Analysis

  • max time kernel
    786s
  • max time network
    826s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2023, 17:35

General

  • Target

    VEGAS_Pro_20.0.0.214.exe

  • Size

    574.9MB

  • MD5

    059274e07bbf83ec5b5d4f1d957681eb

  • SHA1

    b0dd598c4dd719ccfc80d769becf5d0589a74eaa

  • SHA256

    e3e504169f03591d5ac617e027c124549f9073a2c357c64cac92cb2b83639145

  • SHA512

    3e6b5305eca533809dac53be730c8f525bf28c54aa4e17d151272f05efa4da03172a700f932a2510ea0c349b822136ae8ad76ed47c621e4b0f34e4394616da43

  • SSDEEP

    12582912:jDMbxgS/TLHSky47LmxRPF/ELbsnW4sxs2K53K2Cm/Fi2DPScaXm:jDyxgS/HXyGLmxRh4s+xs2w3KTm/Fi2T

Malware Config

Extracted

Path

C:\Program Files\VEGAS\VEGAS Pro 20.0\VEGASCapture\LICENSES.chromium.html

Ransom Note
<!-- Generated by licenses.py; do not edit. --><!doctype html> <html> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width"> <title>Credits</title> <link rel="stylesheet" href="chrome://resources/css/text_defaults.css"> <style> body { background-color: white; font-size: 84%; max-width: 1020px; } .page-title { font-size: 164%; font-weight: bold; } .product { background-color: #c3d9ff; border-radius: 5px; margin-top: 16px; overflow: auto; padding: 2px; } .product .title { float: left; font-size: 110%; font-weight: bold; margin: 3px; } .product .homepage { color: blue; float: right; margin: 3px; text-align: right; } .product .homepage::before { content: " - "; } .product .show { color: blue; float: right; margin: 3px; text-align: right; text-decoration: underline; } .licence { background-color: #e8eef7; border-radius: 3px; clear: both; display: none; padding: 16px; } .licence h3 { margin-top: 0; } .licence pre { white-space: pre-wrap; } .dialog #print-link, .dialog .homepage { display: none; } input + label + div { display: none; } input + label::after { content: "show license"; cursor: pointer; } input:checked + label + div { display: block; } input:checked + label::after { content: "hide license"; cursor: pointer; } </style> </head> <body> <span class="page-title" style="float:left;">Credits</span> <a id="print-link" href="#" style="float:right;" hidden>Print</a> <div style="clear:both; overflow:auto;"><!-- Chromium <3s the following projects --> <div class="product"> <span class="title">Abseil</span> <span class="homepage"><a href="https://github.com/abseil/abseil-cpp">homepage</a></span> <input type="checkbox" hidden id="0"> <label class="show" for="0" tabindex="0"></label> <div class="licence"> <pre> Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License. 5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages. 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets "[]" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives. Copyright [yyyy] [name of copyright owner] Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. </pre> </div> </div> <div class="product"> <span class="title">Accessibility Audit library, from Accessibility Developer Tools</span> <span class="homepage"><a href="https://raw.githubusercontent.com/GoogleChrome/accessibility-developer-tools/master/dist/js/axs_testing.js">homepage</a></span> <input type="checkbox" hidden id="1"> <label class="show" for="1" tabindex="0"></label> <div class="licence"> <pre> Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. "Contribution" shall mean any work of authorship, including the original ver
Emails

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

&lt;[email protected]&gt

URLs

http://www.apache.org/licenses/

http://www.apache.org/licenses/LICENSE-2.0

http://code.google.com/p/y2038

http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2

http://mozilla.org/MPL/2.0/

http://www.torchmobile.com/

https://cla.developers.google.com/clas

http://www.openssl.org/)"

