f83f6c53

                                                            SHA1

                                                            5473323e6ca5f351eb9f168cb791c4444d20460e

                                                            SHA256

                                                            0dfe595cca5bd55fedf0a677e84e5a1a6d3f3a26ccdabb88d674abd5918e7e2b

                                                            SHA512

                                                            26d979afd6ff7ff6a4c35baa78c8a89412f16f71a37f7dc825eef6e9b8e528a712569ae5cdef500fb1b349c21a3e4c1d868cdc612fea99242dfd6e3af7528fbe

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\32.png

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            60953b3aca67505c2c7ea1a902e84d51

                                                            SHA1

                                                            5e6a8e04a96e36306c66409edd4775a606f13f54

                                                            SHA256

                                                            3197a2ac164c5bacb65f02fd9a6eb9c0a533fdf3b24f43043bbe9af65ed6608a

                                                            SHA512

                                                            2e65ec84471c3f703617171aa32f1a0d6c57d73e1d5c074b92d20d580df78e7ac4eef5ce54ab7defd0027bb38e33c44a6602d3e123a2fd310e514af0f5b38086

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\48.png

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            1625c1dd7bab831d8ab5308a1a71d525

                                                            SHA1

                                                            f1c145985a7c8c18891caaba0f46729bcbd1f63b

                                                            SHA256

                                                            9bdfc3aa03d4e41b0d83862ce02f9fe7fdb55a492280d86d551b91a24efd47ca

                                                            SHA512

                                                            75079bcb02482abd10b121d81fe39607dcac17bb3107ca274c549b570bb473260dfdbdd13df769b1745425ac5433a22fd392a2a1d815897e0c2091b787bada8e

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\64.png

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            e6671b804d6013a6706ea598e2d854c5

                                                            SHA1

                                                            40e4f401fe4afbf7bda49a02fe94f5308868460e

                                                            SHA256

                                                            57d5cd9fa59f944ffc78ec2a12633a79e2f923124fc50676ffbecaef5021b4a9

                                                            SHA512

                                                            7b11a47497ae5810ec4c7038ebf8358f03d79126886feb6daffd92d116fd606f530ecced9c3d635c0f57b9f9eb80ed9e8fa4eb98b029f9fd798d9b89ccd279a8

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons\32.png

                                                            Filesize

                                                            927B

                                                            MD5

                                                            26496798ba29a454042d60c9633c1e72

                                                            SHA1

                                                            65977f9cc15dd73026c91b479f1bc678050c8c45

                                                            SHA256

                                                            af50d64bd3cc7c3d201cb5abf0d76f44737e2a4040741ce178d9765fe440bcc5

                                                            SHA512

                                                            a4a61f66c712fcd27681073c2f30fda3a98fb6348ac4451d8a8e181e525f4ad8491a09d19c17dfb8f01a53eecbfc3ba25f370afd9df5b2ecb9b613236ecdd3cd

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons\48.png

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            815ddced6b03c8a62cb590ea4585fcba

                                                            SHA1

                                                            9f7e8cce2319b15ec63d89f837a173bd247e6998

                                                            SHA256

                                                            3339af4538fdfa40bb438469e35f6b7668d5c5ac93db0ef4a9e2fbf9ae884446

                                                            SHA512

                                                            ec7069b51959572c40dfa02f380b081912053898b4d4f86166b90bd277f9e8271d0fb3f0627e82645052ebe021c2e24698785e5214e82190a2298f32dd879b3d

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons\64.png

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            f2222b9d8dea52f5ce7d75378de76037

                                                            SHA1

                                                            e3b266fca2e5bf8bd82a62791902e879af7ff6fd

                                                            SHA256

                                                            e895cbcc424d6000a15b21d7cc9dec96deb2403a1469761ba3d9f11528c215b1

                                                            SHA512

                                                            74b947bc915c89f27954b5d0c8c790316ace581a20f7031aa91af3d95303ff0dd8cb4c87d3746ef2b13f76e0e8bba1b5b4a6916f3230c0514164fb1700640f66

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Applications\Temp\scoped_dir5152_28373125\Icons\128.png

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            6a371e7bbf132a71f031772845249b9c

                                                            SHA1

                                                            36f499f3a2e2bf885019d914a0cc6e8b3e035a79

                                                            SHA256

                                                            99b19cf47ea4e47b933229e92b87a474fbd5af7936bdf885c2240d0e6f4bdaaa

                                                            SHA512

                                                            b1fdcd5af84fa476808b8e89794d9df9f8e48b3e7c1a2239deae10832834d01bf311803ac95b3774d781be791b47389310ca866e1a6b497925ca6e2f004555a6

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Last Version

                                                            Filesize

                                                            13B

                                                            MD5

                                                            3e45022839c8def44fd96e24f29a9f4b

                                                            SHA1

                                                            c798352b5a0860f8edfd5c1589cf6e5842c5c226

                                                            SHA256

                                                            01a3e5d854762d8fdd01b235ce536fde31bf9a6be0596c295e3cea9aaf40f3dd

                                                            SHA512

                                                            2888982860091421f89f3d7444cacccb1938ef70fc084d3028d8a29021e6e1d83eaef62108eace2f0d590ed41ece0e443d8b564e9c9a860fc48d766edb1dc3d9

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                                                            Filesize

                                                            80KB

                                                            MD5

                                                            f6681cbf4d9167b9479427c68096e1dc

                                                            SHA1

                                                            49479eabc6fc5afa843accca3062703b2b8930c2

                                                            SHA256

                                                            6cccf990c51b1cbc916a4c40a814a88f0e96ef10a321d800cf991db499695a6d

                                                            SHA512

                                                            fc06b423c66059ece8f815b341899acf6845805bfd246b4b1ac90e371cc6873ba8808bcf19de5be48c09d1d8bfef33b9cf8945ee76cfd8b4b5d3d2f6ac392a05

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                                                            Filesize

                                                            151KB

                                                            MD5

                                                            500967b150a29a146348845e3cc71851

                                                            SHA1

                                                            10dec13a0af47426d00e671c0943e86e6d36d037

                                                            SHA256

                                                            e5452dafc5301871187c423891d2b78ee48f571e913f0d145eaaf8210e58d7bd

                                                            SHA512

                                                            3469ccaa64f48630a52b74190ff08fbdb1320fb73eb62fe7966471ed7f854ac7a3b24424595225352acf70569a069d1c6cf92f61a7d41acfd4d4651de45a31cd

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                                                            Filesize

                                                            47KB

                                                            MD5

                                                            f29dd7063e1d7d53192aaad852cab9b4

                                                            SHA1

                                                            191e5eb5ac21ae5a8b6b7118ddb8085f1f4b51bf

                                                            SHA256

                                                            9af55f86d80d45cc6cc61a1071c9271979c3a2bd12836c80eaea01f1f62dcbfe

                                                            SHA512

                                                            b5c9174dffec08c706673e54cc4cdf4f3ab18ae91689dd02485e2028898912e05faebe41951f97b6b20f32110007f4e84503436b2a99333477366ddea2b52fb9

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                                                            Filesize

                                                            41KB

                                                            MD5

                                                            85b190533ca671bb3ac769102b21412f

                                                            SHA1

                                                            ceb50c4d498c7fe28da73b8a164e8ede76b17168

                                                            SHA256

                                                            ee4a295fdfb1e8d2e1e2512ddad72334ecd0170578c696a52920114d4b579bad

                                                            SHA512

                                                            eeb2d3e301f3c39989150693d5434c11fa0d853f2faccb51cd921388555c8ba7e15aaa3121ca22f81e4b3f2cc4743406cbdb9290f5919f5b89dde302c230f44f

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\ShaderCache\data_1

                                                            Filesize

                                                            264KB

                                                            MD5

                                                            f50f89a0a91564d0b8a211f8921aa7de

                                                            SHA1

                                                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                            SHA256

                                                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                            SHA512

                                                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\ShaderCache\index

                                                            Filesize

                                                            256KB

                                                            MD5

                                                            450e9a0203e7ce54e06199a2b1ea1eb3

                                                            SHA1

                                                            fd1e5fb9b6ddfa46bc4c6e257567fa6c2f50d4b9

                                                            SHA256

                                                            971f191bf4b861ad8f128985ca265f6db6b7f6fee527c9dcbdbb6a9a799f859e

                                                            SHA512

                                                            de78a13dc779b2d3d02c49f1c28604bc881025773249834829ae9d856dd07451ceab1ab1a93709791da947607dd09c1a23dc56a15ce78c19e32730bb6cd7a5c6