https://github.com/mit-plv/fiat-crypto/blob/master/AUTHORS

http://www.opensource.apple.com/apsl/

http://www.mozilla.org/MPL/

http://www.apple.com/legal/guidelinesfor3rdparties.html

http://developer.intel.com/vtune/cbts/strmsimd/922down.htm

http://skal.planet-d.net/coding/dct.html

http://developer.intel.com/vtune/cbts/strmsimd/appnotes.htm

http://www.elecard.com/peter/idct.html

http://www.linuxvideo.org/mpeg2dec/

https://firebase.google.com/terms/analytics/

https://www.freetype.org

https://www.khronos.org/registry/

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 35 IoCs
  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 10 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VEGAS_Pro_20.0.0.214.exe
    "C:\Users\Admin\AppData\Local\Temp\VEGAS_Pro_20.0.0.214.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\product\VEGAS_Pro_20_setup.exe
      "C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\product\VEGAS_Pro_20_setup.exe" -m C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\SetupValues.dat
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x86.exe
        "C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x86.exe" /quiet /norestart /l "C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\001#Install#vcredist2013_12_0_40664_x86.txt"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3384
        • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x86.exe
          "C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x86.exe" /quiet /norestart /l "C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\001#Install#vcredist2013_12_0_40664_x86.txt" -burn.unelevated BurnPipe.{2C287DA5-EE89-4971-A055-FEAA6238649F} {9FA66531-30CD-4E75-A764-218A39157436} 3384
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2656
        • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe
          "C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={9dff3540-fc85-4ed5-ac84-9e3c7fd8bece} -burn.embedded BurnPipe.{3061852B-01AC-416D-81BE-1F3A9889C9DD} {B458A833-9A5A-4AD8-AF63-9DCC49A9F76A} 3384
          4⤵
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2932
          • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe
            "C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={9dff3540-fc85-4ed5-ac84-9e3c7fd8bece} -burn.embedded BurnPipe.{3061852B-01AC-416D-81BE-1F3A9889C9DD} {B458A833-9A5A-4AD8-AF63-9DCC49A9F76A} 3384 -burn.unelevated BurnPipe.{C51F5EA0-BC09-4999-94B6-0A9C0E5ABD51} {3DC1E8CF-5ACB-46F7-8138-82C85E1AF9F0} 2932
            5⤵
            • Loads dropped DLL
            PID:3012
      • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x64.exe
        "C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x64.exe" /quiet /norestart /l "C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\002#Install#vcredist2013_12_0_40664_x64.txt"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3180
        • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x64.exe
          "C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x64.exe" /quiet /norestart /l "C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\002#Install#vcredist2013_12_0_40664_x64.txt" -burn.unelevated BurnPipe.{53FAFD5A-AAB4-42CF-B371-B6736FC95254} {558276E9-B848-48C4-9923-78D394956D40} 3180
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1372
        • C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe
          "C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={042d26ef-3dbe-4c25-95d3-4c1b11b235a7} -burn.embedded BurnPipe.{C2606C37-B0C8-4622-8ADB-82AA95471176} {2E31CDBF-8633-4AB6-B5EC-85AA1BEAE196} 3180
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3020
          • C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe
            "C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={042d26ef-3dbe-4c25-95d3-4c1b11b235a7} -burn.embedded BurnPipe.{C2606C37-B0C8-4622-8ADB-82AA95471176} {2E31CDBF-8633-4AB6-B5EC-85AA1BEAE196} 3180 -burn.unelevated BurnPipe.{58335AA9-CED9-4D5B-9C40-2A74BDAFD948} {A6D31C12-184B-4EAD-9C66-632DCEDDE420} 3020
            5⤵
            • Loads dropped DLL
            PID:4324
      • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\WebView2\MicrosoftEdgeWebView2RuntimeInstallerX64.exe
        "C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\WebView2\MicrosoftEdgeWebView2RuntimeInstallerX64.exe" /silent /install
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\MicrosoftEdgeUpdate.exe
          "C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20WebView2%20Runtime&needsadmin=Prefers"
          4⤵
          • Executes dropped EXE
          • Sets file execution options in registry
          • Checks computer location settings
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4480
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies registry class
            PID:5100
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1800
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"
              6⤵
              • Executes dropped EXE
              • Registers COM server for autorun
              • Loads dropped DLL
              • Modifies registry class
              PID:3020
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"
              6⤵
              • Executes dropped EXE
              • Registers COM server for autorun
              • Loads dropped DLL
              • Modifies registry class
              PID:3500
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.155.77\MicrosoftEdgeUpdateComRegisterShell64.exe"
              6⤵
              • Executes dropped EXE
              • Registers COM server for autorun
              • Loads dropped DLL
              • Modifies registry class
              PID:2168
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNTUuNzciIHNoZWxsX3ZlcnNpb249IjEuMy4xNTUuNzciIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MTcwRkIxREUtNTRDNS00NDlFLUE1RjctQ0FCMzM1MDg4ODlDfSIgdXNlcmlkPSJ7OTA4RUJBOTMtQTY3Ri00MzRDLUI3RDItMzE3RTExRTM1OTI1fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InsyRENDQkM4MC1CRTIxLTRGMEUtOThBMy1GNEJFQURCQTI0MTh9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtxV0pTeld3UGZkY0xSK1hHSXY2eHJaZmlZT3hoUFUyczFOV21qV2NhRlBnPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTcxLjM3IiBuZXh0dmVyc2lvbj0iMS4zLjE1NS43NyIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgaW5zdGFsbF90aW1lX21zPSIxMDEzIi8-PC9hcHA-PC9yZXF1ZXN0Pg
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4524
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20WebView2%20Runtime&needsadmin=Prefers" /installsource offline /sessionid "{170FB1DE-54C5-449E-A5F7-CAB33508889C}" /silent /offlinedir "{94815580-D483-4430-9F13-F437C3AACBF6}"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4108
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1700 /prefetch:2
    1⤵
      PID:1340
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2020 /prefetch:8
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3804
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2476 /prefetch:8
      1⤵
        PID:220
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2832 /prefetch:1
        1⤵
          PID:3032
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2844 /prefetch:1
          1⤵
            PID:2536
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:1
            1⤵
              PID:1136
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:4444
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4512 /prefetch:8
                1⤵
                  PID:1376
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4508 /prefetch:8
                  1⤵
                    PID:4220
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4636 /prefetch:8
                    1⤵
                      PID:960
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4812 /prefetch:8
                      1⤵
                        PID:4068
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4820 /prefetch:8
                        1⤵
                          PID:4052
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4844 /prefetch:8
                          1⤵
                            PID:2348
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4680 /prefetch:8
                            1⤵
                              PID:3708
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4744 /prefetch:8
                              1⤵
                                PID:3856
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4668 /prefetch:8
                                1⤵
                                  PID:1376
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4568 /prefetch:8
                                  1⤵
                                    PID:2312
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4832 /prefetch:8
                                    1⤵
                                      PID:1612
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5332 /prefetch:8
                                      1⤵
                                        PID:3532
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5256 /prefetch:8
                                        1⤵
                                          PID:4584
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4908 /prefetch:8
                                          1⤵
                                            PID:2356
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4464 /prefetch:1
                                            1⤵
                                              PID:2792
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 /prefetch:8
                                              1⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:3684
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 /prefetch:8
                                              1⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:3820
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                                              1⤵
                                                PID:4752
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 /prefetch:8
                                                1⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4316
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:8
                                                1⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:3360
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2116 /prefetch:1
                                                1⤵
                                                  PID:2168
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3136 /prefetch:8
                                                  1⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5004
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4684 /prefetch:8
                                                  1⤵
                                                    PID:4916
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2284 /prefetch:8
                                                    1⤵
                                                      PID:1612
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3812 /prefetch:8
                                                      1⤵
                                                        PID:3448
                                                      • C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe
                                                        "C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"
                                                        1⤵
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:3752
                                                        • C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir3752_793224941\ChromeRecovery.exe
                                                          "C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir3752_793224941\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={12653912-b8c1-4c12-8ae5-40073c18c912} --system
                                                          2⤵
                                                          • Executes dropped EXE
                                                          PID:3992
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:8
                                                        1⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:4584
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3560 /prefetch:8
                                                        1⤵
                                                          PID:1272
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4020 /prefetch:2
                                                          1⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:2004
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:1
                                                          1⤵
                                                            PID:3916
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:8
                                                            1⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:3176
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5356 /prefetch:8
                                                            1⤵
                                                              PID:3920
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5348 /prefetch:8
                                                              1⤵
                                                                PID:4800
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:1
                                                                1⤵
                                                                  PID:4420
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2764 /prefetch:1
                                                                  1⤵
                                                                    PID:2348
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:1
                                                                    1⤵
                                                                      PID:1256
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4476 /prefetch:1
                                                                      1⤵
                                                                        PID:3588
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5544 /prefetch:8
                                                                        1⤵
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:1852
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2132 /prefetch:8
                                                                        1⤵
                                                                          PID:4728
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=812 /prefetch:1
                                                                          1⤵
                                                                            PID:3928
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:1
                                                                            1⤵
                                                                              PID:3464
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5644 /prefetch:8
                                                                              1⤵
                                                                                PID:4648
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4836 /prefetch:8
                                                                                1⤵
                                                                                  PID:5064
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2440 /prefetch:1
                                                                                  1⤵
                                                                                    PID:4344
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:1
                                                                                    1⤵
                                                                                      PID:1700
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3864 /prefetch:8
                                                                                      1⤵
                                                                                        PID:4792
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4876 /prefetch:8
                                                                                        1⤵
                                                                                          PID:2240
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:1
                                                                                          1⤵
                                                                                            PID:4992
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2720 /prefetch:1
                                                                                            1⤵
                                                                                              PID:3852
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5288 /prefetch:8
                                                                                              1⤵
                                                                                                PID:1128
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5544 /prefetch:8
                                                                                                1⤵
                                                                                                  PID:2820
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=896 /prefetch:8
                                                                                                  1⤵
                                                                                                    PID:3272
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5196 /prefetch:8
                                                                                                    1⤵
                                                                                                      PID:1400
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3028 /prefetch:8
                                                                                                      1⤵
                                                                                                        PID:2872
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5664 /prefetch:8
                                                                                                        1⤵
                                                                                                          PID:5016
                                                                                                        • C:\Windows\system32\msiexec.exe
                                                                                                          C:\Windows\system32\msiexec.exe /V
                                                                                                          1⤵
                                                                                                          • Enumerates connected drives
                                                                                                          • Drops file in System32 directory
                                                                                                          • Drops file in Program Files directory
                                                                                                          • Drops file in Windows directory
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          • Modifies registry class
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:3728
                                                                                                          • C:\Windows\syswow64\MsiExec.exe
                                                                                                            C:\Windows\syswow64\MsiExec.exe -Embedding D2A5E96CCBD8D52A639F1F3971174464
                                                                                                            2⤵
                                                                                                            • Loads dropped DLL
                                                                                                            PID:4524
                                                                                                          • C:\Windows\syswow64\MsiExec.exe
                                                                                                            C:\Windows\syswow64\MsiExec.exe -Embedding 32502A4DF2A1C6EE191DCB1CD3DED1EE E Global\MSI0000
                                                                                                            2⤵
                                                                                                            • Loads dropped DLL
                                                                                                            PID:1004
                                                                                                            • C:\Program Files\VEGAS\VEGAS Pro 20.0\vegas200.exe
                                                                                                              "C:\Program Files\VEGAS\VEGAS Pro 20.0\vegas200.exe" /register /user 1085
                                                                                                              3⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              • Modifies registry class
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              PID:4504
                                                                                                              • C:\Program Files\VEGAS\VEGAS Pro 20.0\ErrorReportLauncher.exe
                                                                                                                "C:\Program Files\VEGAS\VEGAS Pro 20.0\ErrorReportLauncher.exe"
                                                                                                                4⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:3324
                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
                                                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "C:\Program Files\VEGAS\VEGAS Pro 20.0\bdmux\BdmuxServer.exe"
                                                                                                              3⤵
                                                                                                              • Registers COM server for autorun
                                                                                                              • Modifies registry class
                                                                                                              PID:3092
                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 208 -InterruptEvent 0 -NGENProcess 1f8 -Pipe 204 -Comment "NGen Worker Process"
                                                                                                                4⤵
                                                                                                                  PID:2680
                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 0 -NGENProcess 290 -Pipe 2a0 -Comment "NGen Worker Process"
                                                                                                                  4⤵
                                                                                                                    PID:4052
                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 0 -NGENProcess 218 -Pipe 2a4 -Comment "NGen Worker Process"
                                                                                                                    4⤵
                                                                                                                      PID:4612
                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 0 -NGENProcess 2c4 -Pipe 2d8 -Comment "NGen Worker Process"
                                                                                                                      4⤵
                                                                                                                        PID:536
                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 308 -InterruptEvent 0 -NGENProcess 2f4 -Pipe 304 -Comment "NGen Worker Process"
                                                                                                                        4⤵
                                                                                                                          PID:3272
                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 0 -NGENProcess 208 -Pipe 2e4 -Comment "NGen Worker Process"
                                                                                                                          4⤵
                                                                                                                            PID:1260
                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 0 -NGENProcess 2c4 -Pipe 2e0 -Comment "NGen Worker Process"
                                                                                                                            4⤵
                                                                                                                              PID:3472
                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 314 -InterruptEvent 0 -NGENProcess 2fc -Pipe 2c4 -Comment "NGen Worker Process"
                                                                                                                              4⤵
                                                                                                                                PID:4572
                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 0 -NGENProcess 28c -Pipe 2fc -Comment "NGen Worker Process"
                                                                                                                                4⤵
                                                                                                                                  PID:1204
                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 218 -InterruptEvent 0 -NGENProcess 328 -Pipe 314 -Comment "NGen Worker Process"
                                                                                                                                  4⤵
                                                                                                                                    PID:4088
                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 0 -NGENProcess 318 -Pipe 28c -Comment "NGen Worker Process"
                                                                                                                                    4⤵
                                                                                                                                    • Drops file in Windows directory
                                                                                                                                    PID:3548
                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 208 -InterruptEvent 0 -NGENProcess 324 -Pipe 300 -Comment "NGen Worker Process"
                                                                                                                                    4⤵
                                                                                                                                      PID:1748
                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 0 -NGENProcess 32c -Pipe 348 -Comment "NGen Worker Process"
                                                                                                                                      4⤵
                                                                                                                                        PID:4692
                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 0 -NGENProcess 330 -Pipe 33c -Comment "NGen Worker Process"
                                                                                                                                        4⤵
                                                                                                                                          PID:1180
                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 0 -NGENProcess 330 -Pipe 310 -Comment "NGen Worker Process"
                                                                                                                                          4⤵
                                                                                                                                            PID:3776
                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 0 -NGENProcess 318 -Pipe 2f4 -Comment "NGen Worker Process"
                                                                                                                                            4⤵
                                                                                                                                              PID:4292
                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 0 -NGENProcess 344 -Pipe 30c -Comment "NGen Worker Process"
                                                                                                                                              4⤵
                                                                                                                                                PID:1256
                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 0 -NGENProcess 34c -Pipe 31c -Comment "NGen Worker Process"
                                                                                                                                                4⤵
                                                                                                                                                  PID:1532
                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 0 -NGENProcess 354 -Pipe 218 -Comment "NGen Worker Process"
                                                                                                                                                  4⤵
                                                                                                                                                    PID:3684
                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 0 -NGENProcess 368 -Pipe 36c -Comment "NGen Worker Process"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:1128
                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 0 -NGENProcess 208 -Pipe 320 -Comment "NGen Worker Process"
                                                                                                                                                      4⤵
                                                                                                                                                        PID:2808
                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 34c -InterruptEvent 0 -NGENProcess 378 -Pipe 358 -Comment "NGen Worker Process"
                                                                                                                                                        4⤵
                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                        PID:3776
                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 340 -InterruptEvent 0 -NGENProcess 334 -Pipe 364 -Comment "NGen Worker Process"
                                                                                                                                                        4⤵
                                                                                                                                                          PID:2256
                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 0 -NGENProcess 344 -Pipe 360 -Comment "NGen Worker Process"
                                                                                                                                                          4⤵
                                                                                                                                                            PID:3096
                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 0 -NGENProcess 324 -Pipe 344 -Comment "NGen Worker Process"
                                                                                                                                                            4⤵
                                                                                                                                                              PID:1260
                                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 334 -InterruptEvent 0 -NGENProcess 330 -Pipe 29c -Comment "NGen Worker Process"
                                                                                                                                                              4⤵
                                                                                                                                                                PID:3684
                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 0 -NGENProcess 328 -Pipe 324 -Comment "NGen Worker Process"
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:4648
                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 330 -InterruptEvent 0 -NGENProcess 384 -Pipe 34c -Comment "NGen Worker Process"
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                  PID:2808
                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 0 -NGENProcess 384 -Pipe 308 -Comment "NGen Worker Process"
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                  PID:3824
                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 0 -NGENProcess 334 -Pipe 2b0 -Comment "NGen Worker Process"
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                  PID:2536
                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 35c -InterruptEvent 0 -NGENProcess 290 -Pipe 330 -Comment "NGen Worker Process"
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                  PID:1904
                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 378 -InterruptEvent 0 -NGENProcess 32c -Pipe 334 -Comment "NGen Worker Process"
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:3068
                                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 338 -InterruptEvent 0 -NGENProcess 290 -Pipe 35c -Comment "NGen Worker Process"
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:3468
                                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 350 -InterruptEvent 0 -NGENProcess 384 -Pipe 378 -Comment "NGen Worker Process"
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:2220
                                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 384 -InterruptEvent 0 -NGENProcess 328 -Pipe 350 -Comment "NGen Worker Process"
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:3128
                                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 0 -NGENProcess 2f8 -Pipe 338 -Comment "NGen Worker Process"
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:1256
                                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 390 -InterruptEvent 0 -NGENProcess 37c -Pipe 368 -Comment "NGen Worker Process"
                                                                                                                                                                            4⤵
                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                            PID:2964
                                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 0 -NGENProcess 354 -Pipe 384 -Comment "NGen Worker Process"
                                                                                                                                                                            4⤵
                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                            PID:2836
                                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 38c -InterruptEvent 0 -NGENProcess 32c -Pipe 208 -Comment "NGen Worker Process"
                                                                                                                                                                            4⤵
                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                            PID:3948
                                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 0 -NGENProcess 374 -Pipe 354 -Comment "NGen Worker Process"
                                                                                                                                                                            4⤵
                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                            PID:1508
                                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 0 -NGENProcess 328 -Pipe 318 -Comment "NGen Worker Process"
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:1620
                                                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 39c -InterruptEvent 0 -NGENProcess 290 -Pipe 398 -Comment "NGen Worker Process"
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:2588
                                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 370 -InterruptEvent 0 -NGENProcess 37c -Pipe 38c -Comment "NGen Worker Process"
                                                                                                                                                                                4⤵
                                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                                PID:3460
                                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
                                                                                                                                                                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 328 -InterruptEvent 0 -NGENProcess 290 -Pipe 3b4 -Comment "NGen Worker Process"
                                                                                                                                                                                4⤵
                                                                                                                                                                                • Registers COM server for autorun
                                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                PID:964
                                                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
                                                                                                                                                                              C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe update /queue
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Drops file in Windows directory
                                                                                                                                                                              PID:2576
                                                                                                                                                                          • C:\Windows\System32\MsiExec.exe
                                                                                                                                                                            "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\VEGAS\VEGAS Pro 20.0\sfvstwrap.dll"
                                                                                                                                                                            2⤵
                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                            PID:2164
                                                                                                                                                                          • C:\Windows\System32\MsiExec.exe
                                                                                                                                                                            "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\mchammer_x64.dll"
                                                                                                                                                                            2⤵
                                                                                                                                                                            • Registers COM server for autorun
                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                            PID:3492
                                                                                                                                                                          • C:\Windows\System32\MsiExec.exe
                                                                                                                                                                            "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sffrgpnv_x64.dll"
                                                                                                                                                                            2⤵
                                                                                                                                                                            • Registers COM server for autorun
                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                            PID:1648
                                                                                                                                                                          • C:\Windows\System32\MsiExec.exe
                                                                                                                                                                            "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sfppack1_x64.dll"
                                                                                                                                                                            2⤵
                                                                                                                                                                            • Registers COM server for autorun
                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                            PID:4668
                                                                                                                                                                          • C:\Windows\System32\MsiExec.exe
                                                                                                                                                                            "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sfppack2_x64.dll"
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:3092
                                                                                                                                                                            • C:\Windows\System32\MsiExec.exe
                                                                                                                                                                              "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sfppack3_x64.dll"
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Registers COM server for autorun
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              PID:3732
                                                                                                                                                                            • C:\Windows\System32\MsiExec.exe
                                                                                                                                                                              "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sfresfilter_x64.dll"
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Registers COM server for autorun
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              PID:3348
                                                                                                                                                                            • C:\Windows\System32\MsiExec.exe
                                                                                                                                                                              "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sftrkfx1_x64.dll"
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Registers COM server for autorun
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              PID:4436
                                                                                                                                                                            • C:\Windows\System32\MsiExec.exe
                                                                                                                                                                              "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sfxpfx1_x64.dll"
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Registers COM server for autorun
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              PID:3376
                                                                                                                                                                            • C:\Windows\System32\MsiExec.exe
                                                                                                                                                                              "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sfxpfx2_x64.dll"
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:964
                                                                                                                                                                              • C:\Windows\System32\MsiExec.exe
                                                                                                                                                                                "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\sfxpfx3_x64.dll"
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:4908
                                                                                                                                                                                • C:\Windows\System32\MsiExec.exe
                                                                                                                                                                                  "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files (x86)\VEGAS\Shared Plug-Ins\Audio_x64\xpvinyl_x64.dll"
                                                                                                                                                                                  2⤵
                                                                                                                                                                                  • Registers COM server for autorun
                                                                                                                                                                                  PID:2144
                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:1
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:2776
                                                                                                                                                                                • C:\Windows\system32\vssvc.exe
                                                                                                                                                                                  C:\Windows\system32\vssvc.exe
                                                                                                                                                                                  1⤵
                                                                                                                                                                                  • Checks SCSI registry key(s)
                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                  PID:1596
                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=64 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:1
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:1704
                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:1
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:4768
                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=65 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2280 /prefetch:1
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:3824
                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:1
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:1608
                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 /prefetch:8
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:824
                                                                                                                                                                                          • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                                            C:\Windows\system32\AUDIODG.EXE 0x504 0x150
                                                                                                                                                                                            1⤵
                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                            PID:1924
                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5464 /prefetch:8
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:4004
                                                                                                                                                                                            • C:\Windows\system32\srtasks.exe
                                                                                                                                                                                              C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:4412
                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5636 /prefetch:8
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:4644
                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2364 /prefetch:8
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:2104
                                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                    PID:4432
                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjMiLz48L2FwcD48L3JlcXVlc3Q-
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                                      PID:3492
                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4EA7507D-12BD-4F12-AEA7-D4296EA492F7}\MicrosoftEdgeWebview_X64_98.0.1108.43.exe
                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4EA7507D-12BD-4F12-AEA7-D4296EA492F7}\MicrosoftEdgeWebview_X64_98.0.1108.43.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                      PID:4572
                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4EA7507D-12BD-4F12-AEA7-D4296EA492F7}\EDGEMITMP_54B07.tmp\setup.exe
                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4EA7507D-12BD-4F12-AEA7-D4296EA492F7}\EDGEMITMP_54B07.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{4EA7507D-12BD-4F12-AEA7-D4296EA492F7}\EDGEMITMP_54B07.tmp\MSEDGE.PACKED.7Z" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                        • Drops file in Program Files directory
                                                                                                                                                                                                        PID:3924
                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iNSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSI2IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NjA4IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iMiIgZG93bmxvYWRlZD0iMTE3Mjc4MTEyIiB0b3RhbD0iMTE3Mjc4MTEyIiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMSIgaW5zdGFsbF90aW1lX21zPSIxOTA2NyIvPjwvYXBwPjwvcmVxdWVzdD4
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                                      PID:3964
                                                                                                                                                                                                  • C:\Windows\system32\osk.exe
                                                                                                                                                                                                    "C:\Windows\system32\osk.exe"
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                    PID:3860
                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:8
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                    PID:3920
                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 /prefetch:8
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                    PID:2228
                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=73 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:1
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:5080
                                                                                                                                                                                                    • C:\Windows\SysWOW64\DllHost.exe
                                                                                                                                                                                                      C:\Windows\SysWOW64\DllHost.exe /Processid:{60A90A2F-858D-42AF-8929-82BE9D99E8A1}
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                      PID:5116
                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5780 /prefetch:8
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:1080
                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5920 /prefetch:8
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:4644
                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3036 /prefetch:8
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                          PID:1204
                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:8
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:1532
                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5780 /prefetch:8
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:3492
                                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1640,1514929501508442359,1295221474483135865,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2288 /prefetch:8
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                              • Registers COM server for autorun
                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                              PID:4908
                                                                                                                                                                                                            • C:\Users\Admin\Downloads\vegas200.exe
                                                                                                                                                                                                              "C:\Users\Admin\Downloads\vegas200.exe"
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:3048
                                                                                                                                                                                                              • C:\Windows\SysWOW64\DllHost.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\DllHost.exe /Processid:{60A90A2F-858D-42AF-8929-82BE9D99E8A1}
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                PID:1532
                                                                                                                                                                                                              • C:\Windows\System32\rundll32.exe
                                                                                                                                                                                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:2884
                                                                                                                                                                                                                • C:\Users\Admin\Downloads\vegas200.exe
                                                                                                                                                                                                                  "C:\Users\Admin\Downloads\vegas200.exe"
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:1684
                                                                                                                                                                                                                  • C:\Users\Admin\Downloads\vegas200.exe
                                                                                                                                                                                                                    "C:\Users\Admin\Downloads\vegas200.exe"
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:2716
                                                                                                                                                                                                                    • C:\Program Files\VEGAS\VEGAS Pro 20.0\vegas200.exe
                                                                                                                                                                                                                      "C:\Program Files\VEGAS\VEGAS Pro 20.0\vegas200.exe"
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                      PID:4128
                                                                                                                                                                                                                      • C:\Program Files\VEGAS\VEGAS Pro 20.0\ErrorReportLauncher.exe
                                                                                                                                                                                                                        "C:\Program Files\VEGAS\VEGAS Pro 20.0\ErrorReportLauncher.exe"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        PID:2896
                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      PID:2412
                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                      PID:3188
                                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{22A06767-4264-4767-B1AE-CB065F108DEB}\MicrosoftEdgeUpdateSetup_X86_1.3.171.39.exe
                                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{22A06767-4264-4767-B1AE-CB065F108DEB}\MicrosoftEdgeUpdateSetup_X86_1.3.171.39.exe" /update /sessionid "{A9B095B8-C0F7-4823-B589-52E1C6485743}"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Drops file in Program Files directory
                                                                                                                                                                                                                        PID:3976
                                                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Temp\EU25F6.tmp\MicrosoftEdgeUpdate.exe
                                                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Temp\EU25F6.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{A9B095B8-C0F7-4823-B589-52E1C6485743}"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Sets file execution options in registry
                                                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                          PID:3096
                                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                            PID:3772
                                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                            PID:4804
                                                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              • Registers COM server for autorun
                                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                                              PID:5100
                                                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              • Registers COM server for autorun
                                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                                              PID:916
                                                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              • Registers COM server for autorun
                                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                                              PID:4640
                                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTU1Ljc3IiBuZXh0dmVyc2lvbj0iMS4zLjE3MS4zOSIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjAiIGluc3RhbGxkYXRldGltZT0iMTY3MzYzNTM3NyI-PGV2ZW50IGV2ZW50dHlwZT0iMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTEwNDg5MDE0MjgiLz48L2FwcD48L3JlcXVlc3Q-
                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                            PID:2680
                                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNTUuNzciIHNoZWxsX3ZlcnNpb249IjEuMy4xNTUuNzciIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QTlCMDk1QjgtQzBGNy00ODIzLUI1ODktNTJFMUM2NDg1NzQzfSIgdXNlcmlkPSJ7OTA4RUJBOTMtQTY3Ri00MzRDLUI3RDItMzE3RTExRTM1OTI1fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins4Mzk1RDM4Ni0wNTIwLTQ0NTAtQTI2NC0xNkI4N0MwRjZEQUN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTU1Ljc3IiBuZXh0dmVyc2lvbj0iMS4zLjE3MS4zOSIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGV4cGVyaW1lbnRzPSJQcm9kdWN0c1RvUmVnaXN0ZXI9JTdCRjMwMTcyMjYtRkUyQS00Mjk1LThCREYtMDBDM0E5QTdFNEM1JTdEIiBpbnN0YWxsYWdlPSIwIj48dXBkYXRlY2hlY2svPjxldmVudCBldmVudHR5cGU9IjEyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-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-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-PHVwZGF0ZWNoZWNrLz48cGluZyByPSItMSIgcmQ9Ii0xIiBwaW5nX2ZyZXNobmVzcz0iezE1QzRBODYxLTQyMzQtNDU4QS04MUU1LTkyQTE0M0UzRjE1NH0iLz48L2FwcD48L3JlcXVlc3Q-
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        PID:4872