                                                          • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Variations

                                                            Filesize

                                                            85B

                                                            MD5

                                                            bc6142469cd7dadf107be9ad87ea4753

                                                            SHA1

                                                            72a9aa05003fab742b0e4dc4c5d9eda6b9f7565c

                                                            SHA256

                                                            b26da4f8c7e283aa74386da0229d66af14a37986b8ca828e054fc932f68dd557

                                                            SHA512

                                                            47d1a67a16f5dc6d50556c5296e65918f0a2fcad0e8cee5795b100fe8cd89eaf5e1fd67691e8a57af3677883a5d8f104723b1901d11845b286474c8ac56f6182

                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1x4ptg2a.tbj.ps1

                                                            Filesize

                                                            60B

                                                            MD5

                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                            SHA1

                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                            SHA256

                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                            SHA512

                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                          • C:\Users\Admin\AppData\Local\Temp\a041ac7c-abd7-401e-bcab-0f879bb42c0e.tmp

                                                            Filesize

                                                            152KB

                                                            MD5

                                                            dd9bf8448d3ddcfd067967f01e8bf6d7

                                                            SHA1

                                                            d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                            SHA256

                                                            fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                            SHA512

                                                            65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                          • C:\Users\Admin\AppData\Local\Temp\nkzvgricuyjtktqtemlysbwyfc

                                                            Filesize

                                                            4KB

                                                            MD5

                                                            05a640e15ef8a6cd5d8db4633bfd2df3

                                                            SHA1

                                                            23771918cb286dd2ca98c0cc1664931e64cc33c8

                                                            SHA256

                                                            5b8be3e1fe8438ab1032b5914b5f5b8f544defc91213c6ef3f307b44d2a1951c

                                                            SHA512

                                                            27d198ecea0bbc12a48ce27c8dbd8a9a445248956623cefd501562cf00162a662e40f020a7276f1f870f324617f419342de9384b71664eea4778866b8bcfd616

                                                          • C:\Users\Admin\AppData\Local\Temp\scoped_dir1620_1079159115\3055e1db-2811-4fe2-83c4-eb850067d3fd.tmp

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            78e47dda17341bed7be45dccfd89ac87

                                                            SHA1

                                                            1afde30e46997452d11e4a2adbbf35cce7a1404f

                                                            SHA256

                                                            67d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550

                                                            SHA512

                                                            9574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5

                                                          • C:\Users\Admin\AppData\Local\Temp\scoped_dir1620_570834120\CRX_INSTALL\_locales\en\messages.json

                                                            Filesize

                                                            711B

                                                            MD5

                                                            558659936250e03cc14b60ebf648aa09

                                                            SHA1

                                                            32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                            SHA256

                                                            2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                            SHA512

                                                            1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                            Filesize

                                                            3KB

                                                            MD5

                                                            12b22f984df3830c7f3b3ad342045f7c

                                                            SHA1

                                                            f1b1feb27bc5f2a415fa1b77ad4413409c7d14b2

                                                            SHA256

                                                            8205e474c9b481376467e2baf4fadb161a89fc8c896defd19657cb0a9fd90773

                                                            SHA512

                                                            5f07691bcbad8c064bb9a59f00edc0578a9336110e3a675877c9eabd2ad5f2a8359f11dc5500b25b08204c769fe514d66dac6a718a1d3bd0665a744aa983d4f6

                                                          • C:\Users\Public\Libraries\alpha.pif

                                                            Filesize

                                                            283KB

                                                            MD5

                                                            8a2122e8162dbef04694b9c3e0b6cdee

                                                            SHA1

                                                            f1efb0fddc156e4c61c5f78a54700e4e7984d55d

                                                            SHA256

                                                            b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450

                                                            SHA512

                                                            99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397

                                                          • C:\Users\Public\Libraries\chrome.PIF

                                                            Filesize

                                                            1.6MB

                                                            MD5

                                                            7182e7bda4256397b944f48a904c3e4b

                                                            SHA1

                                                            f4be8f94ff227b64aeb938df5fb67b7f608a0c7d

                                                            SHA256

                                                            0734f514b98c5bb009e380768218aa48e9f141e511084b7608e110b44d34388a

                                                            SHA512

                                                            b005c31ab285b80e7f7f6d40774a6b242dc905f235f10c090cf7fe6f702801572008315d0b3e9b99d13a5fbaf2f177886ab977d90a8118fb7318dacead92f429