                                                                                                                                                                                                                    Network

                                                                                                                                                                                                                    MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                                                    Downloads

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\EdgeUpdate.dat

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      12KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      369bbc37cff290adb8963dc5e518b9b8

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      de0ef569f7ef55032e4b18d3a03542cc2bbac191

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      3d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      4f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\MicrosoftEdgeComRegisterShellARM64.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      160KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      cf9a26b458293978a908536927ec327d

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      e8b293e3799f352921c7f430648c21f79e47b052

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      4faa7cd71e234433f684c3d70efbfb1ada8d4172fc55caf78c0705e5646b0ba9

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      54447d830595fd5e4cb8ff60e78916b676f983033397932fc0ff402cc310771d9e448cebdb1bcae6e0dd3d90c8968df01171ac52a1e14a36eda950f67909e714

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\MicrosoftEdgeUpdate.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      209KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      0032498af2ebc50357cb31f1024c87fb

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      9818522c47ec379ff7bddf92ea72cd831691d094

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      c6bdf041b02561700c71c6275df4704a52d1fed4ba6a1bec98a602c6c325d6e7

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      f83fc43ca54e87a67d949666ca8c30721f372312042be978b01dcdccd530ce5db4d3d9d6ddc934a92c079825b91fd988f362cd481dd87fa09ddf2cfac85c05c3

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\MicrosoftEdgeUpdate.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      209KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      0032498af2ebc50357cb31f1024c87fb

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      9818522c47ec379ff7bddf92ea72cd831691d094

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      c6bdf041b02561700c71c6275df4704a52d1fed4ba6a1bec98a602c6c325d6e7

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      f83fc43ca54e87a67d949666ca8c30721f372312042be978b01dcdccd530ce5db4d3d9d6ddc934a92c079825b91fd988f362cd481dd87fa09ddf2cfac85c05c3

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      204KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      cbb1acbff5a8ce79804e687be8e3e75e

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      0bb50f813e08ff13d637a8f4ee66e4c0f1fb01ca

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      6d483505a0c9fd508ef48323099e2c64fce025e4b018df1d80d60aa00d8fb004

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      7f4a8df19f94c74b1898109804f4ec596abe32ff59d35279e58b139cf3210f6faa2697eca422435a193f4f2f90535187fcd233a018a54a0cfc426ced25de5ce8

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\MicrosoftEdgeUpdateCore.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      241KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      f70b0fc2f46f5e7082817a11c39e3c54

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      9939591b236bdd16ea02e79eb11a2d6fefe2af44

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      f6e636cfe7c53c120d834756f52ab407f1c5dc97c27a14e557f24c176e86d87f

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      b8bde38507eb84725aad9b7ffa33eae462fe6c7779f7ba650453b10bc9b52128198c4e29a568b0ba865fe266c19af81efc3f62a7ffd68e38e9d403d71b1afd79

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\NOTICE.TXT

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      6dd5bf0743f2366a0bdd37e302783bcd

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      e5ff6e044c40c02b1fc78304804fe1f993fed2e6

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      91d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdate.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.5MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      00670be258aacf4ca0c01ca980e96354

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      4ed09d74b4eb0cb5b95ab37e341025fb7081287c

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      0cb9d6c4fd45a3ba0f8e8c450e90beeee40e57b092906b841805fd3a24da4402

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      79a8e1c944d7e38087668db4052f604b4aabd605f7628e2b2fab8526a8001152b2b9e2e6d15f41e701df24e2e44077b0561b88f64de01ac5366a4d9e696cede1

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdate.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.5MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      00670be258aacf4ca0c01ca980e96354

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      4ed09d74b4eb0cb5b95ab37e341025fb7081287c

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      0cb9d6c4fd45a3ba0f8e8c450e90beeee40e57b092906b841805fd3a24da4402

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      79a8e1c944d7e38087668db4052f604b4aabd605f7628e2b2fab8526a8001152b2b9e2e6d15f41e701df24e2e44077b0561b88f64de01ac5366a4d9e696cede1

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_af.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      27KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      0d8ca15cd08112472d8f725b9d26f400

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      6082361001436a4d2c45babb755601a19bc58a10

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a36ec679129d8fa6e3f56b37c88e7d3406bb4d6d74e559e5a272ac8f34a812f4

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      8ec03222c8a023fba580a309a487e4d9535cded212ce47aaf3d7f4cda250c99ce25417330e0508b0a306e0ba14f9451cda0a31c550fdf0ec92c192792af1e23b

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_am.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      23KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      5b981b86b65935bae5fe5805660c7302

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      1107f5a6b8bb4ed1e95f621fbb7b236d6a57e11c

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      bd380d64f5b9dd6bd979a78e912f1a3d2a7c08eda3418abc85d67c43c8477264

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      d00f6d92f0efa0c89ee042abcb8b583097cd173d80b8009fc9dcda98a25c73edab970d607b4993831577812335db49dd3d76dba64a4cd6adc7b57494f0f78766

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_ar.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      25KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      5e9ba26ad6068d5b12ee2ebd74d66c03

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      2081cb86bbc6e20965b147f4178990f4c9ba52e7

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      6fc47a7fefb2ea88371b5e1ea84b24faaff6d4ccb503e6d9903b8301d16715e6

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      ab2eb6ae054cc107b83d877fc44dd62380c4098fbb805033c1d1f87d7172384c4cb7482d1f8931ad5f5b7dd181f6239748497e4b5866c2f406c310c6837028c4

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_as.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      27KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      30a0dfc5374347d838199254ef2b27e1

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      739c8197c111eededbdfb8e1940e63188bd8c5be

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      92cc3b354e786d428ab3bb43c77119b81a2960b00bd9d99550639a8b5c0428b6

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      b8611af4595eea99fb45653f6419235368075664721c467753cedd3b71507a28e0d6c5fb2c4b3e01db56d4842c043b14e20ac1ae7c225e7d678c77befdfccd1d

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_az.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      28KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      da1dd46046721726b57bab405c7b7c49

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      f42267672f7112d772feee601d2add8346a0a89d

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      d699ca97e2bc94f0ecc95b2ccefed201786535e7ada3fd6ccb543f42cfc273b8

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      b71909c7df499a702b199b87a96d7f25fcc82a0dcbe1138e900b3f386a6204d1b95e37941f32f61a0a558ce2b514f938b0029c55da0e4955229863d8b4b40061

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_bg.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      28KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      9fbe7d6ef07bd3af76a9fc97dfd90e95

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      300ea110b9ec0ef6c754950ff4dd59dbfc9f2b23

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      fef5f9a3ac4626f756b28f6304dc5e5e50bff553930ff35d6b8429ee494b4313

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      0df3f0af13d5ed4291ba179846a741149807e073c767b90ab5fd50449879429de6dd2b43954b3a52d3cc77ef4c98dc9efcd594c17784b48c97bf5bdccc90cc97

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_bn-IN.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      28KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      583c93b26e5dcd4bab07f7d303ebf5c3

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      439e6d4762c2a3593512ff103a8ff32110fd0da3

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      c0bb2e9167995db0d8f1f69a202ba00529e2ead8daeb29fcb99d42b0613efb2f

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      aafbc518e596969d20327a2b860b63013b1d5bb7c89faacff0ba95a9f6bb160dffd5a0058475ec1ba2c5d07cfd8cd4a0cffe4bb89bd4bb74b3e5981d6beec414

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_bn.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      28KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      fef17d66629715ae8ce4ab00464152ca

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      f62db519180eaaec0d62f56bf1dabcf353583aa6

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2ee6f8216f4953f3101de9578b392e2de94d59a79d08cbdd327b3d433f2b70ee

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      98b2647b3bbb2476371fbf9329fad70934bcc7e1f958e925bbfca17a7083e47a5561db986d260025c339b051f7f00bcaaff938ff351032b95075bcc589b7255c

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_bs.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      27KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      c359759bc31042b62167a40c7c0203b0

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      21140ceadd92ab23835c0e7a8f2e2fb95d0ccbdf

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      43fe0258ad799cae8bb20f23c20d74fbbb4b650b97b1b5b737d1d1728556d897

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      1d5837ef553223ac09e93df362da460002fb4f9eccc19120c4fb8c29cd453139a3cef54e9514217ac2d862a423d7a82f3e3d9b09f00c611cb16f19dfbe90979f

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_ca-Es-VALENCIA.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      28KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      5928df4290e3b6e8676a5aac6ddbbc31

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      d83b71bc4b37c3b228b113239506f89761a55f7b

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      ac5f350f4dc790f61135186c113bb2b8a78f26dab322ddb86b0e3403ab960721

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      90113cfe50355d6df04382ee69db6ddad1651e771d0182e28d0d3de3d1d5a2f10d22d5de2b54e12bff1fa5d478513c881e9cfceb2b471746fa870516aa3d0e69

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_ca.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      28KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      c2cc0764c763cd30ab629173ad2c9fdd

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      0e681669c04e102a4b031378b38c2645dd42bb3e

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      f3b266910a5bc6f738c154cb6a754cb55df05ad7f01cd6d61cd6e0cc8927455e

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      f54ac389ea62f4c4af5cfd727be094d43976c53a84a1df4313fa5c81bdd9f7038ec9b13832abda95d6f496956383708b3828f41e4b746ebf645dbc343f6568e6

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_cs.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      27KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      ebe48b47180b491688ec519a8d9bef73

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      bd98b11dbaef493968d999c22e2e35fdadcc51b2

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      02aae7715ad305977f316b9c80989ec63371c4c3e813b64252fe5f92143201d3

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      7b2b7204505d73ce66ad070bd31a7790dc56ef071bd233b7be3eb1ecf82a9cc30a605c0524c707d10a9828849de69a7169f8af5b7ea1c4da797deba89bcafc20

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_cy.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      27KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      909c5c6afa14ee9756a4291077f2359b

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      819e5e4f3197a6f45b5ce461ebda5b8dcf5a9a8f

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      7b0b45ab3f199a316d33be841867e0e5219db63174efb5e6d9866816a3faf770

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      a7b75854111e769dbfc0fef86e6561aff12b883c34cd91d15a2f209c68d76412670e9ca732ca159bab42176a4c3f1d9707f8e9db5e21143c15d13eafa1381d54

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_da.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      27KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      764d47b36dc060e15414e850c974b983

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      4cd0ef1c6a951c50844e441a3673de505aa38004

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      3fa89372d50cee57a316e279bb092287fad67ec1f47cc8f75178a985f43b5cd8

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      9017d3ddc85a919fd1ad5ae182c2e4f1194eeadea98f185a158b5c424b7730f30f10b18ca902cbbbc83d6567033d79327c7b1efa89d36b55b9066a8785530984

                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU8FD9.tmp\msedgeupdateres_en.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      26KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      c4e594d01bdcefcb1b71f06697e13c89

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      26a90b0912332fde26451e2efbbed6bd8c4bd02c

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a1be434cb4d92a01fa3b43c1967f254be29dcaa25ceeb6cb13fed711f90b81ff

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      1d0a1cfc7c8e10bc6b2cc9dcf6db0e204877439fa4cde26e6b1464cedb35676e67416956ca1b2873a10f0ab00a6049d000097c254ede77b06b1f329c34f17d0c

                                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir3752_793224941\ChromeRecovery.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      253KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      49ac3c96d270702a27b4895e4ce1f42a

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      55b90405f1e1b72143c64113e8bc65608dd3fd76

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      82aa3fd6a25cda9e16689cfadea175091be010cecae537e517f392e0bef5ba0f

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      b62f6501cb4c992d42d9097e356805c88ac4ac5a46ead4a8eee9f8cbae197b2305da8aab5b4a61891fe73951588025f2d642c32524b360687993f98c913138a0

                                                                                                                                                                                                                    • C:\ProgramData\Package Cache\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\vcredist_x64.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      455KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      3284088a2d414d65e865004fdb641936

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      7f3e9180d9025fc14c8a7868b763b0c3e7a900b4