                                                          • C:\Users\Public\Libraries\donex.avi

                                                            Filesize

                                                            3.1MB

                                                            MD5

                                                            f53038a3e3da7f979bc9412fee8176a1

                                                            SHA1

                                                            5d25ccd56a87f876eeef39912553d530d1367441

                                                            SHA256

                                                            44575c2dd8a05e7d42ded8212f61ce253c76be5b23ea01e1e937b6f2c75876ff

                                                            SHA512

                                                            6d0c3d0d71c291884eb58df76c9f00a704f35f6b25f5206b33f2151fa2fab75e16ef646a7d305dc8301b8df9e18342b353f4800a277c2147b7aac2199179d395

                                                          • C:\Users\Public\Libraries\expha.pif

                                                            Filesize

                                                            34KB

                                                            MD5

                                                            41330d97bf17d07cd4308264f3032547

                                                            SHA1

                                                            0fcd5a3233316939129e6fcf4323e925e8406e5d

                                                            SHA256

                                                            a224559fd6621066347a5ba8f4aeeceea8a0a7a881a71bd36de69aceb52e9df7

                                                            SHA512

                                                            ae29e41c01ee6620fe822f9feb3dd851617314cec4d8ef750d2ebd2c61bd24fb54012146123f1fdf9b893f26e83ce5a17dbc5d3aae42bb04daab6d42e82f2a04

                                                          • C:\Users\Public\Libraries\ghf.pif

                                                            Filesize

                                                            1.6MB

                                                            MD5

                                                            bd8d9943a9b1def98eb83e0fa48796c2

                                                            SHA1

                                                            70e89852f023ab7cde0173eda1208dbb580f1e4f

                                                            SHA256

                                                            8de7b4eb1301d6cbe4ea2c8d13b83280453eb64e3b3c80756bbd1560d65ca4d2

                                                            SHA512

                                                            95630fdddad5db60cc97ec76ee1ca02dbb00ee3de7d6957ecda8968570e067ab2a9df1cc07a3ce61161a994acbe8417c83661320b54d04609818009a82552f7b

                                                          • C:\Users\Public\Libraries\rdha.pif

                                                            Filesize

                                                            70KB

                                                            MD5

                                                            ef3179d498793bf4234f708d3be28633

                                                            SHA1

                                                            dd399ae46303343f9f0da189aee11c67bd868222

                                                            SHA256

                                                            b53f3c0cd32d7f20849850768da6431e5f876b7bfa61db0aa0700b02873393fa

                                                            SHA512

                                                            02aff154762d7e53e37754f878ce6aa3f4df5a1eb167e27f13d9762dced32bec892bfa3f3314e3c6dce5998f7d3c400d7d0314b9326eedcab72207c60b3d332e

                                                          • C:\Users\Public\alpha.pif

                                                            Filesize

                                                            231KB

                                                            MD5

                                                            d0fce3afa6aa1d58ce9fa336cc2b675b

                                                            SHA1

                                                            4048488de6ba4bfef9edf103755519f1f762668f

                                                            SHA256

                                                            4d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22

                                                            SHA512

                                                            80e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2

                                                          • memory/432-96-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-76-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-62-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-74-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-73-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-61-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-60-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-70-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-69-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-68-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-67-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-66-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-58-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-65-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-59-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-78-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-79-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-81-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-82-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-83-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-84-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-85-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-89-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-90-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-91-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-71-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-72-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-94-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-95-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-97-0x0000000000400000-0x0000000000599000-memory.dmp

                                                            Filesize

                                                            1.6MB

                                                          • memory/432-98-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-99-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-75-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-63-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-102-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-77-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-107-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-80-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-109-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-110-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-112-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-114-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-86-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-88-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-92-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-93-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-53-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-100-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-101-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-103-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-104-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-108-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-111-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-113-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-116-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-115-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-117-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-105-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-106-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-64-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-56-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-57-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/432-52-0x0000000002A40000-0x0000000003A40000-memory.dmp

                                                            Filesize

                                                            16.0MB

                                                          • memory/4300-55-0x00007FF824D70000-0x00007FF825831000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/4300-0-0x00007FF824D73000-0x00007FF824D75000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/4300-14-0x00007FF824D70000-0x00007FF825831000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/4300-13-0x00007FF824D70000-0x00007FF825831000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/4300-10-0x000002A37A440000-0x000002A37A462000-memory.dmp

                                                            Filesize

                                                            136KB