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      102f69b5a98352a6a1a6b26bc2c86ee7611c1f45f5a9ca04f5a8841961f191c6

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      6786fb431addf05df256d0e1383501f96356aa78f66482db9772c58334aead59838abb7db0ea793d4a17627a357598266681c28328485489a21bc2985e751b62

                                                                                                                                                                                                                    • C:\ProgramData\Package Cache\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece}\state.rsm

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      788B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      4a82dddf04871b6b44389dc007a6594d

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b8369b04b5db309a1e2c12e2b4a0ceac503fd8c6

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2f90dbe6efdee312ac361a7aaa06bf953045961b892af43ab96e9ef9af62b854

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      812bee52528aa4f8d500ad93e3361da0f80787dad3cbf478f4acb5388e5b1bbbaf6b675e22dc9b08dfe59d6851ae7c7a96b4ccf11791aa2c96d4b3ec12c02466

                                                                                                                                                                                                                    • C:\ProgramData\Package Cache\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece}\vcredist_x86.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      455KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      0ce624d3a5a586c2bdda26b748da78d7

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b9ed0a86eae645ba19ed08327888a4474c95e34a

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      fd597b58a578cfa46e1818b3b4b795ca6d25225dc11ee86cd491f3d55d7b235d

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      e5bc577bd319eb3ac70c527acfb313fac817e63f5184e6581f6d813491ca0f1a0f80583c14c2b9f2b8fa1df5938c2ae3318a91bda41171c63cd1670c55a85b7f

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\001#Install#vcredist2013_12_0_40664_x86_000_vcRuntimeMinimum_x86.txt

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      e37f3a961153aeb044940389f785ead6

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      d5515f9004d9b7fe3a68b8a717e1f858fe538c15

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      1457ef2caff76c8e88fb185f4eb5c5d794fefdef419b761cce178fe4890165a1

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      046a98cb91b5a27d06afcd1e325e789238d62e4e24e7ea8da9c3f827ea67dd1b62c97e24754dc7ddadc502ab170035e3fb5704b628d0a08ef5829e92b52930fc

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\001#Install#vcredist2013_12_0_40664_x86_001_vcRuntimeAdditional_x86.txt

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      0fa1256a382ac85933da736fa2ca7925

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      e6817abc4aabb97396d8db707f9f7aa93b7d5696

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      eb9b3b8a48eacd5112069c09753bbf3423c04eddf9a1e160c790e678f63bb25d

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      84eae627b50cae79134949e2817c4f2ee3fa28b7eb3b85a96462ff1beaa1b799ec6eac35eff44cd14c7225897540a2ba9c0982e8a0765c6644d8bdebd9e51d9e

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\002#Install#vcredist2013_12_0_40664_x64_000_vcRuntimeMinimum_x64.txt

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      31bfc9f33f79cb4d61a41331855cff77

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      d661e76362ac4556c0d64fd368a0b1e6820f8778

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      6d6a5aca6e0e1bd1a12d55d59ca838e6f9f7bda3c81430b6a5f2dd62bd56451d

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      e69682961d88f37c40e67ac195325505fce234bfe83d4f2009a362d77f8bbb4e1e45582b307bd5f72722a036ee43de6bf3947248cbe33dcb6827e2cccb574889

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\MxMsiLogs\VEGAS_Pro_20_20230113_183758\002#Install#vcredist2013_12_0_40664_x64_001_vcRuntimeAdditional_x64.txt

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      2265171bbd8d744b037ee6e469056211

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      fa39c55174f918edddb08c2ba08e6d933e36995c

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      56d389b0699ec6b16f56e17f9b9ec7af314c032f065408dec86891446c2f50ad

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      dda909773b665d110693a31576a2672639a87302be0631b0f75c723501bc2c7337e62b987e01677b04dbe1b6644577cc93f3a63110fa7298687b5f88a8b40466

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\WebView2\MicrosoftEdgeWebView2RuntimeInstallerX64.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      116.7MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      9eb3d6612f840bc508c55b715c5bd4ff

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      40182a36d003d636d33ace168d6b62e29412ac3a

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      f7a3fc30ee3bc14fa4bf60c216832da5ddd46852638b117d9937d310c8abe22c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      847c3825187304ee37924a14faea52c7ce423835f5d9fc72d8874e55068b12fbd416ac154ebb376225c10c1c398f5318aca78e44db7ea4c84705fbc905407477

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\WebView2\MicrosoftEdgeWebView2RuntimeInstallerX64.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      116.7MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      9eb3d6612f840bc508c55b715c5bd4ff

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      40182a36d003d636d33ace168d6b62e29412ac3a

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      f7a3fc30ee3bc14fa4bf60c216832da5ddd46852638b117d9937d310c8abe22c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      847c3825187304ee37924a14faea52c7ce423835f5d9fc72d8874e55068b12fbd416ac154ebb376225c10c1c398f5318aca78e44db7ea4c84705fbc905407477

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x64.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.9MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      49b1164f8e95ec6409ea83cdb352d8da

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      1194e6bf4153fa88f20b2a70ac15bc359ada4ee2

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a4bba7701e355ae29c403431f871a537897c363e215cafe706615e270984f17c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      29b65e45ce5233f5ad480673752529026f59a760466a1026bb92fc78d1ccc82396ecb8f07b0e49c9b2315dbef976cb417273c77f4209475036775fe687dd2d60

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x64.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.9MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      49b1164f8e95ec6409ea83cdb352d8da

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      1194e6bf4153fa88f20b2a70ac15bc359ada4ee2

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a4bba7701e355ae29c403431f871a537897c363e215cafe706615e270984f17c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      29b65e45ce5233f5ad480673752529026f59a760466a1026bb92fc78d1ccc82396ecb8f07b0e49c9b2315dbef976cb417273c77f4209475036775fe687dd2d60

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x64.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.9MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      49b1164f8e95ec6409ea83cdb352d8da

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      1194e6bf4153fa88f20b2a70ac15bc359ada4ee2

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a4bba7701e355ae29c403431f871a537897c363e215cafe706615e270984f17c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      29b65e45ce5233f5ad480673752529026f59a760466a1026bb92fc78d1ccc82396ecb8f07b0e49c9b2315dbef976cb417273c77f4209475036775fe687dd2d60

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x86.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.2MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      38a1b890ce847167d16567cf7b7a5642

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      0f5d66bcaf120f2d3f340e448a268fe4bbf7709d

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      53b605d1100ab0a88b867447bbf9274b5938125024ba01f5105a9e178a3dcdbd

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      907a9aac75f4f241a85ecb94690f74f5818eea0b2241d9ef6d4bf171f17da0f4bc702e2bb90c04f194592fcc61df5c250508d16b886ed837a74b9f45da9627cd

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x86.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.2MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      38a1b890ce847167d16567cf7b7a5642

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      0f5d66bcaf120f2d3f340e448a268fe4bbf7709d

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      53b605d1100ab0a88b867447bbf9274b5938125024ba01f5105a9e178a3dcdbd

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      907a9aac75f4f241a85ecb94690f74f5818eea0b2241d9ef6d4bf171f17da0f4bc702e2bb90c04f194592fcc61df5c250508d16b886ed837a74b9f45da9627cd

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\addon\vcredist2013_12.0.40664\vcredist_x86.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6.2MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      38a1b890ce847167d16567cf7b7a5642

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      0f5d66bcaf120f2d3f340e448a268fe4bbf7709d

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      53b605d1100ab0a88b867447bbf9274b5938125024ba01f5105a9e178a3dcdbd

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      907a9aac75f4f241a85ecb94690f74f5818eea0b2241d9ef6d4bf171f17da0f4bc702e2bb90c04f194592fcc61df5c250508d16b886ed837a74b9f45da9627cd

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\product\VEGAS_Pro_20_SetupInfo.ini

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      9688917becb433ed5126bf54638a998d

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      aa9da79feb56a3cb3bc82b912453ae9b6d82d7d9

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a7ce825b2da02e3c12db07fccc3cfd69e50c1349e0f9261e4fdff8011535e546

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      2ecb77373161c02defa0b55dd3fa00a04a25476b3b3e76f2a7c58952f0b8de8df47761ba0ea8db1f25ba662659dfddb388fdda9899a27048644bea512f20b9ea

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\product\VEGAS_Pro_20_SetupRes.mxres

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      a61f48cc69f48555ca3f104acecc11f5

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      ac20b910c3b979619f893dc0bedde6d92950d0de

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      7bfd208c8244463a88acd85e0955fe84230c7a7a2f994d95957f48248e4bdab7

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      4712ca1de44e532d594cc31058ef624b33f24735a65f6a4003cd5887e67b4fcc394495f2dad5b40c36a56b1193cacc2595e56a0304451e32fcd9727e16c5c450

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\product\VEGAS_Pro_20_es-ES.mst

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      56KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      203db005a51939eb1b46340547d13608

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      19e47700423833bd3f6b33de4d4d1d74d7e81db0

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      22a045f9379755f8c564c57080e3de48ed3b7aef97c66eca4f4fbcb400e8540f

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      b1436dc32b632b4166f6201e513b590c8b54b00c7f4c4612c16c38acdd86e4ca08a9ad4a75639016e4bbac6212fbdd711ec02f0bb814eecdb10ce9ac4c0b4d16

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\product\VEGAS_Pro_20_setup.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.6MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      ef9a05b54e5cf2d919dc96ddd8989e9b

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      291d6fc45e2228f1d58706a13cd5015d07756d61

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      19b354b41d0e454184d0f1571dcaa4406011ca5f81b4bc274ac0de031ac5a573

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      e88be68ef1f27c0ef1473ab22c10faa39871cceab38a6b74a50c4fea51ee2c243e9fb1a2d225b71a0ec946035d32bd5dd3114561b3ed238f2cded0ef5dbdc567

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\product\VEGAS_Pro_20_setup.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.6MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      ef9a05b54e5cf2d919dc96ddd8989e9b

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      291d6fc45e2228f1d58706a13cd5015d07756d61

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      19b354b41d0e454184d0f1571dcaa4406011ca5f81b4bc274ac0de031ac5a573

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      e88be68ef1f27c0ef1473ab22c10faa39871cceab38a6b74a50c4fea51ee2c243e9fb1a2d225b71a0ec946035d32bd5dd3114561b3ed238f2cded0ef5dbdc567

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\product\VEGAS_Pro_20_setup.xml

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      f854edee386b47b82146c53293f7771f

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      299ab3e435639d791e1c1300f109e706f0288973

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      cdaeca08f3129d79b7c4b47cb8ddb3558392658268f8203076c27cb855a9ef80

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      295f74e95eab550253d011ba36534c7ffc04ff60ca8e58b316d2d02ae4700b99e6687643bf5aa439400eaf20d58ab31e8179c0662c76cf264bcdd4385ca55ba4

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mgxsgajiu0p\product\VEGAS_Pro_20_setup_x64.ms_

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.8MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      8d5930d2e9af0a6ee4370e470e57d40b

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      0ed407656c5f4fb5e1a4c8c56255e1ff5d7f8b9b

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      beede3a492c283de23eda7ca7ed847c8a631a5fc56aa9108468155163ef85b83

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      8a3cbb9207ecf082ffe92b0c5dcd9cab8cd48ad8a502afa87bf2bd83e50da16bd6622e8701b13efcaaa1a829fbd94a9fd1849b7bd3ecddd4d994da4b62688701

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\.ba1\wixstdba.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      117KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      a52e5220efb60813b31a82d101a97dcb

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      56e16e4df0944cb07e73a01301886644f062d79b

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e7c8e7edd9112137895820e789baaaeca41626b01fb99fede82968ddb66d02cf

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      d6565ba18b5b9795d6bde3ef94d8f7cd77bf8bb69ba3fe7adefb80fc7c5d888cdfdc79238d86a0839846aea4a1e51fc0caed3d62f7054885e8b15fad9f6c654e

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\.be\vcredist_x64.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      455KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      3284088a2d414d65e865004fdb641936

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      7f3e9180d9025fc14c8a7868b763b0c3e7a900b4

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      102f69b5a98352a6a1a6b26bc2c86ee7611c1f45f5a9ca04f5a8841961f191c6

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      6786fb431addf05df256d0e1383501f96356aa78f66482db9772c58334aead59838abb7db0ea793d4a17627a357598266681c28328485489a21bc2985e751b62

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\cab2C04DDC374BD96EB5C8EB8208F2C7C92

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5.3MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      f5879f5f3ffa839a280ab853338de872

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      3b4366abb2da245416531925ebd8c76adc3e90ef

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      1f2f8f5d60dadbc6e4d3d36c88cc54f22af0a615b609609e748782dc26231174

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      96a88601cedf859c9fcd388d9e8d2fd6139f6e69ab6b05b0e044d1a598cd1a066d27a0f7a7c71bd77576dcdd083dec7a55f2cd9de52ff95aac23171c9f9670de

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\cab5046A8AB272BF37297BB7928664C9503

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1010KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      361903c5ff86511786d7b450301dd640

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      c9fc04a718a388294658590f1240d8c7e9ee4f82

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e95d29cbb06bb323d9d43fc2ce61d4565b0866622a83d93df76430a0c252b433

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      78ceaaaa7f3e1a40ac2528e2f169416d6ebfaba54301754035f2a62f845421c8cddaed84770182e51794c9fb32720aec998d453de2bef621de7a7e2b3b35af20

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\vcRuntimeAdditional_x64

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      140KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      4f782799f84cd006f7f1c750afb04d8c

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      0cd219d326fd40665d2f1b22569e2517792edfd9

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      8909e5c1d917064983595a4e4717f758c2a8df8f59d7b31a5b79b2f95bd8f7cc

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      cfddad551aa5a35b032b7006b167fd322aff46ec8a2934632c087882b24404ee48083ee38b9110add9846880b1ae0bed136bb21ae751e1d3cde9dc27eaed5915

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{042d26ef-3dbe-4c25-95d3-4c1b11b235a7}\vcRuntimeMinimum_x64

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      140KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      87b74c694f295830ffe516ba20de0b93

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      e6996d47bb76ad25954b793f73211524490f55a9

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e88d0915814e622cd1deca849efa23a0d58d5d756be44ebbb4d460d3dac9e816

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      d0fd7f8c8964a99ce7a9d187640acdbff4ca3d16f02e44696706d6107b58890e763a18857bec2b94f92ca559510fea0ae5515ce3de20aa4371aebb38006c05eb

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{61087a79-ac85-455c-934d-1fa22cc64f36}\.ba1\wixstdba.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      117KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      a52e5220efb60813b31a82d101a97dcb

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      56e16e4df0944cb07e73a01301886644f062d79b

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e7c8e7edd9112137895820e789baaaeca41626b01fb99fede82968ddb66d02cf

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      d6565ba18b5b9795d6bde3ef94d8f7cd77bf8bb69ba3fe7adefb80fc7c5d888cdfdc79238d86a0839846aea4a1e51fc0caed3d62f7054885e8b15fad9f6c654e

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece}\.ba1\wixstdba.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      117KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      a52e5220efb60813b31a82d101a97dcb

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      56e16e4df0944cb07e73a01301886644f062d79b

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e7c8e7edd9112137895820e789baaaeca41626b01fb99fede82968ddb66d02cf

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      d6565ba18b5b9795d6bde3ef94d8f7cd77bf8bb69ba3fe7adefb80fc7c5d888cdfdc79238d86a0839846aea4a1e51fc0caed3d62f7054885e8b15fad9f6c654e

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece}\.be\vcredist_x86.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      455KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      0ce624d3a5a586c2bdda26b748da78d7

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b9ed0a86eae645ba19ed08327888a4474c95e34a

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      fd597b58a578cfa46e1818b3b4b795ca6d25225dc11ee86cd491f3d55d7b235d

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      e5bc577bd319eb3ac70c527acfb313fac817e63f5184e6581f6d813491ca0f1a0f80583c14c2b9f2b8fa1df5938c2ae3318a91bda41171c63cd1670c55a85b7f

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece}\cab54A5CABBE7274D8A22EB58060AAB7623

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      973KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      258b65eb9fed187051d5fcec7ce65dc5

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b9afc5fcd8c6ca2ee3dfe9507e9adabdd9ded039

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      80a29d5ce27c6794b9a38e5d5b98d535f877ac3363f450ee7ac0be9394426e49

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      8d5b4c14deb07cc1bf70abfd6e04573822eff3b3937fb3867f5300d97c46f900f2446f923334d1cf5b51b17eeef063d6d59e8540456f310edecd98d223125bb1

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece}\cabB3E1576D1FEFBB979E13B1A5379E0B16

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      7fe64755ed8427ee4512760b69cfaee1

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      30b8c69a5eb83a1804975f04fd0e701e2e9d98cc

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e12efc1bc0c61a7b9ba10a07502ef6833297d028368760da26e63218b744da79

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      dc6c9dc1cb0502be87281ad5bae3ed54c5cfc7cbc4434880f1ba7a33599fc5503d8192ce6afbcf8ffcc142955f593e9830e49e72c0d5c9a7aac5f91024eac38f

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece}\vcRuntimeAdditional_x86

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      140KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      b547a22dcdcf3d035a56f52f1b16c2b5

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      ec9e2fbee0a5c43c021365a35d1d6d04eea335b3

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      7cef0419f52c47f41b9546065e6788f20de07a7f1e647589ab52d88f6c7e50a5

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      6d49cd8266575f3a9cac205425f1fc11b70a58b0a657ba3e4ebafab43cc37ccaf54f551cbf367c8c08b2a6710f82a18ccffb3870683a9b922c91cff19ea7b65a

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{9dff3540-fc85-4ed5-ac84-9e3c7fd8bece}\vcRuntimeMinimum_x86

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      140KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      89d36fccb34b319b60d1850863e0560b

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      f356410e3946063b85750f54998582510b9672c8

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      60714fcdac0a7cbfc45e6ed9bc6d4b7f8536947f630016e5faca5cce1745adcf

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      24e167d0305811409e433c8d78716e9b3af4bce4b3f372276f4730ae7c802b8be8f193a70ac0d44ad6e083a35f03fcfdb2faaae4a9975c9e2ef1254285b0309f

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\.ba1\wixstdba.dll

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      117KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      a52e5220efb60813b31a82d101a97dcb

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      56e16e4df0944cb07e73a01301886644f062d79b

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e7c8e7edd9112137895820e789baaaeca41626b01fb99fede82968ddb66d02cf

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      d6565ba18b5b9795d6bde3ef94d8f7cd77bf8bb69ba3fe7adefb80fc7c5d888cdfdc79238d86a0839846aea4a1e51fc0caed3d62f7054885e8b15fad9f6c654e

                                                                                                                                                                                                                    • memory/536-291-0x0000000006300000-0x000000000637A000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      488KB

                                                                                                                                                                                                                    • memory/964-236-0x000001C772A40000-0x000001C772A56000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                    • memory/1648-222-0x0000017EA3E50000-0x0000017EA3E66000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                    • memory/1684-444-0x00007FF892980000-0x00007FF893441000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      10.8MB

                                                                                                                                                                                                                    • memory/1684-439-0x00007FF7B7D60000-0x00007FF7BA8AF000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      43.3MB

                                                                                                                                                                                                                    • memory/1684-446-0x00007FF892980000-0x00007FF893441000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      10.8MB

                                                                                                                                                                                                                    • memory/1684-441-0x00000000056A0000-0x00000000058A6000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                                    • memory/1684-440-0x00007FF7B7D60000-0x00007FF7BA8AF000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      43.3MB

                                                                                                                                                                                                                    • memory/1684-442-0x00000000059C0000-0x0000000005B90000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1.8MB

                                                                                                                                                                                                                    • memory/1684-443-0x0000000005963000-0x0000000005981000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      120KB

                                                                                                                                                                                                                    • memory/1684-445-0x00007FF892980000-0x00007FF893441000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      10.8MB

                                                                                                                                                                                                                    • memory/2144-240-0x0000016F6A720000-0x0000016F6A736000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                    • memory/2680-271-0x0000000007600000-0x0000000007ACC000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/2680-273-0x0000000006710000-0x0000000006730000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      128KB

                                                                                                                                                                                                                    • memory/2680-285-0x0000000006AC0000-0x0000000006AD2000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      72KB

                                                                                                                                                                                                                    • memory/2680-284-0x0000000006B00000-0x0000000006B3C000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      240KB

                                                                                                                                                                                                                    • memory/2680-283-0x0000000006AA0000-0x0000000006ABA000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      104KB

                                                                                                                                                                                                                    • memory/2680-282-0x00000000073F0000-0x0000000007576000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                    • memory/2680-280-0x0000000006880000-0x000000000688A000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      40KB

                                                                                                                                                                                                                    • memory/2680-281-0x00000000068B0000-0x00000000068D0000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      128KB

                                                                                                                                                                                                                    • memory/2680-276-0x0000000006950000-0x0000000006A1E000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      824KB

                                                                                                                                                                                                                    • memory/2680-279-0x0000000007130000-0x0000000007252000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                    • memory/2680-278-0x0000000006750000-0x000000000676A000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      104KB

                                                                                                                                                                                                                    • memory/2680-277-0x00000000068D0000-0x0000000006914000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      272KB

                                                                                                                                                                                                                    • memory/2680-275-0x0000000006850000-0x0000000006872000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      136KB

                                                                                                                                                                                                                    • memory/2680-274-0x0000000006810000-0x0000000006842000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      200KB

                                                                                                                                                                                                                    • memory/2680-272-0x00000000066F0000-0x0000000006702000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      72KB

                                                                                                                                                                                                                    • memory/2680-270-0x0000000006540000-0x000000000655C000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      112KB

                                                                                                                                                                                                                    • memory/2680-269-0x0000000006770000-0x0000000006802000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      584KB

                                                                                                                                                                                                                    • memory/2680-268-0x0000000006510000-0x0000000006532000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      136KB

                                                                                                                                                                                                                    • memory/2680-267-0x0000000006C00000-0x000000000712C000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5.2MB

                                                                                                                                                                                                                    • memory/2680-266-0x0000000006660000-0x00000000066C6000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      408KB

                                                                                                                                                                                                                    • memory/2680-265-0x00000000065A0000-0x0000000006652000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      712KB

                                                                                                                                                                                                                    • memory/2680-246-0x0000000003150000-0x0000000003158000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                    • memory/2680-247-0x0000000003160000-0x0000000003168000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                    • memory/2680-248-0x0000000005420000-0x0000000005476000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      344KB

                                                                                                                                                                                                                    • memory/2680-249-0x00000000053C0000-0x00000000053D0000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      64KB

                                                                                                                                                                                                                    • memory/2680-250-0x0000000005A30000-0x0000000005FD4000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5.6MB

                                                                                                                                                                                                                    • memory/2680-252-0x00000000053F0000-0x00000000053F8000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                    • memory/2680-253-0x0000000005580000-0x0000000005592000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      72KB

                                                                                                                                                                                                                    • memory/2680-254-0x00000000055A0000-0x00000000055BC000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      112KB

                                                                                                                                                                                                                    • memory/2680-256-0x00000000056D0000-0x000000000573C000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      432KB

                                                                                                                                                                                                                    • memory/2680-259-0x0000000005660000-0x000000000566A000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      40KB

                                                                                                                                                                                                                    • memory/2680-260-0x00000000056B0000-0x00000000056B8000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                    • memory/2680-261-0x0000000006390000-0x00000000063B2000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      136KB

                                                                                                                                                                                                                    • memory/2680-262-0x0000000005A10000-0x0000000005A2E000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      120KB

                                                                                                                                                                                                                    • memory/2680-263-0x0000000006400000-0x000000000643C000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      240KB

                                                                                                                                                                                                                    • memory/2680-264-0x0000000006490000-0x00000000064E0000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      320KB

                                                                                                                                                                                                                    • memory/2716-449-0x0000000005100000-0x0000000005202000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                    • memory/2716-451-0x00007FF892980000-0x00007FF893441000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      10.8MB

                                                                                                                                                                                                                    • memory/2716-450-0x0000000005210000-0x00000000053E0000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1.8MB

                                                                                                                                                                                                                    • memory/2716-448-0x0000000004EF0000-0x00000000050F6000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                                    • memory/2716-452-0x00007FF892980000-0x00007FF893441000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      10.8MB

                                                                                                                                                                                                                    • memory/2716-447-0x00007FF7B7D60000-0x00007FF7BA8AF000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      43.3MB

                                                                                                                                                                                                                    • memory/3048-432-0x0000000006410000-0x0000000006616000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                                    • memory/3048-428-0x0000000004590000-0x0000000004672000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      904KB

                                                                                                                                                                                                                    • memory/3048-438-0x000000000A110000-0x000000000ABD1000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      10.8MB

                                                                                                                                                                                                                    • memory/3048-434-0x00000000067F0000-0x00000000068F2000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                    • memory/3048-435-0x0000000007660000-0x0000000007823000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1.8MB

                                                                                                                                                                                                                    • memory/3048-430-0x00000000061B0000-0x000000000640C000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.4MB

                                                                                                                                                                                                                    • memory/3048-429-0x0000000005BA0000-0x0000000006058000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                    • memory/3048-436-0x000000000A110000-0x000000000ABD1000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      10.8MB

                                                                                                                                                                                                                    • memory/3048-433-0x0000000006620000-0x00000000067F0000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1.8MB

                                                                                                                                                                                                                    • memory/3048-437-0x000000000A110000-0x000000000ABD1000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      10.8MB

                                                                                                                                                                                                                    • memory/3048-427-0x00007FF7B7D60000-0x00007FF7BA8AF000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      43.3MB

                                                                                                                                                                                                                    • memory/3048-431-0x0000000006060000-0x00000000060D9000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      484KB

                                                                                                                                                                                                                    • memory/3092-226-0x000002878BB70000-0x000002878BB86000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                    • memory/3348-230-0x000001BEC59B0000-0x000001BEC59C6000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                    • memory/3376-234-0x000001D69F520000-0x000001D69F536000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                    • memory/3492-220-0x000001F3FB6C0000-0x000001F3FB6D6000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                    • memory/3732-228-0x000001CEADC90000-0x000001CEADCA6000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                    • memory/3948-397-0x0000000005CF1000-0x0000000005D01000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      64KB

                                                                                                                                                                                                                    • memory/4128-453-0x00007FF7C49B0000-0x00007FF7C74FF000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      43.3MB

                                                                                                                                                                                                                    • memory/4128-454-0x00007FF7C49B0000-0x00007FF7C74FF000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      43.3MB

                                                                                                                                                                                                                    • memory/4436-232-0x000001BE25AA0000-0x000001BE25AB6000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                    • memory/4504-242-0x00007FF7C49B0000-0x00007FF7C74FF000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      43.3MB

                                                                                                                                                                                                                    • memory/4668-224-0x0000015A328C0000-0x0000015A328D6000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                    • memory/4908-238-0x0000013CF1F80000-0x0000013CF1F96000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      88KB